- About this Journal ·
- Abstracting and Indexing ·
- Advance Access ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

International Journal of Distributed Sensor Networks

Volume 2012 (2012), Article ID 981380, 14 pages

http://dx.doi.org/10.1155/2012/981380

## A Vascular-Network-Based Nonuniform Hierarchical Fault-Tolerant Routing Algorithm for Wireless Sensor Networks

^{1}School of Automation, Chongqing University, Chongqing 400030, China^{2}School of Computer Science and Engineering, Chongqing Three Gorges University, Chongqing 404100, China^{3}School of Software Engineering, Chongqing University, Chongqing 400030, China

Received 10 April 2012; Revised 7 August 2012; Accepted 6 September 2012

Academic Editor: Mugen Peng

Copyright © 2012 Hongbing Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

Fault tolerance is the key technology in wireless sensor networks which attracts many research interests. Aiming at the issue that the nodes' failures affect the network's stability and service quality, a vascular-network-based fault-tolerant routing algorithm is presented by nonuniform hierarchical clustering. According to the distribution characteristics of the vascular network and inspirations to the fault tolerance for wireless sensor networks, a mathematical model and network topology are, respectively, established. It applies the improved particle swarm optimization (IPSO) to the nonuniform hierarchical clustering, and multipaths are established between the neighbor hierarchical nodes based on the best-worst ant system (BWAS). It introduces the normalized values of the pheromone generated by the ants as the selection probabilities of transmitting paths to establish the hierarchical routing. Theoretical analysis and simulations show that the algorithm has higher packet receiving rates, lower average transmission delay, and balanced energy consumption. It has the good performance in fault tolerance and stability of data transmitting, and it avoids the hot issue in energy consumption and achieves the network load balance.

#### 1. Introduction

Due to the characteristics of dynamic variation of the topology, no center ad hoc network and the constraints of the resources in wireless sensor networks (WSNs), as well as the unpredictability of the working scenario, such as the vibration and electromagnetic interference, it is prone to unbalance of energy consumption, poor quality of data transmission, and routing instability [1, 2]. So they have great influence on the key technologies, including average transmission delay, packet receiving rate, and average energy consumption, which closely correlate with the network’s stability, accuracy, and reliability. They also weaken the reserved function and bring greater challenges to the existing network technologies, especially for the application in the complex scenario and necessity for strict performance, just like condition monitoring for key facilities and poisonous gas, emergency, and disaster releasing.

The network with good performance should have the integrity of the fault features, the accuracy of fault diagnosis, and fault recovery efficiency. It can perform well in the robustness of nodes’ interconnection, accuracy of data transmission, and against the fast energy consumption as well as the malicious invasion. It also can make a timely diagnosis, find a reasonable control decision, and continue to provide high-credibility computational services by adaptively handling the anomalies of the network. Fault tolerance is the key technology in wireless sensor networks which has attracted great attention and becomes a hot issue that needs further study [3].

Fault tolerance in wireless sensor networks is a complex system problem which includes fault prevention, detection, isolation, diagnosis, and recovery [3]. It mainly includes the optimization of each layer’s protocols or algorithms and joints optimal control among multilayer and hardware fault tolerance [4–6]. Fault tolerance in the network layer [7] and collaborative optimization among the layers are to be the important direction. Fault tolerance in the network layer is to explore the mechanism of multirouting data transmission [7], network coding [8], and so on. The mechanism of multirouting data transmission is to reestablish a path or select one from the multirouting table established in advance to realize the fault tolerance when the source node confirms that the fault exists in the transmitting routing, namely, the redundancy routing fault tolerance [9–11]. Network coding is to transmit the encoded data along multipaths and realize the fault tolerance by decoding and reconstructing the data at sink node, that is, the redundant data fault tolerance [12–14]. The combination of a variety of fault-tolerant methods or collaborative optimization with other layers will achieve the good result [7, 15]. The mechanism of multipath data transmission and network coding improves the stability of data transmission and network load balance. However, it increases the computational complexity, transmission delay, and energy consumption.

Fault tolerance based on the principle of bionics and modern intelligent bionic algorithms has recently been attracting growing research interests in the study of wireless sensor networks. They include biological immune system mechanism, the fuzzy diagnosis, the expert system, the artificial neural network, the particle swarm optimization, ant colony algorithm, and genetic immune algorithm. They provide good ideas and methods to the fault-tolerance and show better fault tolerant effect in wireless sensor networks. For example, the ant colony algorithm with the advantage of swarm intelligence is introduced into the routing establishment in the network layer; the particle swarm algorithm is introduced into the topology establishment with its characteristics of fast clustering convergence to improve the efficiency of clustering; artificial neural network or its combination with the fuzzy algorithm is applied to forecast the perception data to realize fault tolerance in the application layer; genetic algorithm can be applied to the data unit coding to improve fault tolerance of the data transmission in the link layer or network layer.

It has already shown the good performance and advantages when introducing the mechanism of biological immune system into the fault tolerance in wireless sensor networks [16–23]. Some basic research works have been done in this aspect. Bokareva et al. have presented a fault-tolerant architecture SASHA based on the biological immune system, in which the lymph mechanism is used to produce the detector for fault detection, and the thymus mechanism is used to complete the fault diagnosis. This structure cannot only identify the known fault model, but also provide a good adaptive ability of learning and evolving to the unknown fault model [16]. Jabbari and Lang apply the mechanisms of biological immune system to the security detection and fault tolerance by simulating the mechanisms of self-learning, self-organization, and memory and information processing in the biological immune system or the nerve immune system [17]. Atakan and Akan propose the new distributed node and rate selection method (DNRS), which is based on the principles of natural immune system to select the minimum number of sensor nodes based on the B-cell stimulation in immune system to transmit the data to the sink and select the appropriate reporting frequency of sensor nodes to achieve the minimum energy consumption [18]. Rui et al. propose an immune system inspired approach to locally discover and recover from losses of query messages at sensor nodes, similar to antibodies in an immune system [19]. Chen et al. propose a neighborhood node selection algorithm to decide if a sensor node is activated or not according to the B-cell and T-cell models of immune systems by comparing the similarity between artificial immune system and wireless sensor networks [20]. Hu et al. present a hybrid routing scheme and an immune cooperative PSO algorithm for fault-tolerant routing problem [21]. In [22], uniform immunization and temporary immunization are conducted on small worlds of tree-based wireless sensor networks to combat the sensor viruses. Salmon et al. propose an intrusion detection system (IDS) framework inspired by the human immune system to monitor their neighborhood and to identify an intruder [23]. Mechanism of biological immune system or immune algorithms can also be applied in routing optimization, intrusion detection, nodes’ deployment, target coverage, and performance optimization.

This paper will explore establishing the nonuniform hierarchical clustering based fault-tolerant routing algorithm by the bionic intelligent algorithms according to the characteristics of vascular network and inspiration to fault tolerance based on the preliminary studies. It will carry out the fault tolerance studies by combining the routing establishment with the topology design to improve the network’s performance of stability and reliability. The main work and contribution of this paper is: (1) to study the structure and characteristics of the vascular network and the inspirations to the fault tolerance and to establish the mathematical model and network topology; (2) to study the IPSO and BWAS, making these intelligent algorithms more optimal and more suitable for resource-restrained network; (3) to study the nonuniform hierarchical static clustering by applying the IPSO; (4) to study the routing establishment by applying the BWAS.

It innovatively establishes the hierarchical fault-tolerant topology based on the vascular network and uses the normalized values of the ants’ pheromone as the selection probability of the transmission paths to establish the fault-tolerant routing by improved intelligent algorithms. Deference with previous studies in the methods of fault tolerance in the network layer is not to simultaneously establish multipaths or backup paths for each relay node, but to temporarily select the path with maximum normalized values of the pheromone between the two neighbor hierarchical nodes to establish the optimal transmission route. If this node fails, then it selects the other node as the substitute, in which the path is with the second maximum normalized values of the pheromone as the backup transmission path to realize the fault tolerance. The new reestablished transmission path is not from the source node to sink node but from the node ahead of the fault node to the sink node by the selection probability. Furthermore, the intelligent algorithms are improved to fit for the source-restrained network.

The rest of this paper is organized as follows. Section 2 studies the mathematical model of the vascular network and topology. Section 3 presents the nonuniform hierarchical clustering algorithm based on the improved particle swarm optimization (IPSO) and the fault-tolerant routing algorithm by the best-worst ant system (BWAS). Section 4 carries out the simulations and analysis to evaluate the performance. Finally, Section 5 concludes the paper and discusses the future work.

#### 2. Mathematical Model and Network Topology

##### 2.1. Mathematical Model

The vascular network is the fractal tree-like branching network. It has the complex structure with the characteristics of the fractal [24]. Great differences exist among the different sections of the vascular in the structures, physical characteristics, and functions. Different sections have different blood flowing rate. It has the properties of stability, flexibility, connectivity, and multiconnectivity. Blood flows in the directed way according to the pressure difference that exists between any two points. Blood flow has quantitative relationship with current velocity, cross-section, and the pressure.

The characteristics of the vascular network give an important inspiration to the establishment of fault-tolerant routing in WSN. The nodes are hierarchically marked to have the hierarchy differences according to distance to sink node to ensure the directed data transmission. Different clustering probabilities are adopted in different hierarchical areas. Finally, it forms the distribution with different density and scale of the clusters in different hierarchical areas, which has a similar topology with the vascular network model. The vascular-network-based topology has multipaths connectivity and uses the pheromone normalized values generated by ants in ant colony algorithm as the path selection probability to establish the optimal transmission routing to realize the fault tolerance.

The vascular-network-based mathematical model has the following characteristics. (1) Pressure differential network. Each node in WSN has the differential pressure value , which reflects the distance to center node of the network. The ones closer to the center node have higher pressure values. So the pressure difference exists between any two nodes, which reflects the directed data flow. (2) Connectivity of the weighted graph; it is the directed weighted graph and each side is assigned with the different weights . Any two points in the network are connected. (3) Clustering density. Different quantity and density of the clusters are presented in different hierarchies. Larger quantities and higher distribution density of the clusters are presented in the areas with smaller hierarchy values. The mathematical formulations are as follows: where is the pressure of node , is the pressure difference between the nodes and , represents the Euclidean distance from the node to center node , is the quantity of the clustering nodes of network, is a parameter value, represents the directed pressure, is the adjacent matrix element of directed weighted graph, and is the set of side .

##### 2.2. Network Topology

*Definition 1. *Hierarchy: nodes in WSN are marked with different hierarchies according to the distance from the average node to sink node. The nodes belonging to the same hierarchical area are marked with the equal hierarchy value, that is,
where represents the hierarchy value of the node , represents the Euclidean distance from the node to sink node , and is the initial distance value.

###### 2.2.1. Nonuniform Hierarchical Clustering Topology

The topology is established based on the theory and characteristics of vascular network. (1) The nodes in the network are divided into two categories: the average nodes and clustering nodes. Average nodes are responsible for data collection and transmission. Besides this, clustering nodes have the functions of data receiving, forwarding, and routing addressing. The network routing is established among the clustering nodes. (2) The network is divided into different hierarchies by the distance to the sink node. The nodes in the same hierarchical area have the same hierarchy value, and the routing is established among the clustering nodes with different hierarchies. (3) It is the directed weighted graph with connectivity between any two nodes in the network. Each link has different weight; the data propagation and message broadcasting have directions according to the nodes’ pressure gradient. (4) Different quantity and scale of the clusters are presented in different hierarchical areas. Larger quantity and smaller scale of the clusters are presented in the areas with smaller hierarchy values and so does the opposition in the areas with higher hierarchy values. (5) Multipaths will be established between the nodes that are the neighbor hierarchical within their transmission power coverage. The normalized values of the pheromone are used as the probabilities to select the transmitting path. The link with maximum probability is to be selected as the transmitting path. The established physical topology of network is shown in Figure 1.

Figure 1 shows the network’s topology based on the vascular network. It is divided into 3 hierarchies. Node 0 is the sink node, and nodes 1–10 are the clustering nodes. The nodes 1–5 in hierarchy 1 are responsible for the data fusion, receiving the data from the nodes in hierarchy 2 and retransmitting the data to the sink node. Nodes 6–8 in hierarchy 2 are responsible for data fusion in their respective clusters and retransmitting the data from nodes in hierarchy 3 to nodes in hierarchy 1. Nodes 9 and 10 in hierarchy 3 are only responsible for the data fusion and transmitting the data to the nodes in hierarchy 2. For example, node 7 in hierarchy 2 will establish the transmission path with nodes 1–5 in hierarchy 1 and nodes 9-10 in hierarchy 3 within its transmission power coverage excluding the nodes 6 and 8 which belong to the same hierarchy. And the value of each side is not equal.

The fault tolerance of the topology is owing to the normalized value of the ants’ pheromone used as the selection probability of the transmission path, and it selects the path with the maximum probability as the transmission path. For example, the pheromone on the links connecting the node 7 in hierarchy 2 with the nodes 1–5 in hierarchy 1 is different, that is, , where represents the normalized pheromone value. Therefore, the real transmitting path is . When this path fails, it will select the path with the second maximum probability as a substitute. If fails, is to be selected.

###### 2.2.2. Establishing Rules

The topology will be established based on clustering model. The nodes are functionally divided into average nodes (ANs) and clustering nodes (CNs). The routing is established among the hierarchical clustering nodes. The clustering node is to establish the transmission paths only with neighbor hierarchical nodes, not the same hierarchical ones. It establishes the transmission path with all the neighbor hierarchical nodes within the transmitting power coverage. Only one path is to be selected as the actual transmission one, and the rest are the backup transmission paths. The establishing rule is shown in Algorithm 1.

###### 2.2.3. To Determine the Clustering Probability

Different clustering probabilities are adopted in different hierarchical areas to form the different scale and quantity of the clusters, which means nonuniform clustering. Clustering node is dynamically selected according to the residual energy to balance the energy consumption in one cluster [25, 26].

The network is separated into different annular sections with the sink node as the center and () as the radius. The nodes in the same annular section have the same hierarchy value. It applies the larger clustering probability in hierarchy 1 where it is close to the sink node and smaller clustering probabilities in the hierarchical areas that are far from it. It eventually forms the distribution with large quantity and smaller scale of the clusters that are closer to the sink node, as shown in Figure 2.

This topology based on the vascular network model can balance the energy consumption and avoid the hot issue. However, how to determine the clustering probability in each hierarchical area becomes the key issue. The energy consumption model refers to [27], the radius of each area is , and the total number of the nodes is that the network is divided into areas. The clustering probability is () for the area where the radius is . The number of the clusters is in each area. The number of the nodes in one cluster is excluding the clustering node. Suppose each node only sends data bit, so the energy consumption of the clustering node is as follows:

The energy consumption of the nodes excluding the clustering nodes is as follows:

The whole energy consumption in one cluster is as follows:

In order to minimize the energy consumption, from , we can get . According to for the balance of energy consumption, we can get , and so on.

#### 3. Nonuniform Hierarchical Clustering Routing

##### 3.1. Nonuniform Hierarchical Clustering Strategy

Particles, with equal quantity of the nodes, are randomly deployed in the active hierarchical area. It does the initial clustering by clustering probability and then introduces the IPSO to intelligent clustering. It modifies the particles’ flying rules when the particles move to the location coinciding with the sensor nodes, the location of the particle becomes fixed and the velocity turns to zero. The particles no longer follow the rule that the particles’ velocities and locations are updated by their own and swarms’ optimum. The rest particles continue to fly by established rules until the whole particles’ locations coinciding with sensor nodes. It forms the optimal clustering distribution and then turns to the next hierarchical area.

###### 3.1.1. PSO Prototype

PSO is an optimization algorithm based on swarm intelligence which imitates birds’ behavior. Swarm intelligent optimization searching is carried out by the cooperation and competition of the particles. Each solution of the generation has the characteristics of learning the optimum of itself and the group. Each particle is determined by its position and velocity vector. Each particle confirms them by the established direction as well as experiences from the optimal direction of itself and the swarm’s. The velocity and location is updated by the following formulae: where the inertia weight coefficient is the linear descending function by time. It can make PSO explore the larger area at the beginning and roughly locate the position faster. With descending gradually, the particles’ speed gets slower and begins to locally search subtly. , are, respectively, the initial and eventual weight, is the maximum iterations, is the current iterations, is the particle’s velocity vectors, and is the particle’s current position, , are random numbers between 0 and 1 to keep the diversity of the group, are the learning factors which make it keep the ability of self-summary and learning from the optimal particles, and and are, respectively, the best positions of the particle itself and the swarm.

###### 3.1.2. IPSO

(a)Modify the PSO formula with inertia weight. The particles are divided into clusters of particle swarms (). Modify the formula (6) into It updates the particles’ position and velocity by the formulae (7) and (8) in each iteration.(b)Modify particles’ flying rules. The particles no longer follow the rule that the particles’ velocities and locations are updated by their own and swarms’ optimum. In the improved way, when the particle moves to the location coinciding with the sensor nodes, the particle’s location becomes fixed and the velocity turns to zero. The rest particles continue to fly by established rules until the whole particles’ locations coincide with sensor nodes. It forms the optimal clustering distribution, and then the clustering is to be carried out in the next hierarchical area.

###### 3.1.3. Steps of the Algorithm

*Step 1. *Divide the network into different hierarchies by the distance from the nodes to sink node. It uses different clustering probabilities for different hierarchical areas. It selects the nodes in hierarchy 1 as the active nodes and makes others as dormant ones in order to avoid the particles flying into other hierarchical areas.

*Step 2. *Randomly generate the number of the particles as same as nodes and do the initialization. Define the initial position and flying velocity of each particle, the learning factor , (), the inertia weight , , the maximum speed , the maximum position , and the maximum .

*Step 3. *Determine the number of the clusters and cluster center in . Each particle swarm has dimensions, and different individual particles have different positions.

*Step 4. *Set the target function to evaluate the fitness of the particles and the clustering quality by Euclidean distance:
where the *dist* is the normative Euclidean distance between two objects, is the number of the clusters, is the particle, and is the center of cluster .

*Step 5. *Calculate the particle’s self-optimal position in and the optimal position of .

*Step 6. *Judge the particles’ positions. When the particle moves to the sensor nodes’ position, set , , where represents the sensor node’s position.

*Step 7. *Update the rest particles’ positions and velocities by formulae (7) and (8).

*Step 8. *Repeat Steps 3 to 7 until the last particle coincides with the last sensor node. The clustering is over in this hierarchy, and the nodes turn to the dormant state.

*Step 9. *Wake up the nodes in the hierarchical area , and do the clustering by Steps 2 to 8.

##### 3.2. Routing Establishment Based on BWAS

BWAS is the improvement of the ant colony algorithm. It introduces the rewards-punishment mechanism to magnify the pheromone between the best and worst ants. It improves the ability of the optimal path searching and the convergence rate. And pheromone generated by ants is an important parameter reflecting the path’s optimization. It considers the nodes’ energy, inspiration of the nodes’ distance, and the advantages of swarm intelligence.

Now suppose some artificial ants are set at each clustering node and they will die when finishing searching the paths from the clustering nodes to the sink node. The ants have the memory of the pheromone on the paths passed by.

*Step 1. *Initialize the parameters; to determine the clustering nodes, set ants’ quantity at each clustering node and define their property.

*Step 2. *Select the path for each ant by formulae (10) and (11):
where is the transition probability of ant , is the unvisited node, is the pheromone intension on side , is the visibility of the side which reflects the inspiration transferring from node to , and is the node set that the ant is allowed to visit. Formula (11) is to update the pheromone when the ant has finished establishing the whole path, and is a parameter.

*Step 3. *Update the pheromone on the generated paths by formula (14) after each ant finishes the task:
where represents the pheromone value on the side , is a parameter, , is the quantity of the nodes, and is the length of the path.

*Step 4. *Execute Step 2 and Step 3 until each ant generates a path and evaluate the best and worst ants according to the length of the paths passed by.

*Step 5. *Globally update the pheromone on the paths passed by the best ants by formula (16):

*Step 6. *Globally update the pheromone on the paths passed by the worst ants by the following formula:
where is a parameter, and are the lengths of the paths, respectively, passed by the best and worst ant, is the length of global optimal path, and is the volatilizing parameter of the pheromone, where .

*Step 7. *Execute Steps 2 to 7 for ants in the rest clustering nodes until all the ants finishes task and record the pheromone values on the paths.

After the hierarchical dividing and static clustering, it uses the normalized pheromone as the selection probability to establish the fault-tolerant routing. When the energy consumption of the clustering nodes reaches the threshold value, they report the information along the established route in order to reduce the energy consumption. When the transmission cycle is over, it selects the nodes with higher energy as the clustering nodes in the clusters. Then, the whole network calculates the new pheromone values of the paths based on BWAS to establish a new routing.

#### 4. Simulation and Analysis

##### 4.1. Simulation on Nonuniform Hierarchical Clustering

###### 4.1.1. The Distribution of Hierarchical Nodes

Assumptions: (1) the nodes in the network are stationary. (2) The locations of the nodes are known. (3) All nodes have the same status and parameters. (4) Each node works at full-duplex operation mode. (5) The nodes distribute uniformly in the rectangular areas, and the sink node is outside.

The simulation is based on PC with processor i3-2100, RAM with 4 G. 150 nodes are deployed in the area , the number of hierarchies is , and the initial coordinate of sink node is . The radius . The inertia weight coefficient in IPSO is linearly down from 0.9 to 0.4. The learning factors , ; the quantity and scale of the particle swarm are determined by the clustering probability. The maximum iteration is set by the experiments to ensure that the last particle’s location coincides with the sensor node. , are the random values in , and .

Figure 3 shows that 150 sensor nodes are deployed randomly in , which are labeled with blue color. These nodes are not hierarchically divided, and all have the equal hierarchical property. The sink node is deployed at and is labeled with red color. The nodes in Figure 4 are hierarchically divided based on Figure 3. With the sink node as the center of the circle and the distance to sink node as the radius, 3 hierarchical areas are divided, respectively, marked by the colors red, blue, and green. The red nodes belong to hierarchy 1; the blue and green nodes, respectively, belong to hierarchies 2 and 3.

###### 4.1.2. Nonuniform Hierarchical Clustering

The nodes are hierarchically clustered by the IPSO; different clustering probabilities are adopted in different hierarchical areas. Finally, it forms the cluster distribution with different scales and quantities, as shown in Figures 5 and 6.

Figure 5 shows the equal probability hierarchical clustering by IPSO with 3 hierarchies. 150 nodes are clustered by the same probability. The scales of clusters are the same, and there are about 2–4 nodes in each cluster. Figure 6 shows the nonequal probability hierarchical clustering by IPSO with 3 hierarchies. So it forms the distribution that different scales and quantity of clusters are in different hierarchical areas. It, at last, forms the distribution with smaller scales and larger amount of the clusters in the lower hierarchical level where it is near to sink node. And so does the opposition in hierarchy 3 where it has the larger scales of clusters and fewer nodes in each one. It reaches the expected clustering structure.

Table 1 shows the statistics of the nonuniform hierarchical clustering by IPSO. From it, the number of the nodes in hierarchy 1 is 38, the clustering probability is 0.237, and the number of the clustering is 9. According to the energy balance method presented above, we can calculate the probabilities of the second and third hierarchies; they are, respectively, 0.100 and 0.070. The simulation results show the corresponding values are 0.103 and 0.074. From the clustering probabilities, the number of the clusters, and member nodes, we can get the conclusion that the distribution of the clusters is the same with the topology previously supposed.

##### 4.2. Simulation on Nonuniform Hierarchical Clustering Routing

###### 4.2.1. Parameters Setting

After the hierarchical division and nonequal probability static clustering, to place the ants at each clustering node with the number , the initial pheromone value . Pheromone inspiration factor ; it indicates the relative importance of the pheromone when the ants select the forward way. Expect heuristic factor , indicating the relative importance of visibility and affecting the algorithm’s convergence rate. The greater the value is, the closer it is to be greedy algorithm according to the state transition probability. Set the pheromone evaporation coefficient , pheromone residual factor , and the maximum iterations = 200.

###### 4.2.2. Process of Routing Establishment

Now we use to to identify hierarchies 1 to 5. represents the coordinate of the nodes in hierarchy , represents ant’s pheromone normalized value. Table 2 shows the normalized values of the ants’ pheromone by BWAS on the paths from the node in to sink node. The node is randomly selected to establish a transmission path from it to sink node. represents the normalized values on the paths from the node in to nodes in . Table 3 shows the nodes’ coordinates corresponding with the normalized values in Table 2. = 0.3034 represents the normalized values of the pheromone on the path from the node to .

From all the normalized values of the ants’ pheromone on the paths from the node in to the nodes in , = 0.3034. So the node is to be selected as the next hop to establish the transmission route. If the node fails, it will select the path with = 0.1515; therefore, is to be selected as the next hop. So a routing for data transmission has been set up from node in to sink node. The hierarchy order of the established path is , and the corresponding order of nodes’ coordinates is , as shown in Table 3. Figure 7 shows that the actual transmission route is established among 50 clustering nodes based on Table 2.

###### 4.2.3. Simulation on the Routing Establishment

Simulation is completed when all the ants reach the sink node by BWAS. The pheromone on each path stops evaporating and is recorded. Node visited by ants is not hierarchical, only by this can pheromone reflect the links’ quality.

Figure 8 shows the distribution of the clustering nodes in three hierarchies. According to the nonequal probability clustering method, 19 clustering nodes are elected from total 150 nodes and marked with three different colors as for three hierarchies. Simulations in Figure 9 illustrate that all the possible transmission paths are established among the clustering nodes. Paths in different hierarchy are marked with different colors for distinction. The paths established in Figure 9 show the hierarchical characteristic clearly.

For fewer clustering nodes in WSN, we can more clearly understand the establishment of the transmission paths. However, better performance can be reflected for the large-scale network, as shown in Figures 10 and 11.

Figure 10 shows the distribution of 50 clustering nodes in five hierarchies. Figure 11 shows all the possible transmission paths among the clustering nodes. We also mark the hierarchical transmission paths with five different colors for distinction. There are five hierarchies for the established paths; the node only establishes the links to the nodes in the neighbor hierarchies. It has an important significance to the quick establishment and optimization of the transmission routing for large-scale network.

##### 4.3. Performance and Complexity Analysis of the Fault Tolerance

###### 4.3.1. Performance Analysis of the Fault Tolerance

(1) Pheromone, generated by ants during the process of searching the optimal path, is an important parameter reflecting the path’s quality. The higher is, the greater probability the path is selected as transmitting path. (2) It uses the normalized pheromone values as the selectionprobabilities of the paths and selects one with maximum probability as the actual data transmitting path. Any clustering node will establish the possible paths to the nodes in neighbor hierarchies within its transmission power coverage. But only the path with maximum probability is to be selected as actual data transmitting path. If it fails, the path with second maximum probability is to be selected to realize the fault tolerance. Node 7 in Figure 1, for example, has established the paths () with the nodes 1–5 in the neighbor hierarchy. The normalized values of pheromone are not equal, like (, ). And the respective selection probabilities are not equal, like . So the actual transmission path is , . If this path fails, it will select as the actual transmission path and so on. The direction of the gathered data transmitting to sink node is and opposite direction for the message broadcasting. (3) The method of multipaths establishment is different from others. When the fault occurs, the newly established transmission route reestablishes the route not from the source node to sink node but from the node ahead of fault node to the sink node by the selection probability. It saves the computational complexity and overhead. (4) The fault tolerance of the network is greatly related with the transmission range of the nodes. The larger the transmission range is, the better is the performance of the network; however, the more the energy consumption. The node’s transmission range based on the nonuniform hierarchical clustering routing should be set in , where is the radius of the ring in Section 2.2.3. The node with transmission range in can cover some nodes in the neighbor hierarchical area and select the best node in the transmission rang coverage to establish the links. It considers the fault tolerance of the network as well as the energy consumption by reasonable transmission range.

###### 4.3.2. Complexity Analysis of the Algorithm

The computational overhead of the nonuniform hierarchical clustering based fault tolerant routing algorithms is in terms of nonuniform hierarchical clustering by IPSO and computing the pheromone of each path by BWAS. particle swarms are generated in the process of nonuniform hierarchical clustering by IPSO, and each particle swarm contains individual particles; so the computing complexity of the IPSO is . When the positions of the particles are gradually becoming consistent with the sensors’, the number of active particles becomes less during the process of the clustering. Its computational complexity presents exponential decreasing with the reduction of the number of individual particles, not keeping the same computational complexity from the beginning to the end of the clustering by the IPSO algorithm. This is much important to the resource-restricted wireless sensor networks and presents the advantages of the IPSO when using it to cluster in wireless sensor networks.

It has average nodes and clustering nodes in wireless sensor networks; so the time complexity of establishing the routing and computing the pheromone of each path is by the improved ant colony algorithm BWAS, where is the number of iterations, and is the number of the clustering nodes in each hierarchies. The computing and time complexities are determined by the scale of the network and the selection probability of cluster head nodes as well as the number of iterations.

##### 4.4. Analysis of Receiving Rate and Average Packet Delay

It is important to select the high-quality communication link to improve the reliability of network data transmission. Two criterions, receiving rate and average delay, can best reflect the quality of links and performance of fault tolerance. The receiving rate of the packet is defined as the ratio of packets received at sink node and packets sent to source nodes. The closer to 1 the packet receiving rate is, the higher qualities of the links are. The average delay of the packet transmission is defined as average delay of all the packets received at sink node from the source nodes.

The fault nodes in network are supposed to be the ones in which the energy consumption reaches the initial threshold value, and the network is based on the model of timing acquisition transmission. CPEQ presented in [15] is the representative of the fault tolerance in multilayer joint optimization and shows the better performance by the comparison with DD (directed diffusion) routing algorithm. Therefore, we will make a comparison of the algorithm presented in this paper with CPEQ in [15] in receiving rate and average packet delay, as shown in Figures 12 and 13.

Figure 12 shows the comparison of the presented algorithm and CPEQ in the packets receiving rate. Fewer fault nodes have arisen before 300 times of the network operation. It cannot show the apparent influence on the performance of the network by them; so we choose the sampling data during the 300–800 times. Along with the increase of operation times, the fault nodes’ number also increases. The proposed algorithm has a better performance in packet receiving rate and reflects the good stability in data transmission. Figure 13 shows the comparison of the average packet transmission delay during the operation 300–800 times between the presented algorithm and CPEQ. The newly established transmission route reestablishes the route not from the source node to sink node but from the node ahead of fault node to the sink node by the selection probability. Simulation shows the better performance in average data transmission delay than CPEQ.

##### 4.5. Analysis of Energy Consumption

The routing has been established based on BWAS according to two different clustering models. The first clustering model is equal probability clustering based on IPSO among the nodes with same hierarchy property. The second clustering model is the nonequal probability clustering based on the same BWAS in three hierarchies that different clustering probability is adopted in different hierarchy. Now we do the comparative analysis of energy consumption of the nodes, as shown in Figures 14 and 15.

Figure 14 shows the energy consumption by equal probability and nonhierarchical clustering. Figure 15 shows the energy consumption by nonequal probability and hierarchical clustering. There are total 150 nodes in the network. The red diamond point represents that the sensor node runs out of energy. We analyze the energy consumption at cycle , 1200, and 2000 times. From Figures 14 and 15, the number of dead nodes is, respectively, 21, 44, 96, and 14, 39, 72 when two models run at time , 1200, and 2000. The second model shows the relative smaller number of dead nodes. The dead nodes also represent randomly uniform distribution. It overcomes the “hot” issues in energy consumption caused by equal-probability clustering in WSN.

#### 5. Conclusion and Prospect

In this paper, a fault-tolerant routing algorithm is presented based on the nonuniform hierarchical clustering inspired by the characteristics of vascular network. We build the mathematical model and the topology by marking the nodes with different hierarchies. Nonuniform hierarchical clustering is done based on IPSO with different clustering probabilities in different hierarchical areas. It establishes multiple transmission paths between the neighbor hierarchical nodes by the normalized values of the paths’ pheromone generated in BWAS as the path selection probability. It selects the path with maximum probability as the actual data transmitting path to establish the fault-tolerant routing.

Theoretical analysis and simulations show that the topology based on the hierarchical nonuniform clustering can balance the nodes’ energy consumption and avoid the hot issue. The routing has higher packets receiving rate and lower average transmission delay. It can avoid the data loss due to the fault of the nodes or links. So it has a good performance in the fault-tolerance and stability of the data transmission.

Our work introduces the characteristics of the vascular network into the fault-tolerant routing for WSN and carries out the studies within the framework of the biological mechanism. As a novel routing algorithm, in-depth study is needed in the theoretical framework and practical application, especially when it applies to the fault detection and tolerance by the vascular model and the mechanism of the immune system and blood test.

#### Acknowledgments

This work was supported by the National Science and Technology Major Projects of China (no. 2009ZX07528-003-09), Specialized Research Fund for the Doctoral Program of Higher Education of China (no. 20100191110037), Chongqing Key Project of Science and Technology of China (no. CSCT2010AA2036) and (cstc2012gg-yyjs40008), Wanzhou District Science and Technology Planning Projects of China (no. 201203037) and ([2010]23), Youth Project of Chongqing Three Gorges University of China (no. 12QN14) and Science and Technology Project of Chongqing Three Gorges University of China ([2011]52).

#### References

- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,”
*Computer Networks*, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus - J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,”
*Computer Networks*, vol. 52, no. 12, pp. 2292–2330, 2008. View at Publisher · View at Google Scholar · View at Scopus - L. Paradis and Q. Han, “A survey of fault management in wireless sensor networks,”
*Journal of Network and Systems Management*, vol. 15, no. 2, pp. 171–190, 2007. View at Publisher · View at Google Scholar · View at Scopus - X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” in
*Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03)*, pp. 28–39, November 2003. View at Scopus - R. A. F. Mini, A. A. F. Loureiro, and B. Nath, “The distinctive design characteristic of a wireless sensor network: the energy map,”
*Computer Communications*, vol. 27, no. 10, pp. 935–945, 2004. View at Publisher · View at Google Scholar · View at Scopus - R. Badonnel, R. State, and O. Festor, “Management of mobile ad hoc networks: information model and probe-based architecture,”
*International Journal of Network Management*, vol. 15, no. 5, pp. 335–347, 2005. View at Publisher · View at Google Scholar · View at Scopus - H. Alwan and A. Agarwal, “A survey on fault tolerant routing techniques in wireless sensor networks,” in
*Proceedings of the 3rd International Conference on Sensor Technologies and Applications (SENSORCOMM '09)*, pp. 366–371, June 2009. View at Publisher · View at Google Scholar · View at Scopus - P. Djukic and S. Valaee, “Minimum energy fault tolerant sensor networks,” in
*Proceedings of the IEEE Global Telecommunications Conference Workshops (GLOBECOM '04)*, pp. 22–26, December 2004. View at Scopus - N. M. Hoang and V. N. Son, “Disjoint and braided multipath routing for wireless sensor networks,” in
*Proceedings of the International symposium on Electrical & Electronics Engineering*, pp. 11–12, 2005. - Y. Challal, A. Ouadjaout, N. Lasla, M. Bagaa, and A. Hadjidj, “Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks,”
*Journal of Network and Computer Applications*, vol. 34, no. 4, pp. 1380–1397, 2011. View at Publisher · View at Google Scholar · View at Scopus - T. A. Babbitt, C. Morrell, B. K. Szymanski, and J. W. Branch, “Self-selecting reliable paths for wireless sensor network routing,”
*Computer Communications*, vol. 31, no. 16, pp. 3799–3809, 2008. View at Publisher · View at Google Scholar · View at Scopus - R. Luigi, “Effective erasure codes for reliable computer communication protocols,”
*Computer Communication Review*, vol. 27, no. 2, pp. 24–36, 1997. View at Publisher · View at Google Scholar - P. Djukic and S. Valaee, “Reliable packet transmissions in multipath routed wireless networks,”
*IEEE Transactions on Mobile Computing*, vol. 5, no. 5, pp. 548–559, 2006. View at Publisher · View at Google Scholar · View at Scopus - S. Dulman, S. Nieberg, J. Wu, and P. Havinga, “Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks,”
*Wireless Communications and Networking*, no. 3, pp. 1918–1922, 2003. - A. Boukerche, R. Werner Nelem Pazzi, and R. Borges Araujo, “Fault-tolerant wireless sensor network routing protocols for the supervision of context-aware physical environments,”
*Journal of Parallel and Distributed Computing*, vol. 66, no. 4, pp. 586–599, 2006. View at Publisher · View at Google Scholar · View at Scopus - T. Bokareva, N. Bulusu, and S. Jha, “SASHA: toward a self-healing hybrid sensor network architecture,” in
*Proceedings of the 2nd IEEE Workshop on Embedded Networked Sensors (EmNetS-II '05)*, pp. 71–78, May 2005. View at Publisher · View at Google Scholar · View at Scopus - A. Jabbari and W. Lang, “Advanced bio-inspired plausibility checking in a wireless sensor network using Neuro-immune systems: autonomous fault diagnosis in an intelligent transportation system,” in
*Proceedings of the 4th International Conference on Sensor Technologies and Applications (SENSORCOMM '10)*, pp. 108–114, July 2010. View at Publisher · View at Google Scholar · View at Scopus - B. Atakan and O. B. Akan, “Immune system based distributed node and rate selection in wireless sensor networks,” in
*Proceedings of the 1st Bio-Inspired Models of Network, Information and Computing Systems (BIONETICS '06)*, December 2006. View at Publisher · View at Google Scholar · View at Scopus - T. Rui, L. Kenji, and Z. Bing, “Immune system inspired reliable query dissemination in wireless sensor networks,” in
*Proceedings of the 10th International Conference on Artificial Immune Systems*, pp. 282–293, 2011. View at Publisher · View at Google Scholar · View at Scopus - Y. J. Chen, S. F. Yuan, J. Wu, and Y. J. Zhang, “Performance optimization for wireless sensor networks based on immune system,”
*Systems Engineering and Electronics*, vol. 32, no. 5, pp. 1065–1069, 2010. View at Publisher · View at Google Scholar · View at Scopus - Y. Hu, Y. Ding, and K. Hao, “An immune cooperative particle swarm optimization algorithm for fault-tolerant routing optimization in heterogeneous wireless sensor networks,”
*Mathematical Problems in Engineering*, vol. 2012, Article ID 743728, 19 pages, 2012. View at Publisher · View at Google Scholar - Q. Li, B.-H. Zhang, L.-G. Cui, Z. Fan, and A. V. Vasilakos, “Immunizations on small worlds of tree-based wireless sensor networks,”
*Chinese Physics B*, vol. 21, no. 5, Article ID 050205, 2012. View at Publisher · View at Google Scholar - H. M. Salmon, C. M. de Farias, P. Loureiro, et al., “Intrusion detection system for wireless sensor networks using danger theory immune-inspired techniques,”
*International Journal of Wireless Information Networks*. In press. - K.-I. Goh, G. Salvi, B. Kahng, and D. Kim, “Skeleton and fractal scaling in complex networks,”
*Physical Review Letters*, vol. 96, no. 1, 2006. View at Publisher · View at Google Scholar · View at Scopus - I. Ahmed, M. Peng, and W. Wang, “Energy efficient cooperative nodes selection in wireless sensor networks,” in
*Proceedings of the International Conference on Parallel Processing Workshops (ICPPW '07)*, p. 50, September 2007. View at Publisher · View at Google Scholar · View at Scopus - I. Ahmed, M. Peng, W. Wang, and S. I. Shah, “Joint rate and cooperative MIMO scheme optimization for uniform energy distribution in Wireless Sensor Networks,”
*Computer Communications*, vol. 32, no. 6, pp. 1072–1078, 2009. View at Publisher · View at Google Scholar · View at Scopus - S. Lindsey, C. Raghavendra, and K. M. Sivalingam, “Data gathering algorithms in sensor networks using energy metrics,”
*IEEE Transactions on Parallel and Distributed Systems*, vol. 13, no. 9, pp. 924–935, 2002. View at Publisher · View at Google Scholar · View at Scopus