(32 - ) .Springer - Energy Efficient Clustering Routing Protocol in Wireless Sensor Networks - Optimized Cluster Head Selection Model
(32 - ) .Springer - Energy Efficient Clustering Routing Protocol in Wireless Sensor Networks - Optimized Cluster Head Selection Model
https://doi.org/10.1007/s11235-020-00659-9
Abstract
Energy efficiency has become a primary issue in wireless sensor networks (WSN). The sensor networks are powered by
battery and thus they turn out to be dead after a particular interval. Hence, enhancing the data dissipation in energy efficient
manner remains to be more challenging for increasing the life span of sensor devices. It has been already proved that the
clustering method could improve or enhance the life span of WSNs. In the clustering model, the selection of cluster head
(CH) in each cluster regards as the capable method for energy efficient routing, which minimizes the transmission delay in
WSN. However, the main problem dealt with the selection of optimal CH that makes the network service prompt. Till now,
more research works have been processing on solving this issue by considering different constraints. Under this scenario, this
paper attempts to develop a new clustering model with optimal cluster head selection by considering four major criteria like
energy, delay, distance, and security. Further, for selecting the optimal CHs, this paper proposes a new hybrid algorithm that
hybridizes the concept of dragon fly and firefly algorithm algorithms, termed fire fly replaced position update in dragonfly.
Finally, the performance of the proposed work is carried out by comparing with other conventional models in terms of number
of alive nodes, network energy, delay and risk probability.
123
T. A. Alghamdi
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
analysis has stated the considerable improvement in the net- efficient clustering for prolonging the life cycle of network
work lifespan among the proposed model. and enhancing energy efficiency. The optimal solution that
In 2018, Reem et al. [23] have examined an optimum node attained from the earlier network round has been added to
degree for minimum energy consumption. The node degree the prime population for the present round, by which the
of the Degree Constrained Tree (DCT) in homogeneous WSN search efficiency has been enhanced. Further, while model-
with only one BS was adopted for their study. The degree ing the fitness function, the load balancing factor was also
of the nodes, in turn, affects the lifetime of the network. considered that balances the energy consumption between
Consequently, the paper proposes a Collaborative Distributed the nodes. The simulation outcome has revealed that the pro-
Antenna (CDA) routing protocol in terms of transmission posed model has bettered in terms of load balancing having
energy to provide node distribution. The experimental results low variance and energy-efficient.
show that the optimal node degree doubles the lifetime of In 2019, Ennaciri et al. [28] have exploited a new load
the network. Further, DCT with CDA proves enhancement balancing protocol for managing the energy consumed by
in network stability. the sensor nodes in the WSN. The simulation was done
In 2017, Sharawi and Emary [24] adopted Grey wolf using MATLAB, the performance comparison was evaluated
optimization (GWO) to resolve the CH selection problem. using two protocols namely LEACH and SEP. Thus, finally
Suitable fitness function was employed to ensure coverage of it proved its superiority.
the WSN and is fed to the GWO to find its optimum. The pro- Problem statement In the literature, the cluster-based rout-
posed model results are compared with the LEACH routing ing has been reported with different contributions. They are
protocol. Four different like residual energy lifetime, network broadly categorized into, algorithm for cluster head selection
throughput and performance indicators are analysed. Finally, and constraints for cluster head selection. As per the catego-
the introduced model outperforms the LEACH in almost all rization, the constraints for cluster head selection process for
topologies using the different indicators. routing protocol have been reported in [21, 23, 26], whereas
In 2018, Jadhav and Shankar et al. [25] proposed an [22, 24, 25, 27] proposes metaheuristic optimization algo-
energy-efficient cluster head selection algorithm, which is rithm for cluster head selection process is named as set 1.
based on Whale Optimization Algorithm (WOA) called Since our research intends to develop an optimization algo-
WOA-Clustering (WOA-C) was proposed. Consequently, it rithm for cluster head selection process, we consider [22, 24,
helps in the selection of energy aware cluster heads based 25, 27] for further study and analysis. Moreover, our paper
on a fitness function that considers the residual energy of focuses on both the DA and FA concepts that take update
the node and the sum of energy of adjacent nodes. Finally, based on levy distribution, encircling and random solutions.
the implemented algorithm was evaluated in terms of energy It leads the algorithm to converge earlier than the traditional
efficiency, network lifetime, overall stability and throughput. algorithms. It is grouped to form set 2.
Moreover, the performance of WOA-C was assessed against
other standard contemporary routing protocols to show its 2.2 Reviews
superiority over other models.
In 2018, Yahiaoui et al. [26] have proposed delay and Table 2 shows the reviews on CHS in WSN. MEACBM [21]
energy-sensitive routing protocol to ensure enhanced quality has a superior performance by minimizing the consumption
of service. The main objective of the paper includes mini- of energy and raises the network lifetime, throughput and
mization of delay and energy consumption. The WSN and count of dead sensor nodes. However, needs simulation over
actuator network are considered. It composed of both sen- the real-time experiments and requires the consideration of
sor and actuator nodes. The actuators are responsible for scalability of sensor nodes within every cluster. ACOPSO
taking prompt decisions and react accordingly to the data [22] the algorithm selects a cluster head based on the hybrid
gathered by sensor nodes. These networks are organized in operation of PSO and ACO. ACO is a local search algorithm,
clusters, which are supervised using CH. The CH was elected while the cluster head selection problem is a multimodal
based on connectivity and energy capability. Moreover, the optimization problem. So, the probability of sticking with
latter metric ensures the distance among a number of hops the local optimal is high. DCT with CDA [23] has elongated
of sensor nodes relative to the actuator nodes. This metric network lifetime and network stability. However, the security
improves the network reliability by reducing the communi- condition is the major challenge of this method. In [24, 25],
cation delay when alerting the actuator nodes, and hence, Whale optimization and GWO take the updating principle
reduces the energy consumption. Finally, the simulation out- based on the encircling model. The model is not compet-
comes show sufficient gain in terms of communication delay itive enough to understand the cluster head characteristics
and energy consumption. because there is no swirling geography in the cluster head
In 2018, Tianshu et al. [27] have presented a rout- selection process. Delay and Energy sensitive routing proto-
ing approach GECR and genetic algorithm-based energy- col [26] has reduced the packet drop and energy consumption.
123
T. A. Alghamdi
MEACBM [21] Superior performance by minimizing the amount of Needs simulation over the real-time experiments
energy consumption of sensor node Requires the consideration of scalability of sensor nodes
Increases the network lifetime, throughput and count within every cluster
of dead sensor nodes
ACOPSO [22] Reduced packet size Critical to define the initial design parameters
Enhances the network lifetime Cannot define the issues of scattering
Conserves energy in effective manner
DCT with CDA [23] Elongates the network lifetime Security needs to be considered
Improves network stability
GWO [24] Better network lifetime and throughput Uncertain obtaining process
Simplified energy consumption Needs joint consideration of MAC and network layer
WOA-C [25] Extends the life span of network Network performance needs improvement
Improved scalability Cluster Head characteristics are not clearly defined
Delay and energy sensitive Improves the reliability Research never measured security and efficiency
routing protocol [26] Minimize the delay and energy consumption
GECR [27] Better network life cycle Future work focuses on verifying and applying the
Optimal energy utilization appropriate metaheuristic algorithms
Optimal selection is uncertain
Load balancing protocol Improved network stability, throughput, and packet Energy harvesting scheme needs to be considered
[28] drop rate Network lifetime further needs improvement
Significantly reduced energy consumption
RE-attempt [36] Better network lifetime and throughput Will focus on cross-layer design protocols
Simplified energy consumption Needs joint consideration of MAC and network layer
K-means algorithm [37] High throughput Hard to reach the optimal solution within a reasonable
Less energy consumption time
FCM [38] Maximises energy There is possibility to loss information
DBSCAN [39] It categorized cluster based on belong-to, not Less number of constraint are considered
belong-to and ambiguity
Reduce energy consumption
LEACH [40] It measure the level of life time of the sensor nodes Routing of packets is critical
Minimize intra-cluster distance
It still lacks in measuring energy efficiency and security. transmitting the sensed data to the sink node Bs . The pattern
GECR [27] genetic algorithm highly depends on random- of transmission of all sensor nodes depends on the uniform
ization and roulette wheel selection so that updating towards distribution, in which the data is distributed with utmost radio
the optimal point is uncertain. It poses better network life level with the dimensions of Mn and Mm in meters. The group
cycle, energy utilization, and load balancing. Load balanc- of sensor nodes turns into a cluster denoted by Cn .
ing protocol (EESAA) [28] has improved network stability, In each cluster, the term Dcn denotes the corresponding
throughput, and packet drop rate and further significantly CH. A new mechanism for transmitting the data from the
reduced energy consumption. Two major disadvantages are entire nodes to BS is known as CH-oriented routing. Here,
energy harvesting scheme needs to be considered and the the distance among BS and CHis given by d H B and distance
network lifetime further needs improvement. among i th normal node to jth CHis denotedas di j .The main
advantage of this model [29] is of structural data flow, and
lifespan improvement. However, it considered less number of
3 Proposed clustering model: energy constraints for optimal cluster head selection. To overcome
and security awareness in cluster head that issue, few more constraints are included in the proposed
selection process model (Fig. 1).
The WSN model is adopted from [29], of that comprises Here, the security mode, risky mode and γ -risky mode are
of m count of nodes. These sensor nodes are efficient of regarded as constraints that are defined below.
