• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Energy-Efficient Multi-Mode Clusters Maintenance(M2CM) for Hierarchical Wireless Sensor Networks

    2017-05-09 07:48:04XiangdongHuZhulinLiu
    China Communications 2017年6期

    Xiangdong Hu, Zhulin Liu

    College of Automation, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China

    * The corresponding author, email:huxd@cqupt.edu.cn.

    I. INTRODUCTION

    Wireless sensor networks (WSNs) are battery-powered ad hoc networks in which sensor nodes that are scattered over a region connect to each other and form multi-hop networks.Since these networks consist of a large number of micro sensor nodes that are battery operated and wireless communication, care has to be taken so that these sensors use energy efficiently. WSNs have been widely applied in many fields for their advantages of networking flexibility, scalability, etc[1-3]. The sensor nodes are generally battery powered and work in harsh environments, therefore, they have to energy-efficiently work to prolong lifetime of network as far as possible[4].

    Hierarchical clustered topology of WSNs is the most popular networking mode, which has a great number of advantages, such as easy management, efficient energy utilization, simple data integration, etc[5-6]. WSNs have many sensor nodes with characteristics of strongly dynamics, which determines the maintenance tasks of cluster structure and can become very heavy, therefore, multi-mode clusters maintenance is necessary for the damaged clusters because they perhaps have many cases such as single damaged cluster, several damaged clusters which is whether adjacent or not, the damaged node is perhaps cluster head (CH)or ordinary node, the dimension of damaged cluster is too big or too small and so on. The conventional method of clusters maintenance is just periodically re-clustered, which does not distinguish the damaged state of network structure and the scope of changed clusters.This will result in many shortcomings, such as excessive maintenance, high maintenance costs, energy wastage, periodic service interruptions, tardy response and so on.

    To solve the above-mentioned problems,this paper proposes a new algorithm and its implementation mechanism called multi-mode clusters maintenance (M2CM) for hierarchical WSNs. Adaptive local cluster maintenance is the main goal, the clustering operation among whole network only occurs when the system is established, and then the maintenance of cluster structure is triggered by an event and is only within the scope of the damaged clusters,that is to say, the cluster maintenance operation is based on events and local, therefore, it is non-periodic and instead of whole network.The local cluster maintenance operations will start when it is detected that the cluster head has failed, the residual energy of CH is below the set threshold, CH load is imbalanced or new nodes are added or the damaged cluster members (CM) to quit. In addition, according to the number of clusters and affected neighboring relations, this paper proposes two cluster maintenance programs: single cluster maintenance (inner-cluster) and multi-cluster maintenance (inter-cluster), which built up multi-mode clustering mechanisms to deal with different situations of damaged clusters.It’s better to avoid energy wastage, service interruptions, and prolong the network lifetime as far as possible to protect the stability of the cluster structure.

    In order to improve energy utilization rate,prolong the network survival time and improve the network service performance,this paper presents an energy-efficient M2CM algorithm for clusters maintenance based on event-driven and local mechanism in hierarchical WSNs.

    II. RELATED WORK

    LEACH is the most representative of the clustering routing algorithm for WSNs[7], it is able to achieve good scalability of cluster structure from which some clustering routing algorithms draw their ideas. For example, a hybrid network topology is given by introducing node residual energy during the formation of the cluster head[8], which is a two-wheeled clustering protocol based on LEACH. Heinzelman proposed two centralized cluster head generation algorithm[7]: LEACH-C algorithm completes the work of cluster heads selection at the base station, and only the node with higher residual energy than the average energy is likely to become cluster head. In LEACH-F algorithm, the structure of cluster is no longer changed once formed, cluster nodes are constructed around clusters without circulating around to reduce the cost of constructing clusters. Thu et al. points out that the number of members in the cluster has a significant impact on the survival time of the network[9]. Too many cluster members will increase the burden of the cluster head, resulting in the death of the cluster head prematurely.

    With further research, traditional method uses periodic re-clustering mechanism to fit and maintain the network, but “re-clustering” leads to larger maintenance energy consumption and is not targeted, is “periodic”and difficult to determine, some algorithms have improved this. Yan and Li mention the centralized algorithm[10], which is similar to LEACH-C. It introduces cluster similarity in the cluster head rotation; when the similarity is less, the cluster head rotates in the cluster,otherwise the whole network is re-clustered.Huang et al. proposed an energy-efficient cluster head rotation mechanism, re-clustering of whole network when the energy of any cluster head reduces to the remaining 4% of current energy of all the nodes[11]. Enam et al.uses the energy threshold mode, where, the whole network re-clustering will trigger when the remaining energy of a cluster head is below the threshold or a cluster head is detected dead[12]. Gao et al. proposed the cluster head to rotate in the cluster when the residual energy is below the threshold, and the whole network to be re-clustered when more than half of the clusters have been cluster head rotated[13]. Hu and Wang proposed a method of secure clusters maintenance for the sensing layer in the Internet of things, which protects the security and stability of clusters by means of encryption and authentication, evaluation of node’s credibility and maintenance on demand[14]. Elsaid, Shaimaa Ahmed et al. proposed an optimized hierarchical routing technique which aims to reduce the energy consumption and prolong network lifetime. In this technique,the selection of optimal cluster head (CHs)locations is based on artificial fish swarm algorithm that applies various behaviors such as preying, swarming, and following to the formulated clusters and then uses a fitness function to compare the outputs of these behaviors to select the best CHs locations[15].Gherbi, Chirihane et al. proposed a novel hierarchical approach, called Hierarchical Energy-Balancing Multipath routing protocol for Wireless Sensor Networks (HEBM), it is a routing protocol in which load traffic is shared among cluster members in order to reduce the dropping probability due to queue overflow at some nodes. The HEBM approach aims to fulfill the following purposes: decreasing the overall network energy consumption,balancing the energy dissipation among the sensor nodes and as direct consequence: extending the lifetime of the network. In fact, the cluster-heads are optimally determined and suitably distributed over the area of interest allowing the member nodes reaching them with adequate energy dissipation and appropriate load balancing utilization. In addition, nodes radio are turned off for fixed time duration according to sleeping control rules optimizing their energy consumption[16].

    Fig. 1 Radio communication energy model

    In summary, the existing cluster maintenance methods research is mostly focused on the generation and optimization of cluster head exclusively and balancing the energy dissipation among the sensor nodes, and a small amount of algorithms are developed for the problems of “periodical re-clustering”. However, the work done has been simple, one-sided, and has not developed cluster maintenance solutions such as event-driven and local clustering algorithms which are important to the WSNs.

    III. ENERGY MODEL

    To mainly discuss efficient cluster maintenance problems in WSNs, here, the energy consumption model only involves simple communication, and the energy wastage in the calculation, storage, etc. is not considered[17].The model is shown in Fig. 1.

    Energy of nodes involved in communication is divided into two parts: energy consumption in data sending and receiving. Energy consumption in sending data comprises the expenditure of energy by the radio frequency transmitter circuit and the signal amplifier circuit. Energy consumption in the nodes receiving data includes the receiving circuit only. Among them, signal amplifier power consumption can use a free-space model and multi-path fading model according to the distance between the sender and receiver side. In fading model of free-space path, loss exponent is 2, i.e., energy loss is proportional to the distance squared. In the multipath fading model,the path loss exponent is 4.

    Assuming that the channel is symmetric,whenkbit information transmitted through the process of distanced, the energy consumption for the transmission can be given by

    The energy consumption of the receiving side can be calculated as follows:

    IV. MULTI-MODE CLUSTERS MAINTENANCE (M2CM) MODEL

    Similar to the classic LEACH algorithm,M2CM proposed in this paper still divides the network into several clusters, CM of each cluster forwards the collected information to the base station (BS) through CH. The difference is, M2CM algorithm is divided into three stages: cluster building, cluster communication and cluster maintenance, without concept of“round” no longer, the network will maintain the current cluster topology if the triggering event or condition does not appear on cluster maintenance. Once the event that requires cluster maintenance appears, maintenance only occurs in the local scope of the damaged cluster, without affecting the normal work and communication with other clusters. In order to describe the cluster maintenance process of M2CM algorithm clearly, the following events are defined as follows:

    Definition 1Maximum cluster or Minimum cluster: the number of CH exceeds the upper limitwhich is the maximum cluster, the CH number below the lower limitwhich is the minimal cluster. whereNis the total number of active nodes in the monitoring area,is the optimal number of CH[18],andare the adjustable parameters and

    4.1 Algorithm description

    Based on the thought of above-mentioned M2CM algorithm, the working steps of M2CM algorithm is as follows:

    Step 1Clusters generating phase. Clustering is a well-known approach to cope with large nodes density and efficiently conserving energy in wireless sensor networks, therefore,the first step of M2CM algorithm is still generation of clusters based on the well-known LEACH algorithm.

    Step 2Clusters communication phase. Secondly, on completing clusters’ establishment,the network enters into the normal communication phase. CM sends its residual energy,the collected data packets information to CH in a scheduled TDMA time slot, and then CH makes the received information fusion and transmits them to BS.

    Step 3Clusters maintenance phase. After a period of data communication, the cluster will start single cluster maintenance program in the cluster when the following events occur: CH failures or residual energy below the set threshold, CH load imbalance, new nodes join the cluster or CM fails to exit. If multiple adjacent clusters achieve the conditions which start single cluster maintenance simultaneously, start multi-cluster maintenance program to jointly safeguard these multiple clusters.

    Step 4Clusters re-communication-maintenance loop phase. After the clusters maintenance, restore the cluster back to the cluster communication phase, begin to enter the cluster communication once again i.e. cluster maintenance cycle until energy depletion,or if too many nodes die or unable to form a complete cluster structure, the network is no longer able to communicate properly. It means that the lifetime of whole network is over.

    The flowchart of energy-efficient multimode clusters maintenance mechanism is shown in Fig. 2.

    4.2 Single cluster maintenance modes

    Single cluster maintenance program is the cluster maintenance performed only within a single cluster, which does not involve other clusters, mainly in the following situations.

    Mode 1(Time slot reallocation) If there are new nodes applied to join a cluster and the number of CMs within the cluster does not exceedor CMs fail to exit, results in the number of CMs within the cluster not being less thanwith just time slot reallocation.

    The CH re-creates a new TDMA slot according to the received number of join requests or the number of failure nodes that are discovered, and broadcasts in the cluster, CMs send message in the new slot.

    Mode 2(CH re-election) When the energy of CH is below 0.618 times the average residual energy of CM, in order to better balance the network energy consumption, start CH re-election.

    Fig. 2 Flowchart of energy-efficient multi-mode clusters maintenance

    The cluster rebuild message is broadcast by the CH in the cluster, CM sends its residual energy to CH after receiving the message,and marks itself as an unclustered state. After the CH receives all the messages, CM within maximum energy will be elected as the new CH, and broadcasts the CH replacement message to the other CMs in the cluster and the adjacent CH.

    Mode 3(No CH re-election) When the CH energy is depleted or fails, the cluster is unable to continue to work, no CH re-election is performed.

    Firstly, head failure message is broadcasted by the CM which finds the faulty CH. Other CM sends its own residual energyand

    Mode 4(Joining into the adjacent cluster)When the damaged nodes within a cluster reach a certain number, the number of CM is less thanand the number of adjacent cluster nodes are betweenandjoining into the adjacent cluster maintenance strategy will be started.ID to the CM after receiving the message, then the CM puts forward the node of maximum energy as CH according to the message received, and broadcasts the ID number of new CH in the cluster. After receiving the new CH message, CMs first match their ID, if they do not match the ID they send join request to the new CH, otherwise the nodes wait to receive the join request. After receiving the join requests, the new CH creates a new TDMA slot and broadcasts in the cluster.

    The CH broadcasts JOIN_REQ message to join adjacent clusters in the cluster, and sets itself as unclustered, CMs choose to join adjacent clusters with CH after receiving the message. After the adjacent CH receives the JOIN_REQ message, if the number of CM in its cluster does not exceedthen the CM is added to the cluster, otherwise it gives a reject message to the CM, the CM will send JOIN_REQ to other adjacent CHs.

    Mode 5(Cluster splitting) When the number of CM within a cluster is larger thanand the number of CM in the adjacent clusters is betweenstart cluster split maintenance strategy.

    The CH determines the numbernof clusters that will be split according towherememis the number of CMs,nis the number of CHs in the current cluster, with the initial value of 1, the algorithm makesthroughnplus 1 to determinen.Then the cluster splitting algorithm is performed, CH specifies the formernnodes have the maximum energy in the cluster to the new CHs. The new CHs broadcast the CH message ADV_CH, CMs decided to join the strongest signals corresponding to the cluster where the CH located. In order to avoid the number of nodes in new cluster being greater thanthe new CH will no longer accept JOIN_REQ from the CMs when the number of JOIN_REQ messages equals to

    4.3 Multi-cluster maintenance modes

    When the damaged area of clusters within network is larger, and the damaged clusters (at least two) are adjacent, in order to conduct a comprehensive assessment and overall coordination, to achieve load balancing between clusters, a more rational use of network resources, setting the multi-cluster maintenance mode.

    Mode 6(Cluster merging) When multiple adjacent clusters are damaged, and the number of nodes does not exceedafter the merging of these clusters within a cluster, then start the cluster merge maintenance strategy.

    In the clusters merge process, setting the CH which first sends the merge message as the associated CH generally, responsible for intercluster notice. Other CHs of the adjacent clusters broadcast merge message in its respective cluster, and join the cluster where the associated CH located. Meanwhile the associated CH chooses the node of the largest energy as the new CH in the correlation clusters.

    Mode 7(Multi-cluster re-clustering) When multiple adjacent clusters are damaged, and the number of nodes exceedsafter the merging of these adjacent clusters within a cluster, then start multi-cluster re-clustering strategy in the multiple adjacent clusters within the scope of the damage.

    Suppose there arenclusters damaged, set the CH which first sends the merge message as the associated CH generally, responsible for inter-cluster notice. Other CH of the adjacent clusters broadcasts in its respective cluster,and sends the number of CM to the associated with the CH. Then the associated CH determines the number of nodes in the consolidated clusters according to the received information,then calculates the average number of all the damaged adjacent clusters (including this cluster), denoted byavgas follows:

    V. SIMULATION RESULTS AND ANALYSIS

    5.1 Simulation environment

    In order to realize a comprehensive estimation of the performance of the M2CM algorithm,this paper tests LEACH and M2CM algorithm under NS2 network simulation platform.Simulation involves two scenarios, where 100 nodes and 200 nodes randomly distributed in 100 m×100 m area. All sensor nodes have the same initial energy 2J, data packet size is 500 Bytes, head size of packet is 25 Bytes, and BS is located in (50,175). Typically, the power consumption of receiving and transmitting circuit to deal with 1bit data isthe power consumption of amplifier to deal with each bit data transmission isHere the chosen simulation parameters are typical and same as papers of kind in order to conveniently com-pare each other in performances.

    5.2 Selection of the parameter threshold

    This paper involves two parameters: andβ,which decide when to start cluster maintenance, affect the energy consumption and maintenance directly. Ifθandβare small,cluster split times are more frequent, otherwise CH re-election, clusters merge times are more frequent, therefore, improper values of andβwill result in unnecessary energy waste by nodes, thereby shortening the network lifetime.

    Fig. 3 θ and β impact on balance of load

    Fig. 4 Energy consumption comparison

    In order to optimize the values ofθandβ, from the standard deviation of the cluster density, this paper introduces network load balancing indexSdefined as:

    Formula (5) shows thatSis the standard deviation of the cluster density which will mainly effect on the balance of energy consumption between nodes and the lifetime of network, in essence, indicates the degree of deviation from the mean value of the cluster density expected.The experiment results show that a steady and moderateSis helpful to prolong the lifetime of the network.

    To select the optimal values ofθandβthrough simulation and eliminate the randomness of the simulation, we execute the simulation 100 times for each (θ,β) in various network structures, to get the average value ofS. From the simulation results shown in Fig.3, it is clearly understood that, when =1.5 andβ=0.5, the load balance index achieves the minimum, that is the most balanced load in the network at this time. These parameters will be used in the following simulation.

    5.3 Performance simulation and result analysis of M2CM

    5.3.1 Single cluster and multi-cluster maintenance energy consumption comparison

    In order to better reflect the necessity of the multi-cluster maintenance mode, in this paper, comparing energy consumption by taking single cluster and multi-cluster maintenance in the adjacent multiple clusters damaged,as shown in Fig. 4. As can be seen from the figure, multi-cluster maintenance relative to single cluster maintenance is more energy-efficient, and maintenance times are less than for the single cluster, thus it is more conducive to a stable cluster structure. This is because when adjacent multiple clusters are damaged,multi-cluster maintenance is no longer con-fined to single cluster conducted. These damaged clusters are subject to joint maintenance from the point of view of the overall network,so as to achieve a more balanced load between clusters, more rational allocation of network resources. This also avoids the irrationality of single cluster maintenance program carried out and the energy consumption.

    5.3.2 Multi-mode clustering mechanism test

    In order to visually see seven kinds of cluster maintenance modes in M2CM which have advantages in terms of network load balancing,in-time response, the experiment uses data generated during the NS2 running to NAM graphic. The test results are shown from Fig. 5 to Fig. 9, where the block diagram node identified as CH, circle node is CM.

    Fig. 5 is a response of M2CM on failure of CH, where triangle identifies the failed CH.Figure a is the cluster structure before the CH is not damaged, figure b is the structure in the 21 seconds, in which case CH of cluster #3-1 suddenly is damaged caused by failure, figure c is the time in 21.1 seconds, CMs gets on no CH re-election after finding the failure of CH,cluster #3-1 becomes cluster #3-2 to complete the maintenance of CH failure.

    Fig. 6 is a response of M2CM on CH energy below the set threshold and new nodes join.Figure a is the cluster structure after the first clustering, figure b is the network topology at 60 seconds, the CH remaining energy of cluster #4-1 is below the threshold and at the same time, new nodes are added to cluster #2-1 and cluster #5-1. M2CM adopts CH re-election in cluster #4-1 and time slot redistribution in cluster #2-1 and cluster #5-1, resulting in generation of new clusters #4-2, cluster #2-2,and cluster #5-2. Network running can be seen from the NAM shown, and M2CM resolves the network function disruptions caused by the whole network maintenance effectively,avoiding excessive maintenance and unnecessary energy wastage caused by re-clustering in undamaged area.

    Fig. 5 No CH re-election

    Fig. 6 CH re-election and time slot redistribution

    Fig. 7 Response of M2CM on non-adjacent clusters

    Fig. 8 Clusters consolidation

    Fig. 9 Re-clustering based on multi clusters

    Fig. 10 Energy consumption of maintenance versus different percentage of damaged nodes

    Fig. 7 is a response of M2CM on non-adjacent damaged clusters. Fig. 7(a) is the network topology in 100 seconds. As can be seen from the figure, clustering is not balanced obviously in the network, the number of CMs in cluster# 1-1 is greater thanthe number of CMs in cluster # 4-1 is less thanand they are non-adjacent. In Fig. 7(b), M2CM starts single cluster maintenance program, cluster #1-1 splits into clusters #1-2 and cluster #1-3, cluster #4-1 joins into the neighbor cluster #3-1,the network load becomes balanced as can be seen at this time.

    Figs. 8 and 9 show responses of M2CM on adjacent clusters, according to 5.3.1. In this case, multi-cluster maintenance is better than single cluster maintenance. Fig. 8a is the structure of cluster at 161 seconds, clusters#5-1 and cluster #6-1 are damaged adjacent clusters, and the number of nodes in cluster does not exceedafter merging. At this time, M2CM adopt clusters merge strategy, in Fig. 8b, cluster #5-1 and cluster #6-1 clusters merge into cluster #5-2, without affecting the working of the rest of the clusters.

    Fig. 9a is the cluster structure in 200 seconds, cluster #2-1, cluster #3-1 and cluster#5-1 are damaged adjacent clusters, and the number of nodes exceedsafter merging.M2CM adopts multi-cluster re-clustering, as seen in Fig. 9b after maintenance, the rebuilt cluster becomes cluster #2-2, cluster #3-2 and cluster #5-2. From Fig. 9b it is clearly understood that the network load becomes more balanced after maintenance, and the maintenance carried out only in the damaged clusters.

    5.3.3 Recovery energy comparison for diff erent percentage of damaged nodes

    Fig. 10 is the maintenance energy consumption corresponding to the percentage of damaged nodes of M2CM and LEACH, as can be seen from the figure. No matter how much is the ratio of damaged nodes, LEACH uses periodic maintenance of the whole network and energy consumption is constant: 0.096 J.Different from the LEACH, energy consumption of M2CM increases with proportional to number of damaged nodes. When fewer nodes are damaged, only a few damaged clusters are allotted for maintenance, so energy consumption is lower relatively. When there is a higher proportion of the scenario of damaged nodes(even damaged nodes reached 100%), al-though the maintenance workload closes to the whole network, energy consumption of M2CM maintenance is still less than LEACH. This is because this paper uses the free-space transmission and multipath fading transmission model, as per formula (1) which shows that communication energy consumption of the nodes is related with distance. In M2CM the damaged nodes communicate in the damaged region, only broadcast in the damaged area,with no network-wide broadcast. When CH re-election is needed, the new CH election is designated by the previous CH, or when time slot redistribution is needed, CH only allocates time slot for the new entrant, so energy saved compares with LEACH.

    It is noted that we choose LEACH as the comparison object in performance estimation of algorithm because it is widely accepted and easily understood.

    5.3.4 Comparison of network survival time

    Fig. 11(a), 11(b) are the comparisons of network of survival time of M2CM and LEACH in 100 nodes (scenario 1) and 200 nodes (scenario 2) environment. From the figure we can get Table 1 as follows:

    Where FND is the time of “first node death”, END is the time at which all nodes are damaged, AND is the “average time of node death”. Table 1 shows that END of M2CM extends 33.0% compared with LEACH in scenario 1 environment, and FND is nearly close to 1.7 times of LEACH. In scenario 2 environment, the advantage of M2CM is further reflected, END prolonged 49.8% compared with LEACH, and FND is close to nearly 1.8 times of LEACH. Thanks to M2CM considering the different scenarios of damaged clusters, there is effective maintenance of the cluster (inter-cluster) topology only through the local information, improving the utilization of energy.This extends the network lifetime compared with LEACH. In addition, M2CM algorithm distributed the energy consumption into each node evenly, as can be seen from the figure.The death time of the nodes is very close, and the accuracy of data collection is improved.

    Fig. 11 Comparison of network survival time

    Table I Comparison of the network survival time(s)

    Fig. 12(a) shows the amount of data packet received by BS from 100 nodes. From the figure it is clear that the new algorithm can improve the amount of data received effectively compared with LEACH (improved 34.4%); this is because M2CM is able to extend the network lifetime. In addition, with more nodes, this advantage is more obvious. Fig. 12(b) shows the amount of data packet received from 200 nodes. The amount of data received by M2CM improved 74.6% compared with LEACH.

    In addition, due to the M2CM algorithm working under local-area and event-driven,therefore, the computation complexity of the solutions is low, in fact, it is validated by the above results of experiment in energy consumption, network survival time and transmitted data packets.

    VI. CONCLUSION

    The traditional clusters maintenance scheme adopts network function interrupt and energy wastage problems are followed by periodic time-driven processes and the whole network is re-clustered in hierarchical wireless sensor networks. In order to improve energy utilization rate, prolong the network survival time and improve the network service performance,this paper presents an energy-efficient M2CM algorithm for clusters maintenance based on event-driven and local mechanism in hierarchical WSNs. The M2CM adapts to different cluster maintenance modes, through different trigger types and adaptive adjacent relationship with the damaged clusters. It does targeted maintenance and local cluster structural adjustment. The simulation results based on NS2 show that the new model has characteristics of low maintenance cost, load balancing,can prolong the network lifetime and increase the amount of transmitted data compared with LEACH. The algorithm also has good adaptability and robustness and can adapt to the application of large-scale WSNs.

    ACKNOWLEDGEMENTS

    This work is supported by the National Natural Science Foundation of China (Grant No.61170219), the Joint Research Foundation of the Ministry of Education of the People’s Republic of China and China Mobile (Grant No. MCM20150202), and the Science and Technology Project Affiliated to Chongqing Education Commission (KJ1602201).

    [1] G. Z Zheng, S. Y Liu, X. G Qi, “Clustering routing algorithm of wireless sensor networks based on Bayesian game”,Journal of Systems Engineering and Electronics. vol.23, no.1, pp.154-159, 2012.

