Next Article in Journal
Probing the Effect of Governance of Tourism Development, Economic Growth, and Foreign Direct Investment on Carbon Dioxide Emissions in Africa: The African Experience
Next Article in Special Issue
Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks
Previous Article in Journal
The Environmental and Climatic CAP Measures in Poland vs. Farmers’ Expectations—Regional Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN

1
Department of Computer Science, College of Science & Arts Tanumah, King Khalid University, Abha 62529, Saudi Arabia
2
Department of Computer Science and Engineering, Veltech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, Chennai 600062, India
3
Department of Computer Science and Engineering, Saveetha School of Engineering, Chennai 602105, India
4
Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida 201310, India
5
Faculty of Information Technology, City University, Petaling Jaya 46100, Malaysia
6
Department of Media and Educational Informatics, Faculty of Informatics, Eotvos Lorand University, 1053 Budapest, Hungary
7
Environment Protection Department, Faculty of Agriculture, University of Agriculture Sciences and Veterrnary Medicine Cluj-Napoca, Calea Manastur No 3-5, 400372 Cluj-Napoca, Romania
8
Faculty of Building Services, Technical University of Cluj-Napoca, 400114 Cluj-Napoca, Romania
*
Authors to whom correspondence should be addressed.
Energies 2022, 15(13), 4528; https://doi.org/10.3390/en15134528
Submission received: 29 May 2022 / Revised: 16 June 2022 / Accepted: 16 June 2022 / Published: 21 June 2022
(This article belongs to the Special Issue Energy Efficiency in Wireless Networks)

Abstract

:
The goal of today’s technological era is to make every item smart. Internet of Things (IoT) is a model shift that gives a whole new dimension to the common items and things. Wireless sensor networks, particularly Low-Power and Lossy Networks (LLNs), are essential components of IoT that has a significant influence on daily living. Routing Protocol for Low Power and Lossy Networks (RPL) has become the standard protocol for IoT and LLNs. It is not only used widely but also researched by various groups of people. The extensive use of RPL and its customization has led to demanding research and improvements. There are certain issues in the current RPL mechanism, such as an energy hole, which is a huge issue in the context of IoT. By the initiation of Grid formation across the sensor nodes, which can simplify the cluster formation, the Cluster Head (CH) selection is accomplished using fish swarm optimization (FSO). The performance of the Graph-Grid-based Convolution clustered neural network with fish swarm optimization (GG-Conv_Clus-FSO) in energy optimization of the network is compared with existing state-of-the-art protocols, and GG-Conv_Clus-FSO outperforms the existing approaches, whereby the packet delivery ratio (PDR) is enhanced by 95.14%.

1. Introduction

Every object should be smart in today’s technological world. The IoT is a new paradigm that gives common objects and things a whole new dimension. Wireless sensor networks, particularly LLNs, are essential components of IoT. It has a high impact on usage in everyday life [1]. The usage at home, industry and institutions is growing exponentially every day. It is considered one of the most influential technologies of the modern era. The devices added to IoT are growing in leaps and bounds every day. Homes, classrooms and cities are becoming smart with IoT [2,3].
IoT is a new paradigm that connects computers, humans, devices and objects together for communication. There are many definitions given for IoT [4]. A popular definition is: IoT is a connection between the physical and digital worlds. Sensors and actuators are used to connect the digital and physical worlds. IoT is a concept in which computing and networking capabilities are incorporated virtually into any device. The capabilities are used to query the state of the object as well as change it, if possible. IoT is the networking of persons, things, objects and devices that communicate with each other to achieve a complex task, where a high degree of collective intelligence is required [5]. For computing and communications, IoT makes use of sensors, actuators, transceivers and processors. IoT cannot be considered as a single or standalone technology. It is a large collection of connected technology that works synchronously [6].
The network layer in IoT performs the major task of establishing connections among nodes and the server. It is the core layer that does the addressing, routing, formation and maintenance of the network. The network layer has protocols that perform the connectivity and networking tasks. The protocols of the network layer are: IPv4, IPv6, 6LoWPAN, 6TiSCH, 6Lo, IPv6 over Bluetooth Low Energy, IPv6 over G.9959, etc. [7]. IoT consists of LLNs that have low power, low energy and scarce computing resources. The conventional routing protocols for the networks may not be suitable for LLNs. The network layer protocols available for IoT are IPv6 RPL [8], Cognitive RPL (CORPL) [9], Channel Aware Routing Protocol (CARP) [10], Enhancement over CARP (E-CARP) [11] and others.
RPL has become a standard routing protocol suitable for LLNs due to the following characteristics in comparison with the rest: (i) RPL has a better packet reception ratio (PRR) and energy consumption; (ii) it has lesser churn and control traffic overhead; (iii) it had a shorter convergence time; (iv) it is independent of the link layer. Additionally, RPL has the following features: (i) self-healing; (ii) auto-configuration; (iii) Loop avoidance and detection; (iv) independence and transparency; (v) multiple edge routers [12].
Various features of RPL remain the main reason for preferring RPL over other protocols. In spite of its features, RPL also has a lot of room for improvement since the IoT is exponentially growing, and improved routing support is required [13]. Various enhancement methods have been devised for the RPL based on its function and application. Each enhancement method focuses on improving any one of the limitations of RPL or adding more effectiveness to the existing function of RPL [14].
A.
Motivation
A reliable and energy-efficient routing is one important research area. The link in LLNs is unreliable, but it is used to transmit valuable data. The data become vital in some conditions. Considering scenarios such as the healthcare sector, the physiological condition of the patients is monitored round the clock, especially in critical care units. Any little variation in their physiological health parameters would be critical. In that scenario, the communication needs to be reliable and in real time. Any delay in the communication would endanger life. Another environment would be safety, security and surveillance systems, where any behavioral anomaly has to be reported immediately to avoid serious damage. While the objective is to improve the reliability, other QoS parameters must also be satisfied. Those parameters are packet delivery ratio, throughput, convergence time, lifetime, energy consumption and so on. There are many researches focusing on this area, still, the optimum has not yet been achieved.
B.
Contribution
  • The RPL due to its wide usage and popularity has become the de facto standard routing protocol for LLNs in IoT. A wide range of research is going on to enhance the RPL for various environments.
  • The enhancement methods are based on various components of RPL. The research work in this article is based on energy hole rectification-based transmission enhancement and energy-efficiency improvement mechanism for RPL.
  • The main focus of research is on enhancement for reliability in critical environments. A study on the research gap also suggests this as one of the focus areas of research.
  • To formulate a grid across the network and generate clusters in the area of grids formed in the network.
  • To select CH, a bio-inspired approach is introduced; a Graph-Grid-based Convolution clustered neural network with fish swarm optimization (GG-Conv_Clus-FSO) is utilized.
The rest of the research work is arranged as follows: the related mechanism in energy hole detection and their drawbacks are reviewed in Section 2; the proposed grid-based clustering with FSO for the detection of energy holes is illustrated in Section 3; simulation results are illustrated in Section 4; the research is concluded in Section 5.

2. Literature Review

Several reports have been published in 2009 and 2010 [15,16] to identify the routing requirements for the standardization of RPL based on its application in various routing environments. The widespread usage of RPL and its customisation has necessitated substantial study and development. The control packets in the network are necessary to establish a connection and maintain the network. The frequent change and resetting of the network in a mobile setup led to overhead in the link. An efficient way of detecting and controlling congestion is required [17]. LLNs are backbone networks of IoT. They are constrained by energy, memory and processing capacity. The traditional and popular network protocols are not suitable for LLNs due to these constraints. Among the existing routing protocols, RPL is more suitable for LLNs, due to its special features such as auto configuration, self-healing, loop avoidance, multiple edge routers and robustness [18]. RPL is also easily malleable to various environments of LLNs. This section presents an overview of RPL with the background, characteristics and various components.
The Internet Engineering Task Force (IETF) envisioned the standardization of IPv6RPL and started the Routing over Low-power and Lossy networks (ROLL) working group in 2008. The working group aimed at the standardization of RPL, which has the following implicit characteristics [19]: (i) LLNs are constituted by hundreds of nodes that are constrained by energy, size, processing power and memory. (ii) The constrained nodes of LLNs are connected to each other through lossy links, which have low data rates and are unstable. (iii) The traffic patterns of these LLNs may be point-to-multipoint, multipoint-to-point or, in some cases, point-to-point [20], such as urban settings [21], industrial settings, home automation and building automation [22].
Multi-hop WSN node restrictions are closer to BS’s demand to infuse traffic from some other channel, enabling their energy to be spent quicker and possibly leading to very high remaining energy. As a consequence, Distributed Wedge Merging in Multi-Hop Access (DWMA) is presented here as a possible solution to the energy hole problem and routing. The major objective is to remove energy gaps while reducing the likelihood of them emerging in the future. To avoid energy holes from occurring, this DWMA method is combined with a nearby wedge [23].
In heterogeneous networks, violating the response and broadcast buffer specifications has resulted in uneven traffic loads, congestion and, as a result, packet loss in RPL, according to the author. This paper discusses the CBR-RPL technique, which uses a unique drop-aware Objective Function (OF) to arrange nodes into route data. The newly defined OF takes into account both queue occupancy and node transceiver drop rates [24]. The Energy Hole problem, which is common in WSN, drastically affects the lifetime of any established network. The energy diffusion required for data packet forwarding between HN is reduced when a good Head Node (HN) selection technique is used [25].
PEGASIS (Power-Efficient Gathering in Sensor Information Systems) is an energy-saving protocol that tries to extend the network’s lifespan by reducing energy consumption. This research proposes a modification of the PEGASIS approach. SNs are sorted into groups, clustering is carried out using the k-means method and every group is assigned the PEGASIS label. Rechargeable sensor nodes were also used in the suggested strategy. The sensor node’s Euclidean distance from the base station and the sensor node’s residual energy are utilised to determine the chain leader. Every CH’s datum is instantly forwarded to the BS [26]. Various surveys on energy use, energy gaps and attacks on RPL and LLP systems can be found in [27,28,29,30]. The glowworm swarm-based approach cast-off energy-based transmission strategy has been presented to decrease energy consumption caused by control overhead [31]. A least-square support vector machine (LS-SVM) based on modified particle swarm optimization (MPSO) is developed. To begin, the MPSO’s inertial weight is adjusted to accomplish faster iterations, and an LS-SVM-based MPSO’s prediction model is constructed. Second, the predictive simulation was performed and confirmed using the MPSO’s optimised parameters, and the MPSO and PSO predicted values were compared [32]. This work introduces a resilient clustering routing mechanism for WSNs. To estimate the number of cluster heads and identify the best cluster heads, the technique employs the Locust Search (LS-II) approach. After the cluster heads have been identified, other sensor elements are allocated to the cluster heads that are closest to them [33]. Based on the Optimal Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, a methodology for an energy-efficient clustering algorithm for gathering and transferring data is developed. The new optimised threshold function is used in the selection of CH. LEACH, on the other hand, is a hierarchy routing protocol that picks cluster head nodes at random in a loop, resulting in a higher cluster headcount but higher power consumption. In order to improve the energy per unit node and packet delivery ratio with less energy use, the Centralised Low-Energy Adaptive Clustering Hierarchy Protocol is the best [34]. WSNs are designed for specialised applications, such as monitoring or tracking, in both indoor and outdoor conditions, where battery capacity is a major issue. Several routing protocols are designed to solve this problem. A sub-cluster LEACH-derived approach is also proposed in order to improve performance. The Sub-LEACH with LMNN surpassed its competitors in terms of energy efficiency, according to simulation data [35].

3. Proposed Graph-Grid-Based Clustering for Energy Hole Detection

Grid cells of equal length are used to partition the whole network. Every grid cell represents the square territory. Every grid cell has only static nodes. The Sink can be either stationary or moveable for gathering data. The grid cell CH is the one that is closest to the mid-point of the grid cell. Every grid cell has a node ID as well as an associated grid ID that identifies nodes. The sink is responsible for the initial cluster setup, which includes calculating node IDs and grid IDs, establishing the CH for each grid cell and scheduling data transmission and reception for nodes in the grid cells. The GG-Conv_Clus-FSO protocol uses double disjoint anchor group nodes for packet forwarding, and node nomination is based on the clustering method. To locate holes quickly, a grid-based hole identification method is utilised. Data packets are accurately routed to the anchor and destination nodes while consuming the least amount of energy.

Grid Formation

The whole network is divided into equal-sized rectangle-shaped grid cells. Each grid keeps track of the exact location of each cell relative to its border, which is subsequently used to determine the size of the holes. In this, Da × Db denotes the grid cell dimension where the length is determined by Da and width is determined by Xb. Equation (1) [31] indicates the grid cell generation process. The grid-building procedure is completed by
f g , r = g 0 + g × D a , r 0 + r × D b
where the count of a horizontal line is indicated by g, and the count of the vertical line is indicated by r. The process of grid construction is given in Algorithm 1.
Algorithm 1: Construction of Grid
for g = 0 to p = s
  for r = 0 to r = t
   f ( g , r ) = g 0 + g × D a , r 0 + r × D b
 end for
end for
Selection of Cluster Head (CH): In the actual world, fish can identify nutrient-rich places by searching on their own or by swimming near other fish; the region with the most fish often has the most nutrition. Artificial fish swarm optimization (AFSO) is based on mimicking fish behaviour, such as preying, swarming and tracking local fish hunts to attain global optima. The solution space and the states of other artificial fishes are generally the areas where an Artificial Fish (AF) dwells. The subsequent behaviour is determined by the current state as well as the immediate environment, such as the current quality of query responses and the status of nearby neighbours. The movements of an artificial fish, as well as the actions of its neighbours, have an impact on the ecosystem. If fish are discovered in a water area with more food, they will migrate quickly to that area. Equation (2) may be used to describe this behaviour.
F v = F i + V i s u a l × r a n d     i ϵ 0 , n
F n e x t = F + F v F || F v F || × s t e p × r a n d
During preying mode, fish behaviour is represented by Equation (3):
P r e y F i = f i + s t e p f j f i || f j f i ||                 i f   y j y i f i + 2 r a n d 1 . s t e p                 e l s e
where rand is the random function with range [0, 1].
The behaviour of the swarm is represented in Equation (4)
S w a r m F i = f i + s t e p f j f i || f j f i ||                 i f   y c n f > δ y i p r e y   ( f i )                                                                                   e l s e
In the follow stage, behaviour is given by equation
F o l l o w F i = f i + s t e p f m a x f i || f m a x f i ||                 i f   y m a x n f > δ y i p r e y   ( f i )                                                                                   e l s e
The three processes outlined above guarantee that both global and local searches are conducted, as well as a search direction that leads to the greatest food source. The suggested approach differs from the AFSA in two significant ways. The solutions are split at random and behave in one of two ways: swarming or following. The best fish are chosen via tournament selection, and preying processing begins. Fish who are very good at preying are chosen and allowed to breed amongst themselves. The best fish and the new solution are carried to the next iteration. The answers are represented as binary numbers in this study, and the distance between fish is calculated utilizing Hamming distance. The number of locations where two strings u and v differ is the hamming distance between them. The best fish are chosen by spinning the roulette wheel. The likelihood of a fish being picked on a roulette wheel is exactly proportional to its fitness. Equation (6) computes the probability of a fish,
p b i = f i t i j = 1 N f i t i
To enhance QOS, a multi-objective function based on E2E delay as well as energy is proposed and represented by Equation (7):
m i n f i t f i = e D t d D m E r i E i
where dri is the E2E delay, Dtd is the total delay to reach BS, Dm is the maximum delay, Eri is the remaining energy in CH and Ei is the initial energy.
Subsequent assumptions are made:
  • The nodes in the network are distributed arbitrarily;
  • Starting energy of every node is the similar;
  • In ecology, all fishes are unisex;
  • Because fish are unisexual, mating among any two fish is feasible;
  • Because the free space radio method is utilised, the energy needed to transmit one bit of data grows as distance improves.
The flowchart for FSO-based CH selection is shown in Figure 1. Because solution space is binary, a transfer function is required to fill the bit as the fish swims. In this paper, a novel transfer function for flipping the bits described by Equation (8) is,
t r a n s f e r F i = 1 1 + e tan h f i
To attain flipping, a random number between 0 and 1 is generated, and if the random number is less than the transfer function provided by Equation (8), the bit is flipped.
1 ,           i f   p 0 , 1 < t r a n s f e r F i 0 ,                                                                     o t h e r w i s e
Hole Detection: The grid hole is found by comparing the cell coordinates to SNs radius as well as closest count (SN). SN count is closer to the sensor’s radius, which is used to determine the hole’s coverage area. The region in which a hole has developed is said to be Bi. Equations (10) and (11) show the position of the hole in the cell and the grid.
B c e l l   = 1 i B i
B total = 1 j B c e l l
Data propagation across selected CH: Send data around the borders of the hole and transfer it to the correct location. The sensor nodes in the region are clustered, and the CH is selected as the node closest to the grid’s centre. In the GBC-SS, the Static Sink is in charge of coordination, whereas in the GBC-MS, Mobile Sink is in charge of data gathering. The information is transmitted to nearby sensor nodes, and the position is recorded for future data transfer.
Load in the CH node = W h o l e   C H   c o m m u n i c a t i o n   c o s t   t o t a l   c o s t   o f   C H
Load per grid cell = r 2 ρ d t
Intra - and inter - cluster communication cos t = r 2 ρ d t × i = 1 n 2 i 1 g l 1 + i = 1 n 2 i 1 i
where the density is indicated by ρ , the transmission rate of data is characterized by a dot and the determined location is shown as gl.
G = F , E , H is the definition of an undirected and connected graph, where V and E are finite sets of V = N vertices and edges, and W N × N is an adjacency matrix. The graph signals are represented by numerous variables in each vertex. The description indices are represented by the vertex variables in this study. The graph is given by its Laplacian matrix L, which is defined as = D W , where D = diag d ˙ 0 , , d N 1 is the degree matrix created by degrees d i = j W i , j of vertex i. represented as χ / = 0 N 1 with corresponding nonnegative eigenvalues 0 λ 0 λ N 1 . Laplacian matrix L, is diagonalized by the eigenvector matrix X = χ 0 , , χ N 1 so that = X Λ X T , where is the diagonal eigenvalue matrix. = I N D 1 / 2 𝒻 D 1 / 2 is a normalised version [1, 1].
Instead of complex exponentials, the eigenvectors χ / = 0 N 1 of the Laplacian matrix L that meet the orthogonality criterion are employed as decomposition bases for graph-structured data. On a graph, the Fourier transform of a given signal f(n) is defined as Equation (15):
f ˆ ( λ l ) = n = 0 N 1 χ l T ( n ) f ( n ) = X T f
Inverse Fourier transformation is represented by Equation (16):
f n g n ; g n θ , , = 0 N 1 G Λ . f
Convolution is turned into a point-wise product in the Fourier domain as well as reconverted into the vertex domain utilizing the graph Fourier transform as well as the convolution theorem, as in Equation (17):
f × g = X ( k = 0 K θ k Λ k ) T T f = ( k = 0 K θ k ( X Λ k X T ) ) f = k = 0 K θ k k f
A convolution kernel is the graph convolution operation of two graph signals, f(n) and g(n), and its transform, G Λ . A set of free parameters in the Fourier domain, i.e., Laplacian eigenspace, is used to construct this kernel. Convolution is then written as Equation (18):
f * g = X diag θ 0 , , θ N 1 X T f = X G Λ X T f G Λ
G Λ as an eigenvalue polynomial function: As illustrated in Equation (19), a rapid localised convolution based on low-order polynomial approximation was proposed:
G ( Λ ) = ( k = 0 ) K θ k Λ k
which θ k k = 0 K is the polynomial order, and Ki is a vector of polynomial coefficients. K is a tiny positive integer, such as 3, for example. Convolution is then rewritten as Equation (20):
f × g = X ( k = 0 K θ k Λ k ) T T f = ( k = 0 K K θ k ( X Λ k X T ) ) f = k = 0 K θ k k
The convolution is performed by K multiplications of the sparse matrix L, which speeds up computation by avoiding the composition procedure.
The following is the updated version of Equation (21) for layer l:
h ˆ i l + 1 = O h l H k = 1 j N i w i , j k , l V k , l h j l e ˆ i l + 1 = O e l H k = 1 w ˆ i , j k , l
where
w i j k , l = softmax x j w ˆ i , j k , l
w ˆ i , j k , l = Q k , l h i l K k , l h j l d k E k , l e i , j l
with Q k , l , K k , l , V k , l , E k , l R d k , O h , l , O e l R d × d , k 1 , 2 , , H relates the number of attention heads, and where O h l R d × d , V k , l R d k × d , d k H denotes the number of heads. Note that h l i is i-th node’s feature at l-th layer in Equation (22).
cut ( S k , S k ) = v i S k , v j S j e ( v i , v j ) ,
where S k is k-th set of a given graph, S ˆ k indicates the remaining sets, except S k , and e v i , v j is the edge between vertices v i and v j . When referring to multiple sets, the cut issue is represented as Equation (23):
cut ( S 1 , S 2 , S 3 S 8 ) = 1 2 i = k 8 cut ( S k , S k )
The issue of less cuts is extensively studied in the literature in Equation (24):
Ncut ( S 1 , S 2 S g ) = k = 1 g cut ( S k , S ^ k ) vol ( S k , V ) ,
where vol ( S k , V ) = v i S k , v i v e ( v i , v j ) is the total degree of nodes from S k in graph g . The normalised cut problem utilizing DL optimisation, transforming the minimum cut issue into a DL format, as in Equation (25):
L cut = reduce _ sum ( Y Γ ) ( 1 Y ) T A + reduce _ sum ( 1 T Y n g ) 2
A is the adjacency matrix, and, finally, Γ is evaluated by Equation (26):
H j [ l + 1 ] = σ ( i = 1 F i n ( k = 0 K θ i , j k k H i [ l ] ) + b j [ l ] )
where (·) relates a non-linear activation function, e.g., ReLU (·) max(0, ·) = ; Hi [ ]l indicates ith input graph; ijk, and bj [ ] l are trainable F F in out × vector of K-order polynomial coefficients and 1 × Fout vector of bias in l th layer.

4. Result and Discussion

In this section, the simulation outcome of the proposed Graph-Grid-based Convolution clustered neural network with fish swarm optimization (GG-Conv_Clus-FSO) is compared with the existing techniques such as DWMA for 6LowPAN RPL, CBR-RPL, CCS and WEMER and PEGASIS. The simulation of the above-mentioned approaches is investigated with the assistance of the number of rounds vs. alive nodes, the number of rounds vs. dead nodes, PDR, energy consumption and delivery delay. The simulation setup is given in Table 1.

4.1. Energy Consumption

Every sensor node in the data transmission environment in the WSN is equipped with rechargeable batteries that consume the least amount of energy, making battery recharging difficult. The cluster and duty cycle scheduling mechanisms start the data transfer. The data transmission process is completed without interruption, and data are transmitted in the quickest way possible while consuming the least amount of energy. The transmission nodes’ energy consumption is minimized as a result of this condition is given in Table 2.
In Figure 2, energy consumption during data transmission for a different number of nodes is illustrated. The energy consumption of the proposed approach is minimal than existing approaches, namely DWMA, CBR-RPL, WEMER and PEGASIS.

4.2. End to End Delay

It is time takes to transport data from source to destination node. A protocol that has the shortest transmission delay is considered to be effective, the comparisons are given in Table 3.
In Figure 3, end-to-end delay during data transmission for various numbers of nodes is illustrated. E2E delay of the proposed technique is minimal than existing approaches, namely DWMA, CBR-RPL, WEMER and PEGASIS.

4.3. Packet Delivery Ratio

PDR is determined by dividing the total number of data packets sent from source to destination node by the number of data packets delivered. Data communication technology that delivers most packets is deemed the best. The packet delivery ratio of the different method is mentioned in Table 4.
In Figure 4, PDR during data transmission for different numbers of nodes is illustrated. PDR of the proposed approach is higher than existing approaches, namely DWMA, CBR-RPL, WEMER and PEGASIS.

4.4. Packet Loss

Packet loss can be triggered by a mixture of circumstances, including signal deterioration owing to multi-path fading on the network media. In WSNs, packet loss is conceivable. In order for attackers to simply acquire the data. Packet loss occurs when one or more sent packets fail to reach their intended destination. The Packet Delivery Ratio is reduced when packets are lost. The packet loss of the different method is compared and its mentioned in Table 5
In Figure 5, packet loss during data transmission for different number of node is illustrated. The packet loss of proposed approach is minimal than existing approaches, namely DWMA, CBR-RPL, WEMER and PEGASIS.

4.5. Throughput

The amount of data that is efficiently sent/received through a communication channel is referred to as throughput. Throughput is calculated in kilobits per second, megabits per second or gigabits per second and might differ from bandwidth owing to a variety of technical issues such as packet loss, latency, jitter, and more. The quantity of data that is moved from one location to another in a given length of time is referred to as throughput. The comparisons of previous methods and proposed method is mentioned in the below Table 6.
In Figure 6, the throughput during data transmission for different numbers of nodes is illustrated. The throughput of the proposed approach is minimal compared to the existing approaches, namely DWMA, CBR-RPL, WEMER and PEGASIS.

5. Conclusions

The Internet of Things has a significant influence on daily living. For IoT and LLNs, the RPL has become the standard protocol. It is not only extensively utilised, but it has also been studied by diverse groups of individuals. The widespread usage of RPL and its customisation has necessitated substantial study and development. There are certain flaws with the existing RPL mechanism, one of which is an energy hole, which is a major problem in the context of IoT. Fish swarm optimization is used to initiate Grid creation among sensor nodes, which can help in cluster formation and Cluster Head (CH) selection with energy optimization by calculating the energy consumption of the network. The performance of a Graph-Grid-based Convolution clustered neural network with fish swarm optimization (GG-Conv_Clus-FSO) is compared to existing state-of-the-art protocols, and the GG-Conv_Clus-FSObeats the existing techniques, with a 95.14 percent increase in the packet delivery ratio (PDR).

Author Contributions

Conceptualization, Writing—original draft M.K.; Supervision, A.I. and S.B.G.; Writing—original draft and review and editing, C.N.K.B. and V.J.; Validation, C.V.; propose the new method or methodology, M.K. and S.B.G.; Formal Analysis, Investigation C.O.S.; Resources, S.B.G. and C.O.S.; Software, T.C.M.; Writing—review and editing, T.C.M. All authors have read and agreed to the published version of the manuscript.

Funding

National Research Development Projects to finance excellence (PFE)-14/2022-2024 granted by the Romanian Ministry of Research and Innovation.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data will be shared for review based on the editorial reviewer’s request.

Acknowledgments

The work of Chaman Verma was supported by the European Social Fund under the project “Talent Management in Autonomous Vehicle Control Technologies” (EFOP-3.6.3-VEKOP-16-2017-00001).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ul Hassan, T.; Asim, M.; Baker, T.; Hassan, J.; Tariq, N. CTrust-RPL: A control layer-based trust mechanism for supporting secure routing in routing protocol for low power and lossy networks-based Internet of Things applications. Trans. Emerg. Telecommun. Technol. 2021, 32, e4224. [Google Scholar] [CrossRef]
  2. Kim, H.; Kim, H.S.; Bahk, S. MobiRPL: Adaptive, robust, and RSSI-based mobile routing in low power and lossy networks. J. Commun. Netw. 2022, 1–19, early access. [Google Scholar] [CrossRef]
  3. Garg, S.; Mehrotra, D.; Pandey, S.; Pandey, H.M. Network efficient topology for low power and lossy networks in smart corridor design using RPL. Int. J. Pervasive Comput. Commun. 2021. ahead-of-print. [Google Scholar] [CrossRef]
  4. Tharini, V.J.; Vijayarani, S. IoT in healthcare: Ecosystem, pillars, design challenges, applications, vulnerabilities, privacy, and security concerns. In Incorporating the Internet of Things in Healthcare Applications and Wearable Devices; IGI Global: Hershey, PA, USA, 2020; pp. 1–22. [Google Scholar]
  5. Hua, J.; Shunwuritu, N. Research on term extraction technology in the computer field based on wireless network technology. Microprocess. Microsyst. 2021, 80, 103336. [Google Scholar] [CrossRef]
  6. Mabrouki, J.; Azrour, M.; Dhiba, D.; Farhaoui, Y.; El Hajjaji, S. IoT-based data logger for weather monitoring using Arduino-based wireless sensor networks with remote graphical applications and alerts. Big Data Min. Anal. 2021, 4, 25–32. [Google Scholar] [CrossRef]
  7. Lecluyse, C.; Minnaert, B.; Kleemann, M. A Review of the Current State of Technology of Capacitive Wireless Power Transfer. Energies 2021, 14, 5862. [Google Scholar] [CrossRef]
  8. Mogensen, R.S.; Rodriguez, I.; Schou, C.; Mortensen, S.; Sørensen, M.S. Evaluation of the impact of wireless communication in production via factory digital twins. Manuf. Lett. 2021, 28, 1–5. [Google Scholar] [CrossRef]
  9. Aijaz, A.; Su, H.; Aghvami, A.H. CORPL: A routing protocol for cognitive radio enabled AMI networks. IEEE Trans. Smart Grid 2014, 6, 477–485. [Google Scholar] [CrossRef]
  10. Basagni, S.; Petrioli, C.; Petroccia, R.; Spaccini, D. CARP: A channel-aware routing protocol for underwater acoustic wireless networks. Ad Hoc Netw. 2015, 34, 92–104. [Google Scholar] [CrossRef]
  11. Zhou, Z.; Yao, B.; Xing, R.; Shu, L.; Bu, S. E-CARP: An energy efficient routing protocol for UWSNs in the internet of underwater things. IEEE Sens. J. 2015, 16, 4072–4082. [Google Scholar] [CrossRef]
  12. Knežević, Ž.; Beck, N.; Milković, Đ.; Miljanić, S.; Ranogajec-Komor, M. Characterisation of RPL and TL dosimetry systems and comparison in medical dosimetry applications. Radiat. Meas. 2011, 46, 1582–1585. [Google Scholar] [CrossRef]
  13. Safaei, B.; Salehi, A.A.M.; Monazzah, A.M.H.; Ejlali, A. Effects of RPL objective functions on the primitive characteristics of mobile and static IoT infrastructures. Microprocess. Microsyst. 2019, 69, 79–91. [Google Scholar] [CrossRef]
  14. Zhang, L.; Li, C.; Shi, H.; Xia, Y. Techniques to improve the hit rate of unicast node-to-node (n2n) delivery in channel-hopping and multi-hop low-power and lossy networks (LLNS). Tech. Discl. Commons 2021, 4097, 1–9. Available online: https://www.tdcommons.org/dpubs_series/4097 (accessed on 28 May 2022).
  15. Jara, A.J.; Zamora, M.A.; Skarmeta, A.F. HWSN6: Hospital wireless sensor networks based on 6LoWPAN technology: Mobility and fault tolerance management. In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada, 29–31 August 2009; Volume 2, pp. 879–884. [Google Scholar]
  16. Islam, M.M.; Hassan, M.M.; Huh, E.N. Sensor proxy mobile IPv6 (SPMIPv6)-A mobility-supported framework IP-WSN. In Proceedings of the 2010 13th International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 23–25 December 2010; pp. 295–299. [Google Scholar]
  17. Jara, A.J.; Zamora, M.A.; Skarmeta, A.F. An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks Based on 6LoWPAN (HWSN6). J. Wirel. Mob.Netw. UbiquitousComput. Dependable Appl. 2010, 1, 107–122. [Google Scholar]
  18. Petäjäjärvi, J.; Karvonen, H. Soft handover method for mobile wireless sensor networks based on 6lowpan. In Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain, 27–29 June 2011; pp. 1–6. [Google Scholar]
  19. Ha, M.; Kim, D.; Kim, S.H.; Hong, S. Inter-MARIO: A fast and seamless mobility protocol to support inter-PAN handover in 6LoWPAN. In Proceedings of the 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar]
  20. Koster, V.; Dorn, D.; Lewandowski, A.; Wietfeld, C. A novel approach for combining Micro and Macro Mobility in 6LoWPAN enabled Networks. In Proceedings of the 2011 IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA, 5–8 September 2011; pp. 1–5. [Google Scholar]
  21. Bag, G.; Mukhtar, H.; Shams, S.S.; Kim, K.H.; Yoo, S.W. Inter-PAN mobility support for 6LoWPAN. In Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology, Busan, Korea, 11–13 November 2008; Volume 1, pp. 787–792. [Google Scholar]
  22. Bag, G.; Raza, M.T.; Kim, K.H.; Yoo, S.W. LoWMob: Intra-PAN mobility support schemes for 6LoWPAN. Sensors 2009, 9, 5844–5877. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Saravanakumar, V.; DWMA: An Energy Hole Reduction Mechanism on RPL for 6LoWPAN. EasyChair Prepr. 2020. Available online: https://easychair.org/publications/preprint/n6hC (accessed on 28 May 2022).
  24. Shirbeigi, M.; Safaei, B.; Mohammadsalehi, A.; Monazzah, A.M.H.; Henkel, J.; Ejlali, A. A cluster-based and drop-aware extension of RPL to provide reliability in IoT applications. In Proceedings of the 2021 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 15 April–15 May 2021; pp. 1–7. [Google Scholar]
  25. Sharmin, N.; Karmaker, A.; Lambert, W.L.; Alam, M.S.; Shawkat, M.S.T. Minimizing the energy hole problem in wireless sensor networks: A wedge merging approach. Sensors 2020, 20, 277. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  26. Elsheikh, A.H.; Abd Elaziz, M.; Vendan, A. Modeling ultrasonic welding of polymers using an optimized artificial intelligence model using a gradient-based optimizer. Weld. World 2021, 66, 1–18. [Google Scholar] [CrossRef]
  27. Abd Elaziz, M.; Elsheikh, A.H.; Oliva, D.; Abualigah, L.; Lu, S.; Ewees, A.A. Advanced metaheuristic techniques for mechanical design problems. Arch. Comput. Methods Eng. 2022, 29, 695–716. [Google Scholar] [CrossRef]
  28. Bhale, P.; Dey, S.; Biswas, S.; Nandi, S. Energy-efficient approach to detect sinkhole attack using roving IDS in 6LoWPAN network. In International Conference on Innovations for Community Services; Springer: Cham, Switzerland, 2020; pp. 187–207. [Google Scholar]
  29. Sujatha, R.; Srivaramangai, P. Performance Comparison of Black Hole Attack Detection Mechanism in 6lowpan over Manet. Int. J. Adv. Res. Comput. Sci. 2018, 9. [Google Scholar] [CrossRef]
  30. Nandi, S. Energy-Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. In Innovations for Community Services: 20th International Conference, I4CS 2020, Bhubaneswar, India, 12–14 January 2020, Proceedings; Springer Nature: Berlin/Heidelberg, Germany, 2019; Volume 1139, p. 187. [Google Scholar]
  31. Sampathkumar, A.; Mulerikkal, J.; Sivaram, M. Glowworm swarm optimization for effectual load balancing and routing strategies in wireless sensor networks. Wirel. Netw. 2020, 26, 4227–4238. [Google Scholar] [CrossRef]
  32. Liu, G.; Zhu, H. Displacement Estimation of Six-Pole Hybrid Magnetic Bearing Using Modified Particle Swarm Optimization Support Vector Machine. Energies 2022, 15, 1610. [Google Scholar] [CrossRef]
  33. Rodríguez, A.; Pérez-Cisneros, M.; Rosas-Caro, J.C.; Del-Valle-Soto, C.; Gálvez, J.; Cuevas, E. Robust Clustering Routing Method for Wireless Sensor Networks Considering the Locust Search Scheme. Energies 2021, 14, 3019. [Google Scholar] [CrossRef]
  34. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 6016. [Google Scholar] [CrossRef]
  35. Mittal, M.; De Prado, R.P.; Kawai, Y.; Nakajima, S.; Muñoz-Expósito, J.E. Machine Learning Techniques for Energy Efficiency and Anomaly Detection in Hybrid Wireless Sensor Networks. Energies 2021, 14, 3125. [Google Scholar] [CrossRef]
Figure 1. Flow chart of FSO based CH selection.
Figure 1. Flow chart of FSO based CH selection.
Energies 15 04528 g001
Figure 2. Comparison of energy consumption.
Figure 2. Comparison of energy consumption.
Energies 15 04528 g002
Figure 3. Comparison of end-to-end delay.
Figure 3. Comparison of end-to-end delay.
Energies 15 04528 g003
Figure 4. Comparison of the packet delivery ratio.
Figure 4. Comparison of the packet delivery ratio.
Energies 15 04528 g004
Figure 5. Comparison of packet loss.
Figure 5. Comparison of packet loss.
Energies 15 04528 g005
Figure 6. Comparison of throughput.
Figure 6. Comparison of throughput.
Energies 15 04528 g006
Table 1. Simulation Setup.
Table 1. Simulation Setup.
ParametersValues
No. of nodes200
Simulation area1000 × 1000 m2
Routing protocolRPL
Initial energy100 Joule
Packet size300 bits
Simulation time65 ms
Table 2. Comparison of energy consumption.
Table 2. Comparison of energy consumption.
No of NodesDWMACBR-RPLWEMERGG-Conv_Clus-FSO
00000
205.123.472.491.08
4012.179.224.133.42
6025.4613.795.434.79
8031.4519.478.246.33
10043.7829.5511.857.04
Table 3. Comparison of end-to-end delay.
Table 3. Comparison of end-to-end delay.
No of NodesDWMACBR-RPLWEMERGG-Conv_Clus-FSO
00000
2072.4951.3415.469.13
40125.4471.6643.2129.47
60163.27116.7779.3463.06
80255.79166.06134.29103.22
100321.44233.45179.11121.19
Table 4. Comparison of the packet delivery ratio.
Table 4. Comparison of the packet delivery ratio.
No of NodesDWMACBR-RPLWEMERGG-Conv_Clus-FSO
00000
2017.3224.5528.9132.63
4032.6735.4638.6442.03
6041.0448.7552.0650.17
8063.9367.1169.4771.90
10071.4679.0282.0395.14
Table 5. Comparison of packet loss.
Table 5. Comparison of packet loss.
No of NodesDWMACBR-RPLWEMERGG-Conv_Clus-FSO
00000
2089765931
4014313714798
60221226204149
80349358269223
100520440320282
Table 6. Comparison of throughput.
Table 6. Comparison of throughput.
No of NodesDWMACBR-RPLWEMERGG-Conv_Clus-FSO
00000
2065.2287.2498.53127.43
40127.42154.36187.25206.33
60178.11221.42267.22281.16
80229.55265.86298.45379.55
100276.34321.46357.11465.51
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Khan, M.; Ilavendhan, A.; Babu, C.N.K.; Jain, V.; Goyal, S.B.; Verma, C.; Safirescu, C.O.; Mihaltan, T.C. Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN. Energies 2022, 15, 4528. https://doi.org/10.3390/en15134528

AMA Style

Khan M, Ilavendhan A, Babu CNK, Jain V, Goyal SB, Verma C, Safirescu CO, Mihaltan TC. Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN. Energies. 2022; 15(13):4528. https://doi.org/10.3390/en15134528

Chicago/Turabian Style

Khan, Mudassir, A. Ilavendhan, C. Nelson Kennedy Babu, Vishal Jain, S. B. Goyal, Chaman Verma, Calin Ovidiu Safirescu, and Traian Candin Mihaltan. 2022. "Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN" Energies 15, no. 13: 4528. https://doi.org/10.3390/en15134528

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop