iconOpen Access

ARTICLE

An Agent-Based Network Power Management Scheme in WSN for Enhanced Edge Communication in Beyond 5G Networks

Pratik Goswami1,#, Hamid Naseem2,#, Khizar Abbas3,*, Kwonhue Choi1,*

1 School of Computer Science and Engineering, Yeungnam University, Gyeongsan-si, Republic of Korea
2 Department of Electrical Engineering, Yeungnam University, Gyeongsan-si, Republic of Korea
3 Department of Computer Engineering, Gachon University, Seongnam-si, Republic of Korea

* Corresponding Authors: Khizar Abbas. Email: email; Kwonhue Choi. Email: email
# These authors contributed equally to this work

Computers, Materials & Continua 2026, 87(3), 42 https://doi.org/10.32604/cmc.2026.077012

Abstract

In a distributed edge computing environment, Internet of Things (IoT) and Vehicular-IoT (V-IoT) devices communicate through Wireless Sensor Networks (WSNs) by collecting and transmitting data from different environments. Although energy efficiency is always a critical challenge in WSN due to limited battery power, along with the demand for fast communication over edge devices in 5G and beyond 5G scenarios. Therefore, to overcome the challenges, an advanced hierarchical agent-based power management scheme is proposed for WSNs that optimizes energy distribution while maintaining reliable communication. The proposed model employs Master Agents (MAs), Coordination Agents (CoAs), and Task Agents (TAs) to manage power allocation by following a specific order of selection of nodes. The system dynamically adjusts power distribution based on node requirements, trust values, and communication demands over an optimally covered area of nodes, distributed with a 2D Poisson Point Process. Simulation results demonstrate improved energy efficiency, extended network lifetime, and enhanced communication reliability in edge computing scenarios.

Keywords

WSN; energy efficient communication; distributed power allocation; internet of things (IoT); V-IoT; edge communication 5G/6G

1  Introduction

The rapid proliferation of IoT and industrial IoT devices demands sustainable networks with enhanced computation and communication capabilities [1]. Wireless Sensor Networks (WSNs) play a pivotal role, particularly when integrated with Mobile Edge Computing (MEC) for low-latency, high-bandwidth processing [24]. From smart homes to wearable health monitors [5,6], these resource-constrained devices continuously sense environmental parameters (temperature, humidity, sound, light [7]) and transmit data to edge servers or clouds.

1.1 Challenges in Edge-Enabled WSNs

IoT applications—smart cities, healthcare monitoring, industrial automation [810]—impose stringent requirements on WSNs: intensive computation, continuous sensing, and multi-task operations under 6G constraints (limited memory, bandwidth [11,12]). MEC mitigates cloud latency by enabling edge processing [13], yet battery-constrained sensor nodes face critical power management challenges.

Key limitations of traditional approaches include:

•   Static power allocation ignoring dynamic topologies and node heterogeneity.

•   Clustering overhead (e.g., LEACH CH election every round).

•   Lack of trust-awareness for unreliable edge environments.

•   Scalability issues for dense, Poisson-distributed deployments.

1.2 Our Contributions

We propose a hierarchical multi-agent power management framework addressing these gaps:

a.   Trust-driven redistribution: Adaptive power allocation via MACoATA hierarchy with real-time trust metrics (Eq. (2)).

b.   Non-clustered deployment: 2D Poisson Point Process with hybrid CoA selection.

c.   Theoretical guarantees: Trust convergence (Theorem 1–2), energy conservation (Theorem 3), O(NlogN) complexity (Lemma 1).

Table 1 summarizes notation. The paper is organized as follows: Section 2 positions our novelty compared to existing works, Section 3 describes the proposed model and system assumptions. Section 4 describes proposed algorithms and related analysis. Section 5 is to demonstrate the simulation results and finally the paper is concluded with discussion of results, supporting our proposed method in Section 6, discussing the results of our proposed method.

images

2  Related Work

2.1 Agent-Based and Clustering Protocols

Traditional clustering (LEACH [14], HEED, EECS [15]) elects cluster heads probabilistically but suffers CH election overhead and fails in non-uniform deployments. Enhanced variants like firework-optimized LEACH [16,17] and gradient routing [18] improve load balancing but retain clustering rigidity.

Multi-agent systems offer distributed alternatives. NPC [19,20] uses threshold-based power reduction across agents but lacks hierarchy and trust. Three-layer clustering [21] combines centralized/distributed selection but requires base station coordination.

2.2 Trust and Routing Mechanisms

Trust-aware routing (TARM [22]) computes direct/indirect trust via edge nodes but uses static allocation. Recent MARL approaches [23,24] enable decentralized control through Q-learning, achieving power efficiency but requiring extensive training without trust-power coupling.

2.3 Edge Computing and Machine Learning

MEC frameworks address offloading [2527] and ESN design [26], optimizing latency/cost. DDPG-based allocation [16] handles continuous actions but lacks WSN-specific trust. Federated learning [28,29] distributes training but assumes stable topologies, unsuitable for dynamic WSNs.

NN-ILEACH [30] uses neural networks for CH selection (11,361 rounds lifetime) but centralizes training and ignores trust.

2.4 Novelty Relative to Existing Frameworks

Table 2 compares our approach across seven criteria. Unlike clustering methods (overhead), single-agent trust (static), or MARL (training-heavy), we provide:

images

1.   Hierarchical non-clustered agents: MACoATA avoids election overhead.

2.   Trust-power coupling: Dynamic redistribution with convergence guarantees.

3.   Poisson scalability: Handles dense, irregular deployments.

4.   Edge-ready: O(NlogN), theoretical bounds.

It is evident that there are many works that exist where different approaches and methods were taken into consideration to attain energy-efficient sensor networks, and also some of the literature tried to enhance energy efficiency in edge environments. But in most cases, it lacks a technique that can be considered a systematic approach for energy-efficient smooth communication over the edge in the IoT-based WSN paradigm for V-IoT in beyond 5G network.

3  System Model and Assumptions

3.1 Network Architecture

A resource-efficient system relies on multiple factors, and towards energy-efficient communication through a resource-constrained IoT network, the first step is establishing a network architecture with proper deployment of nodes, considering system requirements and infrastructure. The network architecture comprises multiple nodes, and in the IoT and IIoT scenario, it is possible to have multiple tasks over a network simultaneously, and it is evident that those can be different applications. Therefore, there are two possibilities to consider: a) application-specific operation by selecting heterogeneous nodes (where source and sink nodes are predefined) and b) selecting multiple paths for operation, where similar types of applications can occur at the same time within a homogeneous network. Therefore, in our work, we have considered the second option. In the next part of this subsection, detail description of the hierarchical agent-based WSN architecture is presented in Fig. 1.

images

Figure 1: Proposed system model and architecture.

3.1.1 Node Deployment

•   Poisson Point Process (PPP): In our proposed method, nodes are deployed via 2D Poisson Point Process (Algorithm 1) with intensity λ=NA. Nodes are distributed by generating random (x, y) coordinates within grid and continue until N nodes are placed.

It ensures uniform spatial distribution and provides coverage for holes in WSNs. The common approach of clustering is avoided to get rid of different types of problems, such as zero cluster head selection and compulsory cluster head selection in every round, which eventually saves a lot of resources.

•   Roles of Nodes: In the proposed WSN battery power management system, the agents follow specific orders to accomplish a task with prolific communication over the network. In this method, it is considered that there are four source nodes for different paths, where it is assumed that for multi-operation networks, different applications can take place simultaneously over a defined network. Each source node acts as an MA [31] for a specific path of communication and is directly connected to the central battery. The work of the MA is to manage the power distribution over the entire network through the other subagents. At the time of consideration of the MA in each path, the other sensor nodes of the network are assumed to be TAs [32] for the particular path, and CoA is selected from other TAs to act as a coordinator between TAs and the MA for optimal communication.

–   MA: High-power nodes managing CoAs (PMAPth)

–   CoA: Optimally positioned nodes (Algorithm 2) with score:

Scorei=jwjsj(where j{power, pos, density, coverage, link})(1)

–   TA: Worker nodes with power PiPth

images

3.1.2 CoA Selection

As mentioned earlier, MAs are basically the source nodes. Among the TAs, a CoA is selected with hybrid by MA. This CoA negotiates with MA for available resources to complete the task by each TA. We have set a threshold power value, which is considered as the required power to complete task by each TA. After each CoA-TA communication for time instant ‘t’, the consumed power will be determined, and CoA informs the MA of more power requirements. This process continues until the required power for all TAs is calculated. Then, for every time interval of ‘t’, the power for CoA-MA and CoA-TA communication is calculated based on the distance between nodes.

The CoA (Algorithm 2) is chosen using a weighted scoring mechanism that identifies the node best suited to coordinate the traffic on a given path. Each candidate node is evaluated against five criteria: energy efficiency, position in the topology, local node density, coverage, and link quality. The individual scores are combined into a single weighted score that reflects how suitable the node is to act as a CoA.

First, a power score captures how much usable energy the node still has, normalized with respect to the threshold power level. A positional score then measures how well the node is placed between the source and sink, with nodes located roughly midway between them being preferred. A density score evaluates how many neighbors lie within a given radius, so that a CoA has enough nearby nodes to coordinate without becoming overloaded.

The coverage score reflects how much non-overlapping area the node can cover within its communication range, encouraging selections that improve overall sensing and connectivity. Finally, a link-quality score is obtained from the normalized distances to the source and destination; shorter, more reliable links receive higher values. The five scores are weighted according to design priorities (wpower, wpos, wdensity, wcoverage, wlink) and summed to produce the final CoA score for each candidate.

The scoring model normalizes each component to the interval [0, 1], so all metrics are directly comparable even though they capture different aspects of a node’s behavior. The CoA is then chosen as the node with the highest overall score, ensuring that the selected coordinator is, at that moment, the most suitable option for the network. In this way, the method balances energy efficiency, coverage, and link quality while keeping the computation lightweight enough to be practical for dynamic wireless sensor networks such as V-IoT where the nodes are homogeneous (Appendix A.2).

images

3.2 Power Management Scheme

In the proposed scheme the power management depends mainly on trust-based node selection and power distribution. Fig. 2 summarizes the proposed agent-based power management cycle.

images

Figure 2: Comprehensive representation of proposed power management scheme.

3.2.1 Power and Trust Dynamics

The proposed agent-based power management scheme jointly models the evolution of node power and trust to capture both energy sustainability and communication reliability. Each node i maintains a residual battery level Pi and a trust value τi[0,1], which are updated at every round based on power consumption, task participation, and communication quality. Nodes whose power drops below the low-power threshold Plow=0.3Pth enter a power-saving mode, where sensing and transmission rates are reduced to extend lifetime, while nodes with sufficient power continue to participate fully in routing and task execution.

Trust dynamics follow a weighted update rule that combines historical behavior, power efficiency, and link quality. For active nodes, the trust value is updated as

τi(t+1)=ατi(t)+βepower,i(t)+γecomm,i(t),(2)

where α=0.7, β=γ=0.15 are the history, power efficiency, and communication weights, respectively, satisfying α+β+γ=1 (Appendix A.1). Power efficiency is computed as epower,i=min{1,Pi/Pth}, while communication quality ecomm,i reflects packet delivery success and link distance to path endpoints as 1Packet loss rateMax tolerable loss.

For inactive nodes, a decay factor is applied to penalize prolonged non-participation, i.e., τi(t+1)=δτi(t) with δ0.95. Nodes with τi<τmin (typically τmin=0.4) are considered unreliable and are demoted from coordination roles, which in turn triggers CoA reselection and route recomputation in the subsequent algorithms.

3.2.2 Power Allocation

Power allocation in the proposed scheme is performed hierarchically along the path MACoATA and is driven by both the requested task power and the energy state of participating nodes. When a Task Agent T issues a request with required power Preq, the Master Agent identifies the corresponding path and computes power likelihoods for the MA, CoA, and TA as

LMA=min{1,PMAPth},LCoA=min{1,PCoAPth},LT=min{1,PTPth}.

These likelihoods are used to adjust the initial request and account for potential deficits along the path. The adjusted power demand is expressed as

Padj=Preq(1+(1LMA)+(1LCoA)+(1LT)),(3)

so that lower likelihoods (i.e., weaker nodes) increase the required energy budget for reliable delivery.

If the remaining global battery Btot and the local node powers can jointly satisfy Padj, the algorithm allocates at least Pth to each node on the path and the task is executed successfully. Otherwise, the Power Redistribution procedure is invoked to draw excess energy from nodes with Pi>1.5Pth while preserving the stability of their associated MAs. If redistribution cannot fully cover Padj, the requesting TA is switched to power-saving mode and the allocation attempt is marked as failed. This hierarchical, trust-aware allocation mechanism ensures that power is preferentially assigned to reliable nodes and that scarce energy is utilized efficiently across the network.

4  Proposed Algorithms

This section presents the distributed algorithms that implement the power management model described in Section 3. The algorithms operate over the hierarchical path MACoATA and realize the concepts of power and trust dynamics, hierarchical power allocation, fault handling, and energy-efficient routing.

4.1 Dynamic Power Management

The dynamic power management module implements the power allocation model of Section 3.2.2 as per the Dynamic Power Distribution Algorithm 3. When a Task Agent (TA) requests power for a task, the Master Agent (MA) first evaluates the energy condition of the MA, CoA, and TA through likelihood ratios, then adjusts the requested power to obtain Padj. If the system can satisfy this adjusted demand, power is allocated along the path; otherwise, a redistribution procedure attempts to gather additional energy from high-power nodes Power Redistribution Algorithm 4. If redistribution fails, the TA is placed in power-saving mode.

The Power Redistribution algorithm presents a systematic approach to reallocating power resources within a wireless sensor network when additional power (Pneed) is required. This algorithm implements a two-phase strategy to meet power demands while maintaining network stability and operational efficiency.

In the first phase, the algorithm searches for donor nodes whose power exceeds 1.5Pth, while excluding Master Agents (MAs) so that the hierarchy remains intact. These candidates are sorted in descending order of their power Pi, and for each node Nj the algorithm first checks that its associated MA still has at least Pth before any transfer is made. The amount of power moved is then chosen as:

Ptransfer=min(PjPth,Pneed)(4)

which prevents the donor from dropping below the threshold and reduces the remaining demand as much as possible. If this first phase does not fully satisfy the requirement (Pneed>0), a second phase considers ordinary Task Agents (TAs). In this step, each TA has its power reduced by 50%, and the recovered energy is used to further decrease Pneed via PneedPneed0.5Tk.power. The procedure is considered successful when the remaining demand satisfies Pneed0. In this way, the algorithm meets urgent power requests while still protecting critical roles and sustaining the network over the long term.

images

images

4.2 Trust Update

The trust update mechanism implements the behavior described in Section 3.2.1. Active nodes gain trust when they use power efficiently and maintain good-quality links, whereas inactive nodes gradually lose trust over time. After each update, the new trust value is clipped to lie within [0, 1]. The complete procedure is summarized in Algorithm 5.

images

4.3 Fault Detection and Recovery

The Fault Detection and Recovery Algorithm 6 provides a structured way to monitor node health and react to failures. Each node N sends heartbeat messages at regular intervals Δt, and the algorithm combines a timeout check with a trust-based check. Two thresholds are defined: a minimum trust value τmin=0.4 and a maximum allowable gap Tmax between heartbeats. If a node does not send a heartbeat within Tmax, it is marked as faulty and its tasks are reassigned using the power reallocation procedure in Algorithm 4. If a node continues to send heartbeats but its trust τi falls below τmin, its role is downgraded to TA; if it previously served as a CoA, a new CoA is selected according to Algorithm 2. Nodes that maintain regular heartbeats and τiτmin keep their current roles and power allocations. This hierarchical strategy allows the network to detect problems early and recover gracefully while keeping overall performance stable.

•   Heartbeat Monitoring: Node i is faulty if:

ttlast>Tmax or τi<τmin(=0.4)

•   Recovery Actions:

–   Demote CoAs with τi<τmin

–   Trigger Algorithm 7 for route recomputation

images

Sensitivity to Intermittent Link Failures (Tmax, τmin)

To assess robustness under intermittent links, we conducted a sensitivity study by varying the heartbeat timeout Tmax{2,5,10} and the trust threshold τmin{0.3,0.4,0.6} under a heartbeat failure probability of 0.01. Table 3 reports the resulting Lifetime@0.9N and final average trust. Across all tested settings, Lifetime@0.9N remains 500 rounds, while final trust varies only mildly (0.7636–0.7815), indicating that the proposed trust/fault handling is stable and does not require strict parameter tuning.

images

4.4 Energy-Efficient Routing

The Energy-Efficient Data Routing Alogorithm 7 computes routes using both distance and trust information. Given a packet P, a source node S, a destination D, and a hop limit hmax=5, it builds a route R that respects energy and reliability constraints. The route is initialized with the source, and while the destination has not been reached and h<hmax, the algorithm looks for candidate next hops {Ci} within the transmission radius r of the current node R[1], keeping only nodes with τCi>0.5. For each candidate, the cost is computed as

Cost(Ci)=w1d(Ci,D)+w2(1τCi)(5)

where d(Ci,D) is the Euclidean distance to D and w1,w2 control the trade-off between path length and reliability. The node with the smallest cost is added to R. If no suitable candidate exists at some step, routing fails. This approach produces paths that are both short and trustworthy, reducing energy use while keeping the network reliable.

images

Routing Weight Sensitivity

Table 4 analyzes w1{0.2,0.5,0.8} impact (w2=1w1, 50 routes, N=1000). Trust emphasis (w1=0.2, w2=0.8) yields optimal balanced performance: minimum hops (3.42), perfect path trust (1.0), with delivery (42%).

images

Fig. 3 visualizes the trade-off. This approach produces short, trustworthy paths reducing energy while maintaining reliability.

images

Figure 3: Routing weight sensitivity: w1 controls hops vs. delivery trade-off.

4.5 Role Rotation and Power-Saving

To avoid overusing particular nodes and to extend network lifetime, the framework periodically rotates roles Algorithm 8 and enables power-saving behavior for low-power TAs. In role rotation, well-powered, highly trusted TAs are promoted to MA positions, while exhausted nodes are relieved from leadership. The Dynamic Role Rotation algorithm formalizes this idea. At every interval trotate, it evaluates each TA Ti using

Fitness(Ti)=ατTi+βPTiPth,(6)

where τTi is the node’s trust and PTi its power level. The TA with the highest fitness, Tbest, is selected, the current MA S is demoted to TA, and Tbest becomes the new MA. A new CoA for this MA is then chosen using Algorithm 2. This periodic rotation spreads the leadership burden, avoids single points of failure, and keeps the network balanced. Also to validate stability, we tested trotate{30,60,120} and report sensitivity in Table 5. The results show <3.5% energy oscillation variation and zero routing churn across this range, confirming robustness. We use trotate=60 as the baseline setting.

images

images

The Power-Saving Mode Activation Algorithm 9 provides an adaptive strategy for controlling TA activity based on energy levels. It uses two thresholds: a low-power threshold Plow=0.3Pth and the normal operating threshold Pth. When a TA’s power PT falls below Plow, the node reduces its sensing rate (for example, by half), disables non-essential communications, and may request a power boost through Algorithm 3. When PTPth, the node returns to normal operation. For intermediate levels PlowPT<Pth, the node remains in its current reduced state. This three-level behavior saves energy without abruptly disconnecting nodes that still have usable battery.

images

4.6 Network Optimization

The Network-Wide Optimization Algorithm 10 coordinates resource management and role tuning across all N nodes, {Ni}i=1N, at regular intervals topt. At each optimization step, it first identifies TAs with power above 1.2Pth and redistributes their excess energy using Algorithm 4. It then refreshes all trust values using Algorithm 5 and, based on these updated metrics, decides whether to perform role rotations via Algorithm 8. Finally, it recomputes routing paths using Algorithm 7 so that routes remain consistent with the new power and trust landscape. This periodic cycle keeps resource usage efficient and helps maintain good performance as the network and its traffic conditions evolve.

images

4.7 Theoretical Analysis: Convergence, Stability, and Guarantees

4.7.1 Trust Evolution Convergence (Eq. (2))

Theorem 1: (Boundedness of Trust Values): For all nodes i, trust τi(t)[0,1]t0.

Proof: Trust update (Eq. (2)):

τi(t+1)=ατi(t)+βepower,i(t)+γecomm,i(t),

α=0.7, β=γ=0.15, e[0,1]. Weighted sum [0,1]. Clamping ensures bounds.

Theorem 2: (Fixed-Point Convergence): Stationary epower,i=p, ecomm,i=c  τi(t)τi=βp+γc exponentially (rate α=0.7).

Proof: Recurrence: τi(t+1)=ατi(t)+(βp+γc). Solution:

τi(t)=αt(τi(0)τi)+τiτi.

4.7.2 Power Redistribution Invariants (Algorithm 4)

Theorem 3: (Global Energy Conservation): 0Btot(t)Btot(0)t, where Btot(t)=iPi(t).

Proof: Algorithm 4 conservative: Ptransfer=min(PjPth,Pneed). No creation, only transfer/consumption.

Theorem 4: (MA Safety Invariant): No Master Agent drops below Pth unless all donors exhausted.

Proof: Induction: Algorithm 4 line 4 checks MA power Pth.

4.7.3 Coupled System Stability

Theorem 5: (Monotone Trust-Power Feedback): High-trust nodes prioritized (Eq. (5): Costi(1τi)) stable power stable trust.

Low-trust deprioritized power-saving less drain. Beneficial feedback loop.

4.7.4 Complexity Proof

Lemma 1: (Algorithm Complexities): Matches Section 5.8:

TCoA(2)=O(|𝒫|K),(7)

Tredist(4)=O(N),Ttotal=O(NlogN).(8)

4.7.5 Summary of Guarantees

1.   Trust: Bounded + exponential convergence.

2.   Energy: Global conservation + MA protection.

3.   Coupling: Beneficial feedback loop.

4.   Complexity: O(NlogN) validated empirically (Section 5.8).

These explain constant lifetime and linear scaling.

5  Results and Discussion

The effectiveness of the proposed agent based power management scheme is validated using simulation based experiments against established baselines: energy efficient low energy adaptive clustering hierarchy (EE-LEACH) [33], PEGASIS [34], and FEDLEARN [35]. The main simulation parameters are listed in Table 6. All the simulations are done in Python version 3.12.

images

5.1 Network Lifetime and Alive Nodes

The network lifetime of the network is shown with the number of alive nodes with respect to simulation rounds in Fig. 4. It can be seen the proposed method, along with EE-LEACH and FEDLEARN maintain all 1000 nodes alive for 500 rounds, demonstrating effective energy management and robustness. In contrast, PEGASIS breaks down much earlier: by around 130 rounds only 8 nodes are still alive, which shows how vulnerable a pure chain-based routing scheme is when power is limited. The Federated Learning baseline keeps all nodes alive for longer, but it does so at the cost of higher overall energy consumption.

images

Figure 4: Network lifetime comparison.

The stability of the proposed scheme comes from how its main mechanisms work together. The hybrid CoA selection (Algorithm 2) places coordinators in energy-balanced locations so that no small region is overused, while the dynamic power redistribution (Algorithm 4) recovers and reallocates excess energy when needed. On top of this, the power-saving mode (Algorithm 9) prevents sudden failures of nodes by automatically throttling low-energy nodes, eventually help the network to maintain service for a longer time.

5.2 Average Trust Value

Th next Fig. 5 shows how the average trust value evolves over time. The proposed method keeps trust high and stable at around 0.78, which indicates reliable communication and a robust update process in Algorithm 5 that blends past behavior, power efficiency, and link quality. PEGASIS, on the other hand, cannot sustain trust because many nodes die early, so the average trust eventually drops to zero. EE-LEACH reaches the highest trust level (about 0.98), reflecting the benefits of clustering, but likely at the cost of higher energy use. The Federated Learning approach achieves a middle ground, maintaining trust at roughly 0.90 while still consuming more energy than the proposed scheme.

images

Figure 5: Average trust value evolution.

Therefore, by demoting low-trust nodes and reassigning their roles, the trust mechanism limits the influence of unreliable nodes and strengthens overall network reliability, which is crucial for consistent edge-computing performance.

5.3 Energy Consumption

It can be seen in Fig. 6 that the energy consumption the proposed method preserves battery power more effectively with balanced energy consumption compare to PEGASIS. In PEGASIS long chain transmissions drain nodes quickly, whereas EE-LEACH also performs well due to its clustering structure. But compare to all of these methods the Federated Learning approach introduces extra coordination overhead and therefore uses more energy overall.

images

Figure 6: Comparison of energy consumption in the network.

In the proposed method combination of efficient power allocation, timely activation of power-saving mode, and dynamic redistribution of excess energy, extends node lifetime and cuts unnecessary energy use, which is an essential property for IoT edge devices that operate with very limited power budgets.

5.4 System Throughput

Fig. 7 shows the system throughput over time. PEGASIS reaches the highest peak throughput (about 18.94 Mbits) because it exploits long chain transmissions, but this behavior is short-lived and leads to an early network collapse, so it is not sustainable. The proposed scheme achieves a moderate throughput of roughly 1.96 Mbits per round, which ensures efficient data delivery rate and better energy efficiency for long-term operation at the edge. EE-LEACH and the Federated Learning baseline deliver higher throughput (around 4.9 Mbits), reflecting their different communication patterns, but they do so with additional costs in either scalability or resource usage.

images

Figure 7: System throughput evolution.

This trade-off demonstrates a critical multi-objective optimization, where acceptable throughput is maintained while keeping the network alive for much longer, rather than maximizing data rate at the expense of network lifetime.

5.5 Average Hop Count

In Fig. 8, comparison of the average number of hops per data path is shown. The proposed scheme keeps the hop count at a moderate level (about 102), which is roughly 59% fewer hops than Federated Learning (249) and about 90% fewer than PEGASIS (996), showing that the CoA-based routing finds much shorter routes. EE-LEACH achieves the smallest hop count (around 20) because clustered nodes often communicate almost directly.

images

Figure 8: Average hop count comparison.

Fewer hops translate into lower delay and less cumulative energy use, indicating that the proposed routing successfully balances trust, distance, and power.

5.6 Power Saving Mode Usage

Fig. 9 shows how often nodes enter power-saving mode. In the proposed method, about 20%–30% of nodes are typically in power-saving state, which helps conserve energy and extend the network lifetime while still keeping the topology connected. PEGASIS, by contrast, rarely benefits from power-saving because nodes die quickly, leaving little opportunity for controlled savings.

images

Figure 9: Fraction of nodes in power-saving mode.

This behavior illustrates how the scheme reacts dynamically to node energy levels and traffic demand.

5.7 Remaining Battery Power

Fig. 10 plots the remaining global battery power. The proposed method preserves more residual energy throughout the simulation than both Federated Learning and PEGASIS, while EE-LEACH also performs well in terms of battery conservation. Effective power redistribution and fault-tolerant operation prevent unnecessary drain, which is critical for prolonging the lifetime of IoT edge nodes.

images

Figure 10: Remaining global battery power by different method.

5.8 Complexity and Scalability Analysis

5.8.1 Time Complexity

Core algorithms exhibit the following per-round complexities:

TCoA(2)=𝒪(|𝒫|K)(path length×candidates)(9)

Tdist(3)=𝒪(1)(per TA request)(10)

Tredist(4)=𝒪(N)(scan allocations)(11)

Tgreedy(7)=𝒪(hmax)hmax=𝒪(logN)(12)

Trotate(8)=𝒪(N)(everytrotaterounds)(13)

Total: T=𝒪(NlogN) worst-case, 𝒪(N) observed.

5.8.2 Empirical Microbenchmarks

Microbenchmarks (Table 7) via ‘timeit' (200K iterations, N = 1000) confirm theoretical bounds. Algorithm 4 redistribution dominates 97% runtime (O(N) scans across 996 TAs), while CoA (Algorithm 2) identifies pruning opportunity. Total 387 ms/round scales linearly, enabling N=104 on edge devices.

images

Table 7 shows ‘timeit’ results (200K iterations, N = 1000).

5.8.3 Message Complexity

Dominant messages per round total 𝒪(N):

•   Power requests: 𝒪(N) (996 TAMA per round)

•   Heartbeats: 𝒪(N) (Algorithm 6 fault detection, 1 per node)

•   Role updates: 𝒪(N/trotate) (Algorithm 8, amortized every 60 rounds)

•   Data packets: 𝒪(hS) (h=102 hops × 4 sources)

Empirical validation: constant 102 hops across N = 500–1500 (Table 8) confirms 𝒪(h) per-packet routing independent of total nodes N.

images

5.8.4 Scalability for Large N

Table 8 validates scalability for N1000. Lifetime remains constant at 300 rounds across N = 500–1500 confirming 𝒪(1) linear lifetime scaling. Final trust shows near-linear decay (ρ=0.965), but message complexity remains 𝒪(h) per packet (constant 102 hops, independent of N).

5.9 Adversarial Robustness Analysis

To evaluate resilience against malicious behavior, we implemented a composite attack combining trust inflation (malicious nodes initialize τ=1.0 despite bad behavior) and selective packet dropping (malicious nodes drop with probability 0.5). Table 9 shows performance under 20% malicious nodes (mal_ratio=0.2).

images

The scheme maintains stable trust (0.778) and full lifetime despite attack, confirming that the weighted trust update (Eq. (2)) and periodic decay effectively counter inflation attacks. Packet dropping reduces throughput proportionally to malicious density, but does not cascade to premature node death or trust collapse.

5.10 Performance Summary and Discussion

The baseline performance comparison metrics after 500 rounds are summarized in Table 10.

images

From the earlier discussed simulation results, analysis, and performance table, it can be found that the proposed scheme is robust and mainly contributes with three key advantages, which are essential for scalable, energy-efficient edge WSNs:

•   It provides an optimal tradeoff between network longevity and throughput rates, which offers more sustainable operation compared to PEGASIS, which quickly drains the network with short bursts of high throughput.

•   The lower number of hop counts compared to FEDLEARN and PEGASIS defines the reduction of packet forwarding cost by building shorter paths. Also trust-based node selection in path establishment ensures network stability simultaneously.

•   The power-saving mode in the proposed scheme preserves energy by scaling back a specific node’s activity when the battery is low, which prevents disruption of the service. This phenomenon supports WSNs at the edge to adapt dynamic topologies over several applications in resource-constrained network.

Therefore, this non-cluster, agent-based approach delivers better results compared to cluster-based EE-LEACH in terms of greater flexibility for heterogeneous, multi-path deployments and also cost-effectiveness with respect to the overhead cost and longer routes compared to the Federated Learning baseline. These strong claims with comprehensive results validate the applicability and advantages of the agent-based power management framework as a multi-objective solution for real-world wireless sensor networks operating in energy-constrained edge computing environments.

6  Conclusions

This paper proposed an agent-based power management scheme for wireless sensor networks operating in edge computing environments. The framework organizes nodes into Master Agents (MAs), Coordination Agents (CoAs), and Task Agents (TAs), and combines Poisson-based deployment, hybrid CoA selection, trust-aware power allocation, and energy-efficient routing. This integrated approach provides a flexible alternative to traditional cluster-based approaches for heterogeneous, multi-path WSNs. The proposed scheme is justified with simulation results, which confirm its importance as robust and energy efficient by balancing moderate throughput and trust levels and significantly extending network lifetime. Compared with the relevant previous works and baseline approaches, it outperforms PEGASIS and Federated Learning baselines in terms of preserving a larger fraction of alive nodes over time, sustaining higher residual battery energy, and reducing the average hop count, all while keeping the average trust value stable. Also, it shows that as a non-cluster-based scheme, the proposed method is more efficient in WSNs over edge compared to EE-LEACH. The hybrid CoA selection and dynamic power redistribution modules were particularly effective in avoiding energy hotspots and reallocating excess power, whereas the trust update and fault recovery mechanisms limited the impact of unreliable nodes.

Overall, the proposed agent-based scheme offers a practical multi-objective solution that jointly optimizes energy efficiency, reliability, and routing performance for real-world WSN deployments in energy-constrained edge computing environments. Future work can be extended by considering extended mobility-aware framework by integrating learning-based prediction of traffic and energy demand and validating the approach on hardware testbeds for larger-scale deployments.

Acknowledgement: None.

Funding Statement: This research received no external funding.

Author Contributions: Conceptualization, Pratik Goswami, and Hamid Naseem; methodology, Pratik Goswami and Khizar Abbas; software, Pratik Goswami, and Khizar Abbas; validation, Pratik Goswami, Hamid Naseem, and Kwonhue Choi; formal analysis, Pratik Goswami; investigation, Pratik Goswami, Hamid Naseem, and Khizar Abbas; resources, Kwonhue Choi; data curation, Pratik Goswami; writing—original draft preparation, Pratik Goswami, and Khizar Abbas; writing—review and editing, Pratik Goswami, Kwonhue Choi, and Hamid Naseem; visualization, Pratik Goswami, and Khizar Abbas; supervision, Kwonhue Choi; project administration, Kwonhue Choi; funding acquisition, Khizar Abbas. All authors reviewed and approved the final version of the manuscript.

Availability of Data and Materials: The data supporting the findings of this study were generated through in-house simulations using the agent-based WSN power management framework described in this article. The simulation code and generated datasets are available from the corresponding authors on reasonable request.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare no conflicts of interest.

Appendix A

Appendix A.1 Trust Update Weights Selection:

Sensitivity analysis: (Table A1) over α{0.5,0.7,0.9} with β=γ=(1α)/2 confirms robustness: final trust remains stable in [0.769,0.778] and network lifetime at 90% surviving nodes (Lifetime@0.9N) is unchanged at 500 rounds. Trust update variance decreases slightly for larger α, indicating improved stability. Thus, α=0.7 lies within a broad stable operating region rather than requiring precise tuning.

images

Appendix A.2 PPP under Clustered or Mobility-Aware Deployments (Non-Homogeneous Nodes):

While PPP provides a spatial baseline, V-IoT scenarios exhibit clustered (vehicles/hotspots) and mobile topologies. We extended the simulator with:

1.   Clustered deployment: 3 Gaussian clusters (σ=10) Table A2 shows 2.75 times higher local density, which Algorithm 2 exploits via elevated density (w=0.20) and coverage (w=0.15) scores.

2.   Mobility model: Random walk (step radius = 5 every 10 rounds) triggers CoA/path re-selection, maintaining performance.

Table A2 confirms CoA selection adapts to heterogeneity, with clustered deployments yielding richer neighbor sets for improved coordination.

images

References

1. Martalò M, Pettorru G, Atzori L. A cross-layer survey on secure and low-latency communications in next-generation IoT. IEEE Trans Netw Serv Manag. 2024;21(4):4669–85. doi:10.1109/TNSM.2024.3390543. [Google Scholar] [CrossRef]

2. Porambage P, Okwuibe J, Liyanage M, Ylianttila M, Taleb T. Survey on multi-access edge computing for internet of things realization. IEEE Commun Surv Tutor. 2018;20(4):2961–91. doi:10.1109/comst.2018.2849509. [Google Scholar] [CrossRef]

3. Römer K, Mattern F. The design space of wireless sensor networks. IEEE Wirel Commun. 2004;11(6):54–61. doi:10.1109/mwc.2004.1368897. [Google Scholar] [CrossRef]

4. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks. IEEE Commun Mag. 2002;40(8):102–14. doi:10.1109/mcom.2002.1024422. [Google Scholar] [CrossRef]

5. Culler D, Estrin D, Srivastava M. Overview of sensor networks. IEEE Comput. 2004;37(8):41–9. [Google Scholar]

6. Heinzelman WB, Murphy AL, Carvalho HS, Perillo MA. Middleware to support sensor network applications. IEEE Netw. 2004;18(1):6–14. doi:10.1109/mnet.2004.1265828. [Google Scholar] [CrossRef]

7. Chang JH, Tassiulas L. Maximum lifetime routing in wireless sensor networks. IEEE/ACM Trans Netw. 2004;12(4):609–19. doi:10.1109/tnet.2004.833122. [Google Scholar] [CrossRef]

8. Chase J. The evolution of the internet of things. Dallas, TX, USA: Texas Instruments; 2013. [Google Scholar]

9. Bandyopadhyay D, Sen J. Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun. 2011;58(1):49–69. doi:10.1007/s11277-011-0288-5. [Google Scholar] [CrossRef]

10. Stankovic JA. Research directions for the internet of things. IEEE Internet Things J. 2014;1(1):3–9. doi:10.1109/jiot.2014.2312291. [Google Scholar] [CrossRef]

11. Maiti M, Ghosh U. Next generation internet of things in fintech ecosystem. IEEE Internet Things J. 2021;10(3):2104–11. doi:10.1109/JIOT.2021.3063494. [Google Scholar] [CrossRef]

12. Goswami P, Mukherjee A, Maiti M, Tyagi SKS, Yang L. A neural network based optimal resource allocation method for secure IIoT network. IEEE Internet Things J. 2021;9(4):2538–44. doi:10.1109/JIOT.2021.3084636. [Google Scholar] [CrossRef]

13. Li X, Zhu L, Chu X, Fu H. Edge computing-enabled wireless sensor networks for multiple data collection tasks in smart agriculture. J Sens. 2020;1(1):1–9. doi:10.1155/2020/4398061. [Google Scholar] [CrossRef]

14. Abu Salem AO, Shudifat N. Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers Ubiquitous Comput. 2019;23(5):901–7. doi:10.1007/s00779-019-01205-4. [Google Scholar] [CrossRef]

15. Aslam N, Phillips W, Robertson W, Sivakumar S. A multi-criterion optimization technique for energy efficient cluster formation in wireless sensor networks. Inf Fusion. 2011;12(3):202–12. doi:10.1016/j.inffus.2010.11.001. [Google Scholar] [CrossRef]

16. Ali A, Ming Y, Si T, Iram S, Chakraborty S. Enhancement of RWSN lifetime via firework clustering algorithm validated by ANN. Information. 2018;9(3):1–13. doi:10.3390/info9030060. [Google Scholar] [CrossRef]

17. Kang SH, Nguyen T. Distance based thresholds for cluster head selection in wireless sensor networks. IEEE Commun Lett. 2012;16(9):1396–9. doi:10.1109/LCOMM.2012.072012.120712. [Google Scholar] [CrossRef]

18. Xu Z, Chen L, Chen C, Guan X. Joint clustering and routing design for reliable and efficient data collection in large-scale wireless sensor networks. IEEE Internet Things J. 2016;3(4):520–32. doi:10.1109/JIOT.2016.2553121. [Google Scholar] [CrossRef]

19. Hosseingholizadeh A, Abhari A. A new agent-based solution for wireless sensor networks management. In: Proceedings of the 12th Communications and Networking Simulation Symposium (CNS); 2009 Mar 22–27; San Diego, CA, USA. [Google Scholar]

20. Sardouk A, Rahim-Amoud R. A strategy for multi-agent based wireless sensor network optimization. In: Proceedings of the Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009; 2009 Jun 30–Jul 2; Enschede, The Netherlands. [Google Scholar]

21. Lee J, Kao T. An improved three-layer low-energy adaptive clustering hierarchy for wireless sensor networks. IEEE Internet Things J. 2016;3(6):951–8. doi:10.1109/JIOT.2016.2565519. [Google Scholar] [CrossRef]

22. Saleh A, Joshi P, Rathore RS, Sengar SS. Trust-aware routing mechanism through an edge node for IoT-Enabled sensor networks. Sensors. 2022;22(20):820. doi:10.3390/s2220820. [Google Scholar] [CrossRef]

23. Zhou Z, Qian L, Xu H. Decentralized multi-agent reinforcement learning for large-scale mobile wireless sensor network control using mean field games. In: 33rd International Conference on Computer Communications and Networks (ICCCN); 2024 Jul 29–Aug 1; Kailua-Kona, HI, USA. p. 1–6. doi:10.1109/ICCCN61486.2024.10637582. [Google Scholar] [CrossRef]

24. Soltani P, Eskandarpour M, Ahmadizad A, Soleimani H. Energy-efficient routing algorithm for wireless sensor networks based on multi-agent reinforcement learning. arXiv:2508.14679. 2025. [Google Scholar]

25. Liu J, Shou G, Liu Y, Hu Y, Guo Z. Performance evaluation of integrated multi-access edge computing and fiber-wireless access networks. IEEE Access. 2018;6:30269–79. doi:10.1109/access.2018.2833619. [Google Scholar] [CrossRef]

26. Luo R, Jin H, He Q, Wu S, Xia X. Cost-effective edge server network design in mobile edge computing environment. IEEE Trans Sustain Comput. 2022;7(4):839–50. doi:10.1109/TSUSC.2022.3178661. [Google Scholar] [CrossRef]

27. Shabariram CP, Shanthi N, Ponnuswamy PP, Subramaniyaswamy V, Sathana V. Resource allocation in edge computing environment using deterministic policy gradient algorithm. In: Proceedings of the 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS); 2024 Mar 14–15; Coimbatore, India. p. 473–8. doi:10.1109/ICACCS60874.2024.10717103. [Google Scholar] [CrossRef]

28. Zhou J, Pal S, Dong C, Wang K. Enhancing quality of service through federated learning in edge-cloud AIoT systems. Ad Hoc Netw. 2024;153:103346. doi:10.1016/j.adhoc.2024.103346. [Google Scholar] [CrossRef]

29. Qi Y, Feng Y, Wang X, Li H, Tian J. Leveraging federated learning and edge computing for recommendation systems within cloud computing networks. arXiv:2403.03165. 2024. [Google Scholar]

30. El-Sayed HH, Abd-Elgaber EM, Zanaty EA, Alsubaei FS, Almazroi AA, Bakheet SS. An efficient neural network LEACH protocol to extended lifetime of wireless sensor networks. Sci Rep. 2024;14(1):26943. doi:10.1038/s41598-024-75904-1. [Google Scholar] [PubMed] [CrossRef]

31. Mukherjee A, Goswami P, Ayoub Khan M, Li M, Yang L, Pillai P. Energy efficient resource allocation strategy in massive IoT for industrial 6G applications. IEEE Internet Things J. 2021;8(7):5194–201. doi:10.1109/JIOT.2020.3035608. [Google Scholar] [CrossRef]

32. Mukherjee A, Goswami P, Yang L. Distributed artificial intelligence based cluster head power allocation in cognitive radio sensor networks. IEEE Sensor Lett. 2019;3(8):1–4. doi:10.1109/LSENS.2019.2933908. [Google Scholar] [CrossRef]

33. Heinzelman W, Chandrakasan A, Balakrishnan H. An application-specific protocol architecture for wireless microsensor networks. IEEE Trans Wirel Commun. 2002;1(4):660–70. doi:10.1109/TWC.2002.804190. [Google Scholar] [CrossRef]

34. Lindsey S, Raghavendra CS. PEGASIS: Power-efficient gathering in sensor information systems. In: Proceedings of IEEE Aerospace Conferences; 2002 Mar 9–16; Big Sky, MT, USA. doi:10.1109/AERO.2002.1035242. [Google Scholar] [CrossRef]

35. Sattler F, Wiedemann S, Müller K-R, Samek W. Robust and communication-efficient federated learning from non-i.i.d. data. IEEE Trans Neural Netw Learn Syst. 2020;31(9):3400–13. doi:10.1109/TNNLS.2019.2944481. [Google Scholar] [PubMed] [CrossRef]


Cite This Article

APA Style
Goswami, P., Naseem, H., Abbas, K., Choi, K. (2026). An Agent-Based Network Power Management Scheme in WSN for Enhanced Edge Communication in Beyond 5G Networks. Computers, Materials & Continua, 87(3), 42. https://doi.org/10.32604/cmc.2026.077012
Vancouver Style
Goswami P, Naseem H, Abbas K, Choi K. An Agent-Based Network Power Management Scheme in WSN for Enhanced Edge Communication in Beyond 5G Networks. Comput Mater Contin. 2026;87(3):42. https://doi.org/10.32604/cmc.2026.077012
IEEE Style
P. Goswami, H. Naseem, K. Abbas, and K. Choi, “An Agent-Based Network Power Management Scheme in WSN for Enhanced Edge Communication in Beyond 5G Networks,” Comput. Mater. Contin., vol. 87, no. 3, pp. 42, 2026. https://doi.org/10.32604/cmc.2026.077012


cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 338

    View

  • 59

    Download

  • 0

    Like

Share Link