    [2] X.D Hu, H.F Xu, L Zhang, “Model and algorithm of local and on-demand maintenance of clusters in sensing layer of the Internet of things”,Journal of Software, vol.26, no.8, pp.2020-2040,2015.

    [3] G. V Selvi, R Manoharan, “Unequal clustering algorithm for WSN to prolong the network lifetime (UCAPN)”,In Proceedings of the 4th International Conference on Intelligent Systems Modelling & Simulation (ISMS), Bangkok, Thailand, pp. 456-461, 2013.

    [4] S Lonare, G Wahane, “A survey on energy effi-cient routing protocols in wireless sensor network”,In Proceedings of Computing, Communication and Networking, Technologies, Tiruchengode, India, pp.1-5, 2013.

    [5] Y Liao, H Qi, W Li, “Load-balanced clustering algorithm with distributed self-organization for wireless sensor networks”,Sensors Journal,vol.13, no. 5, pp.1498-1506, 2013.

    [6] R. K Tripathi, Y. N Singh, N. K Verma, “Clustering algorithm for non-uniformly distributed nodes in wireless sensor network”,Electronics Letters,vol.49, no.4, pp.299-300, 2013.

    [7] W. R Heinzelman, A Chandrakasan, H Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks”,In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Hawaii, USA,pp.10-15, 2000.

    [8] Q. Z Chen, X. M Zhao, X. Y Chen, “Design of double rounds clustering protocol for improving energy efficient in wireless”,Journal of Software, vol.21, no.11, pp.2933-2943, 2010.

    [9] N. Q Thu, K. H Phung, V. Q Hoan, “Improvement of energy consumption and load balance for LEACH in wireless sensors networks”,In Proceedings of ICT Convergence, Jeju Island, Korea,pp.583-588, 2012.

    [10] G. Y Yan, Z. H Li, “Using cluster similarity to detect natural cluster hierarchies”,In Proceedings of Fuzzy Systems and Knowledge Discovery,Haikou, China, pp. 291-295, 2007.

    [11] H. Q Huang, J Cheng, D. Y Yao, K Ma, H. T Liu,“Wireless sensor network energy driven adaptive cluster head rotation algorithm”,Journal of electronics and information technology, vol.26,no.5, pp.1040-1045, 2009.

    [12] R. N Enam, S Misbahuddin, M Imam, “Energy efficient round rotation method for a random cluster based WSN”,In Proceedings of Collaboration Technologies and Systems, Denver, CO,USA, pp.157-163, 2012.

    [13] J. J Gao, Y. H Liu, L. Q Zhu, Y. W Meng, “Cluster maintenance algorithm based on LEACH-DCHS protocol”,Computer Engineering and Applications, vol.45, no.30, pp.95-97, 2009.

    [14] X.D Hu, K Wang, “Methods of secure clusters maintenance for the sensing layer in the internet of things”,The Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), vol.27, no.1, pp.103-110, 2015.

    [15] SA El-Said, A Osamaa, AE Hassanien, “Optimized hierarchical routing technique for wireless sensors networks”,Soft Computing,vol.20, no.11,pp.4549-4564, 2016.

    [16] C Gherbi, Z Aliouat, M Benmohammed, “An adaptive clustering approach to dynamic load balancing and energy efficiency in wireless sensor networks”,Energy, vol.114, no.11, pp.647-662, 2016

    [17] B Li, J Wang, Q. Y Yin, H. X Li, R Yang, “An energy-efficient geographic routing based on cooperative transmission in wireless sensor networks”,Science China (Information Sciences),vol.56, no.12, pp.4757-4762, 2013.

    [18] W. R Heinzelman, A Chandrakasan, H Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks”,IEEE Transactions on Wireless Communications, vol.1,no.4, pp.660-670, 2002.

    熟女电影av网| 一个人观看的视频www高清免费观看| 日本与韩国留学比较| av.在线天堂| 两性午夜刺激爽爽歪歪视频在线观看| 三级男女做爰猛烈吃奶摸视频| 亚洲三级黄色毛片| 国产成人a区在线观看| 国产精品久久视频播放| 久久午夜福利片| 亚洲av一区综合| 免费观看性生交大片5| 卡戴珊不雅视频在线播放| 亚洲欧美日韩高清专用| 非洲黑人性xxxx精品又粗又长| 国产一级毛片在线| 建设人人有责人人尽责人人享有的 | 狂野欧美白嫩少妇大欣赏| 最近的中文字幕免费完整| 嘟嘟电影网在线观看| 国产在线一区二区三区精 | 国产精品久久久久久久电影| 亚洲精品久久久久久婷婷小说 | 校园人妻丝袜中文字幕| 最后的刺客免费高清国语| 最近2019中文字幕mv第一页| 精品99又大又爽又粗少妇毛片| 欧美极品一区二区三区四区| 日日摸夜夜添夜夜添av毛片| 日日啪夜夜撸| 免费看美女性在线毛片视频| 亚洲精品456在线播放app| 欧美潮喷喷水| 日日啪夜夜撸| 欧美一区二区亚洲| 欧美成人精品欧美一级黄| 国产伦在线观看视频一区| 午夜日本视频在线| 国产亚洲最大av| 国内精品宾馆在线| 看片在线看免费视频| 大话2 男鬼变身卡| 欧美一区二区国产精品久久精品| 99热全是精品| 人人妻人人看人人澡| 中文天堂在线官网| 亚洲最大成人av| 热99re8久久精品国产| 日韩一区二区视频免费看| 国产精品一区二区性色av| 亚洲国产欧洲综合997久久,| 中文乱码字字幕精品一区二区三区 | 一级爰片在线观看| 人妻夜夜爽99麻豆av| 五月玫瑰六月丁香| 国产成人aa在线观看| 成人美女网站在线观看视频| 国产乱人视频| av在线天堂中文字幕| 日韩一区二区三区影片| 人人妻人人看人人澡| 亚洲精品乱码久久久久久按摩| 国产国拍精品亚洲av在线观看| 美女cb高潮喷水在线观看| av黄色大香蕉| av在线蜜桃| 国产成人精品婷婷| 免费黄色在线免费观看| 国产伦一二天堂av在线观看| 成人国产麻豆网| 色播亚洲综合网| 欧美另类亚洲清纯唯美| 国产高清不卡午夜福利| 中文精品一卡2卡3卡4更新| 亚洲婷婷狠狠爱综合网| 国产淫片久久久久久久久| 寂寞人妻少妇视频99o| 白带黄色成豆腐渣| 小说图片视频综合网站| 婷婷色麻豆天堂久久 | 午夜激情欧美在线| 亚洲精品一区蜜桃| 国产久久久一区二区三区| 欧美日本视频| 免费黄网站久久成人精品| av黄色大香蕉| 国产又色又爽无遮挡免| 欧美人与善性xxx| 国产极品精品免费视频能看的| av免费观看日本| 五月玫瑰六月丁香| 亚洲av免费在线观看| 欧美精品国产亚洲| www日本黄色视频网| 哪个播放器可以免费观看大片| 99九九线精品视频在线观看视频| 人妻少妇偷人精品九色| 麻豆成人av视频| 中文欧美无线码| 最近中文字幕高清免费大全6| 久久精品国产99精品国产亚洲性色| 欧美人与善性xxx| 久久国产乱子免费精品| 男插女下体视频免费在线播放| 亚洲av成人精品一区久久| 国内精品美女久久久久久| 国产精品一及| 51国产日韩欧美| 人人妻人人看人人澡| 2022亚洲国产成人精品| 欧美激情在线99| 久久精品国产鲁丝片午夜精品| 亚洲电影在线观看av| 亚洲av成人av| 亚洲国产色片| 看片在线看免费视频| 亚洲精品,欧美精品| 校园人妻丝袜中文字幕| 欧美另类亚洲清纯唯美| 小说图片视频综合网站| 亚洲精品色激情综合| 成人av在线播放网站| 看片在线看免费视频| 只有这里有精品99| 久久99热这里只频精品6学生 | 免费观看在线日韩| 日韩三级伦理在线观看| 国产淫片久久久久久久久| 赤兔流量卡办理| 人人妻人人澡欧美一区二区| 观看美女的网站| 精品99又大又爽又粗少妇毛片| 欧美日韩综合久久久久久| 高清日韩中文字幕在线| 日韩亚洲欧美综合| 久久这里有精品视频免费| 国产极品天堂在线| 视频中文字幕在线观看| 九九爱精品视频在线观看| 99视频精品全部免费 在线| 爱豆传媒免费全集在线观看| 国产成人aa在线观看| 国产成人一区二区在线| 精品国产三级普通话版| 午夜福利视频1000在线观看| 中文字幕久久专区| 亚洲av日韩在线播放| 97在线视频观看| 国产亚洲一区二区精品| 99久久九九国产精品国产免费| 高清日韩中文字幕在线| 国产精品久久久久久精品电影小说 | 欧美日韩在线观看h| 69av精品久久久久久| 级片在线观看| 国产爱豆传媒在线观看| 偷拍熟女少妇极品色| 欧美成人精品欧美一级黄| 亚洲成人av在线免费| 黑人高潮一二区| 国产黄色视频一区二区在线观看 | 性色avwww在线观看| 欧美潮喷喷水| 少妇人妻一区二区三区视频| 国产成人a∨麻豆精品| 欧美一级a爱片免费观看看| 亚洲精品自拍成人| 午夜亚洲福利在线播放| 精品久久久久久久久久久久久| 色综合色国产| 国内少妇人妻偷人精品xxx网站| 日韩强制内射视频| 国产亚洲av嫩草精品影院| 国产亚洲av片在线观看秒播厂 | 亚洲国产精品sss在线观看| 日日摸夜夜添夜夜爱| 国产 一区 欧美 日韩| 欧美一区二区精品小视频在线| 一个人免费在线观看电影| 女的被弄到高潮叫床怎么办| 在线天堂最新版资源| 一级毛片电影观看 | 日本免费一区二区三区高清不卡| 欧美性感艳星| 国产乱人偷精品视频| 中文天堂在线官网| av在线播放精品| av在线老鸭窝| 汤姆久久久久久久影院中文字幕 | 99久久精品国产国产毛片| 啦啦啦韩国在线观看视频| 国产精品福利在线免费观看| videossex国产| 国产午夜精品一二区理论片| 日韩中字成人| 大香蕉97超碰在线| 国产午夜精品论理片| 我的女老师完整版在线观看| 免费在线观看成人毛片| 九草在线视频观看| 国产私拍福利视频在线观看| 人妻少妇偷人精品九色| 欧美激情久久久久久爽电影| 国产精品一区二区三区四区久久| 超碰97精品在线观看| 国产熟女欧美一区二区| АⅤ资源中文在线天堂| 久久精品国产99精品国产亚洲性色| 最近中文字幕2019免费版| 国产精品日韩av在线免费观看| 婷婷色av中文字幕| 精品不卡国产一区二区三区| 成人特级av手机在线观看| 色尼玛亚洲综合影院| 深夜a级毛片| 成人无遮挡网站| 国产精品人妻久久久久久| 亚洲欧美成人综合另类久久久 | 亚洲自拍偷在线| 国模一区二区三区四区视频| 久久久欧美国产精品| 亚洲美女视频黄频| 亚洲欧美一区二区三区国产| 波野结衣二区三区在线| 欧美一区二区国产精品久久精品| 久久久久久久国产电影| 男的添女的下面高潮视频| 岛国在线免费视频观看| 国产成人a区在线观看| 免费观看a级毛片全部| 1024手机看黄色片| 日韩,欧美,国产一区二区三区 | 尾随美女入室| 色吧在线观看| 欧美丝袜亚洲另类| 国产黄片美女视频| 国产精品日韩av在线免费观看| 久久久久久久久久久丰满| 中文天堂在线官网| 国产精品久久视频播放| 日韩在线高清观看一区二区三区| 亚洲精品乱久久久久久| a级毛色黄片| 日本免费在线观看一区| 视频中文字幕在线观看| 久久精品熟女亚洲av麻豆精品 | 最新中文字幕久久久久| 国产片特级美女逼逼视频| 精品酒店卫生间| 国国产精品蜜臀av免费| 午夜福利在线在线| 久久99热这里只频精品6学生 | 男人舔女人下体高潮全视频| 99在线视频只有这里精品首页| 欧美不卡视频在线免费观看| 国产亚洲91精品色在线| 亚洲av电影不卡..在线观看| 婷婷色麻豆天堂久久 | 欧美日本亚洲视频在线播放| 国产精华一区二区三区| 日韩国内少妇激情av| 久久久久久国产a免费观看| 直男gayav资源| 亚洲成人精品中文字幕电影| 在线免费十八禁| 免费av不卡在线播放| av在线天堂中文字幕| 大又大粗又爽又黄少妇毛片口| 男女下面进入的视频免费午夜| 少妇熟女欧美另类| 午夜福利在线观看免费完整高清在| 久久99热这里只频精品6学生 | 国产精品,欧美在线| 亚洲欧美精品综合久久99| 精品人妻偷拍中文字幕| 能在线免费看毛片的网站| 国产成人freesex在线| 亚洲欧洲日产国产| 日韩欧美国产在线观看| www日本黄色视频网| 精品无人区乱码1区二区| 国产极品精品免费视频能看的| 99久久无色码亚洲精品果冻| 色5月婷婷丁香| 国产精品一区二区三区四区久久| 九九爱精品视频在线观看| 村上凉子中文字幕在线| 亚洲国产色片| 国产熟女欧美一区二区| 一二三四中文在线观看免费高清| 在线播放无遮挡| 九色成人免费人妻av| 最近最新中文字幕大全电影3| 免费观看a级毛片全部| 久久人人爽人人片av| 国产免费福利视频在线观看| 亚洲五月天丁香| 特级一级黄色大片| АⅤ资源中文在线天堂| 乱码一卡2卡4卡精品| 看非洲黑人一级黄片| 色视频www国产| 国内少妇人妻偷人精品xxx网站| 最近中文字幕高清免费大全6| 国产精品永久免费网站| 精品一区二区三区人妻视频| 国产精品女同一区二区软件| 久久精品国产亚洲av天美| 又粗又爽又猛毛片免费看| 99九九线精品视频在线观看视频| 天堂影院成人在线观看| 2021天堂中文幕一二区在线观| 丰满少妇做爰视频| 啦啦啦韩国在线观看视频| 国产精品av视频在线免费观看| 欧美xxxx性猛交bbbb| 人体艺术视频欧美日本| 最近视频中文字幕2019在线8| 国产单亲对白刺激| 免费观看在线日韩| 噜噜噜噜噜久久久久久91| 国产精品伦人一区二区| 亚洲av二区三区四区| 日韩欧美三级三区| 国产美女午夜福利| 久久精品国产亚洲av涩爱| 日本wwww免费看| 人妻少妇偷人精品九色| 日本熟妇午夜| 久久久久久久久久黄片| 热99re8久久精品国产| 欧美激情久久久久久爽电影| 国产亚洲91精品色在线| 免费看av在线观看网站| 老司机影院毛片| 久久久久久久午夜电影| 国产v大片淫在线免费观看| 人体艺术视频欧美日本| 中文字幕熟女人妻在线| 尤物成人国产欧美一区二区三区| 亚洲精品日韩在线中文字幕| 91精品伊人久久大香线蕉| 国产伦在线观看视频一区| 亚洲最大成人av| 少妇的逼水好多| 九色成人免费人妻av| 成人美女网站在线观看视频| 亚洲av免费在线观看| 国产大屁股一区二区在线视频| 亚洲欧美成人综合另类久久久 | 日韩大片免费观看网站 | 国产一区二区三区av在线| 青春草国产在线视频| 中文字幕av成人在线电影| 成人性生交大片免费视频hd| 国产女主播在线喷水免费视频网站 | 简卡轻食公司| 国产女主播在线喷水免费视频网站 | 日韩 亚洲 欧美在线| av在线蜜桃| 好男人在线观看高清免费视频| 你懂的网址亚洲精品在线观看 | 久久久久久九九精品二区国产| 精品一区二区三区视频在线| 国内精品美女久久久久久| 国内精品宾馆在线| 午夜福利在线观看免费完整高清在| 禁无遮挡网站| 亚洲欧美精品自产自拍| 国产精品熟女久久久久浪| 亚洲电影在线观看av| 亚洲av男天堂| 老女人水多毛片| 日韩欧美三级三区| 亚洲av成人精品一区久久| 国产一区亚洲一区在线观看| 久久久a久久爽久久v久久| 美女黄网站色视频| 国产 一区 欧美 日韩| 在线免费观看的www视频| 老师上课跳d突然被开到最大视频| 色综合亚洲欧美另类图片| 日本三级黄在线观看| 日韩制服骚丝袜av| 国产av一区在线观看免费| 欧美bdsm另类| 久久久久久久国产电影| 亚洲美女视频黄频| 国产av一区在线观看免费| 久久久久久久久大av| av黄色大香蕉| 免费不卡的大黄色大毛片视频在线观看 | 中文字幕久久专区| 日本猛色少妇xxxxx猛交久久| 联通29元200g的流量卡| 久久久久久国产a免费观看| 亚洲人成网站在线观看播放| 91久久精品国产一区二区三区| 赤兔流量卡办理| 国产高清国产精品国产三级 | 国产精品久久久久久av不卡| 一级黄色大片毛片| 99久久精品国产国产毛片| 精品一区二区三区人妻视频| 水蜜桃什么品种好| 日韩精品青青久久久久久| 久久久久性生活片| 久久99蜜桃精品久久| 免费看日本二区| 3wmmmm亚洲av在线观看| 日本三级黄在线观看| 高清日韩中文字幕在线| 亚洲在线观看片| 变态另类丝袜制服| 成人午夜精彩视频在线观看| 国产精品爽爽va在线观看网站| 91狼人影院| 两个人视频免费观看高清| 人人妻人人澡人人爽人人夜夜 | 秋霞在线观看毛片| 国产精品福利在线免费观看| 欧美成人精品欧美一级黄| 精品国产三级普通话版| 乱码一卡2卡4卡精品| 国产精品一区二区三区四区久久| 秋霞伦理黄片| 国产视频首页在线观看| 一个人看视频在线观看www免费| 丝袜美腿在线中文| 插逼视频在线观看| 国产淫片久久久久久久久| 亚洲精品亚洲一区二区| 国产中年淑女户外野战色| 欧美日韩在线观看h| 亚洲成人久久爱视频| 色网站视频免费| 嫩草影院入口| 精品国产一区二区三区久久久樱花 | 国产亚洲精品久久久com| 一区二区三区高清视频在线| 热99re8久久精品国产| 91aial.com中文字幕在线观看| 成人亚洲精品av一区二区| 婷婷六月久久综合丁香| 高清在线视频一区二区三区 | 欧美成人午夜免费资源| 97超视频在线观看视频| 美女被艹到高潮喷水动态| 嫩草影院精品99| 人妻制服诱惑在线中文字幕| 一级毛片我不卡| 纵有疾风起免费观看全集完整版 | 亚洲精品乱码久久久v下载方式| 成人毛片a级毛片在线播放| 夫妻性生交免费视频一级片| 国产精品女同一区二区软件| 国产精品电影一区二区三区| 日韩欧美三级三区| 又爽又黄a免费视频| 免费播放大片免费观看视频在线观看 | 日韩高清综合在线| 国产精品1区2区在线观看.| 国产免费视频播放在线视频 | 寂寞人妻少妇视频99o| 日韩高清综合在线| 三级男女做爰猛烈吃奶摸视频| 久久韩国三级中文字幕| 亚洲国产精品合色在线| 国产极品精品免费视频能看的| av免费在线看不卡| 中文字幕亚洲精品专区| 精品人妻偷拍中文字幕| 午夜爱爱视频在线播放| h日本视频在线播放| 美女xxoo啪啪120秒动态图| 成人欧美大片| 国产欧美另类精品又又久久亚洲欧美| 精品久久久久久久久久久久久| 日本wwww免费看| 99热这里只有精品一区| 少妇丰满av| 免费看av在线观看网站| av在线观看视频网站免费| 欧美丝袜亚洲另类| 男女啪啪激烈高潮av片| 日韩 亚洲 欧美在线| 又粗又爽又猛毛片免费看| 日本一二三区视频观看| 国产黄片美女视频| 免费搜索国产男女视频| 国产精品一区二区三区四区免费观看| 日韩成人av中文字幕在线观看| 国产伦一二天堂av在线观看| 18禁在线播放成人免费| 特级一级黄色大片| 在线观看美女被高潮喷水网站| 亚洲,欧美,日韩| 观看美女的网站| 国产探花极品一区二区| 18禁在线播放成人免费| 欧美变态另类bdsm刘玥| 男女边吃奶边做爰视频| 99热精品在线国产| 国产成人精品婷婷| 高清毛片免费看| 国产伦精品一区二区三区视频9| 国产91av在线免费观看| 国产 一区精品| 日韩一区二区三区影片| 日韩精品青青久久久久久| 国产真实乱freesex| 全区人妻精品视频| 男人的好看免费观看在线视频| av天堂中文字幕网| 日韩欧美精品免费久久| 夫妻性生交免费视频一级片| 能在线免费看毛片的网站| 精品国产一区二区三区久久久樱花 | 美女高潮的动态| av播播在线观看一区| 韩国高清视频一区二区三区| 国产精品福利在线免费观看| 成人鲁丝片一二三区免费| 少妇人妻一区二区三区视频| 国产精品久久久久久久久免| 少妇丰满av| 直男gayav资源| 国产成人免费观看mmmm| 国产亚洲av片在线观看秒播厂 | 有码 亚洲区| 黄色一级大片看看| 亚洲成人久久爱视频| 日韩精品有码人妻一区| 看片在线看免费视频| 男女视频在线观看网站免费| 22中文网久久字幕| 免费黄网站久久成人精品| 亚洲国产欧美人成| 欧美最新免费一区二区三区| 韩国av在线不卡| 日日撸夜夜添| 国产伦理片在线播放av一区| 国产亚洲精品久久久com| 亚洲国产精品sss在线观看| 成人美女网站在线观看视频| 两个人视频免费观看高清| 一区二区三区高清视频在线| 欧美成人午夜免费资源| 狂野欧美激情性xxxx在线观看| .国产精品久久| 人妻系列 视频| 国产成人免费观看mmmm| 高清视频免费观看一区二区 | 真实男女啪啪啪动态图| 校园人妻丝袜中文字幕| 亚洲精品aⅴ在线观看| 精品99又大又爽又粗少妇毛片| 97在线视频观看| av天堂中文字幕网| 桃色一区二区三区在线观看| 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | 水蜜桃什么品种好| 精品久久久久久电影网 | videossex国产| 久久99精品国语久久久| 丝袜喷水一区| 日日干狠狠操夜夜爽| 男的添女的下面高潮视频| 亚洲不卡免费看| 舔av片在线| 你懂的网址亚洲精品在线观看 | 一本—道久久a久久精品蜜桃钙片 精品乱码久久久久久99久播 | a级毛色黄片| 亚洲精品色激情综合| 少妇熟女aⅴ在线视频| 国产片特级美女逼逼视频| 久久精品夜夜夜夜夜久久蜜豆| 国产在线男女| 久久久久九九精品影院| 97人妻精品一区二区三区麻豆| 黄色欧美视频在线观看| 免费搜索国产男女视频| 神马国产精品三级电影在线观看| 观看免费一级毛片| 国产高清有码在线观看视频| 日韩欧美 国产精品| 精品久久久久久成人av| 舔av片在线| 大话2 男鬼变身卡| 亚洲美女搞黄在线观看| 美女xxoo啪啪120秒动态图| 国产精品一区二区性色av| 亚洲精品乱码久久久v下载方式| 中国国产av一级| 精品熟女少妇av免费看| 老司机福利观看| 国产视频首页在线观看| 国产极品精品免费视频能看的| 午夜精品国产一区二区电影 | 亚洲乱码一区二区免费版| 国产探花在线观看一区二区| 久久韩国三级中文字幕| 免费看a级黄色片| 中文字幕久久专区| 午夜福利在线观看吧| 美女大奶头视频| av专区在线播放| 亚洲精品国产av成人精品| 久久精品国产自在天天线| 97超碰精品成人国产| 老司机影院成人| 久久这里只有精品中国| 91狼人影院| 精品人妻熟女av久视频| 在线免费观看的www视频|