Abstract
1. Introduction
Wireless sensor networks (WSNs) consisting of multiple collaborative sensor nodes have been widely applied in the field of medical, industrial, and military applications [1, 2]. In these applications, tiny sensors equipped with embedded processors, memory, and radio transceivers are randomly deployed in a target area to form a network that realizes event detection, information gathering, and communication. WSNs can provide users with the ability to record, observe, and react to an event or a phenomenon in a specific environment. And WSNs are expected to play an even more important role in the next generation network to sense the physical world [3, 4].
WSNs have many characteristics that differ from conventional wireless networks [5]. The sensor nodes in WSNs typically have limited resources in terms of battery supplied energy, processing capability, communication bandwidth, and storage [6]. Moreover, due to the varying operating environment and requirements of WSNs, issues, including large scale, dynamic topology, and autonomous, distributed operation of the node, should also be carefully taken into account.
Routing is a very important function to achieve efficient communication in the design of WSNs [7] and has been shown to significantly impact the energy efficiency and consequently the lifetime of WSNs [8]. The sensor nodes in WSNs sense the surrounding environment and deliver the measured data to a central base station or the sink through the routing process. Nevertheless, the design of routing protocols in WSNs is a challenging task as a result of their inherent characteristics mentioned above. An applied routing protocol in WSNs should ensure the minimum of the energy consumption and hence maximization of the lifetime of the network [9]. That means that it not only aims for energy efficiency but also aims for energy consumption balance. In addition, an ideal routing protocol should be scalable and resilient to meet the requirements of WSNs.
Recent research has proven that both multipath and clustering communication are very efficient routing methods in WSNs. Clustering has been widely used to extend the network lifetime and achieve network scalability. Data from different sources in cluster are aggregated by reducing redundancy with the purpose of minimizing energy consumption in transmission. On the other hand, in multipath mechanism, two or more paths are established from source to destination [10]. Multipath routing can distribute the forwarding of the data packets across multiple paths so that all nodes can utilize their batteries at a comparable rate, which contributes to prolonging the network lifetime and achieving load balance.
Swarm intelligence (SI) has been considered in the routing issue of an WSN [11]. Social insect communities such as ants and honey bees have many desirable properties in the WSN perspective as surveyed in [7, 12]. These communities are formed with simple, autonomous, and cooperative organisms that are interdependent for their survival [6]. Despite the lack of centralized control, social insect communities are able to effectively coordinate themselves to achieve global objectives. Their labor division is clear and can be adaptively adjusted according to the colony requirements or environment changes in an unpredictable world. The characteristics described above are necessary and desired in the context of sensor networks, especially for the design of routing protocols in WSNs. Bioinspired mechanisms are considered more robust as they provide interesting solution for routing due to their inherent features [10].
Honey bee colonies have recently emerged as a source of inspiration for the optimization of time-varying, dynamic, and multiobjective problems [13]. Some researchers have paid much attention to the foraging behavior of bee swarm and utilize it in designing the routing protocol in last decade. Such systems may be composed of simple nodes working together to deliver messages, while being resilient against changes in its environment. Nevertheless, to the best of our knowledge, limited number of bee-inspired routing protocols for WSNs have been reported in [13–15]. Moreover, these existing works have not considered the integration of clustering technique, multipath mechanism, and bee-inspired mechanism in solving routing problem for WSNs.
In this paper, we propose an energy-efficient and scalable multipath routing protocol for WSNs, Bee-Sensor-C by integrating a dynamic clustering scheme and enhanced BeeSensor proposed in [13]. In our protocol, bee agents were modeled to suit the energy resource constraints in WSNs for the purpose of constructing cluster near the event source and finding the multiple paths of better quality, by extensively borrowing from the principles behind the honey bee communication. The Bee-Sensor-C's design considers several restrictions in respect to resource availability and scalability for WSN. And, furthermore, Bee-Sensor-C has four important features which are listed as follows.
By our experimental evaluation, Bee-Sensor-C performs better in restricting routing overhead and energy efficiency than other SI based WSN routing protocols in our scenarios. What is more, Bee-Sensor-C is scalable and can significantly balance energy consumption among the nodes in the event-based application scenario.
The rest of this paper is organized as follows. In Section 2, we briefly introduce some related routing algorithms. Section 3 presents a brief description of the social insect analogy. The details of the Bee-Sensor-C algorithm are described in Section 4. In Section 5, we describe the evaluation and simulation results. Finally, we conclude the paper together with outlook for future work.
2. Related Works
We now briefly present some well-known routing protocols that are based on cluster or multipath for WSNs. Subsequently, we describe some swarm intelligence based routing protocols mainly taking inspiration from the foraging behaviors of ant or bee colonies.
2.1. Cluster-Based and Multipath Routing Protocols
In the last few years, a relatively large number of clustering routing protocols have been developed for WSNs. LEACH [16] is a representative clustering algorithm for WSN. LEACH forms clusters by using a distributed algorithm. However, it is not friendly in a large network deployment. The authors in [17] design a power-efficient and adaptive clustering hierarchy protocol (PEACH). In PEACH, cluster formation is performed by using overhearing characteristics of wireless communication to avoid additional overheads. BBE-C in [14] based on LEACH-C algorithm uses a bee-inspired algorithm (honey bee mating optimization, HBMO) to perform the clustering of network nodes. Since it is applied to networks with continuous data dissemination, the main objective of BEE-C is to extend the network lifetime by reducing the energy consumption. However, it is poor in scalability due to single hop communication between the cluster head and base station.
Multipath routing protocols can extend the network lifetime because they favor battery depletion at a comparable rate. In [18], the authors propose an energy-efficient multipath routing protocol (EEMRP) for WSNs. EEMRP utilizes a distributed multipath search algorithm to discover multiple paths and considers the remaining energy and hop counts as evaluation index of the link cost function. However, the reliability of successful paths is poor in EEMRP. The authors in [19] present a multipath energy-aware routing protocol (MERP) for WSNs. MERP uses only the local information to find multiple paths between a pair of source and sink node and designs a reliable data transmission algorithm based on an order of the quality of paths. However, MERP is not suitable for large scale WSNs because of the great storage costs of each node. In [20], the authors combine the advantages of multipath routing, enhanced overlay scheme, and clustering technique to make network more energy-efficient and fault tolerant and to get more robust data delivery. According to their simulations, the proposed approach is more energy efficient and robust in terms of data delivery rate than other multipath routing protocols.
2.2. Swarm Intelligence Based Routing Protocols
The idea of using ant-inspired algorithm to establish routes in WSNs is not new. A lot of ant-inspired algorithms for WSNs have been proposed. In FF-Ant (flood forward ant routing) [21], the source nodes flood the forward ants stochastically towards the sink node. If the search is successful, forward ants will create backward ants to traverse back to the source. Multiple paths are updated per flooding. Besides, two methods are used to restrict the flooding process. However, the authors only focus on the building of an initial pheromone distribution, which is not suitable for the high-density networks. The energy efficient ant-based routing algorithm (EEABR) proposed in [22] is designed to extend network lifetime by reducing the communication overhead in path discovering. In EEABR, each node in the network launches a forward ant with fixed size at a regular interval for finding a route to the destination. When the forward ant reaches its destination, it is converted to backward ant with the mission to update the pheromone trail of the path. EEABR performs better in terms of energy efficiency, standard deviation in the battery levels, and minimum remaining energy of a node. The authors in [23] propose three improvements to the EEABR algorithm to further improve its energy efficiency. These improvements are based on a new scheme to intelligently initialize the routing tables, intelligent update of routing tables in case of a node or link failure, and reduce the flooding of ants for congestion control.
Foraging strategy of honey bees has been extensively studied but their utilization in the design of routing protocols is relatively new, especially in WSNs. Saleem et al. in [13] propose an energy-efficient and scalable routing protocol for WSNs, BeeSensor, by taking inspiration from relevant features of BeeAdHoc [24] that is primarily designed for MANET. Besides, in [25], they present and analyze the algorithm in more detail. Like BeeAdHoc, BeeSensor works with four types of agents: packers, scouts, foragers, and swarms. These agents live in a software module called bee-hive for each sensor and undertake different types of tasks. Packers receive data packets from the upper layer and look for suitable foragers. Scouts are used to discover new routes and are divided into two sorts: forward scouts and backward scouts. Foragers carry data packets to the destinations along the unique path. BeeSensor can achieve good performance in energy efficiency by restricting the number of control messages. Moreover, it is scalable with the less memory and processing costs.
Although the researchers above have been engaged in a series of bee-inspired algorithms, they have not proposed a suitable clustering idea for large-scale WSNs. Moreover, these algorithms have a poor performance in the application scenario where the nodes near an event need parallel data transmission. In order to improve the performance, we proposed an energy-efficient and scalable routing protocol, Bee-Sensor-C, by combining a dynamic clustering technique, multipath scheme, and bee-inspired routing.
3. The Social Insect Abilities
In nature, scout bees explore the surrounding of the hive in order to detect possible source of food. Once a flower patch is discovered, the scout bee returns back to the hive to recruit the forager bees through a special dance. The dance is named “waggle dance” and determined fundamentally by the quality, distance, quantity, and direction of food source found. According to “waggle dance,” some bees are recruited and become foragers to collect the food. Furthermore, when a forager successfully returns back to the hive each time, it can also preform the foraging dance and report any improvement or deterioration of the currently working path. If the path's reliability becomes very poor, the forager will stop recruiting new members. In the following, we briefly discuss three key characteristics of the bee colony that can be exploited to solve the routing problems in wireless communication networks.
These strategies of foraging process implemented by the bee colony have desired properties of routing protocols in WSNs and can be utilized in the design of the routing protocol. In the following section, we will introduce our protocols based on the foraging principles of honey bees.
4. Bee-Sensor-C
4.1. Protocol Description
Bee-Sensor-C is an event driven and on-demand multipath routing protocol for WSNs. As shown in Figure 1, Bee-Sensor-C is mainly divided into three phases: cluster formation, multipath construction, and data transmission. Assume that the entire network has been initialized completely and each node has its own ID and relative sink node ID before the cluster formation. The first phase is to build cluster structure when an event happens. In the second phase, we make some improvements to BeeSensor for constructing multipath between CH and relative sink, followed by carrying data to sink through the stochastically selected path. At last, we realize the route maintenance.

Workflow of Bee-Sensor-C.
4.1.1. First Phase: Cluster Formation
When an event occurs in the network, all nodes near the event may need to send the perceived data. In this situation, BeeSensor is poor in the overall performance. Therefore Bee-Senor-C adopts an event-based dynamic clustering algorithm. Being different from BeeSensor, Bee-Sensor-C adds a new agent called HiveHeader into bee-hive for each sensor. The major responsibility of HiveHeader is to claim that the node wants to be a cluster header (CH) node in an event area when it detects an event.
When the event in the network happens, nodes nearby will become activated and measure the specific perceived attribute. And then the nodes having information about the event will join cluster. The clustering region is called event-sub-network and the region outside the event-sub-network is referred to as outside-network.
The clustering algorithm obeys the following rule: node
Once the cluster forms, Bee-Sensor-C takes an efficient mechanism,
Each node has a HiveHeader agent. When node
where
Because the energy consumption is relative to the distance between two nodes, we can find that the sum of energy consumption is the least when the node located in the center of an area communicates with other nodes in the area. Therefore, we make
Equation (1) shows that a node that is with higher residual energy and closer to the event source will send HiveHeader earlier and have the most opportunity of becoming a CH in the event-sub-network. Apart from the agent type field, the HiveHeader also carries four additional information fields in the header: event ID, source node ID (

The packet format of HiveHeader.
Each cluster has its TTL (time to live). CH gathers and aggregates the data from the member nodes in the event-sub-network. After that, it will send the data to the sink node until the event stops. When the remaining energy of current CH is lower than 60% (the value can be adjusted according to practical situation), the average energy of all nodes in the event-sub-network, CH will be reselected by the method above.
4.1.2. Improvements to BeeSensor for Multipath Construction
When CH needs sending data to sink node, it looks whether there are appropriate foragers of any nodes in the event-sub-network for the existing multipath. If CH fails to find valid foragers, an improved BeeSensor algorithm is used to establish multipath between CH and a relative sink node.
Like BeeSensor, Bee-Sensor-C utilizes forward scouts to explore the outside-network in search of an interested sink node using a broadcasting principle. Firstly, CH broadcasts a forward scout to its neighbors in outside-network. However, there is no limit to the hop of forward scouts in BeeSensor, and this will result in excess communication overhead. Therefore, we make the first improvement that realizes the self-destruction of forward scouts. The method is to add an allowable maximum value of the hops between CH and sink node into forward scouts. We define the maximum value as

The frame of a forward scout.
In BeeSensor, when an intermediate node
Entries that consisted of reward value and previous hop in the cache should be updated by future forward scouts only when the new reward value is greater than that existing in the scout cache. Furthermore, the future forward scouts are only utilized to update the cache and will be dropped instead of being rebroadcasted. Upon reaching the sink, the forward scout will be converted into backward scout with a unique path ID. Then, the backward scout travels back to the CH node along the backward route according to the previous hop information in the cache. Each intermediate node creates a forwarding table with path ID, the next hop, and previous hop. For providing loop freedom, a backward scout will be dropped by the node that received the backward scout for the second time, and the corresponding entry is flushed.
However, we find some questions about the above process of BeeSensor in our simulations. Firstly, we find that the variation of reward is not reasonable as the hop count increases. Moreover, the reward does not take into consideration the average residual energy along the path. Consequently, we make the improvement to reward that is calculated according to the following equation:
where
In Bee-Sensor-C, if the residual energy of node
Secondly, when a lot of nodes are randomly distributed in a target area, there may be dense nodes in a small region. In this situation, it is possible that only one node can be the member of multiple paths even though other nodes are supposed to be potential member of paths. Therefore, the method of updating the cache/reward in BeeSensor is not conductive to multipath construction in some cases. For instance, in Figure 4, the nodes in area 1 can communicate with nodes in area 2. When node 3 and node 4 receive the forward scout from node 2 and node 1, they update the cache and consider node 1 as the previous node because the reward from node 1 is of higher value. For the same reason, other nodes in area 2 all choose node 1 as the previous hop. The reward of node 2 is very close to that of node 1, although the former is less than the latter. Thus node 2 is not able to become the intermediate node of any path. In this case, there are some potential paths that are dropped.

Reward-cache update in the intermediate node.
Based on the above-mentioned consideration, we make the improvement to cache update as follows.
We assume that
where
Using the method above, some potential paths may be built. As shown in Figure 4, path 1 along node 3 may be established. This contributes to the balancing of the energy consumption and the prolonging of the lifetime of network.
At last, we find an interesting phenomenon that the node which is the neighbor of sink may choose other neighbor of sink as the previous hop. This reduces the number of paths and results in quick fade of some nodes near the sink. As shown in Figure 5, node D receives the forward scout from node B and node C, it choose node B as the previous hop due to the node B's higher reward. The path covering node C may pass through relatively more hops, which leads to lower reward. When the backward scout travels back, the potential path which passes sink, node D, node B and node A in sequence will be dropped. Moreover, the other neighbor nodes of sink may encounter the same situation, especially when the source node is far away from sink.

Path selection near the sink.
In order to solve the problem above, we proposed the method that the node will directly send the forward scout to sink instead of broadcasting only when the node is the neighbor of sink. Of course, all the nodes in the network know whether they are the neighbors of sink or not.
4.1.3. Data Transmission
In Bee-Sensor-C, when the backward scout with unique path ID arrives at the CH, it recruits foragers using the “waggle dance” of honey bees. The dance number represents the quality of the path and is computed using
where
Once multiple paths between CH and relative sink are constructed, the CH will send the data packets to sink node using foragers that represent valid routes to the sink node. The probability of selecting path
where
4.1.4. Repair Strategy for Situation of Unreachable Sink
In Bee-Sensor-C, there may be a circumstance that all forward scouts could not reach the destination before their self-destruction, which results from route discovery scheme. We have to add a repair strategy to cope with this situation.
As shown in the route discovery scheme, the forward scout is restricted by the hop limit and its transmission probability. The former search failure means that forward scouts need more opportunities to search further in order to access the sink.
At the very beginning, the forward scouts set the initial hop limit and the CH sets a timer waiting for time-out. The hop limit will double its current value after a search failure and will maintain the value when it reaches the maximum hop limit, which is predefined according to the network scale. Each time the hop limit is set, the time-out will be correspondingly modified.
4.1.5. Route Maintenance
In Bee-Senor-C, route maintenance is very necessary and obeys the rules as follows.
In order to detect the validity of path, the last forager arriving at the sink within a certain time will be returned towards the CH using swarm. Swarm has two functions, one is to determine the validity and the other is to collect and update the information about the quality of path.
If none of swarms come back within a specified time period, we think the path becomes invalid. The relative information in routing table and forwarding table will be deleted. Moreover the agents in invalid path will execute self-destruction. When the number of multiple paths is less than two, the CH will start a new route discovery process.
Each event-sub-network has its TTL. When the cluster is dead, relative information will be removed.
4.2. Mathematical Modeling of Key Performance Metrics
For the purpose of finding out the key factor affecting the performance of our protocol, we make the following mathematical analysis mainly on two performance metrics: routing overhead and energy consumption.
4.2.1. System Model
The WSN consists of
where
Then, we analyze the routing overhead and energy consumption of Bee-Sensor-C based on the models in [28].
4.2.2. Routing Overhead
We define routing overhead (
Bee-Sensor-C adopts an event-based dynamic clustering algorithm, and the overhead of this phase is given by
where
where
When the backward scouts come back, the overhead is given by
where
Combining (8), (9), (10), and (11), the overhead of Bee-Sensor-C is given by
In the same scenario, using the same method, we can get the routing overhead of BeeSensor using
where
4.2.3. Energy Consumption
We define energy consumption (
In the event-sub-network, we assume the convergence degree of cluster is
where
where
Therefore, we have
Using the similar method, the energy consumption of BeeSensor is given by
Because the energy consumption of convergence is relatively less than the others, a comparison of (18) and (19) proves that Bee-Sensor-C is better in energy efficiency in our suggested scenario.
Also, we can cope with the routing overhead in another aspect. Taking the data amount of intermediate node as the target optimal parameters, we can prove that our method is better in routing discovery. Now, we separate the proof into two parts.
When intermediate node receives the packet formerly transmitted by this node, it will conventionally drop it and do nothing. Node in our scheme will also drop it as the His is smaller than the cache. So, performance of the normal method is the same as that of our method.
When intermediate node receives the packet for the first time, it will conventionally broadcast the packet. While our method will broadcast the packet depending on the His value, that means the performance of normal method is worse than that of our method.
According to the mathematical analysis, we achieve the following conclusion.
Routing overhead is the main source of energy consumption.
Reducing the total number of nodes that participate in broadcasting forward scouts can effectively reduce routing overhead.
Although the cluster construction and maintenance would bring about more complexity and energy consumption, it is well worthwhile integrating dynamic cluster structure.
Then, we will discuss the scenario that more than one cluster is created in the WSN based on the conclusion above.
4.3. Special Discussion on Multiple Clusters
How to reduce the routing overhead and make Bee-Sensor-C more scalable is our main purpose. According to the prior conclusion, we adopt the method that reuses the existing clusters in the scenario where there are multiple events detected in the network. The method named as “cluster reuse” obeys the following rules.
4.3.1. Cluster Reuse
Each cluster has its TTL, and each forwarding table entry at intermediate nodes in the paths likewise has an associated lifetime. If the event in the event-sub-network stops (i.e., no relative data in the cluster are transmitted), the cluster will also maintain a period of time. When a cluster is alive, other clusters can utilize its information. Moreover, CH belonging to living cluster can reply the route discovery with a backward scout, and the new cluster can construct the path along the CH of the living cluster.
For instance, in Figure 6, cluster 1 is old and alive. When cluster 2 needs to build the multipath between CH 2 and sink, CH 2 broadcasts a forward scout for route discovery. Once the nodes except CH 1 in the cluster 1 receive the forward scout, they will send it to CH 1 directly. When the CH 1 receives the forward scout, it will reply a backward scout to CH 2 along path 1 instead of broadcasting it. The back scout includes the information about the quality of paths between CH 1 and sink. The relative values, such as
where

In case of two clusters.
4.3.2. Number of Signals That Can Be Received Simultaneously
If there are multiple events that occurred almost simultaneously in the environment, plenty of clusters will be created. Obviously, here is a question that how many signals can be transmitted to sink. In the following part, we give a mathematical analysis on the number of signals that can be received from the configuration.
As we can see in Figure 7, two clusters have overlap area; nodes in such area will sense both two events. Assuming that event 1 and event 2 occurred almost simultaneously and cluster headers are not in overlap area, each node, in overlap area, such as node
where

Two clusters sharing overlap area.

Maximum signal number situation.
Using the method above, Bee-Sensor-C can take full advantage of cluster and significantly reduce routing overhead. In the next section, we will compare the performance of Bee-Sensor-C with the existing protocols through simulations.
5. Performance Evaluation
The simulations were conducted in two scenarios. We present the performance of Bee-Sensor-C against three existing protocols: BeeSensor, IEEABR, and FF-Ant in the first scenario where there is only an event that occurred in the network. Then, in the second scenario, we evaluate the performance of Bee-Sensor-C when there are two or more events detected in the network.
5.1. Simulation Environment
The program used in our simulations is written in JAVA and implements the network famework specified by ISO. The lower layer models the IEEE 802.11 network closely and carefully. The IP layer implements these routing protocols taken into comparison. In this section, we will comprehensively evaluate the integrated performance of Bee-Sensor-C through numerous simulations in a random deployed network running event-driven applications.
There are two static scenarios in the simulations. In the first scenario, the sensor nodes are randomly distributed in a square of 200 m × 200 m and the node density increases as the number of nodes increases. Moreover, there is only one event that occurred and the nodes near the event will act as the source nodes. Besides, we evaluate Bee-Sensor-C in the form of scalability in the second scenario where the average node density remains the same and there are two events that occurred in the network.
In both scenarios, the distributed coordination function (DCF) of IEEE 802.11 is used to implement the MAC layer. The radio propagation range for each node is 40 m. The basic data rate is 1 Mbps and PLCP data rate is 2 Mbps. In addition, we consider the nodes in the event-sub-network as data sources using the CBR traffic model with data rate of 2 kbps for duration of 10 s. The parameters (
Simulation parameters.
5.2. Performance Evaluation Metrics
From the results obtained from our simulation experiments, we define the following performance metrics that we use to compare the performance of different protocols.
Packet delivery rate: it is the ratio of total number of data received at the sink node to the total number of data generated by all source nodes in the network. In Bee-Sensor-C, the data received at the sink node have been aggregated by CH.
Control overhead: it is the total size of control packets needed by a routing protocol for one kbits data packets received successfully at the sink (bits/kbits). Energy efficiency: it is the energy consumed in delivering one kbits data packets to sink node (J/kbits).
Energy standard deviation: it is defined as the average variation for energy of all nodes in the network with unit joules (J). An energy-aware routing protocol should not only aim for energy efficiency but also for balancing the network energy consumption.
Energy consumption: it is the total energy consumed by the nodes in the network during the period of experiment with unit Joules.
Routing building time: it is the average time building the multipath takes. In Bee-Sensor-C, it should include the time that constructing cluster takes but exclude the data transmission time in cluster.
Latency: it is defined as the difference in time when an event packet is generated at a source node and it is eventually received at the sink node. In Bee-Sensor-C, the source nodes should include all the nodes in the event-sub-network apart from CH.
5.3. Discussion on Simulation Results
5.3.1. Comparison of Bee-Sensor-C, BeeSensor, IEEABR, and FF-Ant in Scenario 1
In this set of experiments, we compare Bee-Sensor-C with BeeSensor, IEEABR, and FF-Ant in a static scenario. The results of our experiments are shown in Figures 9–14.

Control overhead.

Energy efficiency.

Energy standard deviation.

Packet delivery rate.

Latency.

Routing building time.
5.3.2. Evaluation of Bee-Sensor-C in Scenario 2
The main purpose of this experiment is to evaluate the performance of Bee-Sensor-C when there are two or more events detected in the network, which can reflect the scalability and robustness of Bee-Sensor-C. In the experiments, we call the protocol that adopts “cluster reuse” as Bee-Sensor-C. Otherwise, the protocol is called as “Bee-Sensor-C without CR.” Because Bee-Sensor-C has better performance than other protocols above in similar scenarios, we only compare Bee-Sensor-C to Bee-Sensor-C without CR. The results of our experiments are shown in Figures 15–17.

Control overhead.

Energy efficiency.

Routing building time.
6. Conclusion
In this paper, we proposed an energy-efficient and scalable multipath routing protocol based on dynamic clustering and foraging behavior of bee swarm for WSNs, that is, Bee-Sensor-C. By carrying out dynamic clustering and multipath method, Bee-Sensor-C improves the whole network performance. Via simulations, Bee-Sensor-C outperforms other protocols in metrics of control overhead, energy consumption, packet delivery rate, energy standard deviation, and latency. For instance, in the first scenario, control overhead of Bee-Sensor-C approximately reduces by 40.8%, 53%, and 66% as compared with that of Bee-Sensor, IEEABR, and FF-Ant, respectively. And in terms of the packet delivery rate, Bee-Sensor-C achieves an improvement of about 18.7% over BeeSensor, 16% over IEEABR, and 30.9% over FF-Ant. Moreover, Bee-Sensor-C well supports multicluster scenario. In the second scenario, Bee-Sensor-C reduces 10% control overhead of Bee-Sensor-C without using “cluster reuse” method. In the future, we intend to improve our algorithm to make it compatible with more application scenes and different sensor networks, such as dynamic scenario. And then we will implement the proposed algorithm on a real WSN hardware.