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
L
L
In addition, if the chosen CH achieves the state sd > sr the (n) nor m
gdistance L p − L qnor m (8)
risk should be less than 50%. If the condition is 0 < sd −sr ≤ p1 q1
123
T. A. Alghamdi
The fitness function in terms of energy is given by Eq. (9). tion of the present individual and N signifies the count of the
(m) (n)
If genergy and genergy of Eq. (9) attains more number of CH neighboring individuals.
and energy, then the value of genergy will be higher than one.
The deviations of node energy and unit value are the con-
N
Hi − Y − Yj (14)
ditions for achieving the reduction criterion which is given
j1
by Eq. (10). Here, the improved process of CHS provides a
reduced value of n E(q). In Eq. (12), E(L qnor m ) and E(L nor
p
m)
Alignment is measured, as revealed by Eq. (15), in which
specifies the energy of qth normal node and energy of the p th Q j signifies the velocity of the jth neighboring individual. In
normal node, correspondingly. addition, the formulation for cohesion is given by Eq. (16),
in which Y j specifies the position of the jth neighboring
(m)
genergy individual, Ne symbolizes the neighborcount and Y signifies
genergy (n)
(9)
genergy the position of the current individual.
L
Ne
Qj
n E(q) 1 − E(L nor
p
m
) ∗ E(Dc ) ; 1 ≤ q < Dcn Bi
j1
(15)
p1 Ne
p∈q Ne
(10) j1 Y j
Gi −Y (16)
Ne
Dcn
(m)
genergy n E(q) (11) Attraction to a food resource is computed by Eq. (17), in
q1 which Y + corresponds to the position of food source and Y
Dcn Dcn signifies the current individual position.
(n)
genergy Dcn ∗ Max E(L nor
p
m
) ∗ Max E(L qnor m ) (12)
p1 q1
Fi Y + − Y (17)
The fitness function in terms of delay is given by Eq. (13).
Distraction towards an enemy is specified by Eq. (18), in
The count of nodes in cluster is directly proportional to delay
which Y − describes the enemy’s position and Y denotes the
and therefore for minimizing the delay, the count of nodes in
present position of individuals.
cluster must be reduced.
Dcn
Ei Y − + Y (18)
q
Max Dc
q1 For updating the position of dragonflies in an exploration
gdelay (13) space and to accomplish their movements, two vectors are
L
evaluated and they are step (Y ) and position (Y ).
The value of f delay having to lie among 0 and 1. In The step vector exposes the direction of movement of the
Hcn dragonfly, as computed in Eq. (19). Here, Hi indicates the
q
Eq. (13), Max Hc encompasses the highest count of CH separation of ith individual, p denotes the separation weight,
q1 a denotes the alignment weight, G signifies the ith individ-
and L includes the entire count of clusters in the network. ual cohesion, c refers to cohesion weight, B points to the
alignment of the ith individual, Fi corresponds to the food
resource of the ith individual, f symbolizes the food fac-
4 Optimal selection of secure and energy tor, e corresponds to the enemy factor, w refers to the inertia
aware cluster head selection weight, E i signifies the enemy’s position of the ith individual
and t indicates the iteration counter.
4.1 Conventional dragonfly algorithm
Y (t + 1) ( p Hi + a Bi + cG i + f Fi + eE i ) + wY (t)
The chief motivation of the DA model [31] emerges from (19)
the dynamic and the static swarming mechanisms. These
two mechanisms are associated with the two foremost stages Consequent to the assessment of the step vector, the posi-
namely: (i) exploration and (ii) exploitation. These two tion vectors are manipulated by Eq. (20), in which t indicates
phases are modeled as follows: The formulation for sepa- the current iteration.
ration is evaluated, as in Eq. (14), in which Y j reveals the jth
position of the neighboring individual, Y denotes the posi- Y (t + 1) Y (t) + Y (t + 1) (20)
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
For improving the stochastic performance of the artificial addressing the solution S is proportional to the fitness value.
dragonflies, it is essential to fly around the exploration space, Here, according to Eq. (25), the intensity of light I (w)
where there are no any neighboring solutions. In such con- changes, where I0 indicates the light intensity achieved from
ditions, the dragonfly’s position is modified by Eq. (21), in the source, and light absorption is computed by deploying
which z signifies the dimension of the position vectors, and the light absorption coefficient γ .
t stands for the current iteration.
I (w) I0 e−γ w
2
(25)
Y (t + 1) Y (t) + Levy(z) × Y (t) (21)
The uniformity at w 0 in I w2 is evaded by merg-
The Levy flight is evaluated by Eq. (22), in which β is a ing the inverse square law effects and Gaussian effects. That
constant factor and r1 and r2 are the random numbers that are specifies the attractiveness of fireflies is proportional to I
lying among [0, 1]. Further, δ is computed using Eq. (23), in (w).
which Γ (x) (x − 1). Algorithm 1 depicts pseudo-code of Therefore Eq. (26) that is similar to Eq. (24) can be rep-
the conventional DA model. resented to portray the attractiveness,β, in which β0 denotes
the attraction level at w 0. The intensity of light I and β
r1 × δ
Levy(x) 0.01 × 1
(22) are equal under specific conditions.
|r2 | β
⎛ ⎞1 β β0 e−γ w
2
(26)
πβ β
Γ (1 + β) × sin 2
⎜ ⎟
δ⎝
β−1
⎠ (23)
(1+β) The distance amongst two fireflies Si and S j is specified
Γ 2 ×β ×2 2
wi j as shown in Eq. (27), in which n signifies the dimension-
ality issues. The mobility of the ith firefly is fascinated by
another firefly j that is more gorgeous.
Algorithm 1 : Conventional DA algorithm
Initialization kn
While end condition is not attained
wi j Si − S j
2
Evaluate the objective value of the entire fireflies Sik − S jk (27)
Update enemy and food source k1
Update w , p , a , c , f and e
Compute H B , G , E and F using Eq. (14-18) In this manner, Eq. (28) can be deployed, in which εi
Update the neighboring radius
If a dragonfly involves one neighbor dragonfly, denotes a random number. The movement of fireflies includes
Update the velocity vector as per Eq. (19) three features, the current location of ith firefly, attractive-
Update the position vector as per Eq. (20) ness, and a random walk that involves a variable called α
else
Update the position vector as per Eq. (21) and the randomly created integer lying between [0, 1]. When
end If β0 0, the movement depends alone on the random walks.
Verify the novel positions, depending on the variable The variable γ has a great impact on the speed of conver-
boundaries
end While gence. Even if the γ value can achieve any value lying among
γ ∈ [0, ∞], its setting is based on the issues that have to be
optimized. Usually, it ranges from 0.1 to 10.
4.2 Conventional firefly algorithm
Si (t + 1) Si (t) + β0 e−γ wi j S j (t) − Si (t) + αεi
2
(28)
Fireflies [32] are the most charismatic insects when com-
pared with others. The major features of fireflies are their 4.3 Proposed FPU-DA algorithm
flashing light that has two basic features. The first feature
concerns with the attracting of mating partners and second The novelty of the paper is the hybridization of DA and FF
feature concerns on warning the predators. In FF, the distance (Fig. 2).
w raises with the decrease in light intensity I as shown in For the selection of the optimal cluster head in each cluster,
Eq. (24). we propose a new hybrid algorithm that hybrids the concept
1 of DA and FF, respectively. Even though the conventional
Iα (24) DA algorithm poses various advantages, including accurate
w2
approximations, it also poses certain disadvantages such as
Two major issues namely, attraction and the changes in reduced internal memory and slow convergence. Similarly,
light intensity must be resolved for designing the FF model FF also seems to be little constricting by means of conver-
in an accurate manner. In FF algorithm, light intensity I gence rate. Hence, it is planned to mingle both the concept
123
T. A. Alghamdi
3
Initialization 2 4 5 13
Distributed
1 10 12
sensor nodes 11
9 13
6 7 8 19 20
Update w , p , a , c , f and e
Update the position vector based Update the velocity vector and
on FF model as per Eq. (28) position vector by means of Eq. Fitness
(19) and Eq. (20) respectively Evaluation
Fig. 2 Flow chart of the proposed model Fig. 3 Cluster head selection process
in a certain way that obviously solves the optimization prob- 5 Results and discussion
lems with better convergence. The procedure of proposed
algorithm is as follows, where the concept of FF is influ- 5.1 Simulation procedure
enced into DA algorithm. More particularly, if the dragonfly
involves no neighbourhood, conventionally levy update gets The simulation of FPU-DA based CHS in WSN was per-
executed as per Eq. (21), but in the proposed algorithm, for formed in MATLAB 2018a and the results were attained.
the same case, the FF position update gets evaluated that Here, the experimentations were carried out from 0 to 2000
is given in Eq. (28). As the modification is done based on rounds. The number of sensor nodes was distributed in the
the position update of FF, the presented model is termed as network of the area 100 m×100 m with centralized BS. Here,
FPU-DA model. Algorithm 2 depicts a pseudo code of FPU- E I was the initial energy set at 0.5 and E F was the energy
DA algorithm. An example of optimal clustering model is requirement of free space model that was set at 10n J/bits/m2 .
provided in Fig. 3. In addition, E p denotes the energy of power amplifier set
at 0.0013n J/bits/m2 and E T signifies the energy of trans-
Algorithm 2 : Proposed FPU-DA algorithm mitter set at 50n J/bits/m2 . E D denotes the energy of data
Initialization
While end condition is not attained aggregation set at 5n J/bits/signal. The implementation was
Evaluate the objective value of the entire fireflies performed with respect to constraints such as delay, risk
Update enemy and food source probability, and security. Moreover, the implemented CHS
Update w , p , a , c , f and e
in WSN was distinguished with other traditional methods
Compute H B , G , E and F using Eq. (14-18)
Update the neighboring radius namely, FF [32], GWO [33], DA [31] and WOA [34]. In
If a dragonfly involves one neighbor dragonfly, addition, the NAN and NNE in the network were also veri-
Update the velocity vector as per Eq. (19) fied. In addition, five set of experiments were carried out for
Update the position vector as per Eq. (20)
Else α, β and γ values of FF model namely, [0.1 0.3 1], [0.2 0.4
Update the position based on the FF algorithm 1], [0.3 0.5 1], [0.4 0.6 1] and [0.5 0.7 1] respectively.
as per Eq. (28)
end If
Verify the novel positions, depending on the variable
boundaries
end While
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
5.2 Convergence analysis model when compared over the other schemes. From Fig. 5a,
the NAN for the proposed FPU-DA model at 2000th round
The Fig. 4 shows convergence analysis of the proposed FPU- is 18.92%, and 24.32%, better than the GWO, and WOA,
DA model over other schemes. Figure 4 is splitting into two algorithms. Moreover, the distance among rounds of NAN
sets set 1 and set 2. Set 1 is defined by the optimization are evaluated and represented in Fig. 5b. In addition, from
model research reviewed in the literature [22, 24, 25, 27] and Fig. 5b, the log of NAN for the implemented model at dis-
the proposed model is the hybridization of two conventional tance of 55 is 7.1%, and 7.1% superior to GWO, and WOA
algorithms FF and DA, so that its analysis is named as set 2. algorithms with more alive nodes. Similarly, the NAN with
From the experimental results, enhanced outcomes are found respect to set 2 in terms of number of rounds and distance is
to be attained by the implemented model over the other com- shown in Fig. 5c, d.
pared techniques. For set 1, from iteration 1 to 4, the proposed
model shows worst result when compared to PSO, GWO, and 5.4 Analysis on normalized network energy
WOA. But from iteration 4, the proposed model results best
performance over other conventional models. Iteration 6–9 The analysis on NNE for the presented FPU-DA model is
of the proposed model ensured 52.94%, 27.27%, 1.25%, and compared over other models is illustrated by Fig. 6. From
27.27% better than GA, PSO, GWO, and WOA. The cost Fig. 6, better NNE is found to be achieved by the proposed
function of the adopted model at 10th iteration is 56.25%, scheme over other schemes in terms set 1 and 2. From the
12.5%, 12.5%, and 93.75% better than GWO, WOA DA algo- Fig. 6a, the presented FPU-DA model at 2000th round is
rithms with minimal cost. In addition, for set 2 of iteration 50% and 50% better than the GWO, and WOA algorithms.
1 of Fig. 4b, the presented FPU-DA scheme is 73.33%, and Similarly, Fig. 6b shows better NNE when compared to FF
40% better than FF and DA algorithm, at 2nd iteration of and DA algorithm. Accordingly, from Fig. 6c, d, increased
the proposed model illustrates 33.33%, and 26.66% superior energy is found with respect to number of rounds. Therefore,
to FF and DA models. Further, 4th iteration of the proposed the improvement of the adopted FPU-DA technique for CHS
model is 33.33%, and 7.14% superior to FF and DA. Finally, in WSN has been substantiated successfully.
at iteration 8–10 the proposed model shows 12.5%, and 50%,
better than the FF and DA algorithms. Thus, it is known 5.5 Analysis on delay
that the adopted FPU-DA could offer better outcomes over
other compared schemes with minimum cost function. Fig- The analysis on delay for the suggested FPU-DA based CHS
ure 4b shows that the proposed model outperforms minimal model for varying rounds is given by Table 3. From the
cost functions when compared to conventional FF and DA attained outcomes, the delay of the presented model is very
algorithms. Thus, Fig. 4 proved that the proposed model con- much minimal than the other compared models. As per the
verges too fast when compared to conventional models. results in Table 3, at 1st round, the implemented FPU-DA
model is 16.93%, and 27.1% better than the FF, and DA
5.3 Analysis on number of alive nodes algorithms with less delay. In addition, Table 4 shows the
proposed FPU-DA scheme at 725th round is 10.91%, and
Figure 5 demonstrates the NAN and the log of NAN in terms 9.51% better than the FF, and DA algorithms. Thus, the supe-
of number of rounds and distance respectively. From the anal- riority of the presented FPU-DA model in terms of delay has
ysis of set 1, the NAN is found to be higher in the presented been verified in an effective manner.
123
T. A. Alghamdi
5.6 Analysis on risk probability sets. The probability of risk is much lower for the adopted
scheme over the traditional schemes. From the analysis of
Tables 5 and 6 give the risk probability analysis of the pro- Table 4, at 1500th round, the implemented FPU-DA scheme
posed FPU-DA based CHS model for varying rounds and
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
Table 3 Analysis on delay: proposed over conventional models with Table 6 Analysis on risk probability proposed and conventional models
respect to varying rounds of set 1 with respect to varying rounds of set 2
Round PSO [22] WOA [24] GWO [25] GA [27] FPU-DA Round DA [31] FF [32] FPU-DA
Table 5 Analysis on risk probability: proposed and conventional mod- 5.9 Alive node analysis
els with respect to varying rounds of set 1
Round PSO [22] WOA [24] GWO [25] GA [27] FPU-DA The performance comparison of proposed and conventional
models with respect to the number of alive nodes is shown
1 0.22719 0.084121 0.085493 0.30265 0.077825
in Fig. 8. Figure 8a represents the comparison based on
100 0.16067 0.085493 0.13052 0.15301 0.12692
set 1 models, Fig. 8b illustrates the comparison with set
225 0.26095 0.072902 0.10036 0.27354 0.10803
2 models and Fig. 8c portrays the comparison with other
500 0.1958 0.089094 0.10803 0.20702 0.090417
conventional clustering models. All these comparisons are
725 0.17687 0.13189 0.096761 0.089094 0.018887 made by varying the number of rounds. In Fig. 8a the pro-
1000 0.22719 0.12062 0.044069 0.22487 0.072902 posed model at round 2100 is 49% better than GA, PSO
1225 0.38053 0.11433 0.09539 0.22487 0.067928 and GWO subsequently, 13% better than WOA. Thus, set
1500 0.30867 0.11295 0.10173 0.27851 0.077875 1 based conventional models confirmed maximized lifes-
1726 0.17194 0.10798 0.10036 0.31525 0.14079 pan of the proposed model. Similarly, Fig. 8b depicts better
2000 0.19703 0.072902 0.1494 0.21692 0.077825 results over other models of set 2. Finally, Fig. 8c compared
proposed model with other clustering models. The other
models include K-means clustering model, FCM, DBSCAN,
and LEACH. From the figure the proposed model at round
is 23.45% and 31.05% better than the GWO and WOA algo- 2000 is 87.5%, 37.5%, 80%, and 11.11% better than FCM,
rithms. DBSCAN, and LEACH. And hence we can conclude that the
123
T. A. Alghamdi
Fig. 7 Algorithmic analysis of the proposed model by varying the a α, b β and c γ values of FF model
Fig. 8 Analysis on alive nodes for proposed and conventional schemes with respect to a set 1, b set 2 and other models
surveying capability of the proposed model is better com- converges faster when compared to other models. The mean
pared to other models. of the convergence plot shows 0.11064, which is much less
value compared to other models.
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
Table 8 Statistical analysis of alive nodes, normalized energy and con- 8.09%, and 49.26% better than the FF, GWO, WOA and DA
vergence algorithms. Also, at 1500th round, the implemented FPU-DA
Models FF GWO WOA DA FPU-DA scheme was 74.98%, 23.45%, 31.05% and 45.06% better
than the FF, GWO, WOA and DA algorithms. From the
Alive nodes
experimental results, the implemented FPU-DA based CHS
Best 19 28 27 26 35
in WSN was proved to be best considered to other models.
Worst 100 100 100 100 100 Since more research works have been developed every
Mean 65.926 65.767 66.865 65.135 70.774 year, there will be a great future scope to propose advanced
Median 67 55 57 55 61 meta-heuristic algorithm to attain better coverage and con-
STD 31.941 30.763 30.183 31.982 24.449 nectivity performance in WSN. In addition, objective func-
Normalized energy tion considered here are distance and delay, and to make
Best 0.029041 0.049905 0.033991 0.049836 0.095484 improved performance, other relevant constraints can be con-
Worst 0.54958 0.54957 0.54957 0.54958 0.54958 sidered. Despite the adaptive algorithms find suitability on
Mean 0.19819 0.20634 0.20155 0.20467 0.23513 solving the context aware sensor deployment problem, the
Median 0.13213 0.13225 0.1343 0.13174 0.17645 algorithm has effect on the initialization and the number of
STD 0.16234 0.15389 0.15948 0.15561 0.13754 iterations. So, appropriate procedure for initialization and
Convergence graph number of iterations can lead to a trade-off in terms of achiev-
Best 0.12256 0.090712 0.088942 0.15737 0.081747 ing the objectives at reasonable computational cost. This can
Worst 0.20968 0.15181 0.13253 0.25871 0.15345 be well studied in the future.
Mean 0.17079 0.11719 0.12006 0.17081 0.11064
Median 0.18097 0.090712 0.12239 0.15737 0.087994
STD 0.038041 0.022609 0.014873 0.032586 0.034954 References
Table 9 Computational time 1. Pandey, O. J., & Hegde, R. M. (2018). Low-latency and energy-
Models Computational
balanced data transmission over cognitive small world WSN. IEEE
time
Transactions on Vehicular Technology, 67(8), 7719–7733.
FF 9756 2. Senouci, M. R., & Mellouk, A. (2019). A robust uncertainty-
aware cluster-based deployment approach for WSNs: Coverage,
GWO 9434 connectivity, and lifespan. Journal of Network and Computer
WOA 9377 Applications, 146, 102414.
DA 9368 3. Vieira, R. G., Cunha, A. M., Ruiz, L. B., & Camargo, A. P. (2018).
On the design of a long range WSN for precision irrigation. IEEE
FPU-DA 9102
Sensors Journal, 18(2), 773–780.
4. Hintsch, T., & Irnich, S. (2018). Large multiple neighborhood
search for the clustered vehicle-routing problem. European Journal
6 Conclusion of Operational Research, 270(1), 118–131.
5. Ahmad, A., Javaid, N., Khan, Z. A., Qasim, U., & Alghamdi, T.
A. (2014). Routing scheme to maximize lifetime and through-
This paper has presented a novel clustering model with put of wireless sensor networks. IEEE Sensors Journal, 14(10),
optimal CHS by considering four major criterions such as 3516–3532.
energy, delay, distance and security. The analysis such as con- 6. Alghamdi, T. A. (2016). Cluster based energy efficient routing pro-
tocol for wireless body area networks. Trends in Applied Sciences
vergence analysis, alive node analysis, normalized network
Research, 11(1), 12–16.
energy, delay analysis, risk probability analysis, algorithmic 7. Alghamdi, T. A. (2018). Secure and energy efficient path optimiza-
analysis and statistical test has been made. The evalua- tion technique in wireless sensor networks using DH method. IEEE
tion results proved that the proposed model attains superior Access, 6, 53576–53582.
8. Krishnan, M., Yun, S., & Jung, Y. M. (2019). Enhanced clustering
results compared to other models. From the Alive node and ACO-based multiple mobile sinks for efficiency improvement
analysis, the proposed model at 2000th round was 45.95%, of wireless sensor networks. Computer Networks, 160, 33–40.
18.92%, 24.32% and 24.32% better than the FF, GWO, WOA 9. Radhika, S., & Rangarajan, P. (2019). On improving the lifespan of
and DA algorithms. On considering the convergence anal- wireless sensor networks with fuzzy based clustering and machine
learning based data reduction. Applied Soft Computing, 89, 105610.
ysis, the NAN for the proposed model at 2000th round is 10. Jesudurai, S. A., & Senthilkumar, A. (2019). An improved energy
45.95%, 18.92%, 24.32%, and 24.32% better than the FF, efficient cluster head selection protocol using the double cluster
GWO, WOA and DA algorithms. In addition, the delay at heads and data fusion methods for IoT applications. Cognitive Sys-
1st round, the implemented FPU-DA model was 16.93%, tems Research, 57, 101–106.
11. Zhao, B., Ren, Y., Gao, D., Xu, L., & Zhang, Y. (2019). Energy
26.64%, 27.7%, and 27.1% better than the FF, GWO, WOA utilization efficiency evaluation model of refining unit based on
and DA algorithms. From the analysis, the presented model Contourlet neural network optimized by improved grey optimiza-
in terms of risk probability at 1st round was 77.27%, 8.97%, tion algorithm. Energy, 185, 1032–1044.
123
T. A. Alghamdi
12. Chen, L., Yang, D., Zhang, D., Wang, C., & Nguyen, T.-M.-T. 26. Yahiaoui, S., Omar, M., Bouabdallah, A., Natalizio, E., & Challal,
(2018). Deep mobile traffic forecast and complementary base sta- Y. (2018). An energy efficient and QoS aware routing protocol for
tion clustering for C-RAN optimization. Journal of Network and wireless sensor and actuator networks. AEU - International Journal
Computer Applications, 121, 59–69. of Electronics and Communications, 83, 193–203.
13. Behera, T. M., Mohapatra, S. K., Samal, U. C., & Khan, M. S. 27. Tianshu, W., Gongxuan, Z., Xichen, Y., & Ahmadreza, V. (2018).
(2019). Hybrid heterogeneous routing scheme for improved net- Genetic algorithm for energy-efficient clustering and routing in
work performance in WSNs for animal tracking. Internet of Things, wireless sensor networks. Journal of Systems and Software, 146,
6, 100047. 196–214.
14. Yarinezhad, R., & Hashemi, S. N. (2019). Solving the load 28. Ennaciri, A., Erritali, M., & Bengourram, J. (2019). Load balancing
balanced clustering and routing problems in WSNs with an FPT- protocol (EESAA) to improve quality of service in wireless sensor
approximation algorithm and a grid structure. Pervasive and Mobile network. Procedia Computer Science, 151, 1140–1145.
Computing, 58, 101033. 29. Sarkar, T. A., & Murugan, S. (2019). Cluster head selection for
15. Saini, A., Kansal, A., & Randhawa, N. S. (2019). Minimization energy efficient and delay-less routing in wireless sensor network.
of energy consumption in WSN using hybrid WECRA approach. Wireless Networks, 25(1), 303–320.
Procedia Computer Science, 155, 803–808. 30. Liu, T., Li, Q., & Liang, P. (2012). An energy-balancing clustering
16. Wang, L., Lehman, V., Hoque, A. K. M. M., Zhang, B., Yu, Y., & approach for gradient-based routing in wireless sensor networks.
Zhang, L. (2018). A secure link state routing protocol for NDN. Computer Communications, 35(17), 2150–2161.
IEEE Access, 6, 10470–10482. 31. Jafari, M., & Chaleshtari, M. H. B. (2017). Using dragonfly
17. Thangaramya, K., Kulothungan, K., Logambigai, R., Selvi, M., algorithm for optimization of orthotropic infiniteplates with a
Ganapathy, S., & Kannanc, A. (2019). Energy aware cluster and quasi-triangular cut-out. European Journal of Mechanics A/Solids,
neuro-fuzzy based routing algorithm for wireless sensor networks 66, 1–14.
in IoT. Computer Networks, 151, 211–223. 32. Gandomi, A. H., Yang, X.-S., Talatahari, S., & Alavi, A. H. (2013).
18. Waqas, M., Malik, S. U. R., Akbar, S., Anjum, A., & Ahmad, N. Firefly algorithm with chaos. Communications in Nonlinear Sci-
(2019). Convergence time analysis of OSPF routing protocol using ence and Numerical Simulation, 18, 89–98.
social network metrics. Future Generation Computer Systems, 94, 33. Mirjalili, S., Mirjalili, S. M., & Lewis, A. (2014). Grey wolf opti-
62–71. mizer. Advances in Engineering Software, 69, 46–61.
19. Ansari, A. R., & Cho, S. (2018). CHESS-PC: Cluster-HEad selec- 34. Mirjalili, S., & Lewis, A. (2016). The whale optimization algo-
tion scheme with power control for public safety networks. IEEE rithm. Advances in Engineering Software, 95, 51–67.
Access, 6, 51640–51646. 35. Boothalingam, R. (2018). Optimization using lion algorithm: A
20. Faheem, M., Butt, R. A., Raza, B., Ashraf, M. W., Ngadi, A., & biological inspiration from lion’s social behavior. Evolutionary
Gungorb, V. C. (2019). Energy efficient and reliable data gathering Intelligence, 11, 31–52.
using internet of software-defined mobile sinks for WSNs-based 36. Ahmad, A., Javaid, N., Qasim, U., Ishfaq, M., Khan, Z., &
smart grid applications. Computer Standards and Interfaces, 66, Alghamdi, T. (2014). RE-ATTEMPT: A new energy-efficient rout-
103341. ing protocol for wireless body area sensor networks. International
21. Toor, A. S., & Jain, A. K. (2019). Energy aware cluster based Journal of Distributed Sensor Networks, 10, 464010.
multi-hop energy efficient routing protocol using multiple mobile 37. Zhu, E., Zhang, Y., Wen, P., & Liu, F. (2019). Fast and stable clus-
nodes (MEACBM) in wireless sensor networks. AEU - Interna- tering analysis based on grid-mapping K-means algorithm and new
tional Journal of Electronics and Communications, 102, 41–53. clustering validity index. Neurocomputing, 363, 149–170.
22. Kaur, S., & Mahajan, R. (2018). Hybrid meta-heuristic 38. Wang, Q., Guo, S., Hu, J., & Yang, Y. (2018). Spectral partitioning
optimization-based energy efficient protocol for wireless sensor and fuzzy C-means based clustering algorithm for big data wire-
networks. Egyptian Informatics Journal, 19(3), 145–150. less sensor networks. Journal on Wireless Communications and
23. Mohamed, R. E., Ghanem, W. R., Khalil, A. T., Elhoseny, M., Saj- Networking, 2018, 54.
jad, M., & Mohamed, M. A. (2018). Energy efficient collaborative 39. Jafari, H., Nazari, M., & Shamshirband, S. (2018). Optimization
proactive routing protocol for wireless sensor network. Computer of energy consumption in wireless sensor networks using density-
Networks, 142, 154–167. based clustering algorithm. International Journal of Computers
24. Sharawi, M. & Emary, E. (2017). Impact of grey wolf optimization and Applications, 2018, 1–10.
on WSN cluster formation and lifetime expansion. In 2017 Ninth 40. Moorthi, M., & Thiagarajan, R. (2020). Energy consumption and
international conference on advanced computational intelligence network connectivity based on Novel-LEACH-POS protocol net-
(ICACI), Doha, pp. 157–162. works. Computer Communications, 149, 90–98.
25. Jadhav, A. R. & Shankar, T. (2017). Whale optimization based
energy-efficient cluster head selection algorithm for wireless sensor
networks. Neural and Evolutionary Computing. arXiv:1711.0938
Publisher’s Note Springer Nature remains neutral with regard to juris-
9.
dictional claims in published maps and institutional affiliations.
123
Energy efficient protocol in wireless sensor network: optimized cluster head selection model
123