Energies 16 04198 v2
Energies 16 04198 v2
Energies 16 04198 v2
Article
MHSEER: A Meta-Heuristic Secure and Energy-Efficient
Routing Protocol for Wireless Sensor Network-Based
Industrial IoT
Anshika Sharma 1 , Himanshi Babbar 1 , Shalli Rani 1, * , Dipak Kumar Sah 2 , Sountharrajan Sehar 3
and Gabriele Gianini 4, *
Abstract: Several industries use wireless sensor networks (WSN) for various tasks such as monitoring,
data transmission, and data gathering. They find applications in the industrial internet of things (IIoT).
WSNs are utilized to track and monitor changes in the environment. Since they include multiple small
sensor nodes (SN), they are severely constrained, so resource management geared toward energy
efficiency is crucial in this kind of network. Minimizing the power to interpret, transmit, and store
data between various sensors poses important challenges. Experts have considered various ways to
address these issues that unavoidably affect the network’s performance: reducing energy usage while
maintaining system throughput remains the primary research issue. Another important concern
Citation: Sharma, A.; Babbar, H.; relates to network security. Specifically, intrusion detection and avoidance are major concerns. In this
Rani, S.; Sah, D.K.; Sehar, S.; Gianini,
work, we introduce the meta-heuristic-based secure and energy-efficient routing (MHSEER) protocol
G. MHSEER: A Meta-Heuristic
for WSN-IIoT. The protocol learns the forwarding decisions using the number of hops, connection
Secure and Energy-Efficient Routing
integrity characteristics, and accumulated remaining energy. To make the method more secure, the
Protocol for Wireless Sensor
Network-Based Industrial IoT.
protocol also employs counter-encryption mode (CEM) to encrypt the data. A meta-heuristics study
Energies 2023, 16, 4198. https:// designed to achieve reliable learning is used in the suggested protocol. The protocol consists of two
doi.org10.3390/en16104198 stages. The first stage uses a heuristics method to improve the option for dependable data routing.
Security based on a computationally simple and random CEM is accomplished in the second stage.
Academic Editors: R. Maheswar,
The proposed MHSEER protocol has been compared to the secure trust routing protocol for low
M. Kathirvelu and
power (Sectrust-RPL), heuristic-based energy-efficient routing (HBEER), secure and energy-aware
K. Mohanasundaram
heuristic-based routing (SEHR), and secure energy-aware meta-heuristic routing (SEAMHR) in terms
Received: 22 April 2023 of packet drop ratio, throughput, network delay, energy usage, and faulty pathways. The proposed
Revised: 14 May 2023 protocol increases throughput to 95.81% and decreases the packet drop ratio, packet delay, energy
Accepted: 15 May 2023
consumption, and faulty pathways to 5.12%, 0.10 ms, 0.0102 mJ, and 6.51%, respectively.
Published: 19 May 2023
Keywords: wireless sensor networks; industrial internet of things; sensor nodes; energy efficiency;
meta-heuristic
Copyright: © 2023 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
1. Introduction
conditions of the Creative Commons The industrial internet of things (IIoT) paradigm relies heavily on wireless sensor
Attribution (CC BY) license (https:// networks (WSNs) [1], which are wireless networks without infrastructure facilities that
creativecommons.org/licenses/by/ are deployed using a wide variety of wireless sensors to assess operational, physical, or
4.0/). environmental conditions. In WSN, sensor nodes (SNs) with an inbuilt CPU manage the
system and are connected among them and to the base station (BS) [2] (which in turn can
be linked to the internet). The nodes perform sensing, data processing, and transmission,
whereas data collection, analysis, and delivery to the end user for decision-making are the
BS’s responsibilities [3]. Due to their versatility, WSNs have found application in several
domains such as IoT, tracking and detection systems, conditions monitoring (relative
humidity, temperature, and air density), patient evaluation, and agribusiness [4,5].
The key characteristic of WSN is that not only the storage capacity, memory, and CPU
processor capabilities of the nodes are limited but their power consumption is considerably
constrained [6,7]. Energy-efficient routing (EER) algorithms are therefore essential to reduce
power consumption and extend the useful life of the network [8]. Furthermore, the network
must be operated manually, which presents certain difficulties [9].
When designing protocols and hardware architectures, researchers should prioritize
the effective utilization of the energy storage of SNs [10]. The approaches that have received
the most attention include cluster formation and different data transmission communication
methods. SNs are organized into a number of subsets, i.e., clusters, to reduce power usage
for lengthy transmission [11]. Removing associated data that could reduce the total volume
of data exchanged with the BS is the responsibility of a cluster head (CH) [2,12]. The CH
transfers the combined information to the BS.
Since they are frequently placed in hazardous or distant locations and are therefore
challenging to physically safeguard, sensor nodes are more susceptible to security attacks.
They might also lack the ability to process information and the memory necessary to
execute effective security regulations, which would make them more vulnerable to attacks.
The probability of illegal access and compromised network security and integrity increases
greatly as a result of such restrictions [13]. Most proposed solutions aim to increase resource
efficiency and the timely distribution of data but neglect to address the reliability of sensor
data, leaving a gap for hackers. For industrial operations, inaccurate or manipulated
sensor data can have major repercussions, including malfunctioning equipment, delayed
production, and safety risks. As a result, it is crucial to use secure protocols, encrypted data,
and authentication methods to guarantee the integrity and validity of sensor data [14].
1.1. Objective
WSN-IIoT has the distinct benefit of enabling the continuous surveillance and oversight
of industrial operations, which boosts productivity, safety, and effectiveness [15]. With the
use of WSNs, preventative upkeep may be carried out on manufacturing equipment and
processes, resulting in less downtime. WSNs can also aid in waste minimization and energy
optimization, which can save money and assist the environment. WSN-IIoT may, in general,
automate and revolutionize manufacturing operations by facilitating decision-making
based on data. In order to balance the power usage and avoid unauthorized access, data
manipulation, and exposure by malicious nodes on the network, an energy-efficient routing
(EER) protocol solution should be created for IoT-based WSNs [16,17]. The purpose of
this study is to propose a WSN routing technique that is secure and energy-efficient.
The primary goals of the proposed MHSEER protocol are energy efficiency, stability, and
reliability, in data transfer despite limited resources. To obtain the best possible data
routing, some heuristics are utilized. To learn the routing decision, the MHSEER protocol
uses integrated minimal resources, hop count, and connection integrity measures [18].
The suggested IIoT protocol has advantages such as improved security, decreased power
consumption, and increased reliability. A secure routing protocol can shield critical data
from cyberattacks and stop unauthorized users from connecting to the network. It helps
IIoT devices use less energy, which extends their lifespans and minimizes their operating
expenses, and by lowering the likelihood of network congestion and packet loss, the
protocol can increase the reliability of IIoT systems. The MHSEER protocol is reliable
thanks to encoding and the detection and segregation of hostile nodes; furthermore, it
offers a method for dynamic routing [13]. The network monitoring between the BS and its
surroundings and the energy-efficiency signals together provide effective load balancing
Energies 2023, 16, 4198 3 of 19
and lessen the issue of network segregation. We will show that, compared to existing
state-of-the-art solutions, the MHSEER protocol improves the performance of low-power
SNs in terms of different performance metrics [19]. The suggested Protocol in IIoT also
has several drawbacks, such as complexity and compatibility. A safe routing protocol’s
implementation might be difficult and expensive because it calls for specialized knowledge
and skills. Certain protocols might not work with some IIoT devices, which could restrict
their operation or necessitate extra hardware modifications.
1.2. Contributions
The paper’s contributions are the following.
• An architecture of WSN-IIoT has been developed for the MHSEER protocol that
helps minimize the delay and energy consumption of the network with maximum
stability [14].
• To solve the above-mentioned issues, an MHSEER approach has been proposed, which
enhances the choice for reliable data routing using a heuristic function and uses the
encoding and decoding of data package based on counter encryption mode (CEM) [9].
• The proposed protocol compares the different parameters of a routing protocol such
as throughput, network delay, packet drop rate, faulty pathways, and energy usage
with the above-mentioned existing approaches. MHSEER increases the throughput
and decreases metrics such as the packet drop rate and energy usage.
1.3. Structure
The structure of this article is as follows: Section 2 outlines the state-of-the-art in
energy-efficient routing protocols. Section 3 introduces the proposed architecture of WSN-IIoT
for the secured and energy-efficiency protocol. A detailed discussion of the MHSEER
protocol and the stages designed is presented in Section 4. Section 5 shows the experimental
findings about MHSEER and compares them to the competing approaches. Finally, Section 6
summarizes the findings of the paper.
2. Related Work
Various works aim at providing routing protocols that are secure and energy-efficient.
In 2019, Hamzah et al. [2] discussed a fuzzy approach for selecting cluster heads (CHs)
based on five features: density, residual energy, suitability, and distance from the BS.
Utilizing FL-EEC/D (fuzzy logic-based energy-efficient clustering) depending on minimal
segregation among CHs, WSNs are created. SNs are evaluated for energy efficiency using
the Gini index; clustering techniques normalize resource allocations between WSNs. The
results show that the energy usage of the SN stabilized and the energy efficiency with
respect to the lifetime of a network improved. In regard to the first cluster dead and half
clusters dead, the outcomes demonstrate an average growth.
In 2019, Liu et al. [10] suggest a revised routing protocol to increase WSN resource
efficiency. Residual network energy and network average energy are taken into account by
the IEE-LEACH protocol in this study. In order to further increase the network’s energy
consumption, the proposed protocol also adopts a threshold for choosing CHs amongst
some of the SNs and makes use of single-hop, multi-hop, and composite connections. The
simulation findings demonstrate that this method greatly decreases WSN power use if
compared with a number of current routing strategies.
In 2020, Hayajneh et al. [5] communicated with the OSI layers (physical, data link,
network, topology, and application) to examine cyber threats in WSNs. The number of
significant attacks is calculated, and security precautions are set up to detect attacks. A
security technique is created to fix the flaws and identify other problems that require more
investigation. This method was only used with a small number of SNs, which negatively
impacted the performance performance of the network and did not increase network safety
when there were many SNs present. However, the complexity, consumption, and transmit
time would all significantly increase, making this potentially inappropriate for WSNs.
Energies 2023, 16, 4198 4 of 19
In 2020, Binu et al. [14] created an innovative African Buffalo-based two-tier data
dissemination technique (AB-TTDD) to check the energy-drained unit early, before information
transfer. A brand new temporary energy mapping algorithm (TEMA) was also created
to sustain the pathway by producing the reference node rather than the energy-drained
component. This innovative method has significantly decreased both power usage and
the packet flow ratio. The current study demonstrates that routing maintenance and
optimization in WSN may decrease energy usage. However, the proposed methodology’s
processing takes longer.
In 2020, Haseeb et al. [6] suggested SEHR for WSNs to detect and prevent data
manipulation while achieving greater performance. The method provided reliable and
insightful learning through the use of heuristic evaluation, which was taken from artificial
intelligence (AI). This technique uses a heuristic approach to spot and guard against data
breaches. The current metaheuristic method provides less accurate data categorization. The
key generation portion of this approach needs to be enhanced because the counter block
allows the key value to be identified. By taking into account asynchronous operations among
the sensor nodes, energy consumption and routing efficiency can be further enhanced.
In 2022, Gurram et al. [9] discussed a SEAMHR technique in order to choose the best
route to the target while preserving data integrity. The learned path is used to identify
the most ideal neighbourhood, which serves as a redirector to send the information to
the intended receiver, and mutation elephant herding optimization (MEHO) is used to
enhance the meta-heuristic function. The SEAMHR method uses the AEDL approach
and CTR-AEDL mode encrypted using private keys to encrypt and decrypt data. The
MATLAB tool is used to conduct the experiment.However, the suggested protocol will
not be expanded to take into account mobility requirements and multi-hop network
interactions.
In 2022, Seyfollahi et al. [16] provided a composite energy-aware strategy for data
forwarding in IoT, considering the need to extend IoT technologies and the NP-hardness
of power management in diverse and dispersed IoT networks. By integrating the support
vector machine (SVM), a popular machine learning (ML) approach, and the meta-heuristic
heat transfer optimizer (HTOA) approach, this paper tried to implement an optimal method
for routing and transmitting data. The results demonstrate that merging ML and HTOA has
produced the best possible energy-conscious routing for the IoT.However, it should be taken
into account that HTOA, like another optimizer, could become trapped in local optima.
In 2022, Behera et al. [4] briefly discussed low-energy adaptive clustering hierarchy
(LEACH)-based and bioinspired protocols, their advantages and disadvantages, their
underlying presuppositions, and the selection criteria for the CH to comprehend routing
protocols with various structures, innovative tactics, and improved efficiency in the WSN
environment. The scalability, durability, and packet-delivery rates of different protocols
are contrasted and considered as performance aspects. Additionally, the exploration of
developing cryptographic techniques for verified encryption in WSNs that support privacy
and network safety is an option.
In 2023, ref. [20] the WSN is responsible for gathering and arranging sensed data
before sending it to the base station (BS). As the battery power of sensor nodes is limited,
it is crucial to employ effective techniques for data collection and transmission to ensure
the extended operation of the sensor network. In this study, the researchers utilized the
particle swarm optimization (PSO) method to establish the cluster in WSN. Additionally,
they proposed an energy-efficient routing protocol (E-FEERP) based on fuzzy logic. The
E-FEERP algorithm considers various factors such as battery energy, the average distance
between sensor nodes (SN) and the BS, node density, and communication quality to transmit
data from the cluster head (CH) to the BS optimally.
