Intelligent Automation & Soft Computing DOI:10.32604/iasc.2022.023240 | ![]() |
Article |
Modified Optimization for Efficient Cluster-based Routing Protocol in Wireless Sensor Network
1College of Computing and Informatics, Saudi Electronic University, Riyadh, 93499, KSA
2Self-Development Skills Department, Common First Year Deanship, King Saud University, Riyadh, 11451, KSA
*Corresponding Author: Marwah Mohammad Almasri. Email: m.almasri@seu.edu.sa
Received: 31 August 2021; Accepted: 01 December 2021
Abstract: Wireless Sensor Networks (WSN) comprise numerous sensor nodes for monitoring specific areas. Great deals of efforts have been achieved to obtain effective routing approaches using clustering methods. Clustering is considered an effective way to provide a better route for transmitting the data, but cluster head selection and route generation is considered as a complicated task. To manage such complex issues and to enhance network lifetime and energy consumption, an energy-effective cluster-based routing approach is proposed. As the major intention of this paper is to select an optimal cluster head, this paper proposes a modified golden eagle optimization (M-GEO) algorithm to figure out the most significant issue of choosing an optimal cluster head in every cluster. The M-GEO algorithm selects an optimal cluster head among all the sensors by employing diverse factors namely the residual energy, node degree, distance among the nearby sensors, centrality of sensor nodes as well as distance between the cluster head and sink node. Additionally, the yellow saddle goatfish (YSG) optimization algorithm is employed in generatingan optimal routing path from the cluster head to the base station. Also, the YSG optimization algorithm detectsthe shortest routing path thereby minimizing the energy consumption. Then later, the performance analyses for various parameters are performed to evaluate the performance of the proposed approach.
Keywords: Cluster head; routing; modified golden eagle optimization; yellow saddle goatfish optimization; network lifetime; energy consumption
Wireless sensor networks (WSNs) are largely been reviewed in a ubiquitous computational environment due to their extensive usage [1]. The WSN finds applications in diverse domains like congestion control, biomedical applications, health care monitoring, home automation, environmental management, military and surveillance applications. Generally, WSN contains several thousand and hundreds of sensor nodes that are widely distributed for sensing, evaluating and receiving the information as well. The WSN sensor nodes are of reasonable cost, easily affordable and contain a high capacity to sense, process and transmit the data [2]. In addition to this, the WSN sensor nodes are facilitated with memory, processor, data storage device and radio-transmission module. On the other hand, a huge resource constraint is necessary to design the above-mentioned components. One of the most significant constraints of WSN is its limited energy source. Hence, energy-saving is considered a complicated issue that requires investigation for enhancing the network lifetime [3]. Numerous issues have been investigated to enhance WSN that includes clock synchronization approaches, efficient routing protocols, secure data aggregation approaches, medium access control approaches as well as lo power and energy consumption devices [4].
Numerous sensor network models permit the sensors for transmitting the data to the base station or sink using a multi-hop routing process. In general, the WSN routing protocol determines the path among the source node and the base station (i.e., destination node) to transmit the sensed data. The WSN efficiency relies mainly on routing that promptly influences the network lifetime [5]. The significant role of routing protocol involves the enhancement of both network lifetime and reliability by considering the sensor node capability containing various resource constraints namely low communicated bandwidth, limited power as well as slow processor [6]. Minimizing communication overhead to transmit the data and to determine the optimal routing path is considered a challenging issue and it must be taken into consideration. The most well-known and commonly utilized approach for routing protocol is the clustering approach [7–18].
