Abstract
Wireless sensor network technologies have been widely used in modern life especially in Internet of Things. Since battery energy of sensor nodes is limited, balancing the energy consumption of each node on a transmitting path is an important issue. In this article, we propose a multi-hop clustering routing method with fuzzy inference and multi-path tree. The algorithm identifies the best path from the source node to the destination node by following two steps: (1) dividing the wireless sensor nodes by an efficient clustering routing method and (2) determining the optimal path by a combination of the fuzzy inference approach and multi-path method, taking into account the remaining energy, the minimum hops, and the traffic load of node. Simulation results show that the proposed protocol can efficiently reduce the energy consumption of the network, balance network load, and prolong the survival time of the network.
Keywords
Introduction
Wireless sensor networks (WSNs) are composed of a large number of stationary or mobile sensor nodes based on the way of self-organization and multi-hop to constitute wireless networks. It can collaboratively gather, process, and transmit the information of perceived objects within the geographical area covered by networks, and eventually, provide the information to the terminal user. WSNs have been widely used in broad application prospects, such as habitat monitoring, 1 wildfire monitoring, 2 healthcare system,3,4 and navigation. 5 Challenging issues in WSNs have been extensively studied, for example, power management is explored in Salvadori et al., 6 data gathering is addressed in Cheng et al.,7,8 routing is studied in Karkvandi et al., 9 sensor deployment and coverage issues are explored in Chen et al. 10 as well as localization is studied in Ahn and Ko. 11
The structure of WSNs and the involved components are shown in Figure 1, for example, sensor nodes, sink nodes, task management centers. A sensor node is composed of four components: a sensor module, a processor module, a wireless communication module, and a power supply module. The sensor module, which is made up of sensor and analog-to-digital converter, collects information within the monitoring area and converts the collected information to digital signals. Processor module is responsible for controlling and coordinating the operation of sensor nodes, storing as well as processing the data collected by itself or sent by other nodes. Wireless communication module is responsible for communication with other sensor nodes to exchange control information as well as receive and send the collected data. Power module provides the required energy for the sensor nodes.

Components of a wireless sensor network.
WSNs are often deployed in severe environment or areas where it is not accessible for human. Sensor nodes may be exposed in the open air, suffering from sun exposure or rain, and network maintenance is extremely difficult. Once a WSN is deployed, its lifetime should be as long as possible given the initially provided amount of energy. Moreover, the nodes of WSNs are small and battery-powered, which leads to many problems. Energy efficiency is a critical issue in WSNs due to the limited capacity of the sensor nodes batteries. Unbalanced energy consumption reduces the network lifetime to a large extent. The main purpose of the WSN is to disseminate the information from targets to sink. The energy of the communication path will run out soon due to the high network traffic selecting the same path. Lifetime of WSN is a critical parameter for assessing the performance of routing protocols. Therefore, designing an effective routing method to control energy cost is important for prolonging the network lifetime.
G Smaragdakis et al. 12 and X Fan and Y Song 13 proposed an uneven clustering routing algorithm stable election protocol (SEP). SEP algorithm divides the sensor nodes into normal nodes and advanced nodes so as to deal with energy heterogeneous problem of wireless sensor nodes, which is based on weighted election probabilities of each node to become a cluster head (CH) according to the remaining energy in each node. The nodes with more residual energy will have more chance to become a CH. Experimental results show that the SEP method is better than low-energy adaptive clustering hierarchy (LEACH) protocol to extend the network lifetime. This method transmits the information of the member node to the corresponding CH. However, the CH sends messages directly to the base station after fusing the received data. The energy of the CH will run out because of the long distance between the CH and base station, which will cause the node die soon. In Li et al., 14 the authors proposed an algorithm by setting the energy threshold of nodes using balanced grid to select the CH, which represents an energy-balanced routing algorithm. The algorithm is applicable to some extent in reducing the energy consumption of the network, but does not involve the selection of the optimal path. In Tsai et al. 15 an Axis-Based Virtual Coordinate assignment protocol (ABVCap) method and a routing protocols based on ABVCap virtual coordinate were proposed, which reducing the energy cost of end-to-end communication by minimizing the number of routing hops. The work in Park and Sahni 16 and Wu et al. 17 used another method to prolong the network life cycle, that is, the lesser energy nodes will be distributed the lesser traffic loads, on the contrary, the nodes with more energy will be distributed more. G Jiang et al. 18 used Energy-Efficient Optimal Multi-path (EEOM) Routing Algorithm which has improved the selection of the CH, the establishment of cluster, and the transmission of data. This article also introduced the concept of multi-path and reconstruction of the CH. The improved protocol which overcomes the potential problems of the LEACH and EECS routing protocols is not only for large-scale networks, but also conducive to energy balance. Nevertheless, the optimization model of describing multi-path feature of a WSN remains unclear. In another paper, 19 the authors proposed a multi-path-based reliable routing protocol which can guarantee a specified end-to-end target packet reception rate. This method is superior to both AODV and MAODV-SIM protocols in packet reception rate and maintains a target packet reception rate using multi-path-based reliable routing protocol in a network where the amount of traffic changes dynamically. However, there are difficulties for implementation, as the optimization model for the proposed approach is unknown. In Liu et al., 20 the authors proposed a new routing protocol named the Security and Energy-efficient Disjoint Route (SEDR) which is a three-phase disjoint routing scheme to optimize the secret-sharing-based multi-path routing problem. The objective of this proposal is to maximize both network security and lifetime, subject to the energy constraints. SEDR method delivers sliced shares to the sink node with randomized disjoint multi-path routes using the available surplus energy of sensor nodes and demonstrates that the proposed scheme can maximize the network security without decreasing the network lifetime. This article focuses more on establishing disjoint links than the definition of multi-path, which should also be considered in the maximization of security and lifetime.
From the aforementioned literatures, we note that many routing algorithms minimize the average energy consumption in the network at the expense of non-uniform energy drainage in networks, which will bring about network broken due to the death of certain nodes in the efficient path. In many cases, the network lifetime will be shortened as soon as critical nodes run out of energy.
Aiming at avoiding network broken and prolonging the network lifetime, we propose a new method called SMF (multi-hop clustering routing algorithm based on fuzzy inference and multi-path tree) by combining Lower Energy Adaptive Clustering Hierarchy Enhancement (LEACHEN) method, multi-path algorithm, and fuzzy approach to select the optimal routing path from the source to the destination, which takes into account the highest residual energy, minimum number of hops, and minimum traffic numbers. The innovation points of the proposed SMF approach include the following points.
A new clustering method named LEACHEN is proposed based on the classical clustering LEACH algorithm. 21 LEACHEN method provides constraints and limits for balancing energy consumption, in order to extend the lifetime of the establishment phase.
An efficient evaluation function for multi-path algorithm is employed to seek the next hop, which balances the influence of the minimum hops, the traffic load, and the remaining energy.
In order to verify the performance of the proposed SMF algorithm, different network topologies are employed. We compare the proposed algorithm with the methods in AlShawi et al. 22 and Yuan et al. 23 The results prove that the proposed algorithm is efficient to extend the lifetime of the network.
This article is organized as follows: section “Preliminaries” presents some assumptions, defines the concept of routing metrics, and describes the energy model. In section “SMF algorithm,” we put forward the SMF method, including LEACHEN clustering algorithm, fuzzy inference approach, and multi-path method by describing each part of the algorithm in detail. Then, the simulation environment and results are presented in section “Performance evaluations.” Finally, we provide our key conclusions and future directions in the last section of the article.
Preliminaries
Assumptions
We consider seven assumptions as follows:
Case 1: the positions of the base station as well as the wireless sensor nodes are fixed and the base station is far away from the sensor nodes in the network. All sensor nodes in the network are identical, and the energy is limited.
Case 2: radio signals have the same energy consumption in each direction and all sensor nodes have the same maximum transmission range and the initial energy.
Case 3: all sensor nodes are randomly distributed, and they can acquire the position of their own and the corresponding neighbor nodes as well as the position of the base station.
Case 4: a percentage of the node population is equipped with more energy than the rest of the nodes in the same network—this is the case of heterogeneous sensor networks and they are all uniformly distributed in space.
Case 5: each node can be informed of the average energy in the network and set the probability of selected CH node according to their residual energy. 24
Case 6: each node has a certain amount of traffic pending in node’s queue. The node’s queue includes the application traffic and also the traffic that a node has already committed to forward.
Case 7: all nodes are location-aware. They have knowledge about their positions in WSNs.
Metrics definition
Most of the literatures referenced in this article describe different metrics which have been used to prolong the lifetime of WSNs. In this article, three metrics have been employed to elect the best node in the optimal path. These metrics are as follows:
Remaining energy (RE). The D-value is between initial energy and energy consumption of the node. The main energy consumption for normal nodes is by sending data while for the CH node mainly include data aggregation and data receiving. In WSNs, energy efficiency is the critical aspect of routing protocols. In this standard, battery capacity of the current node is the core. Routing protocol using this measure tends to select path with maximum average energy from the source node to the destination node. That is, the node with more residual energy is much more likely to be selected as the optimal node in the best path.25–27
Minimum number of hops (MH). Minimum number of hops is the common criteria of routing protocol which means the minimum number of relay nodes from the start node to the end node. The basic idea of this measurement is to obtain less relay nodes and less energy cost using the shortest path method, because the less forwarding nodes will consume less energy.26–28
Traffic load (TL). The traffic load of the node can be defined as the pending amount of traffic in a node’s queue. These traffics include the amount of the transfer being sent and previously be transmitted. In the case of the concentrated events of particular sub-region, using the shortest path would cause implosion phenomenon on this path. High load will cause the sensor node data queue overflows, resulting in loss of important information. In addition, the entire sensor network lifetime will be shortened, due to the quick energy consumption of batteries in the sensor nodes.25,27,29
Energy model
Once a node is placed, it often stays immobile and continues working until its energy reaches zero. The energy consumed at a sensor node can be modeled mathematically. This article utilized the first-order radio model 21 which is commonly used in the WSNs. The radio energy consumption model is shown in Figure 2.

Radio energy dissipation model.
The energy consumed by the sensor nodes in this article is divided into two categories. The first category is the energy consumed by the normal or advanced node (non-CH and non-parent node (PN)). According to Figure 2, when the distance between the transmitter and the receiver is
where
The received electronic energy consumption when normal node receives L-bit message is given as
The second category is the energy consumed by the CH or PN. As a CH or PN, in addition to sending and receiving consumes energy, the data processing also consumes the energy, and the energy consumed by the CH or PN while transferring L-bit data can be obtained via
where
The values used in the first-order radio model are described in Table 2.
SMF algorithm
SMF algorithm includes two steps: first, divide the wireless sensor nodes in WSNs into clusters using LEACHEN method and then, use the method which is the combination of fuzzy inference approach and multi-path method (MF) to build a multi-path tree from the source node to the destination node.
LEACHEN clustering algorithm
The main purpose of LEACHEN method is to prevent the node with low energy from becoming the CH, and control the number of the CH to the optimal number as well as reduce the uneven distribution of CHs during every round. In this way, it can reduce the energy cost and extend the lifetime of the network.
The energy of CH will run out soon because CH nodes consume more energy than non-CH nodes. In order to solve this problem, researchers have proposed many protocols and algorithms about energy efficiency recently. Heinzelman et al. 21 proposed the LEACH algorithm which is an elegant cluster–based hierarchical protocol optimizing the energy efficiency in sensor network. The basic idea of this algorithm is randomly electing CH periodically and distributing the traffic numbers of the whole network evenly to each sensor node, which can reduce the network energy consumption and improve the network lifetime.
LEACH method reconfigures clusters repeatedly. Each period named “round” during which the LEACH algorithm elects the CH for each cluster and its member nodes transmit data to their corresponding CH. Then, the CH sends the aggregation data to the base station. Each round is composed of two stages: establishment phase and stabilization phase. During the establishment phase, each node generates a random value between 0 and 1. If the random number of a node is less than the threshold value
where
In LEACH algorithm, each node has the same chance to be the CH, which can balance the energy cost of all nodes. However, it does not consider the residual energy of each node, if a low-power node is elected as CH, then it will accelerate the death of node and affect the network lifetime. In this article, we use the improved algorithm LEACHEN based on LEACH algorithm and SEP method 12 to cluster the wireless sensor nodes. LEACHEN algorithm also uses the “round” concept, and every round consists of the cluster establishment phase and stabilization phase which is similar to LEACH method.
Establishment phase
The larger the stable region is, the better the reliability of the clustering process of the sensor network is. In this section, we describe the establishment phase of LEACHEN method, which improves the stabilization phase of the clustering hierarchy process using the characteristic parameters of heterogeneity. Let
And the average energy of LEACHEN is
where the ratio of advanced node in the total number of nodes is
where
where

Network with all the nodes alive.

Network with some nodes dead.
Stabilization phase
In LEACH protocol, member nodes and CHs, CHs and the base station both use direct single-hop communication. Since the member nodes are close to their corresponding CH, it is appropriate to use the direct communication. However, the distance between the CH and the base station is often far, and transport energy consumption increases exponentially with the distance increasing. Therefore, direct communication will consume relatively larger energy of CH. In order to solve this problem, the SMF protocol in this article uses multi-hop communication to transmit data from the CH to the base station, which creates a multi-hop path tree using multi-path method and fuzzy approach. Only the root node of the path or independent node without parent needs long-distance communications with the base station, while other CHs only need for close communication within the sensing area. After a period of data transmission in the stabilization phase, the network will reenter the establishment phase due to some of the nodes running out of energy. The network will go to next cycle of refactoring cluster.
Fuzzy inference approach
There are diverse applications of intelligent techniques in WSNs. 31 One is the fuzzy logic control which is capable of making real time decisions, even information is not complete. Conventional control systems should have the accurate value of parameters in the environment, which generally does not exist in reality to get results. Nonetheless, fuzzy logic systems not only can manipulate the linguistic rules in a natural way, but also can be used for context by blending different parameters-rules combined together to produce the suitable result.
The fuzzy inference system (FIS) consists of four aspects, a fuzzifier, fuzzy rules, a fuzzy inference engine, and a defuzzifier. In Mamdani and Asilian, 32 the authors show that there are three kinds of commonly used fuzzy inference rules model: Mamdani model, Sugeno models, and Tsukamoto model.
This article selects Mamdani model due to its simplicity. 33 The process is performed in five steps:
Fuzzification of the input. The first step of the FIS is taking the crisp inputs and determining the degree to which these inputs belong to each of the appropriate fuzzy sets. The reasoning of the FIS depends on many fuzzy inference rules and each rule depends on that inputs parse some different fuzzy sets. For example, if U is identified with the parameter measuring temperature, then fuzzy sets over U can be “cold, cool, moderate, warm, and hot.” After blurring the inputs according to the different semantic sets, we can process the calculation of the rules. Each input variable will be blurred according to the corresponding membership functions.
The application of the fuzzy operator. After the fuzzification of the inputs, we can know the satisfied extent of each part in antecedent for each fuzzy rule. If there are several parts of a given rule, the fuzzy operator can get one value which represents the result of the prerequisites to this rule. The input of the fuzzy operator is two or more membership values acquiring from the fuzzification input variables and the input is a separate real value.
Fuzzy reasoning. We should pay attention to the weight of the rule before using the fuzzy implication to do the fuzzy inference. Every rule has a weight, the range of which is [0, 1]. Generally, the weight value is 1. Once the weight value is 0, it will not have any effect during the process of fuzzy inference. Distributing the appropriate weight to the rules means achieving the fuzzy implication.
Aggregation of the rule outputs. Since the decision is made based on the process of testing all the rules in the FIS, we should find some way which can combine the rules to make decisions. Aggregation can combine the fuzzy sets. Generally, the execution order of the rules is not important because the method of aggregation can be exchanged.
Defuzzification. The input of the defuzzification process is a fuzzy set of the aggregate output of the last step and the output is a single crisp number. During the process of defuzzification, it finds the point where a vertical line would slice the aggregate set into two equal masses. However, the aggregation of the fuzzy set including many output values, we should defuzzify them and parse a single value from the fuzzy sets. Defuzzification method includes centroid method, bisector method, middle of maximum method, largest of maximum method, and smallest of maximum method. In this article, we adopt the most commonly used formula of gravity calculation, and the value of the node cost (NC) obtained using gravity method of defuzzifier could be represented as
where
FIS employed in this article is shown in Figure 5 which constructs the fuzzy logic system with residual energy and traffic number as input, NC as output. The value range of remaining energy is [0, 10], and the value range of traffic load is [0, 10] as well as NC is [0, 1]. In the simulation environment, we select the field of fuzzy variable for input and output, when the environment changes, the value range can be modified.

Fuzzy logic system.
The linguistic variables used to represent the node remaining energy and node traffic load are divided into five levels: very low, low, medium, high, and very high, respectively, and the outcome to represent the node cost is divided into five levels: very small, small, medium, large, and very large, respectively.
Membership function is a curve which defines how each point of input interval map to a membership degree which is between 0 and 1. This article selects the trapezoid membership function and triangle membership function. Equation (12) shows the trapezoid membership function while equation (13) is the triangle membership function
where the parameters
where the parameters
The fuzzy rule base currently includes rules like the following: if the remaining energy is very high and the traffic load is very low, then the node cost is very large. Based on the two fuzzy input variables, 25 fuzzy mapping rules are defined in Table 1. We use trapezoid membership functions to represent the fuzzy sets very low, very high, very small, and very large while triangle membership functions to represent other fuzzy sets. The corresponding linguistic states of the membership functions are represented in Figure 6 while the output surface of FIS with two inputs and one output is shown in Figure 7.
If-then rules.

Membership functions of input and output variables.

Output surface of fuzzy inference system with two inputs and one output.
Multi-path method
Due to the reliability of multi-path routing technology and the ability of balancing the traffic load in network, multi-path method is used in wired networks originally. In recent years, this technology has been applied to wireless ad hoc networks and WSNs to improve the efficiency of energy utilization and prolong the network lifetime. Multi-path method employs the evaluation function
where
After clustering with the algorithm in section “LEACHEN clustering algorithm” of this article, the cluster has been constructed. The CH
The specific process of multi-path algorithm adopted in this article is as follows:
Input:
The CH number N;
The information of CH including coordinates, cost values, and so on;
The information of sink node location.
Output: multi-path tree
The main steps of the algorithm are as follows:
Draw the Voronoi diagram according to the corresponding CHs: get the Voronoi diagram according to the corresponding coordinate position of the CHs in the test area. Then, the test area is divided into N small areas and there is only one CH in each small area.
Find the neighbor CHs of each CH
Calcuate the weight
Determine the PN of each CH: traverse all the neighbor nodes
Construct the multi-path tree: the PN of CH

Flow chart of the combined methods of fuzzy inference and multi-path.
Performance evaluations
This section presents the experiment environment, parameters, metrics, and the experiment results.
Experiment environment
The SMF method is implemented in this article using MATLAB 2010a platform. The evaluation results are compared in terms of the time of the first node dead, average residual energy, the number of sensor nodes alive, and so on with the methods in AlShawi et al.
22
and Yuan et al.
23
under the same experimental conditions. In order to verify the adaptive capacity of SMF algorithm under different network topologies, this article adopts two topological regions A and B. The region size of A is
Simulation parameters.
Experiment results
Comparison of first node dies and half of the nodes alive in WSNs
In Tsai et al., 15 the authors employed the required rounds of the first node dies (FND) and half of the nodes alive (HNA) as the metrics to evaluate the advantages and disadvantages of the method. FND metric is useful in these scenarios where it is necessary that all nodes stay alive as long as possible, such as intrusion and fire detection. In addition, HNA metric is useful in these scenarios where sensors are placed in proximity to each other. Adjacent sensors could record related or identical data. In these cases, the whole network can still work normally, even with a single or few nodes dead. The round numbers of FND and HNA of Fuzzy and A-star (FA) algorithm 22 and Cluster, Fuzzy and A-star (CFA) method 23 in the test areas A and B are shown in Figures 9 and 10, respectively.

Experiment results of FND and HNA in the area A.

Experiment results of FND and HNA in the area B.
In the region A, the analysis for FND shows that CFA and FA methods began to appear the death of the first node in 1857th round and 161th round, respectively, while SMF in 2083th round began to appear the death of the first node. As for FND, the SMF algorithm achieves 12.17% and 1193.79% improvements by comparing the methods of CFA and FA. The analysis and comparison by the HNA show that in round 2174th, CFA algorithm has half nodes survived and in round 789th, FA algorithm has half nodes survived, while the SMF algorithm has half of the surviving nodes in round 2418th. HNA improves by 11.22% and 206.46% compared with CFA and FA algorithm.
In the region B, the analysis for FND shows that CFA and FA methods began to appear the death of the first node in 1834th round and 156th round, respectively, while SMF in 1931th round began to appear the death of the first node. As for FND, the SMF algorithm achieves 5.29% and 1137.82% improvements by comparing the methods of CFA and FA. The analysis and comparison by the HNA shows that in round 2183th, CFA algorithm has half nodes survived and in round 756th, FA algorithm has half nodes survived, while the SMF algorithm has half of the surviving nodes in round 2382th. HNA improves by 9.12% and 215.08% compared with CFA and FA algorithm.
The analysis above demonstrates that SMF algorithm outperforms the CFA method and FA approach in terms of the metrics of FND and HNA in both A and B topological areas. Thus, the new method not only extends the stabilization phase of the network but also prolongs the network lifetime.
Comparison of remaining energy in the network in WSNs
Reducing energy consumption of the sensor nodes and network is one of the important factors considered in designing network. Figure 11 shows the average residual energy of the network in area A while Figure 12 shows the average residual energy of the network in area B. In both area A and area B, the average remaining energy of SMF algorithm is higher than that of CFA method and FA approach.

Average remaining energy of nodes in area A.

Average remaining energy of nodes in area B.
Comparison of surviving node numbers in WSNs
The number of nodes alive is one of the most important metrics to reflect the life cycle of the network. It can be seen from Figures 13 and 14 that the proposal outperforms the CFA method and FA approach in terms of the number of nodes alive. In addition, compared with the CFA method and FA approach, the algorithm proposed in this article has a shorter time of node death (i.e. the D-value between the time of all nodes death and the time of the first node death), which reflects the traffic load balance of the nodes of the proposal is superior to CFA method and FA approach.

Number of nodes alive in area A.

Number of nodes alive in area B.
The method in this article based on the uneven clustering LEACHEN algorithm can better balance the energy cost of CHs. It adopts the fuzzy inference method which takes into account the remaining energy, traffic load, and minimum hops, to select the optimal node of the multi-path tree. Using the SMF algorithm can improve the CHs energy consumption in the transmission route and balance the energy consumption of each node, as well as prolong the lifetime of the network. From the comparison of SMF algorithm, CFA method, and FA approach in Figures 9–14, we conclude that the performance of SMF algorithm is better than that of the CFA method and FA approach. Moreover, SMF method’s performance is very stable both in area A and area B, which demonstrates that the proposed algorithm can adapt different topological areas and has certain universality.
Conclusion and future directions
A new clustering method named LEACHEN as well as an efficient evaluation function for multi-path algorithm are proposed in this article to seek the next hop, which balances the influence of the minimum hops, the traffic load, and the remaining energy. The proposed SMF method uses LEACHEN method to divide the sensor nodes in WSNs and adopts multi-hops sending the message from CHs to base station during the stabilization phase. The method also uses the fuzzy inference method and considerate many factors, electing the best node in the multi-path tree from CHs. The simulation results shows that it is the root node of the tree which needs to communicate directly to the base station and other CHs only need transmit the message to their neighbors in the sensing area. Experiment results demonstrate that SMF method is superior to the CFA method and FA approach in the aspects of FND, HNA, average remaining energy, and the number of nodes alive. SMF routing algorithm not only extends the stabilization phase of the network but also reduces the energy cost, balances the traffic loads, and prolongs the network lifetime. However, in the real world, there are many factors that should be taken into account. On-going research will solve the practicability of using the SMF method for data gathering in the real environment.
Footnotes
Academic Editor: Xuyun Zhang
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work is supported in part by the National Natural Science Foundation of China under grant no. 11361046, Ningxia Natural Science Foundation with grant no. NZ15256 and NZ15254, Ningxia High Education research found with grant no. NGY2015120, Undergraduate teaching project of Ningxia High Education with grant no. NXJG2016060, and The Science Foundation of Ningxia Normal University under grant no. NXSFZD201605.