Other works study the problem of clustering and energy efficiency from a game theory
perspective [21,22]. Indeed, game theory is routinely used as a framework for the modeling
and analysis of performance and security networked systems [23–29]. The work by Gemeda
et al. [30] addresses the issue of energy efficiency by proposing a protocol, called GREET,
Energies 2023, 16, 4198 5 of 19
based on non-coalitional game theory: the protocol is not power-aware, but it improves
over LEACH in terms of network lifetime.
The current research increases throughput rates and decreases the packet loss rates,
energy usage, defective routes, and packet delay of the WSN as compared to the existing
energy-efficient protocol (Table 1), as indicated in the prior research.
Year/
Ref. Software
Author Objective Parameter Future Scope
No. Used
Name
To increase the
By integrating the
PhD network’s
SecTrust system into the
Research integration of
RPL protocol, a simulated
2019/ Lab of trustworthy
exercise was conducted to Throughput,
[1] Airehrour Auckland nodes that have
demonstrate the SecTrust packet drop rate.
et al. University repaid their
system’s effectiveness at
of battery life by
fending off Rank and
Technology. extending the
Sybil assaults.
SecTrust-RPL.
Utilize the gain ratio to
The Gini index is
assess how effectively the
SN’s residual a reasonable
clustering methods can
power, the assessment tool
balance the energy
distance to the for assessing the
distribution among WSN
2019/ BS, the density routing protocols’
sensor nodes. A fuzzy
[2] Hamzah .NET of the SN, the energy
logic-based CH election
et al. compacting of effectiveness in
method, a k-means-based
the SN, and WSNs for the
clustering method, and
location metric of energy
LEACH are contrasted
appropriateness. distribution
with the suggested
balance.
technique FL-EEC/D.
Throughput, the To make the
The method provided ratio of packet system smarter
reliable and insightful drops, and fault-tolerant
learning through the use significant delay, by employing
2020/ of heuristic evaluation, consumed certain
[6] Haseeb which was taken from AI. MATLAB energy, lightweight
et al. This technique uses a erroneous routes, machine
heuristic approach to spot overhead on learning-based
and guard against data networks, and approaches to
breaches computational enhance the
cost. SEHR technique.
Developed an accessible
virtual structure that
Average rate of
serves as an intermediary
delivery, average The suggested
architecture between the
2019/ energy approach can be
sink and the nodes while
[8] Kuhlani MATLAB utilization, the further explained
sharing metadata and
et al. lifespan of a to understand
query messages in order
network, and the flow better.
to lessen the mobile sink’s
absolute delay.
frequently current
location to all nodes.
To reduce the energy
consumption of WSNs, The suggested
hierarchical techniques Stable technique can be
that utilize clustering timeframe, expanded to
2019/ hierarchy are proposed. HNA, the manage a system
[31] Alami Data collection and MATLAB lifespan of a of mobile sinks
et al. transmission to a base network, and will analyze
station could be carried network traffic, the network
out using the nodes with and throughput . lifespan
the highest residual optimization.
energy.
Energies 2023, 16, 4198 6 of 19
4. Methodology
This section describes the phases of the proposed MHSEER protocol in detail. The
protocol uses link stability metrics, hop counts, and accumulated residual energies to make
routing decisions. To begin with, the suggested MHSEER protocol uses a meta-heuristic
Energies 2023, 16, 4198 8 of 19
study built to produce reliable and wise learning [9]. The protocol is a metaheuristic
technique that enhances reliable data routing. There are two primary stages to this project.
The first stage of the proposed protocol enhances the choice for reliable data routing
using a heuristic algorithm. The beam heuristic reduces the memory requirements of the
nodes and provides efficient next-hop selection by utilizing a number of characteristics
and link reliability [6]. In the second stage, a protocol that is secure, legitimate, and
based on a computationally simple and random CEM is achieved [14]. The proposed
protocol (Figure 3) simultaneously uses the encryption and decryption of data packets
while utilizing less computational power from the nodes. Furthermore, alarm and traffic
assessment techniques reduce the likelihood of link failure and uneven energy use in the
network area [33].
(h), the degree of integrity of the link (dli ), and the accumulated energy (ei ), the source node
is selected as the next hop, and the packages are transferred directly to it [35]. Additionally,
suppose that there is no viable route available that satisfies the routing criteria in the local
database of the source node. In that case, each of the neighboring nodes must participate in
the process of choosing the next hop. While accessing the affected links, the link integrity
degree uses the hash function of cryptography to ascertain if the transmitted number of
packets has been altered. Suppose node i endangers a probe packet with p bits and sends
it to node j [36]. To identify its message code, Mc , node i first delivers the probe packet
p1 to the hash function. Second, the received Mc is added as p1 + Mc to the real probe
packet and sent to node j. Node j recalculates Mc of the probe packet received by p1 after
receiving it along with Mc . One is used to denote the high threshold value, and zero is
used to denote the low threshold value. The link’s high threshold value indicates that it is
very trustworthy and has a low fault rate. Residual energy aggregation ei is estimated in
two stages [9]. The residual level el is first continuously watched by each node, and then
the residual energy’s rate er is calculated using Equation (1).
1
h f = a ∗ ( e l + er ) + b ∗
+ c ∗ dli (2)
h
where a, b, and c are the weighting coefficients and provide the heuristic function with a
meaningful effect. Following the computation of h f , every neighbor node communicates
its knowledge to the SN to forecast the best course of action to take to reach the BS. The
neighbor node with the highest h f indicates a superior rank for choosing the next hop.
The proposed method uses the meta-heuristic protocol, which maximizes the suitable
next-hop in a subset, to analyze the linked graph. In order to save memory and preserve the
untrusted node while finding the next hop, the protocol creates node databases [37]. The
beam meta-heuristics provide the method for choosing the best node as the next hop based
on each node’s greatest value. If we assume that, using beam heuristics, h f 0 , h f 1 , . . . , h f n ,
which have the highest weight value, then the weighted total S( f n ) can be denoted as
provided in the Equation (3)
S( f n ) = ∑ hfi (3)
where i = 0,1. . . ,n.
Bi shown in Equation (4), the node Ni and counter bits are combined together and then
sent through an encoding function E f using key K.
Bi = E f (K ( Ni + C )) (4)
An encoder enables the encoding and decoding of the packet header, and a key
generator is used to carry out the learning process. The network’s parameters were
optimized through a number of experiments, enabling the system to encode and decode
data packets and Bi very quickly. The activation function used in this experiment is given
by Equation (5).
1
f (x) = (5)
1 + e− x
where f (x) is the sigmoid function. The originating nodes ni and E f are used to create
the new counter block Bi+1 for the data packets Di+1 after being concatenated with Ni
and C. The ciphertext sequences ci , . . . , cn−1 , cn nodes for ni , . . . , nn−1 , nn are consequently
obtained in the BS, indicating that the decoding function D f with the same key is used to
obtain authentic data packets Di where i = 1,. . . , n applying Equation (6).
Di = [ D f (K ( Ni + Bi ))] ⊕ ci (6)
bl − Pl
T fr = (7)
Bm
where bl , Pl , and Bm are the bandwidth of the link, the transmitted packets on the link, and
the maximal bandwidth from i to the BS, respectively.
Parameter Value
Area of simulation 300 ∗ 300 m
SNs 250
Infected nodes 50
Size of packets 64 bits
Level of energy 4 Joules
Position of BS 200, 600
Beamwidth 4
Control messages 40 bits
Range of transmission 40 m
Type of traffic CBR
Table 3 represents the comparative analysis of the proposed approach with the state of
art approaches, and Figure 4 shows the graphical representation of the same.
Recieved packets
Throughput = (8)
Total time
Energies 2023, 16, 4198 12 of 19
Figure 5 shows the 250 nodes with respect to the throughput. In the case of 50 nodes,
the proposed approach acquires the maximum throughput, i.e., 95.8%, as compared to
the other existing approaches; in the case of 100 nodes, the proposed approach acquires
96.2% throughput in comparison to the existing approaches; in the case of 250 nodes, the
proposed approach acquires 93.25% as compared to the existing approaches.
Energies 2023, 16, 4198 13 of 19
Figure 5. Throughput.
Received packets
Packet drop ratio = (9)
Total packets
Table 5. Comparative analysis of proposed packet drop ratio (%) with state-of-art approaches.
Figure 6 depicts the minimum packet drop ratio in the proposed approach. As shown,
if there are 50 nodes, it is 4.8% as compared to the existing approaches. If there are 250
nodes, it is 30% for Sectrust-RPL; 21.27% for HBEER; 15% for SEHR; 9.54% for SEAMHR;
and 8.24% for the proposed approach, which is the minimum that is required.
Energies 2023, 16, 4198 14 of 19
Table 6. Comparative analysis of proposed end-to-end delay (ms) with state-of-art approaches.
Figure 7 depicts the minimum end-to-end delay in the proposed approach. In case
there are 100 nodes, the proposed approach acquires 0.015 ms, i.e., minimum delay, as
compared to the existing approaches. In the case of 250 nodes, it acquires 0.192 ms for
Sectrust-RPL, 0.173 ms for HBEER, 0.141 ms for SEHR, and 0.121 ms for SEAMHR; 0.104 ms
has been acquired for the proposed approach.
Energies 2023, 16, 4198 15 of 19
Table 7. Comparative analysis of proposed energy consumption (mJ) with state-of-art approaches.
Figure 8 represents the energy consumption with respect to the different numbers of
nodes. The proposed method shows a minimal consumption of energy of 0.0102 mJ, while
the existing Sectrust-RPL, HBEER, SEHR, and SEAMHR approaches show a consumption
of 0.0326 mJ, 0.0252 mJ, 0.0190 mJ, and 0.0154 mJ, respectively. Because of the smart and
risk-tolerant routing approach used by the proposed protocol, the routing pathways were
stable for a considerable amount of time.
Energies 2023, 16, 4198 16 of 19
Table 8. Comparative analysis of proposed faulty routes (%) with state-of-art approaches.
6. Conclusions
To optimize the routing strategy with wise judgments against malicious nodes, this
paper provides a safe EER protocol for WSNs. To achieve dependable communication
for WSN, the proposed protocol focuses on important elements, including energy usage,
secure data transfer, packet delay, and route maintenance. Using all parameters that have
an impact on the energy effectiveness of the WSN protocol is recommended to obtain
the highest results from energy-efficient routing protocols. To achieve efficient next-hop
decisions and decrease the use of node memory, the heuristic function uses a variety of
factors and network integrities. Using different parameters, performance evaluations with
existing approaches are shown. The approach offers improved network performance metrics
such as throughput and reduced packet drop ratios, energy consumption, end-to-end delays,
and defective routes. The proposed protocol increases throughput to 95.81% and decreases the
packet drop ratio, packet delay, energy consumption, and faulty pathways to 5.12%, 0.10 ms,
0.0102 mJ, and 6.51%, respectively, in comparison to the existing energy-efficient routing
protocol. However, if the proposed approach can be implemented using realistic datasets,
it can produce far better outcomes. In future work, the proposed energy-efficient protocol
will be implemented using real-world datasets for better results.
Author Contributions: Conceptualization, H.B. and A.S.; methodology, S.R. and A.S.; validation,
A.S., D.K.S. and H.B.; formal analysis, S.S., S.R., and H.B.; investigation, S.R. and G.G.; resources, S.R.;
data curation, G.G., and A.S.; and writing—original draft preparation, A.S. and H.B. All authors have
read and agreed to the published version of the manuscript.
Funding: This research received external funding.
Data Availability Statement: Not applicable.
Acknowledgments: The work was partially supported by the MUSA (Multilayered Urban Sustainability
Action) project, funded by the European Union—NextGenerationEU, under the National Recovery and
Resilience Plan (NRRP) Mission 4 Component 2 Investment Line 1.5:
strengthening of research structures and creation of R&D “innovation ecosystems”, set up of “territorial
leaders in R&D” (CUP G43C22001370007, Code ECS00000037). The work was also partially supported by
the SERICS project (PE00000014) under the NRRP MUR program funded by the EU—NextGenerationEU.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future
Gener. Comput. Syst. 2019, 93, 860–876. [CrossRef]
2. Hamzah, A.; Shurman, M.; Al-Jarrah, O.; Taqieddin, E. Energy-efficient fuzzy-logic-based clustering technique for hierarchical
routing protocols in wireless sensor networks. Sensors 2019, 19, 561. [CrossRef]
3. Sharma, S.; Kaur, A. Survey on wireless sensor network, Its Applications and Issues. In Journal of Physics: Conference Series; IOP
Publishing: Bristol, UK, 2021; Volume 1969, p. 012042.
4. Behera, T.M.; Samal, U.C.; Mohapatra, S.K.; Khan, M.S.; Appasani, B.; Bizon, N.; Thounthong, P. Energy-Efficient Routing
Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance. Electronics 2022, 11, 2282. [CrossRef]
5. Hayajneh, A.A.; Bhuiyan, M.Z.A.; McAndrew, I. A novel security protocol for wireless sensor networks with cooperative
communication. Computers 2020, 9, 4. [CrossRef]
Energies 2023, 16, 4198 18 of 19
6. Haseeb, K.; Almustafa, K.M.; Jan, Z.; Saba, T.; Tariq, U. Secure and energy-aware heuristic routing protocol for wireless sensor
network. IEEE Access 2020, 8, 163962–163974. [CrossRef]
7. Kumar, A.; Sharma, I. Enhancing Cybersecurity Policies with Blockchain Technology: A Survey. In Proceedings of the 2022
5th International Conference on Contemporary Computing and Informatics (IC3I), Greater Noida, India, 14–16 December 2022;
pp. 1050–1054. [CrossRef]
8. Kuhlani, H.; Wang, X.; Hawbani, A.; Busaileh, O. Heuristic data dissemination for mobile sink networks. Wirel. Netw. 2020,
26, 479–493. [CrossRef]
9. Gurram, G.V.; Shariff, N.C.; Biradar, R.L. A Secure Energy Aware Meta-Heuristic Routing Protocol (SEAMHR) for sustainable
IoT-Wireless Sensor Network (WSN). Theor. Comput. Sci. 2022, 930, 63–76. [CrossRef]
10. Liu, Y.; Wu, Q.; Zhao, T.; Tie, Y.; Bai, F.; Jin, M. An improved energy-efficient routing protocol for wireless sensor networks.
Sensors 2019, 19, 4579. [CrossRef]
11. Qureshi, K.N.; Bashir, M.U.; Lloret, J.; Leon, A. Optimized cluster-based dynamic energy-aware routing protocol for wireless
sensor networks in agriculture precision. J. Sens. 2020, 2020, 9040395. [CrossRef]
12. Sharma, S.; Guleria, K. Pneumonia Detection from Chest X-ray Images using Transfer Learning. In Proceedings of the 2022 10th
International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida,
India, 13–14 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6.
13. Akin, E.; Korkmaz, T. Comparison of routing algorithms with static and dynamic link cost in software defined networking (SDN).
IEEE Access 2019, 7, 148629–148644. [CrossRef]
14. Binu, G.; Shajimohan, B. A novel heuristic based energy efficient routing strategy in wireless sensor network. Peer- Netw. Appl.
2020, 13, 1853–1871. [CrossRef]
15. Gowri, S.; Pappa, C.K.; Tamilvizhi, T.; Nelson, L.; Surendran, R. Intelligent Analysis on Frameworks for Mobile App Development.
In Proceedings of the 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India,
23–25 January 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1506–1512.
16. Seyfollahi, A.; Taami, T.; Ghaffari, A. Towards developing a machine learning-metaheuristic-enhanced energy-sensitive routing
framework for the internet of things. Microprocess. Microsyst. 2023, 96, 104747. [CrossRef]
17. Yun, W.K.; Yoo, S.J. Q-learning-based data-aggregation-aware energy-efficient routing protocol for wireless sensor networks.
IEEE Access 2021, 9, 10737–10750. [CrossRef]
18. Daanoune, I.; Baghdad, A.; Ballouk, A. An enhanced energy-efficient routing protocol for wireless sensor network. Int. J. Electr.
Comput. Eng. (2088–8708) 2020, 10, 5462–5469. [CrossRef]
19. Liao, R.F.; Wen, H.; Wu, J.; Pan, F.; Xu, A.; Jiang, Y.; Xie, F.; Cao, M. Deep-learning-based physical layer authentication for
industrial wireless sensor networks. Sensors 2019, 19, 2440. [CrossRef]
20. Narayan, V.; Daniel, A.; Chaturvedi, P. E-FEERP: Enhanced Fuzzy-based Energy Efficient Routing Protocol for Wireless Sensor
Network. Wirel. Pers. Commun. 2023, 1–28. [CrossRef]
21. Gemeda, K.A.; Gianini, G.; Libsie, M. The effect of node selfishness on the performance of WSN cluster-based routing algorithms.
In Proceedings of the AFRICON 2015, Addis Ababa, Ethiopia, 14–17 September 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–5.
22. Gemeda, K.A.; Gianini, G.; Libsie, M. Collaborative packets forwarding to extend lifetime of multi-authority wireless sensor
networks. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC),
Palladam, India, 10–11 February 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 513–519.
23. Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy. ACM Comput.
Surv. (CSUR) 2013, 45, 25. [CrossRef]
24. Gianini, G.; Damiani, E.; Mayer, T.R.; Coquil, D.; Kosch, H.; Brunie, L. Many-player inspection games in networked environments.
In Proceedings of the 2013 7th IEEE International Conference on Digital Ecosystems and Technologies (DEST), Menlo Park, CA,
USA, 24–26 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–6.
