Next Article in Journal
Implementation of a Transportable Radar Mode S of Monopulse Secondary Surveillance (MSSR-S) for the Peruvian Civil Aviation Surveillance
Previous Article in Journal
Detection of Transmission State of Multiple Wireless Sources: A Statistical Mechanics Approach
Previous Article in Special Issue
AI-Assisted Multi-Operator RAN Sharing for Energy-Efficient Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Entropy Weighted TOPSIS Based Cluster Head Selection in Wireless Sensor Networks under Uncertainty

1
Department of Computer and Information Science, Raiganj University, Raiganj 733134, India
2
Department of Mathematics, Raiganj University, Raiganj 733134, India
3
School of Mathematics and Statistics, Southwest University, Beibei, Chongqing 400715, China
*
Author to whom correspondence should be addressed.
Telecom 2023, 4(4), 678-692; https://doi.org/10.3390/telecom4040030
Submission received: 15 June 2023 / Revised: 17 July 2023 / Accepted: 12 September 2023 / Published: 3 October 2023

Abstract

:
In recent decades, wireless sensor networks (WSNs) have become a popular ambient sensing and model-based solution for various applications. WSNs are now achievable due to the developments of micro electro mechanical and semiconductors logic circuits with rising computational power and wireless communication technology. The most difficult issues concerning WSNs are related to their energy consumption. Since communication typically requires a significant amount of energy, there are some techniques/ways to reduce energy consumption during the operation of the sensor’s communication systems. The topology control technique is one such effective method for reducing WSNs’ energy usage. A cluster head (CH) is usually selected using a topology control technique known as clustering to control the entire network. A single factor is inadequate for CH selection. Additionally, with the traditional clustering method, each round exhibits a new batch of head nodes. As a result, when using conventional techniques, nodes decay faster and require more energy. Furthermore, the inceptive energy of nodes, the range between sensor nodes and base stations, the size of data packets, voltage and transmission energy measurements, and other factors linked to sensor nodes are also completely unexpected due to irregular or hazardous natural circumstances. Here, unpredictability represented by Triangular Fuzzy Numbers (TFNs). The associated parameters of nodes were converted into crisp ones via the defuzzification of fuzzy numbers. The fuzzy number has been defuzzified using the well-known signed distance approach. Here, we have employed a multi-criteria decision-making (MCDM) approach to choosing the CHs depending on a bunch of characteristics of each node (i) residual energy, (ii) the number of neighbors, (iii) distance from the sink, (iv) average distance of cluster node, (v) distance ratio, and (vi) reliability. This study used the entropy-weighted Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) approach to select the CH in WSNs. For experiments, we have used the NSG2.1 simulator, and based on six characteristics comprising residual energy, number of neighbor nodes, distance from the sink or base station (BS), average distance of cluster nodes, distance ratio, and reliability, optimal CHs have been selected. Finally, experimental results have been presented and compared graphically with the existing literature. A statistical hypothesis test has also been conducted to verify the results that have been provided.

1. Introduction

WSNs have become popular as model-based ambient sensing solutions for various applications. Due to the advancements in microelectromechanical logic circuits, semiconductor logic circuits, growing computing power and communication capabilities, wireless sensor networks have recently become more popular. A WSN is mainly composed of sensor devices from different geographical locations. The sensor node may perform some functionalities, including accumulating sensed information and communicating with other interconnected sensors [1]. Various WSN development efforts aim to address sensor nodes’ design, implementation, and deployment issues depending on a specific need for monitoring and sensing in real-time applications. A WSN type casting depends on the type of environment in which it is applied, like environment monitoring [2], industrial applications [3], surveillance [4], military applications, automation in transportation, and healthcare systems [5]. It has been observed that a WSN comprises of many detecting nodes and a base station (BS). The detecting nodes must transmit data to the base station through diverse areas. Source and sink are other names for the BS and the sensing node, respectively. The sink must gather and analyze the data from all source nodes in the network. The WSN may be used to connect to the base station, which may not have any energy restrictions.
On the other hand, the sensor nodes are completely dependent on their batteries, and they become inactive when they run out of power. Effective battery backup is critical for any WSN strategy based on the difference between WSN protocols and conventional wireless systems. By incorporating diverse clustering techniques, various techniques/methods have been proposed to effectively allocate nodes’ energy in WSNs [6,7]. Non-stationary sensors gradually replace individual smart sensors, which sense, process, and transmit significant information. The merger of several sensors, processors, and other communication devices into a single sensor node component has allowed this to happen. Sensor nodes in large numbers are distributed to form a sensor network. WSNs are extensively used in several sectors viz. green agriculture, healthcare monitoring systems, environmental surveillance [8,9], smart homes [10], air purifiers [11], and disaster management systems [12,13], due to their easy integration, self-organization, and real-time tracking characteristics. Sensor nodes are usually deployed in vulnerable conditions, making battery replacement and node restoration difficult.
Moreover, enhancing the battery performance of nodes is very expensive. As a result, researchers have paid more attention to improving network lifetime and stability using existing network protocols [14]. In WSNs, one of the conventional relaying strategies is flat architecture or hierarchical architecture. Flat architectural techniques experience enormous amounts of information as a network’s hubs grow, resulting in inefficient power generation and a lack of flexibility. Due to this, hierarchical routing algorithms have become more prevalent. Low-Energy Adaptive Clustering Hierarchy (LEACH) [15] is the hierarchical protocol for WSNs. LEACH tends to be the most prominent and commonly used protocol compared to the other protocols.
Moreover, it is a challenging task to obtain information from the interconnected network environment. While transmission will occur, receiving this data at the BS simultaneously is impossible. Using techniques like time division multiple access, node information synchronizes in LEACH-Fuzzy Clustering (LEACH-FC) [16] to acquire the remaining energy information across networks. Along with making a range of information accessible, LEACH-FC also increases the BS’s computing capability compared to the nodes. Consequently, such a centralized process can be used to enhance clustering. Energy consumption depends on their connection while data is transmitted from a node to a BS. Nodes that are not CHs, which aggregate and distribute data from neighboring nodes, can transmit information farther due to clustering. As a result, good CH selection provides improved energy efficiency.
Clustering is the method used in WSNs for wireless communication. Each cluster’s controller also called the “cluster head, “ collects all the data from each sensor node in that cluster and transfers it to the intended location. The node that gets the message from the cluster head joins the cluster after every successive round. If the cluster contains many nodes, the CH will reduce the message’s intensity so fewer nodes may receive it. On the other hand, if the cluster size is small, the CH will increase the message strength to enable many nodes to receive the message [17]. Sensor nodes are distributed relatively densely to meet coverage requirements, allowing some nodes to be idle and extending the network’s life. The number of neighbors, the residual energy level, the distance between the cluster head (CHs) and the receiving station, the rate at which charge is diminished over data transmission, and the average distance between nodes of the same cluster are only a few of the variables that are taken into consideration when selecting a CH. Utilizing multiple attribute decision-making (MADM) techniques helps simplify the difficult and occasionally laborious process of choosing CHs [18,19,20,21]. Various MADM/MCDM techniques address different decision-making problems in engineering, science, and even social science. This strategy’s guiding premise is to select options based on many qualities or criteria, which frequently causes problems in real-world applications because estimating the exact value of all the traits or features is difficult. Fuzzy-based techniques can also be used to lessen these kinds of challenges [22,23]. Cluster head selection is vital for efficient data aggregation, network scalability, load balancing, accurate decision-making, and ensuring security in wireless sensor networks. It determines energy distribution, reduces communication overhead, extends network lifetime, and enhances data fusion. Proper selection maximizes network performance and optimizes resource utilization. Several studies have been made to select CHs based on a single parameter. It has been observed that CHs selected by a single parameter may decrease the network lifetime. Therefore, we have included six characteristics/parameters used to determine the CHs in this research. These characteristics are mainly (i) residual energy (ii) the number of neighbors (iii) distance from the sink, (iv) average distance from cluster node, (v) distance ratio, and (vi) reliability. In this study, we have adopted the entropy weighted TOPSIS method [24,25,26] to select the cluster head in WSNs depending on each node’s mentioned characteristics.
Here, we have applied these approaches to extend the network’s lifetime. Generally, the CHs selection problem is solved, assuming that the initial energy and other related parameters are precisely determined. Also, due to the non-availability of the distribution function of the measurement system, all the parameters can be measured in terms of some special values. However, in reality, the irregular/dangerous natural conditions also cause completely unanticipated changes in the initial energy of nodes, the distance between sensor nodes and base stations, the size of data packets, voltage and transmission energy measurements, and other elements connected to sensor nodes [27,28]. Therefore, the possibility of adjusting the parameter is quite important. Therefore, erroneous parameter values result in uncertainty measures. As a fuzzy set is very helpful in representing uncertainty, Triangular Fuzzy Numbers (TFNs) were used in this work to convey uncertainty [29,30]. The associated parameters of nodes were then converted into crisp ones via the defuzzification of fuzzy numbers. The commonly accepted signed distance technique was used for defuzzification in this scenario. For experiments, we considered a hundred nodes of WSNs where all the nodes were randomly distributed within a 100 × 100   m 2 area and utilized the OPNET modeler to assess the MAC layer functionality of 802.15.4 slotted CSMA/CA. Here, we also considered uncertain parameters for the entire network setup. Overall, the work conducted for this study can be summed up as follows: (i) Cluster head selection in the WSN has been conducted using the entropy-weighted TOPSIS approach. (ii) TFNs were utilized to express all the metrics, including initial node energy, the distance between sensor nodes and base stations, data packet size, voltage and transmission energy measurements, and other aspects related to sensor nodes. (iii) We used uniform distribution to create all nodes in the network design. (iv) The NSG2.1 Simulator was employed for the simulation process. (v) For experiment purposes, the Ad hoc On-Demand Distance Vector (AODV) routing protocol [31] was employed. Finally, experimental results were presented and compared graphically.
The rest of the work is presented as follows. The fundamental mathematical underpinnings and approaches used to build the entire work and theoretical background are presented in Section 2. Section 3 gives certain assumptions and notations to help with the investigation. The mechanism for forming cluster heads for WSNs has been explained in Section 4. Numerical experiments and discussions have been made in Section 5. Section 6 of this study contains its concluding observations.

2. Theoretical Background and the Related Work

This section presents related work as well as some essential concepts that have been employed throughout the investigation.

2.1. Background and Related Work

MCDM and TOPSIS [32] are highly useful in WSN applications. MCDM [33] enables informed decision-making by assessing multiple criteria, such as energy efficiency, coverage, and cost [34]. Meanwhile, TOPSIS ranks alternative WSN solutions based on their similarity to an ideal solution. By employing these methodologies, decision-making processes and optimization in WSN deployments can be significantly enhanced. In WSN, energy consumption is a major issue for several researchers [35,36]. The MCDM approach using TOPSIS has been used to select efficient CHs that enhance accuracy, extend network lifetime, and reduce CH-associated energy consumption overhead [37,38]. Another approach, cluster protocols [39], provides improved energy efficiency, scalability, fault tolerance, data aggregation, extended network lifetime, and efficient routing in WSNs, making them a valuable choice for WSN deployments. There are several clustering protocols, like LEACH, Adaptive Periodic Threshold-based Energy-Efficient Network (APTEEN) [40], Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [41], Centralized LEACH (LEACH-C) [42], Cross-Layered Clustering and Cooperative Communication Hybrid Architecture (C3HA) [43], Hybrid Energy-Efficient Distributed Clustering (HEED) [44], Modified LEACH (LEACH-M) [45], and Adaptive LEACH (ALEACH) [46], have been applied to extend the network’s lifetime. LEACH introduced the concept of clustering in WSNs, utilizing a randomized rotation of cluster heads to distribute energy consumption evenly. It offers energy efficiency and scalability. The main issue related to LEACH is that it chooses the CHs randomly, directly impacting the network lifespan. Compared to LEACH, APTEEN uses a dynamic threshold-based approach to select cluster heads, considering residual energy and distance to the base station. It improves network lifetime and energy efficiency. PEGASIS is another popular clustering protocol that optimizes data aggregation and transmission by forming a series of sensor nodes. It reduces energy consumption and extends the network lifetime. Another important factor that improves the quality of WSN communication is reliability. The above protocol omitted the reliability factor introduced by C3HA. C3HA integrates cross-layer information exchange and cooperative communication to enhance network performance, reliability, and energy efficiency. LEACH-M addresses the shortcomings of LEACH by incorporating a mobility-based clustering approach. It adapts to node mobility and improves network stability, whereas ALEACH enhances the LEACH protocol by dynamically adjusting cluster formation based on network conditions, energy levels, and data requirements. The selection of CHs using several network parameters has been introduced by HEED, which incorporates residual energy and node proximity as basic criteria for selecting CHs. Upon reviewing multiple WSN studies focused on extending network lifetime, a clear correlation has been found between clustering mechanisms and selecting suitable CHs. This study aims to extend the network lifetime by dividing the network into an appropriate number of clusters and employing the entropy-weighted TOPSIS technique to select CHs based on six network parameters. Additionally, this study introduces uncertainty using triangular fuzzy numbers (TNF) for defuzzifying experimental parameters, enhancing the research’s depth and complexity.

2.2. Basic Concepts of Fuzzy Sets

Let X be a universal set. A fuzzy set is formed by a function μ A ˜ ( x ) , that corresponds each element x in X to a real number in the interval [ 0 , 1 ] . The function μ A ˜ ( x ) is designated as a membership function in the fuzzy set A ˜ . An α -cut of a fuzzy set A ˜ is a crisp set A α that covers all the points of X that have a membership grade in A ˜ greater than or equal to the prefixed value α . It is defined as A α = { x X : μ A ˜ ( x ) α } , where μ A ˜ ( x ) is the membership function of A ˜ , α [ 0 , 1 ] . A fuzzy set A ˜ is normal if there exists at least one element x X such that μ A ˜ ( x ) = 1 . A ˜ is convex if every α -cut of A ˜ is a convex set. A fuzzy set is called fuzzy number when it is convex and normal.
A fuzzy number A ˜ = ( a , b , c ) , where a b c is called a Triangular Fuzzy Number (TFN), and its membership function μ A ˜ ( x ) : X [ 0 , 1 ] is as follows:
μ A ˜ ( x ) = { x a b a if a x b 1 if   x = b c x c b if b x c
Let A ˜ = ( a , b , c ) be a triangular fuzzy number, then α -level set of A ˜ is A α = { x X : μ A ˜ ( x ) α } = [ A α , A α + ] where A α = a + ( b a ) α and A α + = c ( c b ) α , α [ 0 , 1 ] . Now, we can represent A ˜ as A ˜ = α [ 0 , 1 ] A α . Here, we can derive the signed distance [47] from [ A α , A α + ] to 0 ˜ as D ( A α , 0 ˜ ) = 1 2 ( A α + A α + ) . If A ˜ = ( a , b , c ) is the TFN, then we have D ( A ˜ , 0 ˜ ) = 1 2 0 1 ( A α + A α + ) d α = 0.25 ( a + 2 b + c ) .

2.3. Computation of Criteria Weights Based on Entropy Measure

To determine the criteria weights, we have used the entropy weighted approach. The entropy weighted approach measures the capacity of each criterion to contain decision information in order to estimate the relative importance of characteristics. The amount of entropy value reflects how unpredictable a message is. One could investigate the work of Clausius [48] and Shannon [49] for additional information.
If Π = ( π i j ) m × n is the decision matrix and w = ( w 1 , w 2 , , w n ) be the weight vector, and 0 w j 1 and w j = 1 are in relation to the m alternatives and n criteria then the weight w j , j = 1 , 2 , , n can be obtained as follows:
Step 1:
calculate Ω j = 1 log ( m ) i = 1 m p i j log ( p i j ) , j = 1 , 2 , , n where p i j = π i j i = 1 m π i j .
Here, it is stated that lim p i j 0 p i j log p i j 0 ;
Step 2:
calculate Ψ j = 1 Ω j , j = 1 , 2 , , n ;
Step 3:
calculate w j = Ψ j j = 1 n Ψ j , j = 1 , 2 , , n .

2.4. Finding the Best Alternative Using TOPSIS Method Based on TFNs

To overcome an issue involving MCDM, this section describes how to use the TOPSIS strategy when the weights of the criteria are unknown and can be estimated by using Shannon entropy method.
Assume that there exist m alternatives A 1 , A 2 , , A m and n criteria C 1 , C 2 , , C n with a weight vector w = ( w 1 , w 2 , , w n ) , where 0 w j 1 and w j = 1 . A decision matrix Z ˜ = ( z ˜ i j ) m × n might be used to convey an alternative’s characteristics in relation to the criteria expressed by a TFN z ˜ i j = ( z i j 1 , z i j 2 , z i j 3 ) where i = 1 , 2 , , m and j = 1 , 2 , , n . Employing the signed distance method, mentioned in Section 2.2, the MCDM decision matrix (1) has been formed as follows:
( D ( Z ˜ , 0 ˜ ) ) m × n = ( D ( z ˜ 11 , 0 ˜ ) D ( z ˜ 12 , 0 ˜ ) D ( z ˜ 1 n , 0 ˜ ) D ( z ˜ 21 , 0 ˜ ) D ( z ˜ 22 , 0 ˜ ) D ( z ˜ 2 n , 0 ˜ ) D ( z ˜ m 1 , 0 ˜ ) D ( z ˜ m 2 , 0 ˜ ) D ( z ˜ m n , 0 ˜ ) )
Let I + = ( 1 , 1 , , 1 ) and I = ( 0 , 0 , , 0 ) represent consequently, the positive and negative ideal solutions for the m alternatives A 1 , A 2 , , A m . Here, we used the following formula to compute the separation measures s m i + = s m i + ( I + , A i ) and s m i = s m i ( I , A i ) of each alternative from positive ideal and negative ideal solutions:
s m i + = j = 1 n ( w j ( 1 D ( z ˜ i j , 0 ˜ ) ) 2
and
s m i = j = 1 n ( w j D ( z ˜ i j , 0 ˜ ) ) 2
Here D ( z ˜ i j , 0 ˜ ) = 0.25 ( z i j 1 + 2 z i j 2 + z i j 3 ) , i = 1 , 2 , , m , j = 1 , 2 , , n , and w j , j = 1 , 2 , , n are calculated using the entropy-weighted method discussed in Section 2.3.
Using Equations (2) and (3), the relative closeness of m alternatives A 1 , A 2 , , A m with respect to the positive ideal solution I + is computed as follows:
R C i ( A i ) = s m i s m i + s m i + , i = 1 , 2 , , m
The best alternative among a group of specified possible alternatives can be identified using Equation (4), which also determines the ranking order of all alternatives. The alternatives may then be ranked according to the closeness coefficient, with the alternative with the higher rank being considered the best choice.

3. Some Assertions and Symbols

We have considered a WSN here under the following assertions:
  • Nodes are distributed at random places inside a square area;
  • The base station is positioned outside the square’s bounds, enabling communication with nodes inclined to multi-path attenuation. Multi-path attenuation does not influence communication between nodes;
  • The nodes are cohesive because they share the same capabilities and initial battery energy while performing different tasks depending on the time of day;
  • Communication between any node, the BS, or any other node is possible.
  • The nodes are immobile;
  • Every node senses its environment and emits a signal of the same length;
  • Numerous aspects of sensor nodes, including the primary energy of nodes, the distance between sensor nodes and receiving stations, the size of information packets, and estimates of voltage and transmission power, among others, have imprecise values due to erratic/dangerous natural conditions.
Table 1 provides a list of symbols used in the paper.

4. Cluster Heads Formation Method for WSN

The nodes designated to serve as CHs should inform the rest of the nodes in the network that they have been selected for such a function. To achieve this, each of the chosen CHs transmits an appropriate signal throughout the network announcing their selection as cluster heads. This brief message provides the network node identification and a header, characterizing it as an update message. Each non-cluster head node selects the CH that is closest to it and uses the least amount of transmission energy to form its cluster. The link is connected to the CH with the shortest distance and received signal amplitude. The node and base station (BS) will respond directly if the distance between it and the CH is longer than its distance from the BS. Otherwise, it connects the cluster using the shortest distance. Here, we have considered the shortest distance measure as Euclidean distance.
If d b is the distance between CH and a designated node, then d b can be measured using the formula as follows:
d b = ( X W x ) 2 + ( Y W y ) 2
where ( X , Y ) and ( W x , W y ) are the position of cluster head (CH) and node location.
The BS, which is situated outside of the network area, is a node with improved processing abilities and no limited battery life. In order to obtain an appropriate signal-to-noise ratio (SNR), a k bit of information is transmitted over a distance d b using a conventional radio energy dissipation model [23]. During data communication, the data transmission energy consumption ( E T e ) and energy consumption due to data reception ( E D r x ) are approximated using Equations (6) and (7).
E T e = { k × E L e + k × e f s × d b 2 i f d b d b 0 k × E L e + k × e m p × d b 4 i f d b d b 0
E D r x = k × E L e
It is to be noted that the electronic energy E L e depends on various features, viz. coding of digital devices, modulation, filtering, and bandwidth of the signal, whereas e f s d b 2 and e m p d b 4 are dependent on the distance to the receiver and acceptable bit-error rate.
Following the creation of the clusters, the CH, after receiving all CH connect signals from every node, assigns a timeframe for each designated node. The responsibility of gathering information from all cluster nodes belongs to each cluster head. The CH transmits the message to the BS after applying data aggregation when a packet of data from all the individuals is received. It has been observed that several protocols have been used for re-clustering strategy and choosing CHs using a probabilistic approach rather than a deterministic approach. Data transmission and re-clustering proceed for several cycles until all nodes are still alive. As dead nodes begin to appear, the number of active nodes in the cluster diminishes, and the smaller clusters that have lesser power than the predetermined threshold are combined with the larger ones. As a result, the cluster size starts to slow down anytime the number of active nodes diminishes. Determining the number of CHs in each cycle is crucial for increasing the WSN’s lifetime and energy efficiency. Here, we have calculated the requisite number of clusters [42] O c , distance ratio, and reliability using the following equations:
O c = e f s π ( e m p d b 4 E L e ) Z N n
d r = d s + d n c d s × d n c
R = 1 N c N n o d e

4.1. Node Selection Criteria:

In our experiment, we have calculated reliability, residual energy, the number of neighbor nodes, the distance from the sink (BS), the average distance of cluster nodes, and the distance ratio (see Table 2). Following the first simulation round, the best CHs were chosen based on six criteria: residual energy, number of neighbors, distance from the sink (BS), average distance of cluster nodes, distance ratio, and reliability. Based on our hypothesis, we divided the network into 14 clusters for this study, with a cluster head in each cluster. We have utilized the NSG2.1 simulator and tool command language for this simulation. Here, we have generated 100 nodes within 100 × 100 m 2 and run the simulation on NS2 for the first round. For the subsequent round, the selection of CHs has been made by using our proposed algorithm (see Section 4.2). We have plotted the node, and it has been depicted in Figure 1.

4.2. WSNs Lifetime Extension Algorithm via MCDM and TOPSIS Technique

We proposed an algorithm based on MCDM and TOPSIS techniques to extend the lifetime of WSNs. This algorithm has been termed Algorithm 1. Algorithm 1 is as follows:
Algorithm1. WSN Lifetime Extension Algorithm
Step 1: Distribute 100 nodes in an entire network with BS location (50,175) and spread nodes randomly over 100 × 100   m 2 areas.
Step 2: In order to find the values of different parameters, all nodes will send the data to BS for the first round of simulation.
Step 3: The network is divided into O c a number of clusters using Equation (8).
Step 4: Weight is assigned to each node using the entropy-weighted approach. The TOPSIS technique is used to select CHs from each cluster for the second round of simulation based on the weight of predefined parameters for CH selection.
Step 5: Repeat steps 6 to 13 until the residual energy of all the nodes has yet to be finished.
Step 6: When a node’s residual energy exceeds all other nodes in the same cluster, the counter increases.
Step 7: When a node’s distance from the sink is less than that of all other nodes in the same cluster, the counter increases.
Step 8: When a node’s number of neighbors exceeds that of all other nodes in the same cluster, the counter increases.
Step 9: When the average distance of cluster nodes is smaller than that of all other Cluster nodes within the same cluster, the counter increases.
Step 10: When the distance ratio of a node is smaller than the distance ratio of all other nodes within the same cluster, the counter increases.
Step 11: The node with the largest counter value is designated as a CH for the next round.
Step 12: If a cluster has fewer than three nodes, nodes will be added to the closest cluster, considering each cluster’s reliability.
Step 13: Jump to the next round.
Step 14: Stop.

5. Numerical Experiment and Discussions

Unsafe or unreliable communication has yielded detrimental consequences, including increased noise and adverse effects on sensor node batteries. The battery life directly affects the network’s longevity, which is closely tied to residual energy. Furthermore, the presence of noisy data necessitates extra caution and thorough processing. Lastly, the distance between sensors, logic, and actuators is critical in facilitating replacements. This incident represents the uncertainty of WSNs. For computational experiments, we used a thousand nodes of WSNs where all the nodes were randomly distributed within a 100 × 100 m 2 area and ran the simulation on NS2 for the first round. In our experiment, we utilized the OPNET modeler to assess the MAC layer functionality of 802.15.4 slotted CSMA/CA. Here, we also considered uncertain parameters for the entire network setup, which has been shown in Table 3. Also, we estimated the optimum range of O c . Here, we considered N n = 100 nodes, Z = 100 m , e f s = 10 pJ , e mp = 0.0013 pJ , and 76 m < d b < 168 m . Therefore, the expected optimum number of clusters was in the range (1, 10), i.e., 1 < O c < 10 .
Table 2. Decision parameter for selecting cluster heads.
Table 2. Decision parameter for selecting cluster heads.
Cluster HeadResidual EnergyNumber of NeighborsDistance from the SinkAverage Distance of Clusters NodesDistance RatioReliability
CH10.96958157.20313.2320.08190.92
CH20.9654477.22315.5270.07740.96
CH30.96988141.17326.9370.04420.92
CH40.96537135.05931.0490.03960.93
CH50.9688492.44447.7520.03180.96
CH60.96413115.06922.6880.05280.97
CH70.9647485.98822.3480.05640.96
CH80.96575106.36724.4330.05030.95
CH90.96496102.18115.6940.07350.94
CH100.96561093.39133.7240.04040.9
CH110.96989119.43617.0160.06710.91
CH120.96886109.22428.8630.04380.94
CH130.9698285.15829.50.04560.98
CH140.965610147.86817.7060.06320.9
It ought to be noted that the signed distance method mentioned in Section 2.2 has been used to transform fuzzy parameters into defuzzified values. For example, I i = ( 0.7 , 1.0 , 1.2 ) and D ( I ˜ i , 0 ˜ ) = 0.25 ( 0.7 + 2 × 1.0 + 1.2 ) = 0.25 × 3.9 = 0.975 . Other parameters have undergone a similar computation.
Using Equation (8), we have calculated the value of O c . It is to be noted that the value of O c lies between 1 < O c < 10 , and consequently, we have chosen the value of O c = 9 for the purpose of the numerical experiment. Hence, we have selected nine cluster heads based on six criteria: residual energy, number of neighbors, distance from the sink, average distance of cluster node, distance ratio, and reliability using the MCDM approach. Here, Table 3 is a decision matrix of our proposed problem. Using Table 3, we have calculated weight vectors using the entropy method described in Section 2.3. The weight vector w using Section 2.3 has been computed as w = ( 0.156 , 0.176 , 0.167 , 0.175 , 0.170 , 0.156 ) . Further, we have calculated s m i + and s m i using Formulas (2) and (3). These are shown in Table 4.
Using separation measures of each alternative, we have calculated the closeness coefficient using Equation (4), which has been shown in Table 5.
The alternative with the highest rank is regarded as the best choice. Therefore, we have chosen nine cluster heads based on the closeness coefficient. Table 6 (Option 1) and Table 7 (Option 2) provide these nine cluster heads.
The network lifespan is expressed in the number of cycles until its single node exhausts its remaining energy. The experimental results depending on Options 1 and 2 are shown in Figure 2 and Figure 3 respectively. On a setup area, sensor nodes were distributed at random. Network lifetimes, which show the number of active nodes over time in cycles, have been plotted.
Figure 2 shows that the remaining energy diminished after 1900 cycles, whereas Figure 3 shows that the remaining energy diminished completely after 2200 cycles. Consequently, Option 2 is acceptable as compared to Option 1. However, both are acceptable compared to the LEACH protocol. Figure 4 presents comparative results between the LEACH protocol and our proposed method. In this research, it has been found that the proposed strategy with both alternatives shows 31% and 40% network lifetime in comparison with LEACH, where 31% indicates 1900 simulation rounds and 40% to 2200 rounds. The CH selection in LEACH is random, potentially resulting in selecting nodes with low residual energy as CHs. When CHs die after a few simulation rounds, the cluster formation collapses, necessitating data exchange and consuming significant residual energy. This reduces the network’s longevity. To address this, our study with uncertain parameter values compares the proposed approach with LEACH regarding cluster residual energy. The findings indicate that in LEACH, the residual energy of all nodes depletes after 1300 rounds, whereas our proposed approach takes 2200 rounds to exhaust all residual energy shown in Figure 5. Compared with energy utilization, our proposed approach consumes 29% less energy than LEACH due to determining the right CHs.

5.1. Time Complexity of Our Proposed Algorithm

In our proposed approach, we have O c clusters and N c nodes in each cluster; the algorithm necessitates around Θ ( O c ) operations to access O c clusters. Determining the reliability of each cluster takes approximately Θ ( N c 2 ) time. Additionally, the algorithm involves constant time operations for calculating residual energy, distance from the sink, number of neighbors, average distance of cluster nodes, and the distance ratio denoted as . Thus, the overall time complexity of the algorithm can be approximated as Θ ( O c N c 2 + ) or simplified as Θ ( O c N c 2 ) .

5.2. Result Validation

We have validated our proposed result using a statistical hypothesis in this subsection.
Null Hypothesis ( H o ): the average number of simulation rounds falls within the 95% confidence interval, specifically between 1800 and 2300.
Alternate Hypothesis ( H 1 ): the number of simulation rounds does not fall within the 95% confidence interval.
We set the significance level at α = 0.05 , and T represents a random variable following the t-distribution. The 95% confidence interval is between 1800 and 2300. The simulation was executed 50 times, and the average result obtained was 2200. Using statistical calculations, we have determined that the T-Score is 0.3496 and p (the probability of T being greater than 0.3496) is 0.7968.
Since ( p > α = 0.05 ) , we do not have sufficient evidence to reject the null hypothesis ( H o ). Therefore, we can conclude that the average number of simulation rounds falls within the 95% confidence interval, i.e., 1800 and 2300.

6. Concluding Remarks

The MCDM method for cluster head selection in WSNs under uncertainty has been examined in this paper. TOPSIS, an entropy-based technique, is used to choose the CHs in WSNs. The number of clusters/cluster heads is optimized by considering six parameters: reliability, residual energy, the number of neighbor nodes, the distance from the sink (BS), the average distance of non-cluster nodes, and the distance ratio. We employed Triangular Fuzzy Numbers to express all the characteristics, including initial node energy, the distance between sensor nodes and base stations, the size of data packets, voltage, and transmission energy measurements, and other matters about sensor nodes (TFNs). For the context of this research, we segregated the entire network into 14 clusters, with a cluster head in each cluster, based on our hypotheses. For this experiment, we used the NSG2.1 simulator and tool command language. We also used the AODV protocol for simulation. The nodes in this network topology were generated using a uniform distribution, and a technique for choosing cluster heads was also proposed. The lifespan achieved by the LEACH protocol was compared to the lifetime achieved by the simulated network. Simulation results show that our suggested approach, based on the entropy-weighted TOPSIS method, significantly extends network lifetime and saves energy compared to the LEACH protocol. Finally, the overall strategy used in this work will serve well enough for the selection of cluster heads as well as other network design aspects associated with WSNs, including uncertain parameters.

Author Contributions

S.S., L.S., K.T. and T.S. formulated and studied the problem. S.S., L.S., K.T. and T.S. wrote the first draft of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

The authors are grateful to anonymous referees for their constructive as well as helpful suggestions and comments to revise the paper in the present form.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yetgin, H.; Cheung, K.T.K.; El-Hajjar, M.; Hanzo, L.H. A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef]
  2. Wang, P.; Sun, Z.; Vurun, M.C.; Al-Rodhaan, M.A.; Al-Dhelaan, A.M.; Akyildiz, I.F. On network connectivity of wireless sensor networks for sandstorm monitoring. Comput. Netw. 2011, 55, 1150–1157. [Google Scholar] [CrossRef]
  3. Villaverde, B.C.; Rea, S.; Pesh, D. InRout-A QoS aware route selection algorithm for industrial wireless sensor networks. Ad Hoc Netw. 2012, 10, 458–478. [Google Scholar] [CrossRef]
  4. Komar, C.; Donmez, M.Y.; Ersoy, C. Detection quality of border surveillance wireless sensor networks in the existence of trespassers’ favorite paths. Comput. Commun. 2012, 35, 1185–1199. [Google Scholar] [CrossRef]
  5. Corchado, J.M.; Bajo, J.; Tapia, D.I.; Abraham, A. Using heterogeneous wireless sensor networks in atelemonitoring system for healthcare. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 234–240. [Google Scholar] [CrossRef]
  6. Yu, J.Y.; Chong, P.H.J. A survey on clustering schemes for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 2005, 7, 32–48. [Google Scholar] [CrossRef]
  7. Abbas, A.A.; Younis, M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007, 30, 2826–2841. [Google Scholar] [CrossRef]
  8. Wu, H.; Miao, Z.; Wang, Y.; Lin, M. Optimized recognization with few instances based on semantic distance. Vis. Comput. 2015, 31, 367–375. [Google Scholar] [CrossRef]
  9. Lin, B.; Guo, W.; Xiong, N.; Chen, G.; Vasilakos, A.V.; Zhang, H. A pretreatment Workflow Scheduling Approach for Big Data Applications in MulticloudEnviorments. IEEE Trans. Netw. Serv. Manag. 2015, 13, 581–594. [Google Scholar] [CrossRef]
  10. Alaidad, A.; Zhou, L. Patients’ adoption of WSN-based smart home healthcare system: An integrated model of facilitators and barriers. IEEE Trans. Prof. Commun. 2017, 60, 4–23. [Google Scholar] [CrossRef]
  11. Boubrima, A.; Bechkit, W.; Rivano, H. Optimal WSN deployment models for air pollution monitoring. IEEE Trans. Wirel. Commun. 2017, 16, 2723–2735. [Google Scholar] [CrossRef]
  12. Kadri, B.; Bouyeddou, B.; Moussaoui, D. Early Fire Detection System Using Wireless Sensor Networks. In Proceedings of the 2018 International Conference on Applied Smart Systems (ICAAA), Medea, Algeria, 24–25 November 2018; pp. 1–4. [Google Scholar]
  13. Lule, E.; Bulega, T.E. A Scalable Wireless Sensor Network (WSN) Based Architecture for Fire Disaster Monitoring in the Developing World. Int. J. Comput. Netw. Inf. Secur. 2015, 2, 45–49. [Google Scholar] [CrossRef]
  14. Guleria, K.; Verma, A.K. Comprehensive review for energy efficient hierarchical protocols on wireless sensor networks. Wirel. Netw. 2019, 25, 1159–1183. [Google Scholar] [CrossRef]
  15. Heinzelman, W.R.; Chandrakasan, A.; Balakrisnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 2000 International Conference on System Sciences, Maui, HI, USA, 7 January 2000; pp. 1–10. [Google Scholar]
  16. Lata, S.; Mehfuz, S.; Urooj, S.; Alrowais, F. Fuzzy clustering algorithm for enhancing reliability and network lifetime of wireless sensor networks. IEEE Access 2020, 8, 66013–66024. [Google Scholar] [CrossRef]
  17. Abdul Latiff, N.M.; Tsimenidis, C.C.; Sharif, B.S. Energy-Aware Clustering for Wireless Sensor Networks using Particle Swarm Optimization. In Proceeding of the 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Communications, Athens, Greece, 3–7 September 2007; pp. 1–5. [Google Scholar]
  18. Zanakis, S.H.; Solomon, A.; Wishart, N.; Dublish, S. Multi-attribute decision making: A simulation comparison of select methods. Eur. J. Oper. Res. 1998, 107, 507–529. [Google Scholar] [CrossRef]
  19. Zopounidis, C.; Doumpos, M. Multicriteria classification and sorting methods: A literature review. Eur. J. Oper. Res. 2002, 138, 229–246. [Google Scholar] [CrossRef]
  20. Jahan, A.; Mustapha, F.; Ismail, M.Y.; Sapuan, S.M.; Bahraminasab, M. A comprehensive VIKOR method for material selection. Mater. Des. 2011, 32, 1215–1221. [Google Scholar] [CrossRef]
  21. Chauhan, A.; Vaish, R. Pareto optimal microwave dielectric materials. Adv. Sci. Eng. Med. 2013, 5, 149–155. [Google Scholar] [CrossRef]
  22. Xu, X.; Fallahi, N.; Yang, H. Efficient CUF-based FEM analysis of thin-wall structures with Lagrange polynomial expansion. Mech. Adv. Mater. Struct. 2022, 29, 1316–1337. [Google Scholar] [CrossRef]
  23. Azad, P.; Sharma, V. Cluster head selection in wireless sensor networks under fuzzy environment. ISRN Sens. Netw. 2013, 2013, 909086. [Google Scholar] [CrossRef]
  24. Senapati, T.; Yager, R.; Fermatean, R. fuzzy weighted averaging/geometric operators and its application in multi-criteria decision-making methods. Eng. Appl. Artif. Intell. 2019, 85, 112–121. [Google Scholar] [CrossRef]
  25. Bai, Z.Y. An interval valued intuitionistic fuzzy TOPSIS method based on an improved score function. Sci. World J. 2013, 2013, 879089. [Google Scholar] [CrossRef] [PubMed]
  26. Sahoo, L. Some Score Functions on Fermatean Fuzzy Sets and Its Application to Bride Selection Based on TOPSIS Method. Int. J. Fuzzy Syst. Appl. 2021, 10, 18–29. [Google Scholar] [CrossRef]
  27. Sahoo, L.; Sen, S.; Tiwary, K.; Samanta, S.; Senapati, T. Modified Floyd-Warshall’s algorithm for maximum connectivity in Wireless Sensor Networks under uncertainty. Discret. Dyn. Nat. Soc. 2022, 2022, 5973433. [Google Scholar] [CrossRef]
  28. Sahoo, L.; Sen, S.; Tiwary, K.; Samanta, S.; Senapati, T. Optimization of data distributed network system under uncertainty. Discret. Dyn. Nat. Soc. 2022, 2022, 7806083. [Google Scholar] [CrossRef]
  29. Zadeh, L.A. Fuzzy logic = computing with words. IEEE Trans. Fuzzy Syst. 1996, 4, 103–111. [Google Scholar] [CrossRef]
  30. Zadeh, L.A. Fuzzy Sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  31. Chakeres, I.D.; Belding-Royer, E.M. AODV routing protocol implementation design. In Proceedings of the 2004 24th International Conference on Distributed Computing Systems Workshops, Tokyo, Japan, 23–24 March 2004; pp. 698–703. [Google Scholar]
  32. Torfi, F.; Farahani, R.Z.; Rezapur, S. Fuzzy AHP to determine the relative weights of evaluation criteria and fuzzy TOPSIS to rank the alternatives. Appl. Soft Comput. J. 2010, 10, 520–528. [Google Scholar] [CrossRef]
  33. Sen, S.; Sahoo, L.; Tiwary, K.; Simic, V.; Senapati, T. Wireless Sensor Network Lifetime Extension via K-Medoids and MCDM Techniques in Uncertain Environment. Appl. Sci. 2023, 13, 3196. [Google Scholar] [CrossRef]
  34. Feeney, L.M. An Energy-Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. Mob. Netw. Appl. 2001, 6, 239–249. [Google Scholar] [CrossRef]
  35. Farahani, S. ZigBee Wireless Networks and Transceivers. In Newnes; Elsevier: Amsterdam, The Netherlands, 2011. [Google Scholar]
  36. Karaca, O.; Sokulla, R.; Prasad, N.R.; Prasad, R. Application oriented multi criteria optimization in WSN using on AHP. Wirel. Pers. Commun. 2012, 65, 689–712. [Google Scholar] [CrossRef]
  37. Mainwaring, A.; Polastre, J.; Szewczyk, R.; Culler, D.; Anderson, J. Wireless sensor networks for habitat monitoring. In Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications 2002, Atlanta, GA, USA, 28 September 2002; pp. 1–10. [Google Scholar]
  38. Dalia, R.; Gupta, R. Cluster Head Election in Wireless Sensor Network: A comprehensive Study and Future Directions. Int. J. Comput. Netw. Appl. 2021, 7, 178–192. [Google Scholar]
  39. Raman, C.J.; Ali, L.; Gobalakrishnan, N.; Pradeep, K. An Overview of the Routing Techniques Employed in Wireless Sensor Network. In Proceedings of the 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 28–30 July 2020; pp. 332–336. [Google Scholar]
  40. Ma, J.; Wang, S.; Meng, C.; Ge, Y.; Du, J. Hybrid energy-efficient APTEEN protocol based on ant colony algorithm in wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 102. [Google Scholar] [CrossRef]
  41. Misra, S.; Kumar, R. An analytical study of LEACH and PEGASIS protocol in wireless sensor networks. In Proceedings of the 2017 International Conference on Innovations in Information, Embedded and Communication Systems, Coimbatore, India, 17–18 March 2017; pp. 1–5. [Google Scholar]
  42. Heinzelman, W.R.; Chandrakasan, A.P.; Balakrishnan, H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  43. Tay, M.; Senturk, A. A New Energy-Aware Cluster Head Selection Algorithm for Wireless Sensor Networks. Wirel. Pers. Commun. 2022, 122, 2235–2251. [Google Scholar] [CrossRef]
  44. Ullah, Z. A Survey on Hybrid, Energy Efficient and Distributed (HEED) Based Energy Efficient Clustering Protocols for Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 124, 2685–2713. [Google Scholar] [CrossRef]
  45. Zhao, L.; Qu, S.; Yi, Y. A modified cluster-head selection algorithm in wireless sensor networks based on LEACH. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 287. [Google Scholar] [CrossRef]
  46. Ali, M.S.; Dey, T.; Biswas, R. ALEACH: Advanced LEACH Routing Protocol for Wireless Micro-sensor Networks. In Proceedings of the 2008 International Conference on Electrical and Computer Engineering, Dhaka, Bangladesh, 20–22 December 2008; pp. 909–914. [Google Scholar]
  47. Clausius, R. Ueber die bewegende Kraft der Wärme und die Gesetze, welchesichdaraus für die Wärmelehreselbstableitenlassen. Ann. Phys. 1950, 155, 368–397. [Google Scholar] [CrossRef]
  48. Shannon, C. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  49. Dong, X.; Lu, H.; Xia, Y.; Xiong, Z. Decision-making Model under Risk Assessment Based on Entropy. Entropy 2016, 18, 404. [Google Scholar] [CrossRef]
Figure 1. Distribution of 100 nodes over the area 100 × 100   m 2 .
Figure 1. Distribution of 100 nodes over the area 100 × 100   m 2 .
Telecom 04 00030 g001
Figure 2. Number of nodes alive vs. number of rounds for Option 1.
Figure 2. Number of nodes alive vs. number of rounds for Option 1.
Telecom 04 00030 g002
Figure 3. Number of nodes alive vs. number of rounds for Option 2.
Figure 3. Number of nodes alive vs. number of rounds for Option 2.
Telecom 04 00030 g003
Figure 4. Network lifetime comparison between LEACH and the proposed approach.
Figure 4. Network lifetime comparison between LEACH and the proposed approach.
Telecom 04 00030 g004
Figure 5. Total residual energy of all clusters vs. number of rounds.
Figure 5. Total residual energy of all clusters vs. number of rounds.
Telecom 04 00030 g005
Table 1. List of symbols.
Table 1. List of symbols.
SymbolDescription
d b Distance to the base station
d b 0 Fixed measuring distance to the base station
d s Distance from the sink
d n c A node’s distance from each node in a cluster or its number of neighbors
( X , Y ) Position of CHs in a WSN
( W x , W y ) Position of nodes in a WSN
I e n e r g y Initial energy
E L e Electronics energy
E T e The energy used for data transmission
e f s Amplification of energy to overcome open space
e m p Amplification of energy to navigate the multi-path
E D r x The usage of energy during data receipt
O c The optimal number of cluster heads
Z The dimensions of the square area
N n o d e The total number of nodes in the network
N c The number of nodes in a cluster
R The reliability of a cluster
Table 3. The experimental parameter utilized for WSNs.
Table 3. The experimental parameter utilized for WSNs.
ParametersParametric Value as per AssumptionsDefuzzified Value
N n 100
I ˜ i (0.7, 1, 1.2)0.975
Coordinate of BS(50, 175)
Size of the data packet(495, 500, 510)501.25
Hello/broadcast/CH join message(22,25,28)25
e ˜ f s (8, 10, 12)10
e ˜ m p (0.001, 0.0013, 0.0015)0.001275
E L ˜ e (47, 50, 52)49.75
Table 4. Separation evaluates s m i + and s m i of each alternative in relation to positive ideal and negative ideal solutions.
Table 4. Separation evaluates s m i + and s m i of each alternative in relation to positive ideal and negative ideal solutions.
CHs1234567891011121314
s m i + 26.2012.9923.8823.0217.3319.4314.6918.0817.1216.5320.0318.7414.9224.75
s m i 107.1126.3388.9482.6846.8758.8833.6551.0145.7042.6562.5754.7934.7095.57
Table 5. Closeness coefficient of each alternative.
Table 5. Closeness coefficient of each alternative.
CHs1234567891011121314
R C i ( A i ) 0.800.670.790.780.730.750.700.740.730.720.760.750.700.79
Table 6. Selection of the nine cluster heads as per the highest closeness coefficient of each alternative for Option 1.
Table 6. Selection of the nine cluster heads as per the highest closeness coefficient of each alternative for Option 1.
R C i ( A i ) 0.800.790.790.780.760.750.750.740.73
Rank123456789
CHs131441161285
Table 7. Selection of the nine cluster heads as per the highest closeness coefficient of each alternative for Option 2.
Table 7. Selection of the nine cluster heads as per the highest closeness coefficient of each alternative for Option 2.
R C i ( A i ) 0.800.790.790.780.760.750.750.740.73
Rank123456789
CHs131441161289
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sen, S.; Sahoo, L.; Tiwary, K.; Senapati, T. Entropy Weighted TOPSIS Based Cluster Head Selection in Wireless Sensor Networks under Uncertainty. Telecom 2023, 4, 678-692. https://doi.org/10.3390/telecom4040030

AMA Style

Sen S, Sahoo L, Tiwary K, Senapati T. Entropy Weighted TOPSIS Based Cluster Head Selection in Wireless Sensor Networks under Uncertainty. Telecom. 2023; 4(4):678-692. https://doi.org/10.3390/telecom4040030

Chicago/Turabian Style

Sen, Supriyan, Laxminarayan Sahoo, Kalishankar Tiwary, and Tapan Senapati. 2023. "Entropy Weighted TOPSIS Based Cluster Head Selection in Wireless Sensor Networks under Uncertainty" Telecom 4, no. 4: 678-692. https://doi.org/10.3390/telecom4040030

APA Style

Sen, S., Sahoo, L., Tiwary, K., & Senapati, T. (2023). Entropy Weighted TOPSIS Based Cluster Head Selection in Wireless Sensor Networks under Uncertainty. Telecom, 4(4), 678-692. https://doi.org/10.3390/telecom4040030

Article Metrics

Back to TopTop