IDCT Intelligent Data Collection Technique For IoT-Enabled Heterogeneous Wireless Sensor Networks in Smart Environments
IDCT Intelligent Data Collection Technique For IoT-Enabled Heterogeneous Wireless Sensor Networks in Smart Environments
them to survivability problems and face failures. One of the tem tuning [47], [48]. The Bees algorithm does not make
crucial issues in a WSN is to enhance energy efficiency, which any assumptions such as the continuity of the search space
can have a significant impact on the stability and lifetime of and requires limited problem domain knowledge beyond the
the WSN. Moreover, the ability of the network to withstand desired solution performance. The range of applicability of the
various challenges and failures in order to meet the targeted Bees algorithm to the field of engineering encompasses a large
tasks is a basic concern in a WSN [6], [7]. number of optimization tasks. The Bees algorithm consists of
Various methods have been presented in the literature to exploitation and exploration, the two key elements of optimiza-
preserve energy and extend network lifetime. Sensing and tion techniques that help to find the global optimum in opti-
communication are the major energy-consuming tasks, and mization problems [47]. Moreover, the algorithm has strength
therefore effective energy management and scheduling can in both local and global searches and it can be efficiently
help to extend the service life of the WSN. One of the used for solving several multi-modal and multidimensional
generic techniques for preserving network energy is switching optimization problems. In our work, we invest the capabilities
the node’s state between awake and sleep modes [8]. As the of SI and the benefits of Bees algorithm as a swarm-based
deployment of the WSN nodes is usually in a dense manner, algorithm to form disjoint DSs that work for heterogeneous
retaining the sensing and radio communication capabilities of WSN. This is done by redesigning the Bees algorithm and its
the nodes suspended or stopped while in the sleep state can parameters and operations, to fit for proposed problem.
make the sleep/awake method an efficient solution for energy In this paper, we utilize the concept of DS to select the
conservation. Only the nodes that belong to the active set take cluster head nodes, where multiple disjoint DSs are selected
the responsibility of sensing and data collection from the target based on node energies. We aim to enhance the overall lifetime
area. The remaining nodes stay in a sleep state, characterized of a heterogeneous WSN where the nodes in the network have
by low power consumption. Switching the node’s state from heterogeneous initial energy. Proper selection of the disjoint
awake to sleep and vice versa can help in providing prolonged DSs in an efficient manner can help to improve the overall
service. WSN lifetime, where the network lifetime is the sum of the
Most of the algorithms in literature focus on finding a single lifetime of each disjoint DS. The key objective of our work
dominating set (DS) in the network. Such a set can function is to consider energy as the main factor while forming the
as a virtual backbone of a WSN and helps to structure the DS of cluster heads, and to provide a swarm-based algorithm
WSN in a hierarchical manner for use in data routing and (Bees algorithm-based method) with an energy-aware fitness
communication, e.g., [20]–[22], [32], [33], [37], [40], [42], function, to enable the selection of sets that can maximize the
[46]. Moreover, the concept of DS is integrated with clustering WSN lifetime.
in WSNs for cluster head operations [34], [35], [41], [45] or The following are the main contributions of the paper:
inside each cluster [36]. Further improvements are made by • We address the issue of energy conservation in hetero-
considering the DSs problem as a domatic partition problem geneous WSN by proposing energy-aware disjoint DS
where multiple disjoint DSs are determined, e.g., [15]–[17], algorithms.
[23]. Although all the mentioned above algorithms succeeded • We present a novel method based on the Bees algorithm,
to solve the issue of finding the DS, none of them considered where the energy of the formed sets and the lifetime of
the node’s energy during the creation or selection of DSs. the network are considered in the fitness function of the
Moreover, the existing algorithms for multiple disjoint DSs do bees algorithm, for selecting sets that can enhance WSN
not always produce good results for sensors having different lifetime.
initial energy. Also, reliance on single virtual backbone may • The proposed technique uses node’s energy to effectively
cause problem in data transmission if node failure occurs, and achieve load balancing during data collection and to
create unbalance between nodes. Motivated by this, we utilized determine the path from the collector node to Base station
the DS concept to select the set of collectors, where multiple (BS), which leads to an increase in the energy efficiency
disjoint DSs are selected considering the heterogeneity of node of IoT-enabled WSNs.
energies. We provide a dynamic method of selecting collection • Provide extensive simulation results to verify that the pro-
paths for collector nodes to achieve balance between nodes. posed algorithm can enhance WSN lifetime and exceed
Several Swarm Intelligence (SI) methods have been used other related schemes with reference to energy efficiency
to address WSN issues to bring efficient optimization solu- and WSN lifetime.
tion [50], [51]. SI is employed for many challenges in WSN
The rest of this paper is structured as follows: Section II
such as network lifetime, node deployment, connectivity, cov-
presents the review of related works. The proposed approach
erage, scheduling, localization, clustering, data gathering [49],
is described in Section III. The results of simulation and the
[50]. SI techniques have also been applied to the applications
comparison with existing schemes are provided in Section IV.
of IoT system and cloud computing, to facilitate the solving
Section V concludes our work.
of multi-objective optimization problems [49]. One of such
SI algorithm is the Bees algorithm. Different versions of
the Bees Algorithm have been used to solve various engi- II. R ELATED W ORKS
neering problems, such as pattern classifier training, dynamic Different methods have been reported in the literature to
control problems, machine shop scheduling, robotic swarm address the power constraints in IoT networks based on various
coordination, non-linear model identification and control sys- factors affecting energy consumption. Numerous works have
OSAMY et al.: IDCT: INTELLIGENT DATA COLLECTION TECHNIQUE 21101
found that the implementation of a sleep/awake schedule is additional energy of nodes and proximity to the BS. CDS-
effective for conserving the nodes’ energy [6], [8]. However, LEACH [35] utilized connected DS concept as a metric for
the representation of WSN by finding the minimum DS for cluster head selection.
IoT networks is considered as an NP-hard problem. This K-connected DS (K-CDS) algorithm named CDS-FOR is
indicates that the problem of sleep/awake scheduling in WSN proposed in [45] with the goal of transmitting the data sensed
can be interpreted as an NP-hard minimum DS problem. Many by the nodes towards the sink by forming K-CDS. This ensures
research works have been introduced in order to address this that each node is connected to a minimum of k-nodes.
concern. A Balanced Energy Efficient Virtual Backbone Construction
In [14] and [15], centralized approximation algorithms were (BEE-VBC) algorithm is proposed in [46]. BEE-VBC employs
proposed. However, centralized approximation algorithms are the well-known heuristic Genetic Algorithm (GA) and con-
not convenient solutions for large-scale WSNs [15]. Thus, sider multiple factors such as energy, coverage of neighbors,
the work in [16]–[18] utilized the properties of distributed reliability, data rate, and traffic deviation in the design of
algorithms in order to create DSs. fitness function. The maximum fitness nodes are utilized for
In order to create small Connected DSs (CDS), [19] pro- CDS construction to improve the quality of the solution and
posed a degree-based three-stage centralized greedy approxi- to ensure steady connectivity among the dominator nodes, and
mation algorithm. The authors stated that the method provided form the path towards the BS.
better results compared to traditional algorithms, in terms of In [37], a method called ADCOCDS is suggested for
construction cost. The work proposed in [7] increased the reducing transmission delay and network power consumption.
CDS connectivity by using a non-trivial potential function. ADCOCDS creates a backbone network. The nodes in the
The presented greedy strategy is based on a 2-connected backbone network run in a duty cycle-based mode, while
graph decomposition (called Tutte’s decomposition) to form others conserve power by switching off the radio if no data
3-connected components. needs to be sent. If the occurrence of an event is detected by
The work in [10] proposed a clustering approach based on a dominate node, it will turn on its radio and transmit the data
DS, known as EBDSC, to improve network performance. The to the corresponding dominator.
work in [11] proposed a distributed scheme for determining An intelligent CDS-based backbone design scheme is pre-
the nodes to form a DS in a WSN. sented in [40]. A distributed approach is adopted to design the
The authors of [20] and [21] have proved the importance WSN structure, with nodes energy value serving as a major
of virtual backbone (VB) in terms of increasing network parameter. Thus a connected DS (CDS) is constructed in a
scalability and efficiency. As the connectivity offered by a distributed fashion to create a virtual backbone.
connected DS allows for the transmission of data and com- Work in [41] proposed a weighted clustering algorithm for
munication between the nodes in the WSN, such a set can WSNs based on connected DSs. The backbone structure’s
function as a VB of a WSN (VBN). Moreover, this helps to elements are chosen according to the (k, T) - CDS where,
structure the WSN in a hierarchical manner for use in data k is the backbone nodes count and T is the hop distance.
routing and communication. Connected DSs in the context of The method determines the elements of the DS one by one,
energy harvesting (CDSEH), which is based on the concept selecting the most appropriate sensor node as a member of the
of VBN, have been proposed in [22]. They applied both DS based on its weight. In multi-hop scenarios, the (k, T) -
centralized as well as distributed schemes to solve the issue. CDS gives CH redundancy.
In addition, the work proposed in [22] verified that the problem In [42], authors proposed an optimized region based- data
discussed in CDSEH is NP-complete and thus they suggested routing approach (AORED) for WSNs. In AORED, CDS
a hybrid algorithm to address it. In [23], the DS problem is was applied to construct the VBN of communicating nodes.
converted into a domatic partition problem to provide further In EBDSC scheme of [44], each node calculates its lifetime.
improvements by partitioning the WSN nodes into disjoint DS. If a node has the maximum lifetime amongst the neighbors,
Although all the aforementioned algorithms succeeded to it is selected as a candidate CH. Its decision to become a final
solve the issue of finding the minimum DS, none of them CH is according to a probability determined by its uncovered
considered the node’s energy during the creation or selection neighbors.
of CDS. Thus, the work proposed in [9] used different local The work in [43] introduced an energy constrained mini-
search algorithms, while considering the nodes varying initial mum connected DS approach and used energy constraints to
energy to create CDS. However, the complexity of the pro- design the task of determining CH optimally. The authors
posed algorithm is considered as its main drawback. Motivated of DGA-EBCDS [33] suggested that by constructing an
by this, we utilized the DSs concept to select the sets of energy-balanced CDS for data acquisition, the network life-
collectors, where multiple disjoint DSs are selected based on time could be extended.
node energies. By modifying the basic LEACH, LEACH-DS-ACO is pro-
In the context of employing DS for data collection and posed in [34]. In this work, DS formation is applied to each
routing in WSNs, the work in [36] introduced Fuzzy-DS-ACO. cluster to construct its DS. Then a cluster chain is constructed
Fuzzy-DS-ACO divides sensor nodes into clusters using Fuzzy using ACO, and leader for the chain is chosen based on
C-Means. For each cluster, a DS is identified, and the cluster remaining energy and distance to the BS. In [32] authors
chain (CC) is constructed using ACO. Using the Fuzzy Logic proposed a Hierarchically Diffused CDS (HDCDS)-based
system, a chain leader (CL) for each CC is selected based on Compressive Data Gathering (CDG) scheme. A CDS was built
21102 IEEE SENSORS JOURNAL, VOL. 21, NO. 18, SEPTEMBER 15, 2021
A. System Model
The proposed IDCT technique operates in two phases:
In our proposed model, WSN is depicted as a graph G =
• Bees based collector nodes selection (BBCNS), and
(V, E). V and E stand for the set of deployed WSN nodes and
• Data gathering path formation and collection.
the communication links between nodes, respectively. There
exist an edge between two nodes p and q ∈ V if p lies In the first phase, we find energy-aware disjoint DSs that work
within the communication range (CR) of q. We follow the as collector nodes for each round based on the adapted Bees
assumption that the links between nodes in the WSN are algorithm in which the energy of the formed sets and the WSN
symmetric, i.e., all the nodes in the WSN possess identical lifetime are considered while devising the fitness of the Bees
communication range. The sensor nodes are battery-powered algorithm. We find the data gathering path to send data from
and have heterogeneous initial energy. The power consumption collector nodes to the BS in the second phase. Algorithm 1
rate is considered constant for all the nodes. presents the pseudo-code for IDCT.
A set D ⊂ V is a DS if ∀v ∈ V \D has a neighbor in D.
In the concept of a DS, the nodes assigned for accomplishing Algorithm 1 Intelligent Data Collection Technique (IDCT)
the tasks on behalf of their neighboring nodes constitute the 1: Input: WSN, Bees algorithm parameters.
DS, and can be used to prolong WSN lifetime. DS with 2: Output: Collecting Path for each node.
a smaller size can perform effectively in terms of power 3: DSs = DS1 , DS2 , . . . , DSk : set of dominated sets.
efficiency since more nodes can be made to sleep mode. 4: k: total number of formed DSs.
However, the major drawback of this scheme is the lack of 5: {Generate dominated sets} //Phase-I
balance in energy distribution among the nodes. This problem 6: Start Bees Based Collector Nodes Selection (BBCNS)
can be eased by substituting an existing DS with another Phase to generate DSs.
disjoint DS in the WSN and switch the state of the nodes 7: {Data gathering path formation and collection phase}
in the previous set to sleeping mode. I.e., employing as many //Phase-II
disjoint DSs as possible and utilizing each for a particular 8: Initial Step: Form aggregation tree
amount of time, then substituting it with another, and so on. 9: for each round r do
The node with minimum energy in a DS determines the 10: i x = mod(r, k) {determine the index of current DS}
lifetime of that set, which is obtained by dividing the node 11: {get DS for current round}
energy by the rate at which the energy is consumed. Our target 12: if i x = 0 then
is to enhance the entire lifetime of heterogeneous WSN. This 13: curr ent DS = DSs(i x)
can be achieved by selecting the disjoint DSs in an efficient 14: else
manner such that the total network lifetime is improved, where 15: curr ent DS = DSs(k)
the overall WSN lifetime is the sum of the lifetime of each of 16: end if
the disjoint DS. 17: Get parent node for each collector node ci ∈ curr ent DS
For clarification, consider the example of a WSN graph by calling algorithm 3.
consisting of seven nodes with heterogeneous energy shown in 18: Each ci forward data to selected parent node toward BS.
Figure 1. From the network graph, we can have two disjoint 19: end for
DSs D1 = [1, 2, 5] and D2 = [3, 4, 6]. In D1 , node 5 has min-
imum energy, while node 4 in D2 has minimum energy. There-
fore, if we consider the energy consumption rate as constant
and equal to 0.05, then the lifetime of D1 is 0.03/0.05 = 0.6 B. Bees Based Collector Nodes Selection (BBCNS)
and the lifetime of D2 is 0.18/0.05 = 3.6. As a result, the total Phase
network lifetime is 4.2. The total network lifetime can be Bees algorithm [12] is one of the popular meta-heuristic
optimized and enhanced if the DSs are D1 = [2, 4, 5] and optimization schemes because of its efficiency in evaluating
D2 = [1, 3, 6]. In this case, the overall WSN lifetime will be global results to a variety of problems. This algorithm reflects
(0.03/0.05) + (0.76/0.05) = 0.6 + 15.2 = 15.8. honey bees’ natural behavior in determining the best site
OSAMY et al.: IDCT: INTELLIGENT DATA COLLECTION TECHNIQUE 21103
– randomly select DSs D1 and D2 from z denotes the initial energy, p = |P List1
| , |P Li st| denotes the
– randomly select index r1 from D1 and r2 from D2 size of parent list for collector node, di v represents integer
– exchange between the two sets D1 and D2 at indices division and ε is the count of successive rounds in which
r1 and r2 . a node does not work as relay node. The threshold value
increases when ε reaches the value of 1/ p, which gives the
• Else z is set to a new random solution
chance for node s to take the role of relay node. Moreover,
• x i is replaced if it has lower fitness value than z.
the value of ε is set to zero when a node is selected as a relay
Repeat the above steps to update each individual in (n − m). node. This prevents the low value for the threshold that could
Figure 4 shows an example of selected bee and the crossover occur when the nodes have a very low energy level.
operation on the sets in it to generate new bee. From Figure 4, ω(s, r ) is a function that identifies whether or not a node
we can see that the new solution contains {7}, {1, 6} and s can share the selection procedure for round r ; zero value
{2, 4, 5, 3}. The first two sets are invalid while the 3rd one indicates that s can serve as relay node while other values
is a valid set which is only considered during fitness value indicate that s cannot serve as a relay node. It is calculated as
calculations for this individual. follows:
5) Final Step: Finally, the overall positions are sorted by
1
fitness values, and the process runs until the global optimum ω(s, r ) = − mod(r, 1/ p). (4)
is discovered. p
3) Data Collection Step: Each node that is not in the set of
C. Data Gathering Path Formation and Collection Phase collector nodes selects the nearest collector node and sends
In order to determine the path of data gathering, we propose its sensed data to it. The collector node constructs a path
an intelligent data collection method that is inspired by the to the BS by determining the parent node (based on Parent
OSAMY et al.: IDCT: INTELLIGENT DATA COLLECTION TECHNIQUE 21105
Node Selection Step) that works as a relay node with the selected nodes D1 and the set of neighbors of the selected
best benefits and sends it confirm message. The selected node nodes xD1, and each node in the network is either in D1
continues the path construction by forwarding the data to its or has a neighbor in D1 . According to the definition of DS,
next node towards the BS. This process repeats until the data D1 is a DS, which contradicts the assumption that GSP does
reaches the BS and each time node with maximum benefit is not generate a solution.
selected as the next node for data delivery towards the BS. Lemma 2: BBCNS correctly generates the DSs.
Proof: We prove this through contradiction. Suppose the
Algorithm 3 getParentID: Select Parent Node to Work as claim is wrong, meaning that BBCNS does not correctly
Relay Node generate the DSs. Then, the solution soltmax is invalid at the
end of the iteration tmax . Assume we have the initial solutions
1: Input: round number (r ), parent list (P Li st).
sol1 = (d11 , . . . , dk1i ), sol2 = (d12 , . . . , dk2 ), …, sol p =
2: Output: parent id (P I D) that works as relay node.
(d1n , . . . , dkn ). According to the BBCNS, a group of solutions
3: if P Li st = ∅ then
are generated in the initialization process using GSP. During
4: p = |P List 1
| the fitness evaluation step, each of these solutions is evaluated
5: else
using the Equation 1, and the best solution with the highest fit-
6: p = 1
7: end if ness value is kept and saved for the subsequent operations. The
top best m solutions are then selected during the neighborhood
8: Set T empid = 0
search process and are subjected to swap mutation to generate
9: for every node si in P Li st & si .E > 0 do
new solutions. The newly generated solutions are evaluated
10: Set Tr = rand() {Random value}
based on their fitness, as discussed above. The remaining
11: if ω(si , r ) == 0 then
solutions are subjected to crossover operation in the global
12: calculate using equation 3
search step to generate new solutions, which are evaluated and
13: Calculate T = × p × (1 − p × mod(r, p−1 ))−1
added to the population. These operations are repeated until
14: if Tr < T then
15: T empid = si .i d the maximum number of iterations tmax is reached. The best
solution with maximum fitness value and valid sets is retained
16: end if
in each iteration until the maximum number of iterations tmax
17: else
is reached. Moreover, the convergence of the Bees algorithm
18: ε(si , r ) = ε(si , r ) + 1 {consecutive rounds in which
has been proved in a number of studies [12], [47]. Therefore
si has not worked as relay node.}
BBCNS is convergent.
19: end if
Lemma 3: The formed tree by the second phase is con-
20: end for
nected.
21: if T empid = 0 then
22: Set P I D = T empid Proof: We present the proof through contradiction. Sup-
pose the formed tree is disconnected. During the second phase,
23: ω(si , r ) = r ound(1/ p) − 1
BS sends a message to neighbors specifying its hop distance
24: ε(si , r ) = 0
h B S . Each node si that receives the message updates its hop
25: end if
distance h si to h B S + 1, adds the sender i d to its parent list,
26: return P I D
and sends a message to its neighbors stating its hop distance
(h si ). Each neighbor node s j of si that receives this message
will execute the same steps executed by si , if (h si < h s j ).
D. The Correctness and the Evaluation of IDCT At the end of this process, each node will have a hop distance
In this section, we prove the correctness of our proposed and a list of parent nodes, implying that each node has a path
algorithm and evaluate its time and communication complex- to the BS, which contradicts the previous assumption.
ity. The proof and the evaluation are presented in a set of Lemma 4: The proposed IDCT prolongs the network life-
Lemmas as follows: time.
Lemma 1: The Generating Solution Procedure (GSP) gen- Proof : Network lifetime can be expressed as the sum of
erates a solution. the lifetimes of the generated disjoint DSs. The node with
Proof: We prove this by contradiction. Suppose GSP does minimum energy determines the lifetime of any DS, i.e., the
not generate any solution. In the proposed work, GSP is used network lifetime can be extended by considering disjoint sets
in the first phase (BBCNS) for initialization process. Since with maximum lifetime and this is the main idea of IDCT,
we assumed that GSP doesn’t generate a solution, there exist where IDCT’s fitness function is developed to form DS that
no valid DS in its solution. Meanwhile, according to GSP, all have nodes with convergence in their energy levels and thus
nodes are candidate nodes in the first iteration (say X is the maximizes the lifetime of the DS.
set of candidate nodes). GSP works by selecting a node s1 Lemma 5: If n is the number of nodes in the network
randomly from the set X, excludes it from X and adds it to a and l is the average number of children, the communication
set called D1 . The neighbors of the node s1 are then eliminated complexity of the IDCT will be O(n logl (n)) messages.
from X and added to a list called xD1. Proof : The number of messages exchanged during Col-
These operations will be repeated until X becomes empty. lector nodes selection (BBCNS), and Data gathering path
At the end of the iterations, we have two sets, the set of formation and collection phases can be computed as follows:
21106 IEEE SENSORS JOURNAL, VOL. 21, NO. 18, SEPTEMBER 15, 2021
Fig. 5. Impact of BS location and communication radius on lifetime (FND, HND, and LND).
Fig. 7. Impact of BS location and communication radius on dead nodes per round.
Fig. 8. Impact of BS location and communication radius on standard deviation of energy per round.
the BS location is changed from corner to the middle of one of the BS in the center provides the longest lifetime. This is
edge, and then to the center of the area regardless of the change because the distance from the nodes to the BS decreases as
in communication radius. The results reveal that the location the BS moves from the corner to the center.
21108 IEEE SENSORS JOURNAL, VOL. 21, NO. 18, SEPTEMBER 15, 2021
Fig. 9. Impact of standard deviation, average energy and number of live Fig. 10. Impact of node density against average consumed energy and
standard deviation until first node dies and network lifetime.
nodes against number of rounds and node density.
As the main concern of WSN is the energy expended along the distribution of dead nodes and the standard deviation of
the network lifetime, we present the following results to show consumed energy during round operations. It is clear from
the IDCT performance in balancing energy utilization of the these figures that the average expended energy as well as the
nodes with change in communication radius and BS location standard deviation of energy consumption decrease as the BS
along its lifetime. Figure 6 provides the effect of BS location moves from the corner to the center. The reason for this is same
on the average energy expended until FND and the standard as discussed above, i.e. due to the impact of the changes in the
deviation of energy. It is clear that expended energy until FND number of neighboring nodes. It is evident from the figures that
and the standard deviation of consumed energy is reduced IDCT performs well on balancing the energy consumption
as the BS location is changed to the area center. Moreover, among nodes with the appropriate BS positioning, which in
the BS located at the corners and edges may have only a few turn ensures increased lifetime.
neighboring nodes compared to the center, resulting in less 2) Impact of Communication Radius: Our aim in this test
balance between the nodes, affecting the IDCT and shortening is to see how IDCT performs over various communication
the lifetime. radius (C R ) of nodes. 100 nodes are deployed randomly on a
To further analyze the network lifetime performance and 100 m × 100 m area. We change the C R from 25 to 45 with
stability period of operation, we conducted additional exper- an increment of 10 m with BS at the corner.
iments by changing the BS location and radius of com- The impact of C R on the lifetime of the network (in terms of
munication. Accordingly, the flow of dead nodes and the FND, HND and LND), the average energy consumed until the
standard deviation of consumed energy by nodes during the first node dies (FND), and the standard deviation of expended
rounds of operation are shown in Figures 7 and 8, respectively. energy respectively are already depicted in Figures 5 and 6.
The results indicate the impact of changing BS location on From these figures it is evident that as the C R increases,
OSAMY et al.: IDCT: INTELLIGENT DATA COLLECTION TECHNIQUE 21109
[15] K. Islam, S. G. Akl, and H. Meijer, “Maximizing the lifetime [35] C. Patra, “Introducing connected dominating set as selection feature
of wireless sensor networks through domatic partition,” in Proc. of cluster heads in hierarchical protocols of wireless sensor networks,”
IEEE 34th Conf. Local Comput. Netw., Oct. 2009, pp. 436–442, doi: Global J. Comput. Sci. Technol., vol. 20, no. 1, pp. 21–26, 2020.
10.1109/LCN.2009.5355161. [36] S. Mondal, S. Ghosh, and U. Biswas, “A dominating set based
[16] I. Stojmenovic, M. Seddigh, and J. Zunic, “Dominating sets and neigh- data gathering in wireless sensor network using fuzzy logic and
bor elimination-based broadcasting algorithms in wireless networks,” ACO,” in Proc. Int. Conf. Informat. Anal., Aug. 2016, pp. 1–8, doi:
IEEE Trans. Parallel Distrib. Syst., vol. 13, no. 1, pp. 14–25, Jan. 2002, 10.1145/2980258.2980415.
doi: 10.1109/71.980024. [37] W. Shi, W. Liu, T. Wang, Z. Zeng, and G. Zhi, “Adding duty
[17] J. Wu and H. Li, “On calculating connected dominating set for efficient cycle only in connected dominating sets for energy efficient and fast
routing in ad hoc wireless networks,” in Proc. 3rd Int. Workshop data collection,” IEEE Access, vol. 7, pp. 120475–120499, 2019, doi:
Discrete Algorithms Methods Mobile Comput. Commun. (DIALM), 1999, 10.1109/ACCESS.2019.2937626.
pp. 7–14, doi: 10.1145/313239.313261. [38] A. Khedr and R. Bhatnagar, “Agents for integrating distributed data
[18] K. Islam, S. G. Akl, and H. Meijer, “A constant factor localized for complex computations,” Comput. Informat. J., vol. 26, no. 2,
algorithm for computing connected dominating sets in wireless sen- pp. 149–170, 2007.
sor networks,” in Proc. 14th IEEE Int. Conf. Parallel Distrib. Syst., [39] A. M. Khedr “Learning K-nearest neighbors classifier from distributed
Dec. 2008, pp. 559–566, doi: 10.1109/ICPADS.2008.78. data,” Comput. Inform., vol. 27, no. 3, pp. 355–376, 2008.
[19] J. P. Mohanty, C. Mandal, C. Reade, and A. Das, “Construction of [40] B. Abid, S. Messai, and H. Seba, “Energy-based connected dominating
minimum connected dominating set in wireless sensor networks using set for data aggregation for intelligent wireless sensor networks,” in
pseudo dominating set,” Ad Hoc Netw., vol. 42, pp. 61–73, May 2016, Proc. Int. Conf. Mach. Learn. Netw. Cham, Switzerland: Springer, 2018,
doi: 0.1016/j.adhoc.2016.02.003. pp. 193–211, doi: 10.1007/978-3-030-19945-6_13.
[41] V. S. Anitha and M. P. Sebastian, “A connected dominating set-
[20] B. Das, R. Sivakumar, and V. Bharghavan, “Routing in ad hoc networks
based weighted clustering algorithm for wireless sensor networks,” in
using a spine,” in Proc. 6th Int. Conf. Comput. Commun. Netw.,
Proc. IEEE Int. Conf. Wireless Commun., Netw. Inf. Secur., Jun. 2010,
Sep. 1997, pp. 34–39, doi: 10.1109/ICCCN.1997.623288.
pp. 530–534, doi: 10.1109/WCINS.2010.5544142.
[21] J. Yu, N. Wang, G. Wang, and D. Yu, “Connected dominating [42] H. Faheem, N. Ilyas, S. Ul, and S. Tanvir, “Connected dominating set
sets in wireless ad hoc and sensor networks—A comprehensive sur- based optimized routing protocol for wireless sensor networks,” Int.
vey,” Comput. Commun., vol. 36, no. 2, pp. 121–134, 2013, doi: J. Adv. Comput. Sci. Appl., vol. 7, no. 11, pp. 322–331, 2016, doi:
10.1016/j.comcom.2012.10.005. 10.14569/IJACSA.2016.071142.
[22] T. Shi, S. Cheng, Z. Cai, and J. Li, “Adaptive connected [43] J. Albath, M. Thakur, and S. Madria, “Energy constrained dominat-
dominating set discovering algorithm in energy-harvest sensor ing set for clustering in wireless sensor networks,” in Proc. 24th
networks,” in Proc. IEEE INFOCOM, Apr. 2016, pp. 1–9, IEEE Int. Conf. Adv. Inf. Netw. Appl., Apr. 2010, pp. 812–819, doi:
doi: 10.1109/INFOCOM.2016.7524504. 10.1109/AINA.2010.14.
[23] J. Yu, Q. Zhang, D. Yu, C. Chen, and G. Wang, “Domatic partition [44] X. Kui, J. Wang, S. Zhang, and J. Cao, “Energy balanced clustering data
in homogeneous wireless sensor networks,” J. Netw. Comput. Appl., collection based on dominating set in wireless sensor networks,” Adhoc
vol. 37, pp. 186–193, Jan. 2014, doi: 10.1016/j.jnca.2013.02.025. Sensor Wireless Netw J., vol. 24, pp. 99–217, Feb. 2015.
[24] O. Yilmaz and K. Erciyes, “Distributed weighted node shortest path [45] E. G. Julie and S. Tamilselvi, “CDS-fuzzy opportunistic routing protocol
routing for wireless sensor networks,” in Proc. Int. Conf. Wire- for wireless sensor networks,” Wireless Pers. Commun., vol. 90, no. 2,
less Mobile Netw. Berlin, Germany: Springer, 2010, pp. 304–314, pp. 903–922, 2016, doi: 10.1007/s11277-016-3250-8.
doi: 10.1007/978-3-642-14171-3_26. [46] G. V. S. Varsa and D. Sridharan, “A balanced energy efficient virtual
[25] W. Osamy, A. A. El-Sawy, and A. Salim, “CSOCA: Chicken backbone construction algorithm in wireless sensor networks,” AEU
swarm optimization based clustering algorithm for wireless sen- Int. J. Electron. Commun., vol. 107, pp. 110–124, Jul. 2019, doi:
sor networks,” IEEE Access, vol. 8, pp. 60676–60688, 2020, doi: 10.1016/j.aeue.2019.05.018.
10.1109/ACCESS.2020.2983483. [47] M. S. Bahari, “Enhancement of bees algorithm for global optimisation,”
[26] A. Salim, W. Osamy, A. M. Khedr, A. Aziz, and M. Abdel-Mageed, Ph.D. dissertation, Dept. Mech. Eng., School Eng. College Eng. Phys.
“A secure data gathering scheme based on properties of primes and Sci., Univ. Birmingham, Birmingham, U.K., 2019.
compressive sensing for IoT-based WSNs,” IEEE Sensors J., vol. 21, [48] D. T. Pham and M. Castellani, “A comparative study of the bees
no. 4, pp. 5553–5571, Feb. 2021, doi: 10.1109/JSEN.2020.3032585. algorithm as a tool for function optimisation,” Cogent Eng., vol. 2, no. 1,
[27] Y. Lim and S. Kang, “Intelligent approach for data collection in wireless Dec. 2015, Art. no. 1091540, doi: 10.1080/23311916.2015.1091540.
sensor networks,” Int. Arab J. Inf. Technol., vol. 10, no. 1, pp. 36–42, [49] W. Sun, M. Tang, L. Zhang, Z. Huo, and L. Shu, “A survey of using
2013. swarm intelligence algorithms in IoT,” Sensors, vol. 20, no. 5, pp. 14–20,
[28] P. V. P. Raj, A. M. Khedr, and Z. A. Aghbari, “Data gathering via 2020, doi: 10.3390/s20051420.
mobile sink in WSNs using game theory and enhanced ant colony [50] M. V. R. Sarobin and R. Ganesan, “Swarm intelligence in wireless
optimization,” Wireless Netw., vol. 26, no. 4, pp. 2983–2998, 2020, doi: sensor networks: A survey,” Int. J. Pure Appl. Math., vol. 101, no. 5,
10.1007/s11276-020-02254-x. pp. 773–807, 2015.
[51] R. V. Kulkarni, A. Forster, and G. K. Venayagamoorthy, “Compu-
[29] A. Thiruchelvi and N. Karthikeyan, “Pair-based sink relocation and route
tational intelligence in wireless sensor networks: A survey,” IEEE
adjustment in mobile sink WSN integrated IoT,” IET Commun., vol. 14,
Commun. Surveys Tuts., vol. 13, no. 1, pp. 68–96, 1st Quart., 2011,
no. 3, pp. 365–375, Feb. 2020, doi: 10.1049/iet-com.2019.0054.
doi: 10.1109/SURV.2011.040310.00002.
[30] G. S. Arumugam and T. Ponnuchamy, “EE-LEACH: Development
of energy-efficient LEACH protocol for data gathering in WSN,” Walid Osamy received the B.Sc. (Hons.), M.S.,
EURASIP J. Wireless Commun. Netw., vol. 76, pp. 1–9, Dec. 2015, doi: and Ph.D. degrees in computer science from the
10.1186/s13638-015-0306-5. Faculty of Science, Zagazig University, Egypt,
[31] R. Sridhar and N. Guruprasad, “Energy efficient chaotic whale opti- in June 2000, June 2006, and September 2010,
mization technique for data gathering in wireless sensor network,” respectively. From July 2001 to March 2009,
Int. J. Electr. Comput. Eng., vol. 10, no. 4, p. 4176, Aug. 2020, doi: he was involved in the Project of Network
10.11591/ijece.v10i4.pp4176-4188. Infrastructure and Management Information Sys-
[32] X. Yu, W. Xu, and C. Chen, “HDCDS-CDG: A hierarchically tems, Communication Information Technology
diffused connected dominating sets based compressed data gather- Center (CITC) and a member of Information
ing scheme,” J. Phys., Conf., vol. 1570, no. 1, pp. 12–56, 2020, and Communication Technology Projects (ICTP),
doi: 10.1088/1742-6596/1570/1/012056. Zagazig University. From December 2010 to Jan-
[33] X. Kui, J. Wang, and S. Zhang, “A data gathering algorithm based on uary 2019, he was an Assistant Professor with the Department of Com-
energy-balanced connected dominating sets in wireless sensor networks,” puter Science, College of Computers and Informatics, Benha University,
in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Apr. 2013, Egypt. Since February 2019, he has been working as an Associate
pp. 1139–1144, doi: 10.1109/WCNC.2013.6554724. Professor with the Department of Computer Science, College of Com-
[34] S. Ghosh, S. Mondal, and U. Biswas, “A dominating set based puters and Artificial Intelligence, Benha University. Since March 2015,
modified LEACH using ant colony optimization for data gath- he has been working as an Assistant Professor with Qassim University,
ering in WSN,” in Proc. 2nd Int. Conf. Adv. Electr., Elec- Buraidah, Saudi Arabia. His research interests include computational
tron., Inf., Commun. Bio-Inform. (AEEICB), Feb. 2016, pp. 390–396, intelligence and in the field of the IoT [mobile computing and wireless
doi: 10.1109/AEEICB.2016.7538315. sensor networks (WSNs)].
21112 IEEE SENSORS JOURNAL, VOL. 21, NO. 18, SEPTEMBER 15, 2021
Ahmed Salim received the B.Sc. degree in com- Ahmed A. El-Sawy received the B.S. and M.S.
puter science and the M.Sc. degree in the area degrees from Cairo University in 2000 and 2003,
of distributed computing from Zagazig Univer- respectively, and the Ph.D. degree in computer
sity, Egypt, in June 2001 and December 2006, science from Suez Canal University in 2011.
respectively, and the Ph.D. degree in systems, From 2004 to 2011, he was a Lecturer with the
networks, and telecommunication devices from Faculty of Computers and Information Systems,
the Bonch-Bruvich University of Telecommunica- Taif University, Saudi Arabia. Since 2012, he has
tion, Saint-Petersburg, Russia, in October 2010. been a Lecturer and an Associate Professor of
From January 2012 to December 2012, he was Computer Science with Benha University since
a Consultant of the Information and Commu- 2017. Since 2017, he served as the Head of
nication Technology Project (ICTP), Zagazig Computer Science for the Faculty of Computers
University. From January 2011 to May 2019, he was an Assistant Pro- and Artificial Intelligence, Benha University, Egypt. His research inter-
fessor with the Department of Mathematics, Faculty of Science, Zagazig ests include artificial intelligence in computer network, bioinformatics,
University. Since June 2019, he was as an Associate Professor with chimoinformatics, deep learning, and optimization.
the Department of Mathematics, Faculty of Science, Zagazig University.
Since January 2014, he has been working as an Assistant Professor
with the Department of Computer Science, Faculty of Science and
Art, Qassim University, Al-mithnab, Saudi Arabia. His research interests
include decomposable algorithms, computing, and wireless networks.