25. Lena Cota, G.; Mokhtar, S.B.; Lawall, J.; Muller, G.; Gianini, G.; Damiani, E.; Brunie, L. A framework for the design configuration
of accountable selfish-resilient Peer-to-Peer systems. In Proceedings of the 2015 IEEE 34th Symposium on Reliable Distributed
Systems (SRDS), Montreal, QC, Canada, 28 September–1 October 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 276–285.
26. Lena Cota, G.; Mokhtar, S.B.; Gianini, G.; Damiani, E.; Lawall, J.; Muller, G.; Brunie, L. Analysing Selfishness Flooding with
SEINE. In Proceedings of the 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
(DSN), Denver, CO, USA, 26–29 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 603–614.
27. Lena Cota, G.; Mokhtar, S.B.; Gianini, G.; Damiani, E.; Lawall, J.; Muller, G.; Brunie, L. RACOON++: A semi-automatic framework
for the selfishness-aware design of cooperative systems. IEEE Trans. Dependable Secur. Comput. 2017, 16, 635–650. [CrossRef]
28. Gianini, G.; Mio, C.; Fossi, L.G.; Egyed-Zsigmon, E. A Watermark Inspection Game for IoT Settings. In Proceedings of the
2019 IEEE World Congress on Services (SERVICES), Milan, Italy, 8–13 July 2019; IEEE: Piscataway, NJ, USA, 2019; Volume 2642,
pp. 29–34.
29. Gianini, G.; Viola, F.; Lena-Cota, G.; Lin, J. Hybrid Inspector-Inspectee-Agent Games in Mobile Cloud Computing. In Proceedings
of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, Alicante, Spain, 16–20 November 2020; pp.
95–100.
30. Gemeda, K.A.; Gianini, G.; Libsie, M. An evolutionary cluster-game approach for Wireless Sensor Networks in non-collaborative
settings. Pervasive Mob. Comput. 2017, 42, 209–225. [CrossRef]
Energies 2023, 16, 4198 19 of 19
31. El Alami, H.; Najid, A. ECH: An enhanced clustering hierarchy approach to maximize lifetime of wireless sensor networks. IEEE
Access 2019, 7, 107142–107153. [CrossRef]
32. Yin, Y.; Li, Y.; Gao, H.; Liang, T.; Pan, Q. FGC: GCN based federated learning approach for trust industrial service recommendation.
IEEE Trans. Ind. Inform. 2022, 19, 3240–3250. [CrossRef]
33. Gao, H.; Huang, W.; Liu, T.; Yin, Y.; Li, Y. Ppo2: Location privacy-oriented task offloading to edge computing using reinforcement
learning for intelligent autonomous transport systems. IEEE Trans. Intell. Transp. Syst. 2022. [CrossRef]
34. Babbar, H.; Rani, S. Software-defined networking framework securing internet of things. In Integration of WSN and IoT for Smart
Cities; Springer: Cham, Switzerland, 2020; pp. 1–14.
35. Babbar, H.; Rani, S.; Islam, S.M.; Iyer, S. QoS based Security Architecture for Software-Defined Wireless Sensor Networking. In
Proceedings of the 2021 6th International Conference on Innovative Technology in Intelligent System and Industrial Applications
(CITISIA), Sydney, Australia, 24–26 November 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–5.
36. Khalaf, O.I.; Abdulsahib, G.M. Energy efficient routing and reliable data transmission protocol in WSN. Int. J. Adv. Soft Comput.
Appl. 2020, 12, 45–53.
37. Lilhore, U.K.; Khalaf, O.I.; Simaiya, S.; Tavera Romero, C.A.; Abdulsahib, G.M.; Kumar, D. A depth-controlled and energy-efficient
routing protocol for underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2022, 18, 15501329221117118. [CrossRef]
38. Elsmany, E.F.A.; Omar, M.A.; Wan, T.C.; Altahir, A.A. EESRA: Energy efficient scalable routing algorithm for wireless sensor
networks. IEEE Access 2019, 7, 96974–96983. [CrossRef]
39. Maheshwari, P.; Sharma, A.K.; Verma, K. Energy efficient cluster based routing protocol for WSN using butterfly optimization
algorithm and ant colony optimization. Ad. Hoc. Netw. 2021, 110, 102317. [CrossRef]
40. Xu, C.; Xiong, Z.; Zhao, G.; Yu, S. An energy-efficient region source routing protocol for lifetime maximization in WSN. IEEE
Access 2019, 7, 135277–135289. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.