Next Article in Journal
College Students’ Entrepreneurial Intention and Alertness in the Context of the COVID-19 Pandemic
Previous Article in Journal
Application of the EFQM Model in the Education Institution for Driving Improvement of Processes towards Sustainability
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks

1
Department of Information Technology, Vellore Institute of Technology, Vellore 632014, India
2
Department of Computer Science and Engineering, R.M.K Engineering College, Chennai 601206, India
3
Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
4
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
5
Department of Computer Engineering, Al-Nahrain Nano Renewable Energy Research Center, Al-Nahrain University, Baghdad 10071, Iraq
6
Department of Computer Science and Engineering, B V Raju Institute of Technology, Narsapur 502313, India
*
Author to whom correspondence should be addressed.
Sustainability 2022, 14(13), 7712; https://doi.org/10.3390/su14137712
Submission received: 11 May 2022 / Revised: 13 June 2022 / Accepted: 22 June 2022 / Published: 24 June 2022

Abstract

:
The Internet of Things (IoT) is a network of numerous devices that are consistent with one another via the internet. Wireless sensor networks (WSN) play an integral part in the IoT, which helps to produce seamless data that highly influence the network’s lifetime. Despite the significant applications of the IoT, several challenging issues such as security, energy, load balancing, and storage exist. Energy efficiency is considered to be a vital part of the design of IoT-assisted WSN; this is accomplished by clustering and multi-hop routing techniques. In view of this, we introduce an improved metaheuristic-driven energy-aware cluster-based routing (IMD-EACBR) scheme for IoT-assisted WSN. The proposed IMD-EACBR model intends to achieve maximum energy utilization and lifetime in the network. In order to attain this, the IMD-EACBR model primarily designs an improved Archimedes optimization algorithm-based clustering (IAOAC) technique for cluster head (CH) election and cluster organization. In addition, the IAOAC algorithm computes a suitability purpose that connects multiple structures specifically for energy efficiency, detachment, node degree, and inter-cluster distance. Moreover, teaching–learning-based optimization (TLBO) algorithm-based multi-hop routing (TLBO-MHR) technique is applied for optimum selection of routes to destinations. Furthermore, the TLBO-MHR method originates a suitability purpose using energy and distance metrics. The performance of the IMD-EACBR model has been examined in several aspects. Simulation outcomes demonstrated enhancements of the IMD-EACBR model over recent state-of-the-art approaches. IMD-EACBR is a model that has been proposed for the transmission of emergency data, and the TLBO-MHR technique is one that is based on the requirements for hop count and distance. In the end, the proposed network is subjected to rigorous testing using NS-3.26’s full simulation capabilities. The results of the simulation reveal improvements in performance in terms of the proportion of dead nodes, the lifetime of the network, the amount of energy consumed, the packet delivery ratio (PDR), and the latency.

1. Introduction

In recent times, the Internet of Things (IoT) and mobile edge computing (MEC) are becoming familiar components in fulfilling forthcoming technical necessities. The technological expansions mainly focus on the demand for information transfer, minimizing load on the network, and throughput [1]. Handling minimum postponement, data memory storage, and being able to function in crucial application zones are the requirements for networks in smart grids, smart cities, reliable platforms, and in transportation [2]. The growing amount of data could be dealt with using MEC gadgets that have a specific groundwork for obtaining network analytics, and network optimization by using IoT. With rapidly increasing numbers of IoT gadgets, the creation of self-governing networks for IoT gadgets has received increasing attention by scientists [3]. In the concept of network executives, the chief goal is to create a power-proficient multi-hop network that can connect source-to-destination nodes via mobile phone relay nodes (RNs) through the use of power restraints [4]. Thus, the network topologies are termed respectively in order to wirelessly connect between RNs, which are IoT gadgets.
As a result of recent progression in microelectromechanical system (MEMS) technologies and wireless networks, wireless sensor networks (WSNs) have garnered significant attention by different applications such as military, healthcare, disaster management, industrial automation, etc. [5]. Wireless sensor networks (WSN) are an integral part of the IoT. Therefore, WSN applications have found associations in society, the computing world, and the physical world. In common terms, WSNs comprise a large number of tiny sensors dispersed over a vast area, accompanied by base stations (BS) that assemble information from these sensor nodes. All sensor nodes (SN) have restricted power supplies, and have the abilities to process data, sense, and transmit [6]. Hierarchical-based (or cluster-based) routing is a familiar method with some specific benefits that relate to scalability and efficiency in communications. The concepts of hierarchical routing have been implemented in order to attain power efficiency in WSNs [7]. In contrast, lower power nodes are used only for sensor related work in areas that are nearer to the target. Thus, making clusters and allocating specific jobs to cluster heads (CHs) can importantly donate to the scalability of the system, its lifespan, and its power efficiency. Scalability is a critical aspect in WSNs that has not been well established in many of the protocols as a result of the initial assumptions made. For example, cluster-based protocol generally considers one sink with cluster heads inside the coverage of the sink [8]. Under those considerations, WSNs lack scalability, and result in communications that are excessive in terms of their power requirements. Hence, slightly raising the total quantity of device nodes or the width of the network will lead to overloading that develops exponentially, and a hindrance that contains only a single sink; these can strangle the network. Hierarchical routing is an effective way to diminish power utilisation inside the cluster and perform information accumulation. In addition to this, this approach permits merging tasks to decrease the number of transferred packets to the sink [9]. All perceptions of the nodes, from hardware devices to their accomplished processes, will aid in distributing the power load [10]. Thankfully, hierarchical routing has several roles to assist us in distinguishing potential stages in protocol processes; the availability of two operation modes in the sensor nodes can estimate comparatively higher energy expenses. However, various transmission modes, namely cluster heads and normal sensors, may become advantageous if executed in every layer.
This project emphasises the use of a better metaheuristic-driven energy-aware cluster-based routing (IMD-EACBR) scheme for IoT-assisted WSN. The proposed IMD-EACBR model initially derives an improved Archimedes optimization algorithm-based clustering (IAOAC) technique. In addition, the IAOAC algorithm computes a fitness function that involves multiple parameters, namely energy efficiency, distance, node degree, and inter-cluster distance. Moreover, teaching–learning-based optimisation (TLBO) algorithm-based multi-hop routing (TLBO-MHR) technique was executed for the optimum selection of routes to destinations. The design of IAOAC and TLBO-MHR techniques with multiple input parameters depicts the innovation of the research. The presentation of the IMD-EACBR model has been examined in several aspects.
In this paper, we propose the IMD-EACBR, a new routing strategy for WSNs that uses a mix of a clustering methodology and a TLBO-MHR technique to extend network lifetime. The goal of the proposal is to find the best route from the source to the destination by prioritising the maximisation of remaining battery power, the minimisation of energy consumed in a multi-hop path, and the greatest equity across sensor nodes. The simulation results show that this protocol not only balances the overall network’s energy usage, it also delays node death time and provides more dependable data delivery.
The core donations and innovations of this investigation are as follows:
i.
Multi-hop directing methods are thought to be energy-effective explanations for wireless device systems, which address a problem known as gathering. On the other hand, the cluster-based directing techniques used in conventional wireless networks might not be appropriate to WSN due to factors such as the presence of an underwater present, a limited bandwidth, a high water compression, a prolonged broadcast latency, and an increased error prospect.
ii.
In order to tackle these challenges and achieve energy efficiency in WSNs, the primary focus of this research is on the making of a metaheuristic-based gathering along with a directing procedure for WSNs. This protocol is given the name IMD-EACBR.
iii.
The IMD-EACBR technique selects the most advantageous CHs and the most direct paths to the BS. IMD-EACBR is a method that employs the teaching–learning-based optimization (TLBO) optimizer-based gathering in order to select the most suitable CHs and construct appropriate collections.
iv.
In order to demonstrate the manner in which the IMD-EACBR technique enhances performance, a number of simulations are carried out, and the results are analysed in a variety of different ways.
The remaining portion of the paper is divided into five sections that are descriptive in nature. In the second section, an assessment of preceding efforts that have been made in the same context is presented, in order to classify the practical gaps. In Section 3, the plan is broken down into its individual IAOAC phases for clarity. The study is brought to a close with a discussion of the potential directions of IAOAC in the years to come. Section 4 provides an in-depth analysis of the presentation, in order to validate the superiority and effectiveness of IAOAC. Section 5 presents the conclusions.

2. Literature Review

Kavitha, A. et al. [11] proposed a cluster-based routing with simulated annealing and genetic algorithm-based hybrid (SAGA-H) method. The presented technique was simulated and explained by utilizing MATLAB. Furthermore, the observed results were compared to a contemporary genetic algorithm (GA)-based method regarding average residual energy, network lifespan, and the number of packets transmitted between the BS and sink.
Subbulakshmi, P. et al. [12] introduced a multiple-objective founded gathering and Sailfish Optimizer (SFO)-directed protocol to augment energy efficiency in WSNs. The CH is chosen based on fitness criteria that are expressed from multiple objectives. It assists in reducing the number of dead sensors and minimises energy utilization. Following CH selection, SFO is utilised to select an optimum route to a sink node for transmitting information. The presented method was analysed, and results were compared to current techniques.
Gowda, C.S. et al. [13] proposed a novel hybrid neural network (NN)-based energy-effective routing method by using routing protocol (RP). Firstly, the sensors are clustered by the mean shift clustering method. Next, the bald eagle search approach chooses the CH to clustered node. Subsequently, RP is chosen rather than visiting each CH. Then, the RP is selected according to the weight assessment among hop distances and the amount of transferred data packets. At last, a hybrid NN using group teaching algorithm was presented for determining the optimal route.
Vaiyapuri et al. [14] presented an IoT-assisted cluster-based routing (CBR) method for information-centric WSNs (ICWSN), named CBR-ICWSN. The proposed method undergoes a black widow optimization (BWO)-founded gathering approach for efficiently choosing an optimal set of CHs. Furthermore, the CBR-ICWSN approach comprises an oppositional ABC (OABC)-based routing method for better election of routes.
Shafiq et al. [15] proposed a robust cluster-based routing protocol (RCBRP) to recognize the routing path by which minimal energy is expended, in order to enhance network lifespan. The presented method was composed of transmission and explored ow methods. Then, is the study presented two approaches: (i) distance and energy consumption assessment method, and (ii) routing and energy-effective bunch technique.
Zheng et al. [16] presented a stability-aware cluster-based routing (SACR) approach for CRSN. In terms of cluster formation, the study presented range subtleties and energy utilisation in the clustering method.
Awan et al. [17] proposed a metaheuristic artificial intelligence approach based on the social behavior of grey wolves, in order to minimise the energy utilization of WSNs from the livestock industry. The energy level, grid size, transmission range, and direction were the major parameters utilised for measuring the algorithm’s performance. The following Table 1 describes the existing approach methodologies.
O. J. Pandey et al. [18] presented LPWANs, a multi-hop data directing approach. Since the multi-hop data program encounters a number of obstacles, including augmented data dormancy, increased meddling, and decreased data quantity (i.e., inefficient utilisation of bandwidth), we suggest a reinforcement learning strategy to handle these obstacles. The suggested technique updates the network’s Q-matrix at periodic time intervals and picks relay devices to exploit the increasing prize rate between designated device–gateway pairings. Furthermore, we present a novel data routing mechanism that optimises the energy rate of the cables. This strategy results in unchanging energy use and accelerated data transport. On a WSN testbed, simulations and actual node deployments are used to conduct experiments [19]. In order to prevent sensor nodes from behaving selfishly in future operations, a consequence instrument is developed to compel device nodes to embrace cooperative methods. The simulation findings demonstrate that game theory may efficiently reduce the sensor network’s energy consumption and enhance the amount of data transmission, thus achieving the goal of extending the network’s lifetime [20].

3. Materials and Methods

In this article, a new IMD-EACBR method has been designed to maximise energy efficiency and lifetimes of WSNs. At the primary level, the IoT nodes in the network are randomly placed and communicate with one another for the information collection process. Then, the presented IMD-EACBR technique primarily selects CHs and organizes clusters using the IAOAC technique. This is followed by the optimal selection of routes using the TLBO-MHR technique. Once the optimal routes are identified, the CHs use optimal routes for transmitting data to a BS. Figure 1 demonstrates the general procedure of the proposed IMD-EACBR method.
Srilakshmi, U. et al. [21] introduced AOA, inspired by the work of Archimedes, that can be determined from rules of physics. The presented method focused on the object that was completely or partially immersed in the fluid. The initialisation procedure of each object can be implemented by Equation (1):
0 i = l i + r a n d × ( u i l i ) , i = 1 , 2 , , N
where l i and u i indicate the lower and upper bounds of ith object, respectively, and N denotes the number of objects. Rand are numbers that are produced at random and are spread out evenly across the range [0, 1]; rand can refer to a scale factor in the range [0, 1]. The density and volume of all the objects are initialised by the following equation:
d e n i = r a n d , v o l i = r a n d

3.1. Algorithmic Process of IAOA Technique

Here, rand denotes a vector of D -dimensional value within [ 0 ,   1 ] . The acceleration of an object is evaluated by the following equation:
a c c i = l b i + r a n d × ( u b i l b i )
The suitability purpose is evaluated, and the object with the optimal fitness value is allocated by x b e s t ,   d e n b e s t ,   v o l b e s t , and a c c b e s t .
The updating procedure for the ith object’s volume and density can be implemented by the following equations:
d e n i t + 1 = d e n i t + r a n d × ( d e n b e s t d e n i t )
v o l i t + 1 = v o l i t + r a n d × ( v o l b e s t v o l i t )
where t denotes the present iteration and rand indicates an arbitrary value. It can be shown in the following equation:
T F = e x p   ( t t   m a x   t   m a x   )
The transfer operator (TF) aids the alteration of AOA exploration, from the exploration stage to the misuse phase, as shown in Equation (6). The TF rate steadily rises over the period pending the unity value 1, where TF is the transfer operator capable of transferring the operator search procedure from the examination to the mistreatment stage. Then, t   max denotes the maximum quantity of repetitions. Next, the values of T F are increasingly improved through iteration. The density decreasing factor assists the AOA to transfer from the global to a local searching space, and is expressed in the following equation:
d t + 1 = T F ( t t   m a x   )
The values of d t + 1 decrease with time; furthermore, suitable allocations of parameters assist in achieving a balance between the exploitation and exploration stages. While t is the number of repetitions, t max is the supreme quantity of repetitions. The exploration stage refers to collisions among the substances; this stage is measured once the transmission operative is 0.5. The hastening of the ith object at iteration t + 1 can be upgraded by choosing an arbitrary material ( m r ) in the following equation [22]:
a c c i t + 1 = d e n m r + v o l m r × a c c m r d e n i t + 1 × v o l i t + 1
where n m r ,   v o l m r , and a c c m r indicate the thickness, capacity, and quickening of random material ( m r ) , respectively. The acceleration of the ith object in the exploitation stage is evaluated with the following equation:
a c c i t + 1 = d e n b e s t + v o l b e s t × a c c b e s t d e n i t + 1 × v o l i t + 1
In Equation (9), n b e s t ,   v o l b e s t , and a c c b e s t indicate the object’s thickness, capacity, and hastening, respectively. It can be significant to standardize the acceleration of all the particles; this defines the step percentage by which all the particles would change. It can be formulated with the following equation:
a c c i n o r m t + 1 = u × ( a c c i t + 1 min ( a c c ) max ( a c c ) min ( a c c ) ) + l
where l and u denote the normalization range, allocated as 0.1 and 0.9, respectively. Once the object is farther from the international optimal, the value of hastening would be higher; in such cases, the examination stage is presented, otherwise mistreatment stage is conducted.
The location of the ith element is upgraded in the examination stage as follows:
χ i t + 1 = χ i t + C 1 × r a n d × a c c i n o r m t + 1 × d × ( χ r a n d χ i t )
At the same time, the updating procedure for particle position in the exploitation stage is given in the following equation:
χ i t + 1 = χ i t + F × C 2 × r a n d × a c c i n o r m t + 1 × d × ( T × χ b e s t χ i t )
where C 1 and C 2 denote constants (C) determined by the user, T indicates a variable which is based on the transfer operator ( T = C 3 × T F ) ,   C 3 indicates a continuous rate, χ b e s t represents the location of the optimal subdivision, and F indicates the flag applied to alter the element movement path.
The IAOA is derived using Levy flight (LF) approach in the classical AOA [23,24,25,26,27]. It is an arbitrary walk where the steps are determined with respect to the step length that has a detailed probability distribution. An arbitrary step length is drawn in a Levy distribution (LD) that is determined with following formula [28]:
L ( s ) | s | 1 β
where β ( 0 < β 2 ) refers the catalog, and s is the stage measurement. The Mantegna algorithm for symmetric Levy stable distribution is utilised to create arbitrary step sizes. In Mantegna’s procedure, the step measurement s is measured as follows:
s = u | v | 1 β
where u and v are drawn from a normal distribution, as follows:
u N ( 0 ,   σ u 2 ) , v N ( 0 ,   σ v 2 )
This distribution follows the expected LD for | s | | s 0 | , whereas s 0 refers to the minimum step length. During the presented approach, the step sizes are created by utilising an LD to exploit the search region, and are computed as follows:
s t e p s i z e ( t ) = 0.001 × s ( t ) × S L C
where t refers to the iteration counter for the local search approach, s ( t ) has been computed utilising an LD, and S L C denotes the social learning component of the global searching technique.

3.2. Process Involved in IAOAC Technique

Once the nodes are deployed in the region of interest, the IAOAC technique is executed. The IAOAC method was developed with the presence of four suitability features, including the energy competence of IoT device nodes, the compactness of cluster nodes, the regular detachment of IoT devices for CHs contained by their sensing series, and the distances of CHs to sinks. The data on fitness parameters are shown in Equation (17).
Energy competence: The CHs execute many events such as sensing, gathering, aggregation, data broadcast, etc.;thus, CHs intake more energy than other nodes. Hence, they can be vital to determine a fitness function (FF) that shares the load among all of the IoT devices from the system. The suitability limit for effective deployment of system energy is determined as follows:
R e = e ( n i ) A ν g e = 1 n i = 0 n e ( n i ) f 1 = C H o p t R e A v g e = C H o p t e ( n i ) 1 n Σ i = 0 n e ( n i ) C H o p t = 5 %   o f   n ,   e ( n i ) = 0.5 J   o r   1.25 J   o r   1.75 J
where R e ,   A ν g e , and n i refer to the node RE, network average energy, and total amount of IoT device nodes from the system, respectively. C H o p t signifies the optimum percentage of CHs.
The number of nodes in a cluster is an important parameter to consider when trying to improve the energy efficiency of networks, since it affects the cost of intra-cluster transmissions. The cluster cost function was defined using the supplied function, which meant that the network energy deployment was of a higher quality than before:
f 2 = m a x   ( n ( C H 1 ) , n ( C H 2 ) , n ( C H 3 ) n ( C H j ) ) ,   n = 2   t o   95 ,   j = 1   t o   15  
where n ( C H j ) refers to the number of IoT devices from the range of the jth CH ( C H j ) . The value of objective function f 2 is higher than any choice of CH, and is utilised in decreasing the energy reduction.
The regular detachment of IoT devices to the CH within its detection range occurs in intra-cluster transmission, and when IoT devices transmit data to CH. If the CH is away from CM, then IoT devices diminish their energy consumption once the CH is nearer to the member IoT device node; afterward, it deploys minimal energy.
f 3 = 1 n s τ i = 0 n s r d i s t ( C H ,   i )   d i s t ( C H ,   i ) = 1   t o   35   m , n s r = 1   t o   100
where n s r and d i s t ( C H ,   i ) signify the number of IoT devices from a sensing series and the Euclidean distance in node and CH from the perception sequence of individual clusters, respectively. Therefore, the rate of f 3 is minimal but the diminishing intra-cluster transmits power.
Detachment from CH to Base Station(BS): When using CH selection (CHS), however, the distances among the CHs and BSs are quite important. The reason for this is because the supplied function forecasts that if the CHs are located a significant distance from the sink, they will use energy at a rapid rate:
f 4 = 1 C H i = 0 C H d i s t ( B S ,   C H i )   d i s t ( B S ,   C H i ) = 1   t o   70 m ,   C H = 1   t o   15
where d i s t ( B S ,   C H i ) implies the Euclidean distance between the BS and the ith CH ( C H i ) . Minimising the f 4 impartial purpose states that the CHs are not far away from the BS.
When the f 1 , f 2 , f 3 , and f 4 purpose strictures are measured, the impartial purpose is called FF, which is represented as follows:
F F = M a x i m i z e   F i t n e s s = α f 1 + β f 2 + γ 1 f 3 + δ 1 f 4
where α , β , γ , and δ signify the weight coefficients to f 1 , f 2 , f 3 , and f 4 FF parameters, respectively. The range of weight coefficients is varied between z e r o and one.

3.3. Design of TLBO-MHR Technique

When the CHs are chosen and clusters are optimally generated, the TLBO-MHR algorithm is applied to generate optimal routes in the IoT-assisted WSN. TLBO is a population-based technique simulated by the procedure of teacher as well as learner [29,30,31,32,33,34,35,36]. Differing from other heuristic techniques, TLBO requires fewer approaches to certain parameters, which is an essential reason for choosing TLBO technique to optimize problems. Other heuristic approaches are heavily dependent on the parameter chosen; that is a significant limitation, as its efficiency is heavily dependent upon parameter tuning. A minor change from some parameters can affect the efficacy of the entire technique.
TLBO begins by creating an arbitrary primary population, and then upgrades that population from all its iterations [37,38,39,40,41,42,43]. The rows match to learner, whereas columns relate to subjects. All the subjects of the learner signify the grade of application, while the entire quantity of topics of a beginner assemble to periods on which preparation is executed. The purpose of all the learners is to exploit their skills in all the subjects. The procedure of TLBO was separated into two stages: teacher and learner phases. During the teacher stage, the mean of learners from all the subjects is computed. The fitness of all learners is measured, and the optimum learner is then chosen as a teacher ( X o l d g ) . A novel vector is furthered to represent a population that is created in the existing mean and optimum mean vector, as follows:
X n e w ( i ) g = X ( i ) g + r × ( X m a i n g T f M g )
where r represents the arbitrarily created number between zero and one. T f signifies the instructor factor and its rate is either 1 or 2.
The rate of T f is arbitrarily chosen as follows:
T f = r o u n d [ 1 + r 1 ]
where r 1 refers to the arbitrary quantity with a rate between zero and one. T f is not an input parameter and is arbitrarily obvious by the technique utilised in Equation (12). The value of T f is chosen as either 1 or 2, depending on rounding up conditions. If X n e w ( i ) g is superior in fitness to X ( i ) g , then X ( i ) g is exchanged by the higher learner X n e w ( i ) g . Random variables rand1 and rand2 are accidental numbers with a uniform delivery in the interval [0, 1] and are a scale factor in the interval [0, 1].
During the learner stage, the learner interrelates with everyone and enhances his or her data through mutual communication [44,45,46,47,48]. All the learners relate with other learners for the sake of data sharing. From among all learners X ( i ) g , another learner X ( r ) g is arbitrarily chosen ( i r ) and the population is upgraded as follows:
X n e w ( i ) g = { X ( i ) g + r a n d × ( X ( i ) g X ( r ) g ) i f   X ( i ) g X ( r ) g X ( i ) g + r a n d × ( X ( r ) g X ( i ) g ) o t h e r w i s e
The algorithm endures until the condition is met. Algorithm 1 provides the entire mechanism of TLBO. Figure 2 shows the flow chart of the TLBO method.
Algorithm 1: TLBO Algorithm
Input: Populace size (pop-size), quantity of topics, end condition
Initialisation: Create primary people
while terminating condition is not met do
  Teacher phase
  Choose the   optimum   separate   as   a   teacher   x T e a c h e r g in people
  Compute the   mean   charge   ( x m ) of all the subjects
  for i = 1 to popsize do
       T F = r o u n d ( 1 + r a n d ( 0 , 1 ) )
       x i n e w = x i o l d + r a n d i ( x T e a c h e r g T F × x m )
   Compute fitness   of   novel   individual   f ( x i n e w )
   if f ( x i n e w ) < f ( x i o l d ) then
          x i o l d = x i n e w
    end
  end
Learner phase
  for i = 1 to popsize do
  Choose an   arbitrary   individual   x r   so   as   r i
  if f ( x i ) < f ( x r ) then
      x i n e w = x i o l d + r a n d i ( x r x i )
  else
      x i n e w = x i o l d + r a n d i ( x i x r )
  end
   end
 end
 end
Return Best
During instruction, to define the best group of routes, the TLBO-MHR procedure is applied in order to determine the subsequent hop to BS. This can be shown in the following:
f ( x ) = { i ,   F o r   W h i c h | ( i k X i f j ) | i s   M i n i m u m ,     i       a n d       1 i k   }  
The procedure aims to define the best group of routes in CHs to the BS through an FF that contains two variables, such as distance and energy [49,50,51,52,53]. Initially, the RE of the next-hop node is described, and the node with maximum energy serves as the RN. Hence, the node with superior RE becomes the next-hop node. This is given in the following:
f 1 = E C H
Furthermore, the Euclidean distance is executed for defining the distance in a CH to BS. Using minimum distance, the energy consumption is kept significantly low [38,54,55,56,57]. When the distance is increased, additional energy is expended. Thus, the node with lowest distance is chosen as an RN, as follows:
f 2 = 1 i = 1 m d i s t ( C H i ,   N H ) + d i s t ( N H ,   B S )
The above-mentioned sub-objective is studied relative to FF, where α 1 and α 2 denote the weights assigned to each sub-objective.
F i t n e s s = α 1 ( f 1 ) + α 2 ( f 2 ) ,     w h e r e     α 1 + α 2 = 1   ;     α i ( 0 ,   1 )

4. Experimental Validation

In this section, a complete proportional training of the IMD-EACBR model compared to other current models is carried out. A route damage prototype founded on a cluster is created using both the CI and FI representations. Large-scale features such as PLEs and shadow factors in LOS and NLOS instances are designed and associated with those of the NYU prototype in the same setting.
Table 2 and Figure 3 report a brief network lifetime (NLT) examination of the IMD-EACBR model compared to other approaches. The results indicate that the IMD-EACBR model accomplished a maximum NLT under all SNs [58,59,60,61,62,63,64,65,66,67]. For instance, with 100 SNs, the IMD-EACBR model attained an maximum NLT of 1719 rounds, whereas the sunflower optimisation (SFO), gray wolf optimisation (GWO), genetic algorithm (GA), ant line optimisation (ALO), and particle swarm optimisation (PSO) models obtained reduced NLTs of 1593, 1448, 1415, 1349, and 1300 rounds, respectively. Furthermore, with 500 SNs, the IMD-EACBR model reached a superior NLT of 3500 rounds, whereas the SFO, GWO, GA, ALO, and PSO models resulted in lower NLTs of 3501, 3395, 3263, 2966, and 2684 rounds, respectively.
Table 3 and Figure 4 demonstrate the number of alive sensor nodes (NOASN) analysis of the IMD-EACBR method and of other models. The results indicate that the IMD-EACBR model accomplished maximum NOASN under all rounds. For instance, with 2000 rounds, the IMD-EACBR approach attained an increased NOASN of 468, whereas the SFO, GWO, GA, ALO, and PSO models obtained reduced NOASNs of 444, 404, 373, 295, and 278, respectively. Simultaneously, with 3250 rounds, the IMD-EACBR prototype achieved the highest NOASN of 315, whereas the SFO, GWO, GA, ALO, and PSO approaches achieved occasional to few NOASNs of 176, 52, 10, 5, and 2, respectively.
A comprehensive proportional examination of the IMD-EACBR model compared to current models in terms of numbers of dead sensor nodes (NODSN) is shown in Table 4 and Figure 5. The outcomes exhibit that the IMD-EACBR approach resulted in effective outcomes with negligible values of NODSNs [18,19,68,69,70]. For example, with 2000 rounds, the IMD-EACBR model achieved a decreased NODSN of 215 nodes, whereas the SFO, GWO, GA, ALO, and PSO models resulted in increased NODSNs of 367, 478, 500, 500, and 500 nodes, respectively.
An ephemeral comparative inspection of the IMD-EACBR prototype compared to current algorithms in terms of energy consumption (ECM) is provided in Table 5 and Figure 6. The consequences were that the IMD-EACBR approach outperformed, resulting in effectual outcomes with minimal values of NODSNs. For instance, with 100 SN, the IMD-EACBR approach provided decreased NODSNs of 0.047 mJ, whereas the SFO, GWO, GA, ALO, and PSO models resulted in increased NODSNs of 0.078 mJ, 0.113 mJ, 0.153 mJ, 0.203 mJ, and 0.246 mJ, respectively.
Table 6 and Figure 7 illustrate a brief throughput (THPT) examination of the IMD-EACBR approach compared to other approaches. The results indicate that the IMD-EACBR methodology demonstrates supreme THPT under all SNs. For example, with 100 SNs, the IMD-EACBR model achieved a higher THPT of 0.975 Mbps, whereas the SFO, GWO, GA, ALO, and PSO techniques achieved lower THPTs of 0.934 Mbps, 0.891 Mbps, 0.861 Mbps, 0.804 Mbps, and 0.704 Mbps, respectively. Eventually, with 500 SNs, the IMD-EACBR approach reached a superior THPT of 0.902 Mbps, while the SFO, GWO, GA, ALO, and PSO techniques resulted in lower THPTs of 0.819 Mbps, 0.728 Mbps, 0.632 Mbps, 0.565 Mbps, and 0.522 Mbps, respectively.
Table 7 and Figure 8 depict a brief packet delivery ratio (PDR) analysis of the IMD-EACBR approach compared to existing algorithms. The results indicate that the IMD-EACBR model achieved the greatest PDR under all SNs. For example, with 100 SNs, the IMD-EACBR model reached a PDR of 98.83%, whereas the SFO, GWO, GA, ALO, and PSO systems obtained lower PDRs of 98.40%, 96.47%, 95.65%, 94.37%, and 93.79%, respectively [20,23,24,25,26,27]. Moreover, with 500 SNs, the IMD-EACBR model reached an ultimate PDR of 96.56%, whereas the SFO, GWO, GA, ALO, and PSO methodologies resulted in reduced PDRs of 95.20%, 94.66%, 93.47%, 92.30%, and 91.37%, respectively.
Finally, a cost function examination of the IMD-EACBR model compared to other optimization techniques is summarised in Figure 9. The results indicate that the GA performed poorly with increased cost function values. The other algorithms, except for the GWO and the IMD-EACBR model, exhibited similar cost function values. Although the GWO algorithm achieved a reasonable outcome, the IMD-EACBR model displayed superior performance. The aforementioned tables and figures report the superiority of the IMD-EACBR approach over all other methods in IoT-assisted WSNs.

5. Conclusions

In this study, a new IMD-EACBR procedure has been designed to maximise the energy efficiency and lifetime of WSNs. At the primary level, the IoT nodes in the network are randomly placed and communicate with one another via information collection processes. Then, the presented IMD-EACBR technique primarily selects CHs and organises clusters using the IAOAC technique. Following this, the optimal selection of routes takes place using the TLBO-MHR technique. Once the optimal routes are identified, the CHs use optimal routes to transmit data to the BS. The recommended protocol makes use of an energy-saving method, in which optimum CHs are chosen on the basis of an improved search equation and an effective fitness function, as opposed to relying on a conventional search procedure. These processes make the protocol more effective. In order to demonstrate that the suggested protocol is valid across a range of presentation criteria, we compared its performance to that of other well-known cluster-based conventions. The design of IAOAC and TLBO-MHR techniques with multiple input parameters helps to achieve maximum network efficiency. The performance of the IMD-EACBR model has been examined in several aspects. The outcomes of the simulation experiments demonstrated the effectiveness of the enhancements of the IMD-EACBR technique over existing approaches. Among the technical limitations of the IMD-EACBR approach is the requirement for parameter tweaking. In the future, the energy efficiency of the IMD-EACBR technique may be further enhanced by data aggregation and sleep scheduling schemes.

Author Contributions

Conceptualization, K.L. and N.S.; organization, N.S. and Y.A.; validation, N.S. and Y.A.; formal analysis, K.L. and N.S.; investigation, K.L. and N.S.; resources, N.S. and A.K.N.; data curation, K.L., S.A., and O.I.K.; writing—original draft preparation, K.L.; writing—review and editing, N.S. and Y.A.; visualization, O.I.K. and S.A.; supervision, N.S. and Y.A.; project administration, N.S. and Y.A.; funding acquisition, S.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Taif University with the Grant Code: (TURSP-2020/313).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the Taif University for supporting this study through Taif University Researchers Supporting Project Number (TURSP-2020/313), Taif University, Taif, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Arjunan, S.; Pothula, S.; Ponnurangam, D. F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks. Int. J. Commun. Syst. 2018, 31, e3811. [Google Scholar] [CrossRef]
  2. Rezaeipanah, A.; Amiri, P.; Nazari, H.; Mojarad, M.; Parvin, H. An energy-aware hybrid approach for wireless sensor networks using re-clustering-based multi-hop routing. Wirel. Pers. Commun. 2021, 120, 3293–3314. [Google Scholar] [CrossRef]
  3. Berlin, M.A.; Tripathi, S.; Devi, V.B.; Bhardwaj, I.; Arulkumar, N. IoT-based traffic prediction and traffic signal control system for smart city. Soft Comput. 2021, 25, 12241–12248. [Google Scholar]
  4. Norouzi Shad, M.; Maadani, M.; Nesari Moghadam, M. GAPSO-SVM: An IDSS-based energy-aware clustering routing algorithm for IoT perception layer. Wirel. Pers. Commun. 2021, 1–20. [Google Scholar] [CrossRef]
  5. Satpathy, S.; Prakash, M.; Debbarma, S.; Sengupta, A.S.; Bhattacaryya, B.K. Design a FPGA, fuzzy based, insolent method for prediction of multi-diseases in rural area. J. Intell. Fuzzy Syst. 2019, 37, 7039–7046. [Google Scholar] [CrossRef]
  6. Famila, S.; Jawahar, A.; Sariga, A.; Shankar, K. Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments. Peer—Peer Netw. Appl. 2020, 13, 1071–1079. [Google Scholar] [CrossRef]
  7. Kavitha, A.; Velusamy, R.L. Simulated annealing and genetic algorithm-based hybrid approach for energy-aware clustered routing in large-range multi-sink wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 2020, 35, 96–116. [Google Scholar] [CrossRef]
  8. Subbulakshmi, P.; Prakash, M. Mitigating eavesdropping by using fuzzy based MDPOP-Q learning approach and multilevel Stackelberg game theoretic approach in wireless CRN. Cogn. Syst. Res. 2018, 52, 853–861. [Google Scholar] [CrossRef]
  9. Rajaram, P.V.; Prakash, M. Intelligent deep learning based bidirectional long short term memory model for automated reply of e-mail client prototype. Pattern Recognit. Lett. 2021, 152, 340–347. [Google Scholar]
  10. Ramalingam, C.; Mohan, P. Addressing semantics standards for cloud portability and interoperability in multi cloud environment. Symmetry 2021, 13, 317. [Google Scholar] [CrossRef]
  11. Neelakandan, S.; Arun, A.; Bhukya, R.R.; Hardas, B.M.; Kumar, T.; Ashok, M. An Automated Word Embedding with Parameter Tuned Model for Web Crawling. Intell. Autom. Soft Comput. 2022, 32, 1617–1632. [Google Scholar] [CrossRef]
  12. Mohan, P.; Subramani, N.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I.; Ulaganathan, S. Improved metaheuristics-based clustering with multihop routing protocol for underwater wireless sensor networks. Sensors 2022, 22, 1618. [Google Scholar] [CrossRef] [PubMed]
  13. Anuradha, D.; Subramani, N.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Rajagopal, M. Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 2867. [Google Scholar] [CrossRef]
  14. Singh, H.; Ramya, D.; Saravanakumar, R.; Sateesh, N.; Anand, R.; Singh, S.; Neelakandan, S. Artificial intelligence based quality of transmission predictive model for cognitive optical networks. Optik 2022, 257, 168789. [Google Scholar] [CrossRef]
  15. Subramani, N.; Mohan, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 415. [Google Scholar] [CrossRef] [PubMed]
  16. Subahi, A.F.; Alotaibi, Y.; Khalaf, O.I.; Ajesh, F. Packet Drop Battling Mechanism for Energy Aware Detection inWireless Networks. CMC-Computers. Mater. Contin. 2020, 66, 2077–2086. [Google Scholar]
  17. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. A Novel Approach of Design and Analysis of a Hexagonal Fractal Antenna Array (HFAA) for Next-Generation Wireless Communication. Energies 2021, 14, 6204. [Google Scholar] [CrossRef]
  18. Pandey, O.J.; Yuvaraj, T.; Paul, J.K.; Nguyen, H.H.; Gundepudi, K.; Shukla, M.K. Improving Energy Efficiency and QoS of LPWANs for IoT Using Q-Learning Based Data Routing. IEEE Trans. Cogn. Commun. Netw. 2021, 8, 365–379. [Google Scholar] [CrossRef]
  19. Yan, X.; Huang, C.; Gan, J.; Wu, X. Game Theory-Based Energy-Efficient Clustering Algorithm for Wireless Sensor Networks. Sensors 2022, 22, 478. [Google Scholar] [CrossRef]
  20. Raghavendra, S.; Harshavardhan, A.; Neelakandan, S.; Partheepan, R.; Walia, R.; Rao, V.C.S. Multilayer Stacked Probabilistic Belief Network-Based Brain Tumor Segmentation and Classification. Int. J. Found. Comput. Sci. 2022, 1–24. [Google Scholar] [CrossRef]
  21. Srilakshmi, U.; Veeraiah, N.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I.; Subbayamma, B.V. An Improved Hybrid Secure Multipath Routing Protocol for MANET. IEEE Access 2021, 9, 163043–163053. [Google Scholar] [CrossRef]
  22. Jha, N.; Prashar, D.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Blockchain Based Crop Insurance: A Decentralized Insurance System for Modernization of Indian Farmers. Sustainability 2021, 13, 8921. [Google Scholar] [CrossRef]
  23. Sridevi, M.; Saravanan, C. Deep Learning Approaches for Cyberbullying Detection and Classification on Social Media. Comput. Intell. Neurosci. 2022, 2022, 2163458. [Google Scholar] [CrossRef]
  24. Sundas, A.; Badotra, S.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. Modified bat algorithm for optimal vm’s in cloud computing. Comput. Mater. Contin. 2022, 72, 2877–2894. [Google Scholar] [CrossRef]
  25. Sennan, S.; Kirubasri; Alotaibi, Y.; Pandey, D.; Alghamdi, S. EACR-LEACH: Energy-aware cluster-based routing protocol for WSN based IoT. Comput. Mater. Contin. 2022, 72, 2159–2174. [Google Scholar]
  26. Rawat, S.S.; Alghamdi, S.; Kumar, G.; Alotaibi, Y.; Khalaf, O.I.; Verma, L.P. Infrared Small Target Detection Based on Partial Sum Minimization and Total Variation. Mathematics 2022, 10, 671. [Google Scholar] [CrossRef]
  27. Li, G.; Liu, F.; Sharma, A.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Research on the natural language recognition method based on cluster analysis using neural network. Math. Probl. Eng. 2021, 2021, 9982305. [Google Scholar] [CrossRef]
  28. Kiran, S.; Neelakandan, S.; Reddy, A.P.; Goyal, S.; Maram, B.; Rao, V.C.S. Wearable Telemedicine Technology for the Healthcare Industry; Academic Press: Cambridge, MA, USA, 2022; pp. 153–168. [Google Scholar] [CrossRef]
  29. Jain, D.K.; Tyagi, S.K.K.S.; Neelakandan, S.; Prakash, M.; Natrayan, L. Metaheuristic Optimization-based Resource Allocation Technique for Cybertwin-driven 6G on IoE Environment. IEEE Trans. Ind. Inform. 2021, 18, 4884–4892. [Google Scholar] [CrossRef]
  30. Venu, D.; Mayuri, A.V.R.; Neelakandan, S.; Murthy, G.L.N.; Arulkumar, N.; Shelke, N. An efficient low complexity compression based optimal homomorphic encryption for secure fiber optic communication. Optik 2022, 252, 168545. [Google Scholar] [CrossRef]
  31. Fathy, A.; Alharbi, A.G.; Alshammari, S.; Hasanien, H.M. Archimedes optimization algorithm based maximum power point tracker for wind energy generation system. Ain Shams Eng. J. 2022, 13, 101548. [Google Scholar] [CrossRef]
  32. Hemavathi; Akhila, S.R.; Alotaibi, Y.; Khalaf, O.I.; Alghamdi, S. Authentication and Resource Allocation Strategies during Handoff for 5G IoVs Using Deep Learning. Energies 2022, 15, 2006. [Google Scholar] [CrossRef]
  33. Srilakshmi, U.; Alghamdi, S.; Ankalu, V.V.; Veeraiah, N.; Alotaibi, Y. A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access 2022, 10, 14260–14269. [Google Scholar] [CrossRef]
  34. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S. Design and Synthesis of Multi-Mode Bandpass Filter for Wireless Applications. Electronics 2021, 10, 2853. [Google Scholar] [CrossRef]
  35. Sharma, S.; Chakraborty, S.; Saha, A.K.; Nama, S.; Sahoo, S.K. mLBOA: A Modified Butterfly Optimization Algorithm with Lagrange Interpolation for Global Optimization. J. Bionic Eng. 2022, 1–16. [Google Scholar] [CrossRef]
  36. Asha, P.; Natrayan, L.; Geetha, B.T.; Beulah, J.R.; Sumathy, R.; Varalakshmi, G.; Neelakandan, S. IoT enabled environmental toxicology for air pollution monitoring using AI techniques. Environ. Res. 2022, 205, 112574. [Google Scholar] [CrossRef] [PubMed]
  37. Rao, R.V.; Savsani, V.J.; Vakharia, D.P. Teaching–learning-based optimization: A novel method for constrained mechanical design optimization problems. Comput. Aided Des. 2011, 43, 303–315. [Google Scholar] [CrossRef]
  38. Perumal, S.K.; Kallimani, J.S.; Ulaganathan, S.; Bhargava, S.; Meckanizi, S. Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks. Concurr. Comput. Pr. Exper. 2022, e7106. [Google Scholar] [CrossRef] [Green Version]
  39. Prakash, M.; Ravichandran, T. An efficient resource selection and binding model for job scheduling in grid. Eur. J. Sci. Res. 2012, 81, 450–458. [Google Scholar]
  40. Mohan, P.; Thangavel, R. Resource selection in grid environment based on trust evaluation using feedback and performance. Am. J. Appl. Sci. 2013, 10, 924. [Google Scholar] [CrossRef] [Green Version]
  41. Veeraiah, N.; Khalaf, O.I.; Prasad, C.V.P.R.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A.; Alsufyani, N. Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 2021, 9, 120996–121005. [Google Scholar] [CrossRef]
  42. Alotaibi, Y. A New Secured E-Government Efficiency Model for Sustainable Services Provision. J. Inf. Secur. Cybercrimes Res. 2020, 3, 75–96. [Google Scholar] [CrossRef]
  43. Prakash, M.; Sayeed, R.F.; Princey, S.; Priyanka, S. Deployment of MultiCloud Environment with Avoidance of DDOS Attack and Secured Data Privacy. Int. J. Appl. Eng. Res. 2015, 10, 8121–8124. [Google Scholar]
  44. Ramalingam, C.; Mohan, P. An efficient applications cloud interoperability framework using I-Anfis. Symmetry 2013, 13, 268. [Google Scholar] [CrossRef]
  45. Mohan, P.; Sundaram, M.; Satpathy, S.; Das, S. An efficient technique for cloud storage using secured de-duplication algorithm. J. Intell. Fuzzy Syst. 2021, 41, 2969–2980. [Google Scholar] [CrossRef]
  46. Ambeth Kumar, V.D.; Malathi, S.; Kumar, A.; Veluvolu, K.C. Active Volume Control in Smart Phones Based on User Activity and Ambient Noise. Sensors 2020, 20, 4117. [Google Scholar] [CrossRef] [PubMed]
  47. Alotaibi, Y. A New Meta-Heuristics Data Clustering Algorithm Based on Tabu Search and Adaptive Search Memory. Symmetry 2022, 14, 623. [Google Scholar] [CrossRef]
  48. Anand, J.G. Trust based optimal routing in MANET’s. In Proceedings of the 2011 International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, 23–24 March 2011; pp. 1150–1156. [Google Scholar] [CrossRef]
  49. Kamalraj, R.; Neelakandan, S.; Kumar, M.R.; Rao, V.C.S.; Anand, R.; Singh, H. Interpretable filter based convolutional neural network (IF-CNN) for glucose prediction and classification using PD-SS algorithm. Measurement 2021, 183, 109804. [Google Scholar] [CrossRef]
  50. Kavitha, T.; Mathai, P.P.; Karthikeyan, C.; Ashok, M.; Kohar, R.; Avanija, J.; Neelakandan, S. Deep Learning Based Capsule Neural Network Model for Breast Cancer Diagnosis Using Mammogram Images. Interdiscip. Sci. Comput. Life Sci. 2021, 14, 113–129. [Google Scholar] [CrossRef]
  51. Cyril, C.P.D.; Beulah, J.R.; Subramani, N.; Mohan, P.; Harshavardhan, A.; Sivabalaselvamani, D. An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurr. Eng. Res. Appl. 2021, 29, 386–395. [Google Scholar] [CrossRef]
  52. Reshma, G.; Al-Atroshi, C.; Nassa, V.K.; Geetha, B.; Sunitha, G.; Galety, M.G.; Neelakandan, S. Deep Learning-Based Skin Lesion Diagnosis Model Using Dermoscopic Images. Intell. Autom. Soft Comput. 2022, 31, 621–634. [Google Scholar] [CrossRef]
  53. Kannan, K.S.; Suma, K.G. A Secured Healthcare Medical System Using Blockchain Technology. In ICCCE 2021; Lecture Notes in Electrical Engineering; Kumar, A., Mozar, S., Eds.; Springer: Singapore, 2022; Volume 828. [Google Scholar] [CrossRef]
  54. Sunitha, G.; Geetha, K.; Neelakandan, S.; Pundir, A.K.S.; Hemalatha, S.; Kumar, V. Intelligent deep learning based ethnicity recognition and classification using facial images. Image Vis. Comput. 2022, 121, 104404. [Google Scholar] [CrossRef]
  55. Parthiban, S.; Harshavardhan, A.; Neelakandan, S.; Prashanthi, V.; Alolo, A.-R.A.A.; Velmurugan, S. Chaotic Salp Swarm Optimization-Based Energy-Aware VMP Technique for Cloud Data Centers. Comput. Intell. Neurosci. 2022, 2022, 4343476. [Google Scholar] [CrossRef] [PubMed]
  56. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 6016. [Google Scholar] [CrossRef]
  57. Harshavardhan, A.; Boyapati, P.; Neelakandan, S.; Akeji, A.A.A.-R.; Pundir, A.K.S.; Walia, R. LSGDM with Biogeography-Based Optimization (BBO) Model for Healthcare Applications. J. Healthc. Eng. 2022, 2022, 2170839. [Google Scholar] [CrossRef]
  58. Alotaibi, Y. Automated Business Process Modelling for Analyzing Sustainable System Requirements Engineering. In Proceedings of the 2020 6th International Conference on Information Management, London, UK, 27–29 March 2020; pp. 157–161. [Google Scholar]
  59. Suryanarayana, G.; Chandran, K.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A. Accurate Magnetic Resonance Image Super-Resolution Using Deep Networks and Gaussian Filtering in the Stationary Wavelet Domain. IEEE Access 2021, 9, 71406–71417. [Google Scholar] [CrossRef]
  60. Rout, R.; Parida, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. Skin Lesion Extraction Using Multiscale Morphological Local Variance Reconstruction BasedWatershed Transform and Fast Fuzzy C-Means Clustering. Symmetry 2021, 13, 2085. [Google Scholar] [CrossRef]
  61. Geetha, B.; Kumar, P.S.; Bama, B.S.; Neelakandan, S.; Dutta, C.; Babu, D.V. Green energy aware and cluster-based communication for future load prediction in IoT. Sustain. Energy Technol. Assess. 2022, 52, 102244–102256. [Google Scholar] [CrossRef]
  62. Rayen, S.J.; Arunajsmine, J. Social Media Networks Owing To Disruptions For Effective Learning. Procedia Comput. Sci. 2020, 172, 145–151. [Google Scholar] [CrossRef]
  63. Divyabharathi, S. Large scale optimization to minimize network traffic using MapReduce in big data applications. In Proceedings of the International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), Melmaruvathur, India, 20–21 April 2016; pp. 193–199. [Google Scholar] [CrossRef]
  64. Neelakandan, S.; Rene Beulah, J.; Prathiba, L.; Murthy GL, N.; Irudaya Raj, E.F.; Arulkumar, N. Blockchain with deep learning-enabled secure healthcare data transmission and diagnostic model. Int. J. Modeling Simul. Sci. Comput. 2022, 2241006. [Google Scholar] [CrossRef]
  65. Neelakandan, S.; Prakash, M.; Bhargava, S.; Mohan, K.; Robert, N.R.; Upadhye, S. Optimal Stacked Sparse Autoencoder Based Traffic Flow Prediction in Intelligent Transportation Systems. In Studies in Systems, Decision and Control; Springer: Cham, Switzerland, 2022; Volume 412. [Google Scholar] [CrossRef]
  66. Paulraj, D. A gradient boosted decision tree-based sentiment classification of twitter data. Int. J. Wavelets Multiresolution Inf. Process. 2020, 8, 205027. [Google Scholar] [CrossRef]
  67. Paulraj, D. An Automated Exploring and Learning Model for Data Prediction Using Balanced CA-SVM. J. Ambient. Intell. Humaniz. Comput. 2020, 12, 4979–4990. [Google Scholar] [CrossRef]
  68. Rajendran, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S. MapReduce-based big data classification model using feature subset selection and hyperparameter tuned deep belief network. Sci. Rep. 2021, 11, 24138. [Google Scholar] [CrossRef] [PubMed]
  69. Kavitha, M.; Babu, B.S.; Sumathy, B.; Jackulin, T.; Ramkumar, N.; Manimaran, A.; Walia, R.; Neelakandan, S. Convolutional neural networks-based video reconstruction and computation in digital twins. Intell. Autom. Soft Comput. 2022, 34, 1571–1586. [Google Scholar] [CrossRef]
  70. Pandey, O.J.; Hegde, R.M. Low-Latency and Energy-Balanced Data Transmission Over Cognitive Small World WSN. IEEE Trans. Veh. Technol. 2018, 67, 7719–7733. [Google Scholar] [CrossRef]
Figure 1. Overall process of the IMD-EACBR technique.
Figure 1. Overall process of the IMD-EACBR technique.
Sustainability 14 07712 g001
Figure 2. Flowchart of the TLBO technique.
Figure 2. Flowchart of the TLBO technique.
Sustainability 14 07712 g002
Figure 3. NLT analysis of the IMD-EACBR technique under various densities of SNs.
Figure 3. NLT analysis of the IMD-EACBR technique under various densities of SNs.
Sustainability 14 07712 g003
Figure 4. NOASN analysis of the IMD-EACBR technique under varying numbers of rounds.
Figure 4. NOASN analysis of the IMD-EACBR technique under varying numbers of rounds.
Sustainability 14 07712 g004
Figure 5. NODSN analysis of the IMD-EACBR technique under various numbers of rounds.
Figure 5. NODSN analysis of the IMD-EACBR technique under various numbers of rounds.
Sustainability 14 07712 g005
Figure 6. ECM analysis of the IMD-EACBR technique under various densities of SNs.
Figure 6. ECM analysis of the IMD-EACBR technique under various densities of SNs.
Sustainability 14 07712 g006
Figure 7. Throughput analysis of the IMD-EACBR technique under different densities of SNs.
Figure 7. Throughput analysis of the IMD-EACBR technique under different densities of SNs.
Sustainability 14 07712 g007
Figure 8. PDR analysis of the IMD-EACBR technique under different densities of SNs.
Figure 8. PDR analysis of the IMD-EACBR technique under different densities of SNs.
Sustainability 14 07712 g008
Figure 9. Cost function analysis of the IMD-EACBR technique compared to other methodologies.
Figure 9. Cost function analysis of the IMD-EACBR technique compared to other methodologies.
Sustainability 14 07712 g009
Table 1. Summary of existing approaches.
Table 1. Summary of existing approaches.
Reference NoPublished YearApproach AdvantagesDisadvantages
[11]2020Simulated annealing and genetic algorithm-based hybrid (SAGA-H)Self-organizationHigh communication cost
[12]2018Clustering and Sailfish Optimizer (SFO)Low communication costHigh latency
[13]2021Novel hybrid NN based energy-effective routing Load complementaryHigh latency, low scalability
[14]2021Cluster based routing (CBR) Fast convergence, low overheadLow coverage
[15]2022Robust cluster-based routing protocol (RCBRP) Minimum overhead, low latencyOnly uniform node distribution
[16]2021Stability-aware cluster-based routing (SACR) Support node heterogeneityLow scalability
[17]2022Metaheuristic artificial intelligence approach based on social behavior of grey wolvesProlongs network lifetimeNeeds parameter adjustments
Table 2. NLT analysis of the IMD-EACBR technique compared to other approaches under various densities of SNs.
Table 2. NLT analysis of the IMD-EACBR technique compared to other approaches under various densities of SNs.
Network Lifetime (Rounds)
Density of Sensor NodesIMD-EACBRSFO Alg.GWO Alg.Genetic Alg.ALO Alg.PSO Alg.
100171915931448141513491300
150195017391653155414421380
200213519561791170615471456
250243821742082181816921538
300259023922286200918711687
350284726562570235920621984
400309228872808264323792165
450328330983045295326302354
500350035013395326329662684
Table 3. NOASN study of the IMD-EACBR procedure compared to other methods for different numbers of rounds.
Table 3. NOASN study of the IMD-EACBR procedure compared to other methods for different numbers of rounds.
No. of Alive Sensor Nodes
No. of RoundsIMD-EACBRSFO Alg.GWO Alg.Genetic Alg.ALO Alg.PSO Alg.
2000468444404373295278
2250451408322260205154
250043939220517913254
27503853121761268533
30003372257025198
3250315176521052
350028513322000
Table 4. NODSN analysis of the IMD-EACBR technique compared to other models under various numbers of rounds.
Table 4. NODSN analysis of the IMD-EACBR technique compared to other models under various numbers of rounds.
No. of Dead Sensor Nodes
No. of RoundsIMD-EACBRSFO Alg.GWO Alg.Genetic Alg.ALO Alg.PSO Alg.
2000325696127205222
22504992178240295346
250061108295321368446
2750115188324374415467
3000163275430475481492
3250185324448490495498
3500215367478500500500
Table 5. ECM analysis of the IMD-EACBR technique compared to other models under different densities of SNs.
Table 5. ECM analysis of the IMD-EACBR technique compared to other models under different densities of SNs.
Energy Consumption (mJ)
Density of Sensor NodesIMD-EACBR SFO Alg.GWO Alg.Genetic Alg.ALO Alg.PSO Alg.
1000.0470.0780.1130.1530.2030.246
1500.1060.1490.1860.2310.3210.368
2000.1250.1930.2620.3230.4150.442
2500.2400.2710.3490.4310.5020.568
3000.2880.3370.4290.5230.5630.657
3500.4010.4170.5800.5730.6250.686
4000.4170.4760.5960.6580.7140.736
4500.4950.5090.6220.7050.7730.782
5000.5240.5610.6250.7540.8180.846
Table 6. Throughput analysis of the IMD-EACBR technique compared to other approaches under different densities of SNs.
Table 6. Throughput analysis of the IMD-EACBR technique compared to other approaches under different densities of SNs.
Throughput (Mbps)
Density of Sensor NodesIMD-EACBR SFO Alg.GWO Alg.Genetic Alg.ALO Alg.PSO Alg.
1000.9750.9340.8910.8610.8040.704
1500.9670.9300.8770.8050.7880.677
2000.9580.9160.8550.7810.7620.658
2500.9550.8950.8380.7710.7280.636
3000.9450.9030.8010.7450.6910.616
3500.9450.8780.7760.7070.6560.573
4000.9290.8440.7760.6920.6190.569
4500.9130.8300.7380.6670.5940.548
5000.9020.8190.7280.6320.5650.522
Table 7. PDR analysis of the IMD-EACBR technique compared to other approaches under different densities of SNs.
Table 7. PDR analysis of the IMD-EACBR technique compared to other approaches under different densities of SNs.
Packet Delivery Ratio (%)
Density of Sensor NodesIMD-EACBRSFO Alg.GWO Alg.Genetic Alg.ALO Alg.PSO Alg.
10098.8398.4096.4795.6594.3793.79
15098.4697.9096.4795.5494.0793.16
20098.4697.6496.4395.3593.7392.82
25098.2597.6896.3495.1393.5392.52
30098.0397.4096.1094.8193.2992.34
35097.6296.5895.8594.5092.8891.97
40097.1996.6095.3994.3592.7191.72
45096.9796.1595.0093.9492.5291.48
50096.5695.2094.6693.4792.3091.37
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Lakshmanna, K.; Subramani, N.; Alotaibi, Y.; Alghamdi, S.; Khalafand, O.I.; Nanda, A.K. Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks. Sustainability 2022, 14, 7712. https://doi.org/10.3390/su14137712

AMA Style

Lakshmanna K, Subramani N, Alotaibi Y, Alghamdi S, Khalafand OI, Nanda AK. Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks. Sustainability. 2022; 14(13):7712. https://doi.org/10.3390/su14137712

Chicago/Turabian Style

Lakshmanna, Kuruva, Neelakandan Subramani, Youseef Alotaibi, Saleh Alghamdi, Osamah Ibrahim Khalafand, and Ashok Kumar Nanda. 2022. "Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks" Sustainability 14, no. 13: 7712. https://doi.org/10.3390/su14137712

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop