iconOpen Access

ARTICLE

Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks

by S. Nithya Roopa1, P. Anandababu2,*, Sibi Amaran3, Rajesh Verma4

1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, 641049, India
2 Department of Computer and Information Science, Faculty of Science, Annamalai University, Chidambaram, 608002, India
3 Department of Computing Technologies, SRM Institute of Science and Technology, Chennai, 603203, India
4 Department of Electrical Engineering, King Khalid University, Abha, 61411, Kingdom of Saudi Arabia

* Corresponding Author: P. Anandababu. Email: email

Computer Systems Science and Engineering 2023, 45(1), 497-512. https://doi.org/10.32604/csse.2023.029133

Abstract

Recently, energy harvesting wireless sensor networks (EHWSN) have increased significant attention among research communities. By harvesting energy from the neighboring environment, the sensors in EHWSN resolve the energy constraint problem and offers lengthened network lifetime. Clustering is one of the proficient ways for accomplishing even improved lifetime in EHWSN. The clustering process intends to appropriately elect the cluster heads (CHs) and construct clusters. Though several models are available in the literature, it is still needed to accomplish energy efficiency and security in EHWSN. In this view, this study develops a novel Chaotic Rider Optimization Based Clustering Protocol for Secure Energy Harvesting Wireless Sensor Networks (CROC-SEHWSN) model. The presented CROC-SEHWSN model aims to accomplish energy efficiency by clustering the node in EHWSN. The CROC-SEHWSN model is based on the integration of chaotic concepts with traditional rider optimization (RO) algorithm. Besides, the CROC-SEHWSN model derives a fitness function (FF) involving seven distinct parameters connected to WSN. To accomplish security, trust factor and link quality metrics are considered in the FF. The design of RO algorithm for secure clustering process shows the novelty of the work. In order to demonstrate the enhanced performance of the CROC-SEHWSN approach, a wide range of simulations are carried out and the outcomes are inspected in distinct aspects. The experimental outcome demonstrated the superior performance of the CROC-SEHWSN technique on the recent approaches with maximum network lifetime of 387.40 and 393.30 s under two scenarios.

Keywords


1  Introduction

Wireless Sensor Network (WSN) contains autonomous, wireless, networked sensing, spatially distributed devices that are utilized for monitoring a physical space [1]. WSN utilized for environment monitoring, includes disaster monitoring, animal or plant tracking, air quality monitoring, and water quality monitoring. This environment monitoring WSN, otherwise known as “field system,” frequently comprise multiple sensors shared in the environment as well as a local gateway node that collects the information for storage or to transfer the information to a remote server. Newly, several researchers are working on different aspects of energy harvesting WSNs (EHWSNs) [2]. It plays a vital role in several applications, besides, in EHWSNs, sensor nodes (SNs) are harvest energy in the environments [3]. In this system, the sensors are battery-operated, lower-cost devices with the capacity to sense the certain environment parameter needed by the application and transmit the gathered information to the local gateway for storage and processing. Therefore, sensors consist of a wireless transceiver, the sensor(s), memory, a battery to power the node, and a micro-controller. Fig. 1 illustrates the process of energy harvesting in WSN.

images

Figure 1: Energy harvesting in WSN

While running on batteries, the short lifetime of the sensors is major problem in executing WSN for environment monitoring applications [4]. In most of these applications, it can be hard to change the battery of node frequently, and when sensors deplete its battery, that node could be considered dead. In the past few decades, authors have focused on developing energy saving techniques to minimalize the power utilization of the sensors at the medium access (MAC), routing, and physical (PHY) layers. To resolve the problem of the constraint power supply to sensors driven by battery, new WSN platform that assists the energy harvesting from the immediate surrounding has been proposed [5]. Furthermore, the renewable energy system is the most promising way to resolve the EE problem of EHWSN situated in remote and rural regions. In the terrain profile, it can be hard to replace batteries because of geographical limitations (difficult terrain), that make access to this site [6].

The harvested energy is transformed into electrical signal that is either stored or consumed directly for future use. For instance, using solar panels to charge a rechargeable battery in the daytime [7]. Renewable energy technique is related to energy estimation systems for astute energy management. Therefore, it is necessary for undertaking inept power-saving mechanisms along with renewable energy techniques for attaining a higher reliability condition [8]. The sensor might integrate dynamic behaviour tendency in the face of the evaluated energy not being capable of sustaining them in the following recharge cycle. Therefore, it can be optimized decisive parameters including duty cycling, sampling rate, and transmit power to adopt the power utilization based on the magnitude and periodicity of the harvestable resource [9]. At the same time, it is justified to assign sensors with high residual energy with shorter RF range and bigger sleep duration, where, those with higher residual energy are carefully chosen as the preferred routing path [10]. But effort has not been made to propose protocol considering battery degradation over time (storage loss, leakage) that impacts the performance of EHWSN.

This study develops a novel Chaotic Rider Optimization Based Clustering Protocol for Secure Energy Harvesting Wireless Sensor Networks (CROC-SEHWSN) model. The presented CROC-SEHWSN model aims to accomplish energy efficiency by clustering the nodes in EHWSN. The CROC-SEHWSN technique was based on the integration of chaotic concepts with traditional rider optimization (RO) algorithm. Besides, the CROC-SEHWSN model derives a fitness function (FF) involving 7 distinct parameters related to WSN. For demonstrating the enhanced performance of the CROC-SEHWSN technique, a wide range of simulations were carried out and the outcomes are inspected under distinct aspects.

The rest of the paper is organized as follows. Section 2 offers a detailed review of existing clustering techniques for EHWSN. Next, Section 3 discusses the proposed model and Section 4 offers performance validation. Lastly, Section 5 concludes the paper.

2  Literature Review

Several clustering techniques for EHWSN is available in the literature [710]. Bao et al. [11] proposed a structure of software-defined EHWSN (SD-EHWSN) for collaborative beamforming (CB) communication. In detail, it can be initial design the process of CB communication dependent upon the software-defined network (SDN) infrastructure for reducing the communications and computational overhead of SN. Afterward, it can be assumed that solar energy-harvesting model for achieving long-term function of WSN and employ a stationary Markov (SM) chain for modeling the arriving procedure of solar energy. Garg [12] presented an optimized technique dependent upon metaheuristic, for enhancing the energy efficiency of increase and forward relay IoT network. The energy constraint relay exploits power-splitting based relay protocol for acquiring energy in source and transmission data to target. It is developed expression to energy efficiency of scheme utilizing the throughput at target and outage probability to performance estimate.

Al-Otaibi et al. [13] progressed a hybridization of meta-heuristic cluster based routing (HMBCR) approach for WSN. The HMBCR approach primarily contains a brainstorm optimization with levy distribution (BSO-LD) based clustering method utilizing a FF integrating 4 parameters like distance to neighbors, network load, energy, and distance to base station (DBS). In addition, the water wave optimization with hill climbing (WWO-HC) based routing procedure was executed to an optimum route selection. Rathore et al. [14] presented the hybrid whale and grey wolf optimization (WGWO) based cluster process to EHWSNs. During this study, it can be utilized 2 metaheuristic techniques such as whale and grey wolf for increasing the efficacy of clustering process. The exploitation as well as exploration abilities of the presented hybrid WGWO technique are significantly greater than the typical several present meta-heuristic techniques in the estimation of the technique.

Lin et al. [15] examine a New Harmony search algorithm with multiple populations and local search (HSAML) to this issue with heterogeneity, dynamics, and EH sensor. With simulating, the stability, network lifespan, and implementing time of presented technique are examined. In the experimental outcomes, the presented HSAML executes superior to the conventional technique. Han et al. [16] presented a clustering process for EHWSN (CPEH) which considers the variety of EH capability amongst sensors from both cluster development and inter-cluster transmission. It proceeds the node data namely local density, local energy state, and remote degree as to account for and utilize fuzzy logic (FL) for conducting the CH selective and cluster size allocating. In the meantime, the ACO as a reinforcement learning (RL) approach was employed by CPEH for discovering an extremely effectual inter-cluster routing. Nair et al. [17] utilize 4 varieties of bio-inspired techniques for attaining the maximal EH assuming parameter of PS ratio, amplitude, and phase imbalance from the Rayleigh fading environments.

3  The Proposed Model

This study has developed a novel CROC-SEHWSN model for accomplishing maximum energy efficiency in the EHWSN. The proposed CROC-SEHWSN model is based on the integration of chaotic concepts with conventional RO algorithm. In addition, the CROC-SEHWSN model has derived a FF comprising seven different parameters related to WSN. For accomplishing secrecy, trust factor and link quality metrics are considered in the FF. Fig. 2 illustrates the overall block diagram of CROC-SEHWSN technique.

images

Figure 2: Overall block diagram of CROC-SEHWSN technique

3.1 System Model

For energy harvesting, we assumed that sensor could endlessly harvest energy from the nearby environment at a constant rate. But because of the hardware diversity and location, the energy harvesting rate differs between sensors. Usually, sensor harvests the energy from vibration or heat of the machine, we believed that this assumption is practical for the EHWSN utilized in Industry 4.0. Then utilize harvest-use mechanism to define the energy obtainability of sensor. The harvested energy is immediately utilized minimizes the difficulty of energy management and easier to implement. Then, apply the traditional radio energy dissipation [18]. The sender consumes energy for running the power amplifier and the radio electronics, where the receiver dissipates energy for running the radio electronics. Representing the packet size as l bits and the transmission distance as d; the energy cost of transmitter (Etx) and receiver (Erx) a packet is given in the following:

Etx(l,d)={Eelecl+Efsd2l,d=x< d0,Eelecl+Empd4l,d>d0, (1)

Erx(l,d)=Eelecl, (2)

whereas Eelec denotes the energy cost for each bit by the radio electronics of transmitting and receiver and Efs ⋅ d2 and Emp ⋅ d4 represents the energy required for each bit for the power amplifier in the free space channel (d2) and the multipath channel (d4). d0 denotes the threshold distance as follows

d0=EfsEmp. (3)

Noted that Eelec,  Efs, and Emp depends on the transceiver character and the acceptable bit-error rate. IT must be carefully set. For aggregating data, assume the CH consumes Eda energy to manage one-bit data and the cluster has W sensors (CH), the energy dissipation for CH in the aggregation process as follows

Eagg=lWEda. (4)

3.2 Overview of CRO Algorithm

RO algorithm is a popular optimization that includes four-rider groups namely follower, bypass rider, attacker, and over-taker.

•   Bypass riders bypass the leading path to attain the destination.

•   Follower follows the leading rider to attain the target.

•   The over-taker takes its own location to attain the destination.

•   The attacker attempts to attain the destination with the highest speed.

It is started by 4 rider groups Gr, which can be accurately shown in Eq. (5), in which U represent the rider count i.e., analogous to Gr, the dimension or count of coordinates is represented as J,Dt(i,j) ith rider’s position at the time.

Dt={Dt(ij)};1iU;1jJ. (5)

The rider count is determined in Eq. (6), where, the count of bypass rider is represented as By, Follower count is represented as Fl, the count of over-taker is represented as Ot and the attacked count is represented by Ak. The relationship amongst the variables is shown in the following.

H=By+Fl+Ot+Ak. (6)

By=Fl=Ot=Ak=H/4. (7)

The steering angle at the time t is provided below, where Sit(i,j ) denotes the steering angle of i rider vehicle. Eq. (9) determines the first steering angle, where the location angle of ith rider vehicle is represented by θj, and the co-ordinate angle is given as ϕ. The coordinate angle defines the steering angle as follows [19].

Sit={Siit};1iU;1jJ. (8)

Sii,j={θiifj=1Siij¨+φifj1&Sii,i+φ360Siij+φ360otherwise (9)

φ=360J. (10)

Therefore, the initialization of brake, gear, and accelerator is modelled in the following. The gear of i rider vehicle is represented as Ai. The accelerator of i rider vehicle was represented as Bi and the brake of i rider vehicle is Ci.

A={Ai}1iU. (11)

B={Bi}1iU. (12)

C={Ci}1iU. (13)

The success rate of rider was calculated afterward initializing the rider group and parameter. For estimating the success rate, distance is the main parameter calculated between the rider destination and the position. Now, the location of i rider is represented as Di and KSi indicates the target location.

ri=1DiKSi. (14)

Determine leading rider: the success rate performs a significant role. However, it isn’t a constant factor. Since the location of the rider changes at each time step.

The location of rider group is upgraded: The bypass rider doesn’t go after other riders. Hence, the location upgraded arbitrarily. Where, β,  δ denotes the random integer and it ranges from 0 and 1, η and ξ signify the other arbitrary numbers in the range of 1to U, and β has a size of 1 × J.

Dt+1By(i,j)=(β(Dt(η,j))δ)+Dt((ξ,j)[1β(j)]). (15)

The update procedure of the follower location is performed based on the location of the leading rider. The location update of the follower is modelled. The co-ordinate selector has been represented as k the leading rider location is represented by DK, leading rider index is denoted as K,ith rider steering angle in the k coordinate is indicated as Sii,kt and the ith rider traveling distance is characterized as hit.k chosen according to the on-time probability PONt as follows.

Dt+1Fl(i,k=DK(K,k+[cos(Sii,kt)DK(K,k+hit)] (16)

PONt=(tT0ff)J. (17)

The over-taker update is continuously depending on three components namely relative success rate, coordinate selector, and direction indicator. The over-taker location update is determined. The ith rider location in kth coordinate is given by Dt(i,k) and the direction indicator of ith rider in time t is given by Idt(i ).

Dt+1Ot(i,k=Dt(i,k+[Idt(i)DK(K,k)] (18)

It is similar to the follower position update. But the attacker upgrades the coordinate value rather than selecting one. Eq. (19) depicts the attacker update procedure and the leading rider location is represented as DK(K, j).

Dt+1Ak(i,j)=DK(K,j)+[cos(Siij¨t)DK(K,j)]+hit. (19)

The achievement of the optimum solution is essential. Thus, the upgrading of the rider parameter is vital. To improve the performance of the RO algorithm, the CRO algorithm has been developed with the inclusion of chaotic concepts. The chaotic map creates random sequence that is employed during the process of encryption. Several concepts in chaos theory, e.g., sensitivity and mixing to primary condition and parameter, match with cryptography. The two essential properties of C-function are sensitivity to primary condition and mixing property. The C-function stream was made by distinct chaotic maps.

an+1=αan(1an)an(0,1) andn=0,1,,α(0,4). (20)

During the logistic map, a semi-group was made by the process of composition of function, as α ∈ (0, 4) denotes a period-doubling bifurcation method.

3.3 Process Involved in CROC-SEHWSN Model

There are seven objective functions in the CROC-SEHWSN model [14]. Those functions are covering each significant aspect required for energy-effective clustering namely finding the current energy ratio, saving the energy by reducing the amount of CHs, minimizing the distance among CHs and BS, improving the link quality from cluster, maximizing the inter-cluster distance among CHs, trust level, and decreasing the intra-cluster distance. The presented approach offers the optimal solution by reducing each objective function. The FF is the sum of each 7 main functions with 7 weight constants. It can be expressed in the following

FF=minimum(m1y1+m2y2+m3y3+m4y4+m5y5+m6y6+m7y7) (21)

Whereas m1, m2, m3, m4, m5, m6, and m7 denotes weight constant determined by user, and FF indicates the FF. As well, y1, y2, y3, y4, y5, y6, and y7 represent the objective functions. The presented method is utilized for finding the optimal solution based on the FF. During the presented method, the solution has been provided by all the agents. The optimal solution for the abovementioned FF comprises of minimal amount of clusters with higher link quality and dynamically chosen CH with higher residual energy.

The initial function has been dedicated to saving energy, and it could reduce the optimum amount of CHs, energy utilization would be minimized.

y1=optimalnumberofclusters(c)sizeofsetofCHcontestants(s). (22)

The 2nd function offers data regarding the present energy ratio; when there are overall M nodes, R cluster the 2nd function is the ratio of first energy of nodes and the present CH energy.

y2=p=1MEnergy(nodep)q=1REnergy(clusterheadq). (23)

The 3rd function’s aim is to enhance the link quality in cluster. This function creates the cluster that distances among SNs are minimal. Euclidean distance is estimated among the SN and CH.

y3=q=1Rnodejϵclusterqeuclideandistance(nodej,clusterheadq)minimumnodejclusterqeuclideandistance(nodej,clusterheadq). (24)

The 4th function reduces the distance among CHs and BS. Now, the area is considered as A × A; overall clusters are R.

y4=1Rq=1Reuclideandistance(clusterheadq,basestation)A2. (25)

The 5th function aim is for minimizing the tra-cluster distance of SN and the respective CH. The binary variable is taking value 1 when a certain node is allocated to a CH; or else, their value is 0.

y5=1Mp=1Mq=1Reuclidean_distance(nodep,cluster_headq)×binaryparameterpqAveragedistancetwoneighborsclusterheads2. (26)

The 6th function is dedicated to maximizing the inter-cluster distance among CHs. |CNq| denotes the amount of nodes in cluster q.

y6=Averagedistancetwoneighborsclusterheads1|CNq|q=1|CNq|euclideandistance(clusterheadq,clusterheadr). (27)

The 7th function is utilized for handling the trust level of nodes. Eq. (28) reduces the maximal load among CHs. |CNq| denotes the amount of trust level in cluster q. Now, the area is considered as A × A; overall= clusters are R.

y7=MAXIMUM(|TLq|)1Rq=1R(|TLq|) (28)

4  Results Analysis

This section examines the experimental validation of the CROC-SEHWSN model with existing approaches such as low energy adaptive clustering hierarchy (LEACH), Multi-objective fuzzy clustering algorithm (MOFCA), energy aware fuzzy unequal clustering (EAUCF), and CPEH. Tab. 1 and Fig. 3 examine the packet delivery ratio (PDR) investigation of the CROC-SEHWSN model with recent methods under two scenarios. The experimental values indicated that the CPEH model has resulted in worse outcomes with the minimal values of PDR. Followed by, the EAUCF, MOFCA, and LEACH models have accomplished slightly improved values of PDR. However, the CROC-SEHWSN model has gained maximum outcomes with higher values of PDR. For instance, with scenarios 1 and 50 nodes, the CROC-SEHWSN model has offered increased PDR of 97.14% whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained decreased PDR of 95.31%, 89.81%, 88.50%, and 65.72% respectively. Similarly, with scenarios 2 and 50 nodes, the CROC-SEHWSN model has provided maximum PDR of 98.82% whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have reached minimum PDR of 97.36%, 93.29%, 81.95%, and 50.26% respectively.

images

images

Figure 3: PDR and PLR analysis of CROC-SEHWSN technique under two scenarios

The figures illustrate a detailed packet loss rate (PLR) inspection of the CROC-SEHWSN model with existing techniques under two scenarios. The figure reported that the CROC-SEHWSN model has outperformed the other methods under all nodes. For instance, with scenarios 1 and 50 nodes, the CROC-SEHWSN model has resulted in lower PLR of 2.86% whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained higher PLR of 4.69%, 10.19%, 11.50%, and 34.28% respectively. Meanwhile, with scenarios 1 and 400 nodes, the CROC-SEHWSN method has resulted in lower PLR of 42.39% whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained higher PLR of 48.68%, 53.13%, 56.01%, and 65.17% correspondingly. Eventually, with scenario 2 and 50 nodes, the CROC-SEHWSN algorithm has resulted to lower PLR of 1.18% whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained maximum PLR of 2.64%, 6.71%, 18.05%, and 49.74% correspondingly.

Tab. 2 and Fig. 4 inspect the average throughput (ATP) investigation of the CROC-SEHWSN model with recent methods under 2 scenarios. The experimental values indicated that the CPEH model has resulted in worse outcome with the minimal values of ATP. Followed by, the EAUCF, MOFCA, and LEACH models have accomplished somewhat improved values of ATP. But, the CROC-SEHWSN model has gained maximum outcome with higher values of ATP. For instance, with scenarios 1 and 50 nodes, the CROC-SEHWSN system has obtainable increased ATP of 22195 whereas the LEACH, MOFCA, EAUCF, and CPEH approaches have obtained decreased ATP of 15654, 13444, 12030, and 7079 correspondingly. In addition, with scenarios 2 and 50 nodes, the CROC-SEHWSN methodology has offered maximal ATP of 24082 whereas the LEACH, MOFCA, EAUCF, and CPEH systems have reached lower ATP of 20262, 18533, 16947, and 9596 correspondingly.

images

images

Figure 4: ATP analysis of CROC-SEHWSN technique under two scenarios

Tab. 3 and Fig. 5 demonstrate a detailed average energy consumption (AECM) inspection of the CROC-SEHWSN model with existing techniques under two scenarios. The figure reported that the CROC-SEHWSN model has outperformed the other methods under all nodes. For instance, with scenarios 1 and 50 nodes, the CROC-SEHWSN approach has resulted in lower AECM of 0.00066 J whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained higher AECM of 0.00073, 0.00082, 0.00093, and 0.00119 J respectively. In the meantime, with scenarios 1 and 400 nodes, the CROC-SEHWSN approach has resulted to lower AECM of 0.00077 J whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained supeiror AECM of 0.00084, 0.00092, 0.00097, and 0.00100 J correspondingly. Finally, with scenarios 2 and 50 nodes, the CROC-SEHWSN system has resulted in lower AECM of 0.00064 J whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained higher AECM of 0.00068, 0.00072, 0.00085, and 0.00108 J correspondingly.

images

images

Figure 5: AECM analysis of CROC-SEHWSN technique under two scenarios

Tab. 4 and Fig. 6 inspect the network lifetime (NLT) investigation of the CROC-SEHWSN technique with recent methods under two scenarios. The experimental values indicated that the CPEH methodology has resulted in worse outcomes with the minimal values of NLT. Along with that, the EAUCF, MOFCA, and LEACH models have accomplished somewhat enhanced values of NLT. Then, the CROC-SEHWSN model has gained maximum outcome with higher values of NLT. For instance, with scenarios 1 and 50 nodes, the CROC-SEHWSN approach has offered increased NLT of 387.40 s whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have obtained decreased NLT of 350.92, 298.82, 153.96, and 109.15 s correspondingly. At the same time, with scenarios 2 and 50 nodes, the CROC-SEHWSN methodology has provided maximal NLT of 393.30 s whereas the LEACH, MOFCA, EAUCF, and CPEH techniques have reached minimal NLT of 339.27, 243.08, 186.89, and 131.77 s correspondingly.

images

images

Figure 6: NLT analysis of CROC-SEHWSN technique under two scenarios

5  Conclusion

This study has developed a novel CROC-SEHWSN model for accomplishing maximum energy efficiency in the EHWSN. The proposed CROC-SEHWSN model is based on the integration of chaotic concepts with conventional RO algorithm. In addition, the CROC-SEHWSN model has derived a FF comprising seven different parameters related to WSN. For accomplishing secrecy, trust factor and link quality metrics are considered in the FF. For demonstrating the enhanced performance of the CROC-SEHWSN technique, a wide range of simulations were carried out and the outcomes are inspected under distinct aspects. The experimental outcome demonstrated the maximum performance of the CROC-SEHWSN technique on existing approaches with maximum lifetime of 387.40 and 393.30 s respectively. In future, multihop routing protocols with lightweight cryptographic solutions can be designed for EHWSN.

Acknowledgement: The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University, Kingdom of Saudi Arabia for funding this work through General Research Project under the grant number: RGP. 2/162/43.

Funding Statement: This research was supported by the Deanship of Scientific Research Project (RGP. 2/162/43) King Khalid University, Kingdom of Saudi Arabia.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

 1.  S. Arjunan and P. Sujatha, “Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol,” Applied Intelligence, vol. 48, no. 8, pp. 2229–2246, 2018. [Google Scholar]

 2.  F. K. Shaikh and S. Zeadally, “Energy harvesting in wireless sensor networks: A comprehensive review,” Renewable and Sustainable Energy Reviews, vol. 55, pp. 1041–1054, 2016. [Google Scholar]

 3.  S. Arjunan and P. Sujatha, “A survey on unequal clustering protocols in wireless sensor networks,” Journal of King Saud University - Computer and Information Sciences, vol. 33, no. 1, pp. 1182021, 2019. [Google Scholar]

 4.  I. Ahmad, L. M. Hee, A. M. Abdelrhman, S. A. Imam and M. S. Leong, “Scopes, challenges and approaches of energy harvesting for wireless sensor nodes in machine condition monitoring systems: A review,” Measurement, vol. 183, pp. 109856, 2021. [Google Scholar]

 5.  S. Arjunan, S. Pothula and D. Ponnurangam, “F5 N-based unequal clustering protocol (F5NUCP) for wireless sensor networks,” International Journal of Communication Systems, vol. 31, no. 17, pp. e3811, 2018. [Google Scholar]

 6.  S. Famila, A. Jawahar, A. Sariga and K. Shankar, “Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments,” Peer-to-Peer Networking and Applications, vol. 13, no. 4, pp. 1071–1079, 2020. [Google Scholar]

 7.  V. K. Menaria, S. C. Jain, N. Raju, N. R. Kumari, A. Nayyar et al., “NLFFT: A novel fault tolerance model using artificial intelligence to improve performance in wireless sensor networks,” IEEE Access, vol. 8, pp. 149231–149254, 2020. [Google Scholar]

 8.  A. Gupta, M. Gupta and A. Nayyar, “Approaches for combating delay and achieving optimal path efficiency in wireless sensor networks,” Journal of Computer Science and Information Technology, vol. 3, no. 5, pp. 105–111, 2014. [Google Scholar]

 9.  G. Suseendran, D. Akila, H. Vijaykumar, T. N. Jabeen, R. Nirmala et al., “Multi-sensor information fusion for efficient smart transport vehicle tracking and positioning based on deep learning technique,” The Journal of Supercomputing, vol. 78, pp. 1–26, 2021. [Google Scholar]

10. B. Han, F. Ran, J. Li, L. Yan, H. Shen et al., “A novel adaptive cluster based routing protocol for energy-harvesting wireless sensor networks,” Sensors, vol. 22, no. 4, pp. 1564, 2022. [Google Scholar]

11. X. Bao, H. Liang, Y. Liu and F. Zhang, “A stochastic game approach for collaborative beamforming in sdn-based energy harvesting wireless sensor networks,” IEEE Internet Things J, vol. 6, no. 6, pp. 9583–9595, 2019. [Google Scholar]

12. R. Garg, “Improved energy efficiency using meta-heuristic approach for energy harvesting enabled IoT network,” Kuwait Journal of Science, 2021, https://doi.org/10.48129/kjs.16583. [Google Scholar]

13. S. Al-Otaibi, A. Al-Rasheed, R. F. Mansour, E. Yang, G. P. Joshi et al., “Hybridization of metaheuristic algorithm for dynamic cluster-based routing protocol in wireless sensor networks,” IEEE Access, vol. 9, pp. 83751–83761, 2021. [Google Scholar]

14. R. S. Rathore, S. Sangwan, S. Prakash, K. Adhikari, R. Kharel et al., “Hybrid WGWO: Whale grey wolf optimization-based novel energy-efficient clustering for EHWSNs,” Journal of Wireless Communication and Networking, vol. 2020, no. 1, pp. 101, 2020. [Google Scholar]

15. C. -C. Lin, Y. -C. Chen, J. -L. Chen, D. -J. Deng, S. -B. Wang et al., “Lifetime enhancement of dynamic heterogeneous wireless sensor networks with energy-harvesting sensors,” Mobile Networks and Applications, vol. 22, no. 5, pp. 931–942, 2017. [Google Scholar]

16. Y. Han, J. Su, G. Wen, Y. He and J. Li, “CPEH: A clustering protocol for the energy harvesting wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–14, 2021. [Google Scholar]

17. A. R. Nair and K. S, “Analysis of energy harvesting in SWIPT using bio-inspired algorithms,” International Journal of Electronics, pp. 1–21, 2022. https://doi.org/10.1080/00207217.2021.2025447. [Google Scholar]

18. S. Tyagi and N. Kumar, “A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 623–645, 2013. [Google Scholar]

19. A. S. Jadhav, P. B. Patil and S. Biradar, “Optimal feature selection-based diabetic retinopathy detection using improved rider optimization algorithm enabled with deep learning,” Evolutionary Intelligence, vol. 14, no. 4, pp. 1431–1448, 2021. [Google Scholar]


Cite This Article

APA Style
Nithya Roopa, S., Anandababu, P., Amaran, S., Verma, R. (2023). Metaheuristic secure clustering scheme for energy harvesting wireless sensor networks. Computer Systems Science and Engineering, 45(1), 497-512. https://doi.org/10.32604/csse.2023.029133
Vancouver Style
Nithya Roopa S, Anandababu P, Amaran S, Verma R. Metaheuristic secure clustering scheme for energy harvesting wireless sensor networks. Comput Syst Sci Eng. 2023;45(1):497-512 https://doi.org/10.32604/csse.2023.029133
IEEE Style
S. Nithya Roopa, P. Anandababu, S. Amaran, and R. Verma, “Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks,” Comput. Syst. Sci. Eng., vol. 45, no. 1, pp. 497-512, 2023. https://doi.org/10.32604/csse.2023.029133


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1057

    View

  • 793

    Download

  • 0

    Like

Share Link