The cluster-based routing protocol provides an effective way of minimizing the energy consumption and the total number of messages transmitted to the base station or the sink node. The clustering approach also effectively manages the scalability and energy consumption of the network to enhance the network lifetime [19]. The clustering approach of the WSN partitions the networks into diverse sensor groups referred to as clusters. The cluster head (CH) is selected as a leader by the sensors from every cluster using centralized control algorithm. The sensors gather data from every cluster and transmit it to the respective cluster head. The two different types of cluster head communication are inter-cluster communication and intra-cluster communication [20]. The transmitted data are later received by the cluster head and transmitted to the sink node. The clustering sensor provides numerous benefits for the effective management of WSN. It also permits power saving in sensors and therefore the CH eliminates the false positive and redundant data using the aggregation method [21]. The sensor node turns to be faulty and unreliable because of nodal deployment in the challenging environment. During packet transmission, the average energy consumption is considered a challenging problem and due to insufficient energy, there occurs packet drop in data transmission. This paper considers both distance and energy to develop energy-efficient WSN since the energy consumption of every node depends significantly on distance among the nodes. In order to minimize the packet losses, every nodal energy in WSN must be taken into consideration. The objective function discussed in this routing process is residual energy, distance among the sensor nodes, distance between base station and cluster head, node centrality and node degree. This research paper fulfills the following objectives.
• Proposing modified golden eagle optimization (M-GEO) algorithm for optimal selection of cluster head from every cluster.
• Utilizing yellow saddle goatfish (YSG) optimization algorithm to generate the optimal routing path from the cluster head to the base station thereby detecting the shortest routing path and minimizing the energy consumption.
• Enhancing the network lifetime and reducing the energy consumption of the nodes during data packet transmission.
The remaining of the paper is structured as follows: In Section 2, the latest surveys based on clustering approaches are presented. Section 3 section portrays the ongoing challenges of WSN and objective function. The system model containing network design, energy model and distance model is described in Section 4. Section 5 depicts the proposed approach for optimal CH selection and route generation. The experimental evaluations are discussed in Section 6. Section 7 concludes the article.
2 Theoretical Backgrounds on Cluster based Routing Protocols
Numerous research papers have been implemented to obtain energy-efficient cluster-based routing protocols for wireless sensor networks. A detailed review of few relevant research works is discussed in Tab. 1.
Maheshwari et al. [22] established a concept based on an energy-efficient cluster-based routing protocol for WSN. This approach utilized two different types of optimization algorithms like butterfly optimization algorithm and the ant colony optimization algorithm to maximize the network lifetime. Various simulation measures namely routing overhead, packet ratio, throughput, and average energy consumption were utilized to obtain minimum energy consumption with high throughput rate. But ineffective system performances were regarded as the major drawback.
An energy-efficient stable clustering approach for WSNsemploying flower pollination optimization algorithm is proposed by Sharma et al. [23]. The major intention of this approach was to extend the stability period of the network. The experimental investigation was conducted and from the analysis, it was clear that energy consumption was minimized and the network lifetime was enhanced. But low efficiency and complexity were considered as the disadvantage of this approach.
Qureshi et al. [24] demonstrated an optimized cluster-based dynamic energy-aware routing protocol for wireless sensor network in the field of agriculture. This approach utilized gateway clustering energy-effective Centroid to achieve low management costs. Cluster head percentage, average data transmission, energy consumption and scalability are the parameters employed for simulation. The throughput rate and network lifetime were enhanced but this approach failed to analyze sensor-based transportation systems.
A Novel Hybrid black widow optimization algorithm for Cluster-Based Routing Protocol in IoT Based Mobile Edge Computing was proposed by Vaiyapuri et al. [25]. This approach was mainly developed to effectively select an optimal cluster headset. The results of this approach obtained enhanced energy efficiency and network lifetime. High routing overhead was the significant drawback of this approach.
Chauhan et al. [26] utilized nature inspired firefly optimization algorithm for the mobile sink-based energy efficient cluster head selection strategy for wireless sensor networks. Few parameters namely packet delay, packet drop ratio, packet delivery ratio, and network lifetime were employed to obtain effective congestion control and load balancing. On the other hand, there occurred a delay during energy evaluation was the major shortcoming of this approach.
An energy-efficient cluster head selection in wireless sensor networks for lifetime enhancement using hybrid grey wolf optimization algorithm based sunflower optimization algorithm was demonstrated by Nagarajan et al. [27]. Network survivability index, throughput and residual energy were the parameters utilized to enhance the efficiency and network lifetime. Due to large communication overhead, this approach was ineffective.
An energy-efficient cluster head selection using artificial bee colony optimization for wireless sensor networks was developed by Ahmad et al. [28]. This approach was mainly intended to minimize overhead and to maximize the network lifetime. Total energy consumption, network lifetime, throughput, scalability were the parameters utilized to achieve high performances with minimum energy consumption. The overall effectiveness of this approach was low when compared with other approaches.
Balaji et al. [29] utilized a fuzzy logic controller to develop an energy efficient cluster routing protocol to maximize the lifetime of wireless sensor networks. The major intention of this approach was to minimize overhead and to enhance network lifetime. Throughput, Energy consumption, and network lifetime were the performance measures employed to determine the performance of the system. The network lifetime of this approach was prolonged but there occurred rule fixation issues while selecting cluster head.
Energy-Efficient cluster-head selection for wireless sensor networks utilizing sampling-based spider monkey optimization was proposed by Lee et al. [30]. Here, a sample based spider monkey optimization algorithm was employed in selecting optimal cluster head and to enhance the network lifetime. The experimentation was conducted and the results revealed that the selection accuracy was very high; however this approach was not applicable for small networks.
Sharma et al. [31] developed a trusted moth flame optimization algorithm and genetic algorithm to provide a secure and energy-efficient cluster head selection. Network lifetime, average energy consumption ratio, number of active and dead nodes were the parameters utilized to select trustworthy mode with high efficiency and network stability. On the other hand, energy hole issues were regarded as the significant drawback of this approach.
3 Problem Descriptions and Objective Function
This section portrays the ongoing challenges of WSN and in what way the proposed approach addresses these issues. Also, the objective function to provide an energy-efficient approach is discussed.
A suitable selection of fitness functions must be taken into consideration to create optimal energy efficiency in WSN. Two different energy approaches namely weighted energy-efficient clustering-based routing protocol and aware cluster-based routing protocol approach provide great importance to the residual energy of the sensor node. The network energy consumption minimizes only if these approaches provide the same level of priority regarding distance and energy. In few other routing and clustering techniques, the WSN performances were influenced when numerous non-cluster head members are present in the cluster head. Furthermore, the performances are also affected due to nodal density. It is also worth noting that in WSN, the direct transmission of data among the cluster head as well as sink or base station consumes more amount of energy that further results in packet loss among the networks. The sensor node turns to be faulty and unreliable because of nodal deployment in the challenging environment. During packet transmission, the average energy consumption is considered a challenging problem and due to insufficient energy, there occurs packet drop in data transmission.
This paper considers both distance and energy to develop energy-efficient WSN since the energy consumption of nodes depends significantly on the distance among the nodes. Thus, the energy consumption is in direct proportion with the distance among the sensor nodes. Furthermore, every nodal energy in WSN is taken into consideration to minimize packet loss. Here, the M-GEO algorithm is employed in selecting the optimal cluster head and the YSG algorithm is utilized to develop an optimal route to the destination node from the source node. The objective functions discussed in this routing process are residual energy, distance among the sensor nodes, distance between the base station and cluster head, node centrality and node degree. Thus, an energy-efficient approach is applicable for both small and large-scale applications by considering the above-mentioned parameters. This further minimizes the packet loss among the networks.
3.2 Objective Function Formulation
This section depicts the mathematical formulation of five objective functions namely residual energy, distance among the sensor nodes, distance between base station and cluster head, node degree and node centrality.
Objective 1: CH Residual Energy
In WSN, several tasks are performed by the CH (i.e., data collection from ordinary sensor nodes and transmitting data to the sink). To accomplish the above-mentioned tasks, high energy is required by the CH. Therefore, a CH prefers a sensor node containing high residual energy.
where RJ signifies the residual energy of Jth CH [21].
Objective 2: Node Degree
Node degree refers to the total number of node that belongs to the corresponding CH. The CH containing the minimum number of sensor nodes is selected. This is because more energy is lost when the total number of CH is increased.
From Eq. (2), the sensor nodes belong to the CH is SJ [21].
Objective 3: Distance between the Sensor Nodes
The distance among the nodes refers to the distances among the CH and ordinary sensor nodes. The dissipation of nodal energy depends mainly on the transmission path distance. When the transmission distance towards the sink is less, then the energy consumption of the sensor nodes is small. Thus,
where D(δJ, CHJ) indicates the distance between the Jth sensor and Kth CH.
Objective 4: Centrality of Sensor Nodes
Node centrality refers to, what extend a node is located centrally from the neighboring sensor nodes. Therefore, the mathematical formula to determine the centrality of the sensor nodes is obtained as follows.
From Eq. (4), M(J) and N denotes the total number of neighbor sensor nodes and network dimension respectively [32].
Objective 5: Distance among the Sink and CH
It defines the total distance between the CH and sink. The energy consumption of the sensor node relies mainly on distance utilizing a transmitting path. Let us consider an illustration; if both the CH and sink are far away from each other, more energy is required for transmitting data. This results in an abrupt drop and large energy consumption of CH. Therefore, the sensor nodes containing less distance from the sink are chosen while transmitting the data [32]. Hence,
where the total distance between the CH and sink is D(CHK, sink).
This section illustrates the comprehensive description regarding three different designs namely the network design, energy design and distance design.
See Fig. 1 depicts the WSN structure comprising sensor nodes, CH, base station, transmission link among CH and sensor nodes and CH as well as the base station. In general, the WSN relies on five different features namely the topological features, sensor allocation, energy consumption, data sensing as well as radio communication [33]. The sensors are located either manually or randomly based on certain applications like military, industrial and environmental domains for monitoring and controlling. Fig. 1 comprises a multi-hop network which can be obtained in a graphical form G stated below.
where the base station and the sensor nodes are represented by δ. ψ indicates the transmission link between various sensor nodes. The following assumptions made for the network are mentioned below.
(i) A 2D Cartesian system is employed for the deployment of random sensors
(ii) Well-equipped non-rechargeable power resources are utilized for all sensor nodes
(iii) The sensor nodes are not feasible to vary their location after they are deployed
(iv) The processing and communication abilities of all sensor nodes are analogous
(v) The sensor nodes comprising initial energy are identical
(vi) The transmission link between sensor nodes is bi-directional (i.e., capable of diffusing data in both directions).
Figure 1: System model of WSN
In general, the selected CH of a particular network transmits messages to a state wherein they operate as CH [34]. Under such circumstances, every sensor node evaluates the specific distances from CH. The node in the network is clustered again with selected CH employing a distance matrix D (m*n) stated in Eq. (7).
From Eq. (7), E indicates the Euclidean distance between the CH. X(1) to X(N) is the sensor nodes. Let us consider two sensor nodes Yth and Zth containing the p and q respectively. Eq. (8) provides the mathematical formula to determine the Euclidean distance [23]. Thus,
In this paper, the receiver and the transmitter energy are computed using a basic first-order ratio design [35]. The energy consumed in collecting and transmitting k bit packets along the distance D is obtained in Eqs. (9) and (10).
The receiving and the transmitting energy dissipated is denoted by εE. D0 indicates the threshold distance. The following equation determining the threshold value is stated in Eq. (11).
From the above Eq. (11), εF and εM denotes the amplification energy of free space and multipath. It is also noted that the transmitter amplification model is dependent on both εF and εM [35].
Fig. 2 depicts the proposed workflow. The proposed approach comprises two major phases: (a) optimal CH selection (b) Routing process. The modified Golden eagle optimization algorithm is employed in selecting the optimal cluster head. M-GEO algorithm selects an optimal routing path among the CH and sink node or base station. Then later the CH transmits the data to the sink node via the path generated using the YSG algorithm.
Figure 2: Proposed workflow
5.1 Modified Golden Eagle Optimization (M-GEO) Algorithm for CH Selection
This paper proposes a modified golden eagle optimization (M-GEO) algorithm to figure out the most significant issue of choosing an optimal CH in every cluster. In WSN, every sensor node is considered as an individual golden eagle and their prey selection process depends upon the distance among an individual sensor node and the nearby sensors. Here, the sensor nodes are attracted by the prey selection process of the golden eagle. The performance behavior and the characteristics of the golden eagle are based on search algorithmic processes. The M-GEO algorithm selects an optimal CH among all the sensors by employing node degree, residual energy, the distance among the nearby sensors, centrality of sensor nodes as well as distance among the CH and sink node. The steps involved in the M-GEO algorithm for optimal CH selection are discussed in the following section.
The generic name of the golden eagle is Aquila and the specific name is chrysaetos belongs to the family of Accipitridae and species of hawks and eagles. Generally, the golden eagles are specialized hunters with extraordinary vision capability and influential talons. The golden eagles can fly at a speed of 190 km per hour and are distributed widely in the northern hemisphere of the earth. Hunting and cruising are the two unique characters of golden eagles that are performed in a spiral path. Additionally, the golden eagles cleverly establish a balance for snatching the best kill at a reasonable amount of energy and time. One of the special features of this eagles are it lower the altitude gradually and at the same time, it approaches the prey. The mathematical modeling and the step-by-step procedure involved in the M-GEO algorithm are discussed as follows [36].
Circular Movement of Golden Eagle
The M-GEO is based on the circular movement of golden eagles. Each golden eagle remembers the best spot it has traveled previously. Simultaneously, the eagle attacks the prey and cruise for searching for better foodstuff. For every iteration, every golden eagle J chooses the prey randomly of a new golden eagle G. Then later it makes a circular movement for identifying the best spot visited before by a golden eagle G. Additionally, the golden eagle J also can select to circle and recollect the memories. Hence,
Eq. (12), P signifies the population size [36].
The golden eagle optimization algorithm utilizes the prey selection process of the chameleon optimization algorithm [37]. Similar to other creatures, the chameleons wander around the trees and in the desert in search of prey. Chameleons are assimilating to climb and hunt with clear eyesight where they can view the prey upto 32 feet. The chameleons significantly nourish themselves by drizzling their clingy tongue to catch their prey. The eyes of the chameleons have the proficiency for exploring the search space in locating the prey. The performance activities of chameleons motion during the foraging process is expressed mathematically by updating the positioning strategy stated as follows [36].
From Eq. (13), the current and new position of the Jth chameleon is represented by t and T. A1 and A2 is the two different positive numbers for controlling the exploration capability. The best and the global best position scored by the chameleon with respect to Jth dimension and Tth iteration is denoted by
Exploitation Phase (Attack Process)
The attack phase is designed in such a way that the present golden eagle's position begins with the vector and terminates with the best spot decided by the eagle after memorizing. Therefore, the following equation provides the computation equation of the attack vector [36].
From Eq. (14), the attack vector of the Jth golden eagle is
Exploration Phase (Cruise Phase)
In accordance with the attack vector, the cruise vector is computed. The cruise vector is perpendicular to the attack vector and considered as a tangent vector. Therefore, initially, it is necessary to determine the hyperplane
Then the cruise vector with respect to the Jth dimension is determined followed by computing the hyperplane vector. Thus,
From Eq. (17), the attack vector, design variables and the best spot of the chosen prey are
The golden eagle displacement generally comprises of two different factors namely the vector and attack. Therefore accordingly the step vector for a golden angle with respect to t iteration is computed in Eq. (18).
From the above Eq. (18), the random number ranging from 0 to 1 are denoted by
Then the eagle position with respect to T + 1th iteration is computed by,
The best spot in the memory is worse than the fitness of the new position, and then the memory of the golden eagle is updated with the new position.
Switching Process from Exploration to Exploitation
It is well known that the golden eagles reveal their higher tendency for cruising and hunting at both initial and final stages. In addition to this, the M-GEO algorithm utilizes both Pa and Pc for exploitation and exploration. Thus,
From Eqs. (21) and (22),
After CH selection using M-GEO, the CH allocates the sensor nodes by employing the potential function stated in Eq. (23).
From Eq. (23), Sp and B signifies the sensor node potential and the proportionality constant. Here, the CH allocates the sensors with high residual energy and minimum transmission distance and hence the total energy consumption will be minimal during the transmission of data.
5.2 Yellow Saddle Goatfish (YSG) Algorithm for Route Generation
YSG algorithm is a metaheuristic algorithm stimulated by the performance behavior of the goatfish. In general, the goatfish discovers a hunting strategy to obtain its prey (i.e., small fishes). The YSG algorithm is applied to solve diverse discrete problems that are illustrated in the graphical form containing the number of links and nodes. During the initialization process, each node comprises goatfishes and every individual is accompanied to the weight. Initially, the weights of the links are computed concerning the random value or by employing mathematical expressions.
The collective hunting model of a goatfish is regarded as a guiding principle for developing a bio-inspired algorithm. The YSG algorithm concerns two distinctive types of search agents namely chaser as well as a blocker. One fish in every sub-population is considered as a chaser and the rest are the blockers. The hunting designs of YSG with their necessary steps are discussed as follows [38].
Every individual goat fish among the population are generated randomly and distributed uniformly containing lower and upper boundaries of M-dimensional search space area.
From Eq. (24), the random number ranges from 0 to 1 are represented by
During the process of hunting, the prey tries to hide behind the cervices and escape in between the corals. The tactics of the chaser fish involve inserting the barbels into the cervices to catch the prey. Here, the levy flight algorithm is employed in random walk generation. The chaser fish attempts in finding the cervices by varying its position containing random walk. Therefore, the new position of the chaser fish is stated in Eq. (25).
From the above Eq. (25), the
From Eq. (26), the current generation and maximum iteration numbers are T and TMAX respectively. Every group generally ignores the other sub-populations to obtain the best prey, then.
From Eq. (27), the best chasing fish obtained so far is denoted by
Once the chase fishes are selected for every cluster, the rest goat fishes are considered as the blocker. During the blocking process, the hunter strategy is employed to encircle the corals thereby block the escaping prey. The blocker fish moves in a circular motion when the chaser fish approaches the prey. Therefore, the new position of the blocker fish is evaluated based on the logarithmic spiral path stated below [38].
From Eq. (29), λ denotes the random value ranging from (r, 1). B signifies the constant determining the direction and shape of the spiral path. The distance among the current position of both chaser and blocker fish is denoted by dg.
The significant intention of the blocker fish prevents the perspective of the prey. The prey progresses to the hunting location during hunting. Hence, the blocker fish which is near to the prey show the way to hunt thus become the new chaser fish and the present chaser fish becomes the blocker fish. Such a technique is referred to as the swapping of roles.
The group changes its position for identifying the new prey once the area has been exploited completely. Under such circumstances, the YSG algorithm utilizes an exploitation parameter and hence for each cluster, if pre-determined iterations exceed without determining the optimal solution, then it is regarded as successful hunting. Therefore zone transformation is performed for entire goat fishes.
From Eq. (30), the new position of the goatfish is
In this paper, the maintenance of clusters is the most significant phase for balancing the load among the cluster. Due to inter-cluster congestion, the neighboring cluster present near the sink node or the base station consumes more energy. Hence, maintaining clusters is necessary for eliminating the failure of nodes. This results in the enhancement of network lifetime during the transmission of data from the source node to the base station. Furthermore, if the residual energies of the CH exceed the threshold level, then M-GEO algorithm is initialized for network clustering. Later, the clustering M-GEO algorithm selects the CH and YSG algorithm is employed in the route generation process.
In the proposed approach, the CH is selected effectively using the M-GEO algorithm. The CH selection is based on employing node degree, the distance among the nearby sensors, residual energy, centrality of sensor nodes as well as distance between the CH and sink node. The base station or the sink node frequently monitors the residual energy to prevent nodal failure while transmitting the data. Consequently, the YSG algorithm is employed to generate an optimal routing path from the CH to the base station. It is capable of detecting the shortest routing path to minimize energy consumption. Therefore, the M-GEO and YSG algorithm for optimal selection of CH and route generation is designed to obtain energy-efficient WSN. Thus, energy-effective WSN is employed in enhancing the total number of packets and network lifetime while transmitting the data.
This section evaluates the performance analysis of the proposed approach. The major intention of this paper is to maximize the network life and to reduce the overall energy consumption of the network. The evaluation results and comparative analysis to achieve an energy-efficient proposed approach are discussed in the following section.
6.1 Experimental Configuration
The proposed energy-efficient routing protocol approach is investigated and executed under the platform of MATLAB R2018a, windows 8 OS containing 4 GB RAM and Intel core i3 processor. The significant intention of utilizing MATLAB is to obtain simple mathematical formulations and appropriate analysis of data.
Tab. 2 depicts the experimentation parameters employed in this experiment containing the deployment area, nodes, clusters, initial nodal energy, packet size, etc. Tab. 3 describes the parameters of the M-GEO algorithm and YSG algorithm.
In this section, various parameters namely the network lifetime, number of alive nodes, energy consumption, throughput, number of dead nodes, packet delivery ratio as well as routing overhead is described.
The network lifetime signifies the total rounds and total time duration of the network for performing the operations. In other words, it defines the rounds that the nodes will die during the task processing. Eq. (31) provides the mathematical formulation of the network lifetime.
From the above Eq. (31), CM, LJ(SN) and NK signifies the coverage matrix, source node lifetime as well as the total number of nodes. From Eq. (31),
It refers to the sensor node in the network containing adequate energy to process its task. The mathematical expression involved in determining the total number of alive nodes is stated in Eq. (33).
From the above Eq. (33), the total number of alive nodes and the energy of the node with respect to the Jth round are AN(J) and RE(N) respectively.
It refers to the sensor node in the network that doesn't contain adequate energy to process its task. The mathematical expression involved in determining the total number of alive nodes is formulated in the below Eq. (34).
From Eq. (34), the total number of dead nodes is DN(J).
The mathematical formulation to determine the total amount of consumed energy by the sensor nodes is formulated in Eq. (35).
From the above Eq. (35), EC, E(CH) and E(CM) signifies the energy consumption, energy employed by the cluster head and cluster member.
Throughput is the ratio of the product of total number of packets and the size of the packet to the total time taken during transmission of data. The mathematical formula to depict the throughput value is determined in Eq. (36).
From the above Eq. (36), Psent and Psize denotes the total number of packets sent and packet size respectively. The throughput value and the time was taken are denoted by TR and T.
The term packet delivery ratio refers to the fraction of the total number of received packets by the total sent packet. Thus,
The term routing overhead refers to the ratio among the total packet received by the sink node to the total number of packets generated.
Fig. 3 presents the comparative analysis based on network lifetime among the proposed approach and various other existing approaches. The network lifetime determines the total rounds when the energy is completely exhausted from the total sensor nodes. The comparative analysis is carried out for the proposed approach and various other existing approaches namely ant colony integrated glow warm swarm optimization (ACI-GWO) [32], butterfly optimization algorithm and ant colony optimization(BACO) [22], flower pollination algorithm (FPA) [23], Hybrid grey wolf sunflower optimization (HGWS) [27]. The experimental analysis is performed and the analysis revealed that the network lifetime of the proposed approach was high than other existing approaches.
Figure 3: Analysis of network lifetime
The comparative graphical analysis of alive node present in the network concerning the diverse routing approaches namely ACI-GWO, BACO, FPA, HGWS as well as the proposed approach is presented in Fig. 4. The figure represented below provides the analysis based on the total number of alive nodes during the processing of the set of rounds. The experimental evaluation is conducted and the analysis demonstrated that our proposed approach has completed 3500 rounds under alive circumstances. But the other existing approaches while completing 3500 rounds the total number of alive nodes is decreased. This indicates that the proposed approach provides better performances with a high number of alive nodes.
Figure 4: Analysis based on total number of alive nodes
Fig. 5 presents the comparative analysis based on dead nodes in the network during the processing of set of rounds. In general, the sensor node exhibit in the network dies during task processing. From the graphical analysis it is noted that after the processing of almost 2000 nodes, the existing approaches lost only less number of dead nodes. But the proposed approach lost more dead nodes while completing 3500 rounds. This demonstrates that the proposed approach achieved high performance than other approaches.
Figure 5: Dead node analysis
Fig. 6 depicts the comparison performance based on energy consumption of the proposed approach with respect to various other existing approaches namely ACI-GWO, BACO, FPA, HGWS. Here, the energy is employed for the processing of tasks containing a diverse number of nodes. From the graphical analysis, the energy consumption of the proposed approach is very low; whereas, in other existing approaches, the energy consumed is very high. This implies that the performances are higher than other approaches. The comparative analysis for the throughput of various approaches along with the proposed approach is represented in Fig. 7. Here, the graphical analysis is plotted for the throughput value and the sensor node density. The experimental analyses are conducted for each respective approach and the comparative analysis is done. Therefore, from the evaluation results, it is clear that the data is transferred at a very high speed in the case of proposed approaches. But the data transfer seems bit lower in other existing approaches.
Figure 6: Energy consumption analysis
Figure 7: Throughput analysis
Fig. 8 presents the pictorial representation for the packet delivery ratio for the proposed approach with respect to various other existing approaches namely ACI-GWO, BACO, FPA and HGWS. From the graphical analysis, the packet is delivered successfully for the proposed approach whereas the packet delivery is low for other existing approaches. Similarly, Fig. 9 presents the graphical analysis based on routing overhead and the analysis revealed that the proposed approach provides minimum routing overhead than other approaches.
Figure 8: Evaluation for packet delivery ratio
Figure 9: Routing overhead analysis
In WSN, the selection of cluster head and generation of the optimal route is considered as a challenging task. This study considers both distance and energy to develop energy-efficient WSN since the energy consumption of every node depends significantly on the distance among the nodes. Thus the energy consumption is in direct proportion with the distance among the sensor node. The cluster-based routing protocol provides an effective way to minimize the energy consumption and the total number of messages transmitted to the base station or the sink node. In the proposed approach, the CH is selected effectively using M-GEO algorithm. The selection of CH is based on employing node degree, residual energy, the distance among the nearby sensors, centrality of sensor nodes as well as distance among CH and sink nodes. Additionally, a yellow saddle goatfish (YSG) optimization algorithm is employed in generating the optimal routing path from the cluster head to the base station that detects the short routing path to minimize energy consumption. Finally, the proposed energy-efficient routing protocol approach is investigated by employing various parameters and the experimental analyses are conducted and the comparative analysis is made concerning the diverse routing approaches namely ACI-GWO, BACO, FPA, HGWS as well as the proposed approach. Thus the obtained outcome revealed that the proposed approach achieved high performance than other routing-based approaches. The conclusion of the proposed approach also directs the future study to enhance the robustness of the system.
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
![]() | This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |