Computer Systems Science & Engineering DOI:10.32604/csse.2022.020312 | |
Article |
Energy Efficient QoS Aware Cluster Based Multihop Routing Protocol for WSN
1Department of Computer Science and Engineering, GRT Institute of Engineering and Technology, Tiruttani, 631209, India
2Department of Information Technology, Kongu Engineering College, Erode, 638060, India
*Corresponding Author: M. S. Maharajan. Email: msmaharajan12017@gmail.com
Received: 19 May 2021; Accepted: 20 June 2021
Abstract: Wireless sensor networks (WSN) have become a hot research area owing to the unique characteristics and applicability in diverse application areas. Clustering and routing techniques can be considered as an NP hard optimization problem, which can be addressed by metaheuristic optimization algorithms. With this motivation, this study presents a chaotic sandpiper optimization algorithm based clustering with groundwater flow optimization based routing technique (CSPOC-GFLR). The goal of the CSOC-GFLR technique is to cluster the sensor nodes in WSN and elect an optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime. The CSPOC algorithm is derived by incorporating the concepts of chaos theory to boost the global optimization capability of the SPOC algorithm. The CSPOC technique elects an optimum set of cluster heads (CH) whereas the other sensors are allocated to the nearer CH. Extensive experimentation portrayed the promising performance of the CSPOC-GFLR technique by achieving reduced energy utilization, improved lifetime, and prolonged stability over the existing techniques.
Keywords: Clustering; routing; wireless sensor networks; energy efficiency; network lifetime; metaheuristics
The current development in the area of wireless communications, MEMS (microelectromechanical system), and digital electronics have led to the growth of microsensors. This small sensor comprises multifunction, transfer easily on shorter distance, requires lower power, and inexpensive [1]. The sensor nodes are accountable for sensing, processing, and delivering data to the base station (BS). They must operate together to create a wireless sensor network (WSN). A WSN comprises a huge amount of sensor nodes that are manually/arbitrarily placed in a provided coverage area. The nodes collect the local physical data, aggregate, and transmit them to BS named sink. For public notable events, the BS is linked to the internet. Rather than transmitting raw data to the node accountable for data fusion, the sensor node could utilize their functioning capabilities to execute evaluation, and fusion operation is to transfer the required data [2]. This feature of wireless sensor allows utilizing in several fields particularly for monitoring and surveillance.
Related to conventional methods of environmental observing, WSN method is a significant green technique for the upcoming detection effectively in the environment variations. The WSN for monitoring environments comprises of huge amount of lower cost battery powered sensor nodes, closely placed through a remote/inaccessible physical space [3,4]. But the major problem is the restricted power assets of sensor nodes. It isn’t real-world for recharging the nodes battery/interchange them once whole depletion of their energies are placed in hostile environment. Thus, when conventional network aims to attain higher level QoS, the sensor network protocol should emphasize mainly energy conservation for maximizing network lifespan. Implementation of energy efficient clustering and routing methods is one of the significant challenges between them. Clustering in WSN comprises combination of effective sensor nodes to different clusters; every cluster has single leader named cluster head (CH). The CH collects the information from every equivalent member, processes it, and sends them to BS. Every sensor node belongs to single cluster and communicates with CH. Then, CH selection requires to be accurately tackled to balance the energy consumption of CH; or else, they will pass away fast because of additional workload to information forwarding and aggregations. Each cluster based routing technique selects primarily the CH arbitrarily or likelihoods and later creates the cluster. But every CH could be placed in a smaller network area and few regular nodes would be separated that might affect network dysfunctions.
Hierarchical routing is an effective manner to reduce energy consumption with the cluster and execute data aggregation. It enables combining tasks for reducing transmit packet amount to the sink [5,6]. An accurate protocol should contain mechanism to save energy in the node as recharging their battery is typically hard, impossible, or risky. Each aspect of the node from the hardware to their executed operation would assist in distributing energy load. Due to hierarchical routing have various parts to assist distinguished possible phases in protocol operation, the presence of 2 operations modes in the sensor could predict high energy costs. But, various communication modes like CH and standard sensors could be useful when executed in all layers. Alternatively, metaheuristic approaches are the optimization systems that can resolve the difficult system. These methods are stimulated by this precise knowledge of biological/social processes that form an abstraction level that could be assumed as search approaches. Few instances of common metaheuristic approach include Genetic Algorithms, Particle Swarm Optimization (PSO), Differential Evolution (DE), Artificial Bee Colony (ABC), Flower Pollination Algorithm (FPA), and Gravitational Search Algorithm (GSA). The Metaheuristic system doesn’t continuity differentiability, require convexity, or particular early condition that corresponds to significant benefits related to other methods. In spite of stimulating outcomes, these search approaches preserve various problems while they are employed to higher multi modal optimization problems [7–9].
This study presents a chaotic sandpiper optimization algorithm based clustering with groundwater flow optimization based routing technique (CSPOC-GFLR). The CSOC-GFLR technique aims to construct clusters and choose optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime. The CSPOC algorithm is derived by incorporating the concepts of chaos theory to boost the global optimization capability of the SPOC algorithm. The CSPOC technique elects an optimum set of cluster heads (CH) whereas the other sensors are allocated to the nearer CH. A comprehensive set of simulations take place to exhibit the significant performance of the CSPOC-GFLR technique interms of different measures.
Gupta et al. [10] proposed genetic algorithm (GA) based method to cluster and routing in WSN. The clustering is depending upon residual energy of gateway and distance from sensor node to their matching CH. The routing system is depending upon residual energy of gateway together with trade off among communication distance and number of forwards. They execute broad simulation of presented method and relate the simulations outcome with the present technique. Shankar et al. [11] utilize distinct PSO-LEACH and Harmony Search Algorithm (HSA) methods. This technique contains exploitation and exploration trade off with local search HSA limitation. To attain a global search with quicker convergence, hybrid of PSO and HSA methods are presented for selecting energy efficiency CH. The introduced technique demonstrates higher search effectiveness of HSA and dynamic capability of PSO enhances the lifespan of sensor nodes. The efficiency of hybrid method is calculated by the number of alive nodes, residual energy, amount of dead nodes, and throughput.
Oladimeji et al. [12] proposed a new Heuristic Algorithm for Clustering Hierarchy (HACH) that are consecutively executes selection of inactive and CH nodes at all rounds. The inactive node selection utilizes a random sleep scheduling method for determining the node selection which could be placed to sleep mode without harmfully influencing the network coverage. Similarly, the clustering method utilizes a new heuristic crossover function for combining 2 distinct solutions to attain an enhanced solution which improves the distribution of CH nodes and manages energy consumption in WSN. Mann et al. [13] proposed an improved Artificial bee colony (iABC) metaheuristic, with an enhanced search formula that is capable of searching for an optimum solution to develop its exploitation capacity and population sample by utilizing initial type of compact Student’s t-distribution for enhancing global convergences of the presented metaheuristic. Additionally, to exploit the capacity of the presented metaheuristic, an energy efficient bee clustering protocol (EEBC) dependent iABC metaheuristic was established that select optimum CH with energy efficiency method in WSN.
Zachariah et al. [14] presented HECK and HOCK a new energy efficient clustering method for increasing the network lifespan for heterogeneous and homogeneous platforms, correspondingly. This method is created by Cuckoo search and Krill herd. When the optimum cluster centroid locations are calculated by the Krill herd method, and the Cuckoo search is employed for selecting the optimum CH. The efficiency of HOCK method is calculated by the variation of BS position and node density. For evaluating HECK method, 2 and 3 levels of heterogeneity are deliberated. In Idrees et al. [15], a protocol named distributed GA for lifetime coverage optimisation (DiGALCO) is recommended for preserving the coverage and improve the lifespan of WSN. The DiGALCO integrates 3 energy efficiency systems: virtual network section to sub domains, distributed CH selection in every subfield, following sensor activity scheduling based genetic algorithm (GA) optimisation executed by every CH. The DiGALCO is working to round. Every round comprises 3 stages: sensing, CH selection, discovery, and GA decision.
In Bhushan et al. [16], a method called fuzzy attribute based joint integrated scheduling and tree formation (FAJIT) approach for tree formation and parent node selection by utilizing FL in heterogeneous networks was projected. The FAJIT is mostly concentrating on tackling the parent node selection problem in heterogeneous networks to aggregate various kinds of data packets for improving energy efficient. The parent node selection is executed depending upon candidate node with least amount of dynamic neighbors. The FL is employed in the event of an equivalent amount of dynamic neighbors. In the presented method, FL is initially employed to WSN, and later min and max normalization are utilized for retrieving the normalization weight (i.e., membership value) for the provided graph edge. This membership value is exploited for representing the degree of a component belonging to a group. Thus, the node with least number of weights is assumed by the parent node. Though several models are existed in the literature, there is still needed to design a new technique to accomplish improved energy efficiency and network lifetime. Therefore, this paper designs the CSOC-GFLR technique aims to construct clusters and choose optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime.
In this study, the sensor nodes are arbitrarily distributed in a 2D region; The BS is available in the center of the monitoring region and has limitless power; each sensor node and BS are fixed; all nodes could alter their transmission range and calculate distance [17]; all sensor nodes have single ID and recognize its individual position; every sensor nodes have restricted power; all clusters have 2
where
Consumed energy of getting
where
4 The Proposed CSPOC-GFLR Technique
The workflow involved in the CSPOC-GFLR technique is demonstrated in Fig. 1. Usually, the sensor nodes in WSN are randomly positioned in the target area and the nodes get initialized to aware of the neighboring nodes [19–22]. Followed by, the CPSOC based clustering technique is applied to cluster the nodes and elect an optimal set of CHs. Then, the GFLR based routing technique is involved to choose optimal route for inter cluster transmission. When the routes are elected, the CMs send the sensed data to CHs and the CHs forwards it to BS via the intercluster communication.
4.1 CPSOC Based Clustering Technique
At this stage, the CPSOC algorithm is executed to determine an optimal set of CHs and organize clusters. Sandpipers are seabirds that could be made around the world. There are extensive sandpiper species with distinct lengths and masses. They consist of fish, earthworms, amphibians, reptiles, omnivorous, and eat insects, etc. They are highly sharper birds. They used bread crumbs for hunting fishes and experts in making rain like sounds by their feet to hunt for underground earthworms. Furthermore, it contains an uncommon pair of glands right above their eyes that assist to flush the extra salt from their system. Commonly, they live in groups. They utilized their knowledge for finding and attacking the prey [23]. An essential thing regarding sandpipers is their attacking and migrating behaviors. The Migration is determined by cyclic motion of sandpipers from one place to other for locating rich food and source that would give enough energy. It is given by:
• In migration, they travel in a group. The early location of sandpipers is distinct to prevent the collision among them.
• In a group, sandpipers could be traveling to the path of an optimum survival fittest sandpiper that is a sandpiper fitness value1 is lower than other.
• According to fittest sandpiper, another sandpiper could upgrade their early location.
It often attacks the migrating birds on sea while they migrate from one side to the other. They could create spiral natural shape motion in attacking. Such behavior is equated in this manner related to decision criterion should be improved. This creates it probable to equate a novel technique. Fig. 2 illustrates the flowchart of SOA. The scientific module of attack and migrating behaviors are deliberated below.
4.1.1 Migration Behavior (Exploration)
This method examines the set of sandpipers that moves from one place to other in migration. In this phase, a sandpiper must fulfill the succeeding 3 scenarios:
Collision avoidance: Further parameter
where
where,
where
Converge in the direction of an optimum neighbor: In collision avoidance, the search agent converges (move) to the direction of optimum neighbor.
where
where
Upgrade regarding optimism search agent: Lastly, the search agent/sandpiper could upgrade its location equivalent to optimum search agent.
where
4.1.2 Attacking Behavior (Exploitation)
In migration, sandpipers could always alter their angle and speed of attack. They utilize their wings for increasing altitude. It creates the spiral behavior, when attacking prey, in the air. This behavior in three-dimension plane is given by.
where
where
4.1.3 Design of CSPO Algorithm
In order to improve the performance of the SPO algorithm, chaos concept is integrated into it. Chaos is an unstable condition/dynamic behavior that is highly sensitive in early conditions. It has been employed in several optimization techniques for avoiding traps in local optimal and enhance the quality of solution. The metaheuristic technique is depending upon 2 methods: exploration and exploitation. By exploitation, the search is created for an optimum solution, where the exploration enables search for an effective solution [24]. The chaos is introduced to metaheuristic technique for striking a balance among exploitation and exploration, hence it efficiently attains an optimum solution. The chaos is included in GFLR method for obtaining enhanced features for exploitation and exploration in every search space and improves the efficiency of the recommended method in detecting an optimum global solution. The Chaotic map is utilized in determining the location of
where
4.1.4 Process Involved in CSPO Based Clustering Technique
Let
The local density
where
where
where
The weight coefficient of evaluated factor fulfills
4.2 GFLR Based Routing Technique
The GFL algorithm is based on the movement of groundwater from recharging regions to discharging regions stimulating the concept of Darcy’s law. A major idea of GFL algorithm is the flow of ground water is mainly directed by Darcy’s law [25]. Earlier works explored that the velocity of the groundwater flows highly based on height difference and gap in position. Once the function undergo initiation, the candidate solution can be defined by
where
where (0) defines the initial velocity of the candidate solution. Next to the initialization process, the position update takes place using the groundwater flow rules and Darcy’s law. Groundwater is majorly supported by height difference (∆h) and gap length (L). Then, the present candidate solution can be mathematically represented using the present functional values, as defined in Eq. (23):
where D is denotes the chosen Discharged region. R and t signify the discharge area water flow and ground water flow correspondingly. The discharge velocity is directly proportional to the Hydraulic gradient (hg), as defined in the following
The production of
where GW is the number of ground water, Itern represents the number of rounds, dim indicates the dimensionality count in the objective function. Fig. 3 demonstrates the flowchart of GFL.
The main principle of GFLR is for finding new route from CHS to BS. The new path is recognized by utilizing GFLR as FF metric that is included of RE, distance to BS (DTBS), and NDE.
At the initialization stage, all FFs determine fittest solution to implemented problem. In routing, all FFs imply the data forwarding route in CH to sink node. The importance of FF is related to CH accessible from the network, and additional location is added to sink. The supremacy of FF is similar to
Euclidean Distance can be represented as distance among CH to next hop and sink. If the distance is minimal after the power utilization rate is also decreased. The second objective is for minimizing the distance amongst CHs to sink measured by,
ND It implies the count of nodes in next-hop. When next-hop is contained of restricted CH members, after it utilizes minimum energy in gained data in neighboring members and stays alive to longer duration. Then, the next-hop with restricted node degree is elected prominently. Lastly, NDE is determined interms of node degree of
Afterward, the weighted sum model is implemented to each sub objective and converted as single objective as represented in Eq. (28). Now
This section examines the performance of the proposed CSPOC-GFLR technique with other existing techniques. The proposed model is simulated using MATLAB R2014. The results are examined under varying number of nodes. In addition, the performance of the CSPOC-GFLR technique is investigated interms of network lifetime (NLT), total energy consumption (TEC), throughput, normalized overhead (NOH), and end to end (ETE) delay. A brief comparative study of the CSPOC-GFLR technique with state of art methods [26,27] takes place interms of NLT, TEC, and throughput as shown in Tab. 1.
Fig. 4 investigates the NLT analysis of the CSPOC-GFLR technique with existing ones under varying node count. The figure demonstrated that the ATEER technique has offered an insignificant outcome with the minimum NLT over the other methods. Similarly, the OQoS-CMRP technique has showcased certainly increased NLT over the ATEER technique. Likewise, the FUCHAR technique has portrayed somewhat improved NLT over the previous methods. But the proposed CSPOC-GFLR technique has gained maximum NLT over the existing methods under different node count. Particularly, the CSPOC-GFLR technique has resulted in a higher NLT of 24284 s, 23754 s, 21299 s, 19949 s, and 18852 s under the varying node count of 100–500.
An extensive TEC analysis of the CSPOC-GFLR technique with compared methods is provided in Fig. 5. From the figure, it is apparently clear that the ATEER technique has appeared as a worse performance which has obtained maximum TEC. At the same time, the OQoS-CMRP technique has accomplished slightly decreased TEC over the ATEER technique. Simultaneously, the FUCHAR technique has demonstrated competitive outcome with the moderately lower TEC. However, the CSPOC-GFLR technique has resulted in a minimum TEC over the existing methods. Specially, the CSPOC-GFLR technique requires the least TEC of 3.14 J, 4.33 J, 6.37 J, 7.30 J, and 10.14 J under varying number of 100–500 nodes.
A detailed throughput analysis of CSPOC-GFLR technique with existing techniques takes place in Fig. 6. The figure reported that the existing ATEER technique has attained lowest throughput under varying simulation time. Moreover, the OQoS-CMRP technique has obtained slightly increased throughput over the ATEER technique, but not than FUCHAR and CSPOC-GFLR techniques. Though the FUCHAR technique has accomplished reasonable throughput, the CSPOC-GFLR technique shows promising results by demonstrating maximum throughput. For instance, the CSPOC-GFLR technique has achieved a higher throughput of 56.36 kbps,61.96 kbps, 64.59 kbps, 70.27 kbps, and 72.43 kbps under varying simulation time of 200–1000 s.
Tab. 2 examines the NOH and ETE delay analysis of the CSPOC-GFLR technique under varying nodes and simulation time. A comprehensive NOH analysis of the CSPOC-GFLR technique with existing techniques takes place in Fig. 7. The figure portrayed that the ATEER technique has exhibited least outcome and offered highest NOH compared to other methods. Eventually, the OQoS-CMRP technique has depicted somewhat reduced NOH over the ATEER technique. Concurrently, the FUCHAR technique has displayed reasonable performance with the considerably minimal NOH. But, the CSPOC-GFLR technique has outperformed the other methods by offering the least NOH over the existing methods. For instance, the CSPOC-GFLR technique requires the least NOH of 1.97, 2.56, 3.14, 4.79, and 3.51 under varying number of 100–500 nodes.
Finally, a complete ETE delay analysis of CSPOC-GFLR technique is investigated in Fig. 8. From the figure, it is noticed that the ATEER technique has resulted in a maximum ETE delay under different simulation times. Meanwhile, the OQoS-CMRP technique has gained somewhat decreased ETE delay over the ATEER technique except for FUCHAR and CSPOC-GFLR techniques. Though the FUCHAR technique has resulted to considerably lower throughput, the CSPOC-GFLR technique achieves significant performance with the least ETE delay under varying simulation times. For instance, the CSPOC-GFLR technique has achieved the lowest ETE delay of 0.01314 ms, 0.02002 ms, 0.01983 ms, 0.01354 ms, and 0.01985 ms under varying simulation time of 200–1000 s. The experimental results stated that the proposed model outperformed the existing techniques due to the following reasons: CSPOC based clustering and GFLR based routing process. Besides, the CSPOC algorithm is derived by incorporating the concepts of chaos theory to boost the global optimization capability of the SPOC algorithm.
This study has developed a novel CSPOC-GFLR technique to construct clusters and choose optimal set of routes with an intention of achieving energy efficiency and maximizing network lifetime. The CSPOC-GFLR technique involves two major phases namely CSPOC based clustering and GFLR based routing process. The CSPOC algorithm is derived by incorporating the concepts of chaos theory to boost the global optimization capability of the SPOC algorithm. A comprehensive set of simulations take place to exhibit the significant performance of the CSPOC-GFLR technique interms of different measures. The experimental outcomes portrayed the promising performance of the CSPOC-GFLR technique by achieving reduced energy utilization, improved lifetime, and prolonged stability over the existing techniques. As a part of future work, the CPSOC-GFLR technique can be deployed in a real time physical environment. Besides, data aggregation and scheduling techniques can be introduced to boost the overall network performance.
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. A. Jorio, S. El Fkihi, B. Elbhiri and D. Aboutajdine, “An energy-efficient clustering routing algorithm based on geographic position and residual energy for wireless sensor network,” Journal of Computer Networks and Communications, vol. 2015, no. 8, pp. 1–11, 2015. [Google Scholar]
2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002. [Google Scholar]
3. J. Uthayakumar, T. Vengattaraman and P. Dhavachelvan, “A new lossless neighborhood indexing sequence (NIS) algorithm for data compression in wireless sensor networks,” Ad Hoc Networks, vol. 83, no. 2009, pp. 149–157, 2019. [Google Scholar]
4. J. Uthayakumar, T. Vengattaraman and J. Amudhavel, “Data compression algorithm to maximize network lifetime in wireless sensor networks,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, pp. 2156–2167, 2017. [Google Scholar]
5. A. Rodríguez, C. Del-Valle-Soto and R. Velázquez, “Energy-efficient clustering routing protocol for wireless sensor networks based on yellow saddle goatfish algorithm,” Mathematics, vol. 8, no. 9, pp. 1515, 2020. [Google Scholar]
6. M. Elhoseny, R. S. Rajan, M. Hammoudeh, K. Shankar and O. Aldabbas, “Swarm intelligence-based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 16, no. 9, pp. 1–12, 2020. [Google Scholar]
7. G. Kadiravan, A. Sariga and P. Sujatha, “A novel energy efficient clustering technique for mobile wireless sensor networks,” in 2019 IEEE Int. Conf. on System, Computation, Automation and Networking (ICSCANPondicherry, India, pp. 1–6, 2019. [Google Scholar]
8. S. Arjunan and P. Sujatha, “Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol,” Applied Intelligence, vol. 48, no. 8, pp. 2229–2246, 2018. [Google Scholar]
9. Y. Liang and Y. Li, “An efficient and robust data compression algorithm in wireless sensor networks,” IEEE Communication Letters, vol. 18, no. 3, pp. 439–442, 2014. [Google Scholar]
10. S. K. Gupta and P. K. Jana, “Energy efficient clustering and routing algorithms for wireless sensor networks: GA based approach,” Wireless Personal Communications, vol. 83, no. 3, pp. 2403–2423, 2015. [Google Scholar]
11. T. Shankar, S. Shanmugavel and A. Rajesh, “Hybrid HSA and PSO algorithm for energy efficient cluster head selection in wireless sensor networks,” Swarm and Evolutionary Computation, vol. 30, no. 4, pp. 1–10, 2016. [Google Scholar]
12. M. O. Oladimeji, M. Turkey and S. Dudley, “HACH: Heuristic algorithm for clustering hierarchy protocol in wireless sensor networks,” Applied Soft Computing, vol. 55, no. 6, pp. 452–461, 2017. [Google Scholar]
13. P. S. Mann and S. Singh, “Improved artificial bee colony metaheuristic for energy-efficient clustering in wireless sensor networks,” Artificial Intelligence Review, vol. 51, no. 3, pp. 329–354, 2019. [Google Scholar]
14. U. E. Zachariah and L. Kuppusamy, “A hybrid approach to energy efficient clustering and routing in wireless sensor networks,” Evolutionary Intelligence, pp. 1–13, 2021. https://doi.org/10.1007/s12065-020-00535-0. [Google Scholar]
15. A. K. Idrees and W. L. A. Yaseen, “Distributed genetic algorithm for lifetime coverage optimisation in wireless sensor networks,” International Journal of Advanced Intelligence Paradigms, vol. 18, no. 1, pp. 3, 2021. [Google Scholar]
16. S. Bhushan, M. Kumar, P. Kumar, T. Stephan, A. Shankar et al., “FAJIT: A fuzzy-based data aggregation technique for energy efficiency in wireless sensor network,” Complex & Intelligent Systems, vol. 7, no. 2, pp. 997–1007, 2021. [Google Scholar]
17. F. Zhu and J. Wei, “An energy-efficient unequal clustering routing protocol for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 15, no. 9, pp. 1–15, 2019. [Google Scholar]
18. S. Soro and W. B. Heinzelman, “Prolonging the lifetime of wireless sensor networks via prolonging the lifetime of wireless sensor networks via,” in 19th IEEE Int. Parallel and Distributed Processing Sym., Denver, CO, USA, pp. 236b, 2005. [Google Scholar]
19. M. S. Maharajan, T. Abirami, I. V. Pustokhina, D. A. Pustokhin and K. Shankar, “Hybrid swarm intelligence based QoS aware clustering with routing protocol for WSN,” Computers Materials & Continua, vol. 68, no. 3, pp. 2995–3013, 2021. [Google Scholar]
20. G. Kadiravan, P. Sujatha, T. Asvany, R. Punithavathi, M. Elhoseny et al., “Metaheuristic clustering protocol for healthcare data collection in mobile wireless multimedia sensor networks,” Computers Materials & Continua, vol. 66, no. 3, pp. 3215–3231, 2021. [Google Scholar]
21. T. Vaiyapuri, V. S. Parvathy, V. Manikandan, N. Krishnaraj, D. Gupta et al., “A novel hybrid optimization for cluster-based routing protocol in information-centric wireless sensor networks for IOT based mobile edge computing,” Wireless Personal Communications, vol. 49, pp. 145, 2021. [Google Scholar]
22. G. N. Nguyen, N. H. Le Viet, A. F. S. Devaraj, R. Gobi and K. Shankar, “Blockchain enabled energy efficient red deer algorithm based clustering protocol for pervasive wireless sensor networks,” Sustainable Computing: Informatics and Systems, vol. 28, pp. 100464, 2020. [Google Scholar]
23. A. Kaur, S. Jain and S. Goel, “Sandpiper optimization algorithm: A novel approach for solving real-life engineering problems,” Applied Intelligence, vol. 50, no. 2, pp. 582–619, 2020. [Google Scholar]
24. O. S. Qasim, N. A. Al-Thanoon and Z. Y. Algamal, “Feature selection based on chaotic binary black hole algorithm for data classification,” Chemometrics and Intelligent Laboratory Systems, vol. 204, pp. 104104, 2020. [Google Scholar]
25. D. C. Secui, C. Hora, G. Bendea and C. Bendea, “Parameter estimation using a modified whale optimization algorithm for input-output curves of thermal and hydro power plants,” International Transactions on Electrical Energy Systems, vol. 30, no. 2, pp. 191, 2020. [Google Scholar]
26. O. Deepa and J. Suguna, “An optimized QoS-based clustering with multipath routing protocol for Wireless Sensor Networks,” Journal of King Saud University—Computer and Information Sciences, vol. 32, no. 7, pp. 763–774, 2020. [Google Scholar]
27. S. Arjunan and P. Sujatha, “Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol,” Applied Intelligence, vol. 48, no. 8, pp. 2229–2246, 2018. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |