Next Article in Journal
An Open Surface Drifter for River Flow Field Characterization
Previous Article in Journal
Fast Sleep Stage Classification Using Cascaded Support Vector Machines with Single-Channel EEG Signals
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction

by
Sasikumar Gurumoorthy
1,
Parimella Subhash
2,
Rocio Pérez de Prado
3,* and
Marcin Wozniak
4,*
1
Department of Computer Science and Engineering, Jerusalem College of Engineering, Chennai 600100, India
2
Department of Computer Science and Engineering, VNR Vignana Jyothi Institute of Engineering and Technology (VNRVJIET), Hyderabad 500090, India
3
Telecommunication Engineering Department, University of Jaén, 23700 Linares, Spain
4
Faculty of Applied Mathematics, Silesian University of Technology, 44-100 Gliwice, Poland
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(24), 9921; https://doi.org/10.3390/s22249921
Submission received: 14 November 2022 / Revised: 10 December 2022 / Accepted: 13 December 2022 / Published: 16 December 2022
(This article belongs to the Section Sensor Networks)

Abstract

:
Currently, analysts in a variety of nations have developed various WSN clustering protocols. The major characteristic is the Low Energy Adaptive Clustering Hierarchy (LEACH), which attained the objective of energy balance by sporadically varying the Cluster Heads (CHs) in the region. Nevertheless, because it implements an arbitrary number system, the appropriateness of CH is complete with suspicions. In this paper, an optimal cluster head selection (CHS) model is developed regarding secure and energy-aware routing in the Wireless Sensor Network (WSN). Here, optimal CH is preferred based on distance, energy, security (risk probability), delay, trust evaluation (direct and indirect trust), and Received Signal Strength Indicator (RSSI). Here, the energy level is predicted using an improved Deep Convolutional Neural Network (DCNN). To choose the finest CH in WSN, Bald Eagle Assisted SSA (BEA-SSA) is employed in this work. Finally, the results authenticate the effectiveness of BEA-SSA linked to trust, RSSI, security, etc. The Packet Delivery Ratio (PDR) for 100 nodes is 0.98 at 500 rounds, which is high when compared to Grey Wolf Optimization (GWO), Multi-Objective Fractional Particle Lion Algorithm (MOFPL), Sparrow Search Algorithm (SSA), Bald Eagle Search optimization (BES), Rider Optimization (ROA), Hunger Games Search (HGS), Shark Smell Optimization (SSO), Rider-Cat Swarm Optimization (RCSO), and Firefly Cyclic Randomization (FCR) methods.

1. Introduction

A Wireless Sensor Network (WSN) contains wide-ranging sensors associated with a wireless medium [1,2,3]. The WSN is employed in an assortment of appliances such as meteorological data compilation, climate monitoring, field surveillance, transport, and healthcare [4,5,6]. On the other hand, the SNs in WSN do not include any rechargeable storage devices and the capability of rechargeable batteries. In this way, it is difficult to sustain any system with capable power utilization.
Clustering is a major method for making data transmission more effective concerning energy and power utilization. This model split the Sensor Nodes (SNs) into assorted clusters [7,8,9,10]. All clusters in the network have distinguishing CH, which is liable to communicate info to other SN in its cluster. In such a scenario, the chief task is to decide on optimal CH under different constraints, such as lower energy consumption, delay, etc. [11,12,13]. As a result, to form clusters via the data aggregation and fusion systems, there is EE in the network as the quantity of data conveyed to the Base Station (BS) is lessened significantly [14,15,16]. The ageing population, safety, security, healthcare, and other social concerns that advanced nations face are significant issues. The concept of “smart cities” makes use of IoT technology to enhance social infrastructure and create a creative remedy for the aforementioned problems. The researcher is encouraged to employ ubiquitous intelligence by the significant advancements in wireless networks, mobile ad hoc networks, 5G, and fiber optic telecommunication [17]. Nowadays, creating an effective WSN is a key study field. A wireless sensor network (WSN) is a collection of parts that transmits data wirelessly from source to destination. Because of the locations where they are deployed, Wireless Sensor Networks (WSN) always require energy. Furthermore, although energy consumption reduction is not the only cause for clustering, in certain survey reports it has been studied from that perspective. The majority of the clustering publications examine and contrast clustering approaches and their effectiveness but neglect to analyze the strategies’ goals. To the best of our knowledge, no survey research has examined the properties of WSN networks that existing clustering algorithms enable, such as heterogeneity and mobility.
Thus, the cluster-oriented approaches were also affianced in enabling the development of the life span of the network [18]. The most generally employed methods include Fuzzy C-Means (FCM) and Low Energy Adaptive Clustering Hierarchy (LEACH). Furthermore, LEACH was a cluster-oriented method, which operates in a dispersed way that prefers CH, depending on the determined likelihood. Therefore, improving the energy efficiency of the WSN is important because higher energy usage reduces the network’s lifetime. Clustering is an effective tactic for lengthening the network’s lifespan and reducing the amount of transmission energy used. With clustering, packet collision is eliminated, throughput is increased, and network scalability is prolonged. Clustering also decreases overall energy consumption. A set of central cluster-oriented methods have been launched so far, depending on meta-heuristic schemes. Definite wide-ranging schemes are Particle Swarm Optimization (PSO), the Harmony Search Algorithm (HSA), and so on. In addition, the challenging factors in modeling the routing schemes are the life span, QoS, and EE of the network. Mobile sinks are employed in the traditional model because of their high throughput and lower energy use, but information loss is the main disadvantage of utilizing a mobile sink [19]. When transmitting data packets from the source node to the destination node using the suggested architecture, information loss is prevented, and by employing the static node, energy consumption is also decreased. Because of its mobility, a cluster head used in combination with a mobile sink causes a larger loss of data during transmission. Due to its immobility, the cluster head has a lower possibility of losing data when utilized with a static sink. Using the suggested model results in a decrease in energy use and an increase in lifetime. The proposed protocol boosts the cluster’s, group’s, and network’s efficiency in terms of overheads, energy use, and throughput dependability. The lifespan of the network, group members, and cluster head/core are all improved by this efficiency and reliability.

1.1. Main Contribution

  • A CHS model for safe and energy-conscious routing in WSNs has been created. Distance, energy, security (risk likelihood), latency, appraisal of trust (direct and indirect trust), and received signal strength indicators all favor CHS (RSSI).
  • The proposed method predicts energy level using enhanced Deep Convolutional Neural Network (DCNN) to select the best CH in WSN. The BEA-SSA is used to select the best CH in the WSN. High RSSI, PDR, and residual energy are presented by the Bald Eagle Assisted SSA (BEA-SSA) model. The enhanced energy evaluation and prediction utilizing DCNN and the implemented BEA-SSA-based CHS are responsible for these improvements.
  • The proposed cluster head selection process aids LEACH to preserve the network lifetime. The literature includes research that similarly aids LEACH. This paper presents an advanced approach that supports LEACH more effectively.

1.2. Organization

The paper is organized as follows: Previous work is reviewed in Section 2. The network model and parameters for the best CH election are briefly discussed in Section 3 and Section 4. The proposed BEA-SSA model is shown in Section 5. The results and conclusion are further illustrated in Section 6 and Section 7.

2. Literature Review

In the related works section, 13 papers are considered. The methods, advantages, and disadvantages of the existing methods are provided.

Related Works

The firefly contribution using Firefly Cyclic Randomization (FCR) for Cluster Head Selection (CHS) in WSN was proposed by Amit et al. in 2022 [20]. Based on three distribution functions, the method finds the randomly generated solution. Additionally, by changing the random vectors of GWO, the study is based on the second method, Firefly Cyclic Grey Wolf Optimization (FCGWO). The study is carried out and described in terms of network longevity, energy efficiency, and live nodes for the three distributions.
In 2021, Shyjith et al. [21] suggested the hybrid optimization technique for CH selection. The preparation phase, transmission phase, and measuring phase are the three steps that make up the proposed CH selection. Initialization of the network’s energy and node mobility occurs initially. Here, multi-objective constraints that take into account delay, energy, and distance are used to select the threshold and CH. Data transfer from CHs to BS starts after the CHs have been identified. The residual energy generated by the nodes is finally updated during the measurement phase.
In 2019, Reeta et al. [22] designed a multi-objective system that depended on delay, traffic rate, energy, cluster density, and distance. Consequently, energy-aware routing was performed using the developed MOFPL. The designed Multi-Objective Fractional Particle Lion Algorithm (MOFPL) system found the best CH from various CH in WSN. The best routing paths were then set up as per deployed multi-objective function. In addition, capable CHS with superior EE was accomplished by the MOFPL method.
In 2020, Augustine et al. [23] offered an improved system for CHS using Taylor Kernel Fuzzy C-Means (KFCM) customized from the KFCM method. The modeled system designated the CH via the acceptability factor, which was reviewed by energy, distance, and trust. In addition, the advantage of the KFCM system was established concerning higher confidence and higher Energy Efficiency (EE).
In 2019, Goswami et al. [24] recognized a cluster formation method using the Firefly (FF) model and the Hierarchical Maximum Likelihood (HML) system in WSN to enhance EE and to lessen the cost-utility. The problems in the FF method were overcome by integrating the Hierarchical Maximum Likelihood HML hypothesis with it. Additionally, the allotment of power in SNs was completed accurately via the maximum likelihood property of HML. Latterly, the outcomes exposed the better cost function of EE using the adopted model.
In 2019, Toor et al. [25] employed a Mobile Energy Aware Cluster Based Multi-Hop (MEACBM) routing scheme for a variety of hierarchical WSNs. As per the novel probability procedure, the CHs were chosen as the finest; mainly, the SNs were elected as the CH, which offered superior energy over other SNs. This method considerably reduced the energy use of SNs to move the info to BS. The outcomes showed improvements over existing models regarding throughput, CH, life span, and dead nodes.
In 2019, Daneshvaret al. [26] presented a clustering method that chose CHs via GWO. To elect CH, optimization was performed on the basis of leftover energy. In addition, to achieve better EE, the GWO system employed the cluster in a large number of consecutive rounds. This permitted the scheme to collect the energy that was required to improve CHS. Finally, the outcomes recognized that GWO assured a capable network life span.
In 2020, Prachi et al. [27] deployed BOA to decide the best CH from diverse SNs. As a result, the Butterfly Optimization Algorithm (BOA) method aimed to decrease the use of energy and raise the life span of the system. The path amid BS and CH was represented using Ant Colony Optimization (ACO), and it elected supreme routes based on node degree, EE, and distance. Latterly, the advantage of BOA was established for nodes and energy use.
In 2019, Sanhaji et al. [28] discuss the experience of implementing a suggested neural network-based routing protocol technique. Our method focuses on enhancing clustering performance. An essential component of Wireless Sensor Networks is energy usage (WSNs). In our approach, which is based on the LEACH (Low-Energy Adaptive Clustering Hierarchy) routing protocol and the neural network’s tool, we introduce the criterion of the consumed energy for the process of the election of the Cluster-Head (CH).
In 2022, Krishna et al. [29] created a group with neighboring sensor nodes, in which the clustering process extends the lifespan of WSNs. For handling the data transfer from the other clustering groups to the fundamental sensor nodes, a principal node known as the cluster head is chosen from the group. Additionally, the cluster heads are positioned to send the signal gathered from its sensor nodes to the base stations. Many WSN applications find it difficult to select an ideal node to serve as a cluster head. The neural network algorithm in the proposed work is used to select a cluster head by examining the base station distance, neighbor sensor counts, and residual energy.
In 2021, Kumar et al. [30] provided a method for finding MNs in WSN using the parameters of each SN. In addition to addressing security, this innovation also made data transmission (DT) energy-efficient by selecting a Cluster Head (CH) that was centered on the sensor’s remaining energy. In the Malicious Nodes Detection (MND) phase, the Improved Deep Convolutional Neural Network (IDCNN) locates the MN and isolates it into the malicious list box. The Extended K-Means (EKM) algorithm clusters the Trusted Nodes (TN) in the energy-efficient DT phase, and the t-Distribution-based Satin Bowerbird Optimization (t-DSBO) algorithm chooses a single CH for each cluster that is centered on the residual energy of those nodes. Through the CH, the cluster’s data are sent to the base station (BS).
In 2022, Gul et al. [31] deployed energy-conscious data gathering in robot network clusters. Due to its limited battery life, a UAV collects data from CH robots by visiting a subset of them, whereas a cluster head (CH) robot in each cluster assigns one collaborative job to each cluster member (CM) robot and collects data from the CMs. A UAV’s decision to visit a subset of CHs is based on several considerations, including the battery’s remaining capacity as well as the locations and data quality of each CH robot. CH robots serve as relay nodes for data transmission for non-visited CH robots.
In 2020, Gul et al. [32] incorporated visiting an optimal number of CH robots while minimizing the total energy consumption of the UAV and the cost of data collection from CH robots. The UAV determines which subset of CH robots to visit by taking into account both its battery capacity and the locations of all CH robots. If the UAV is unable to visit every CH robot, the CH robots that the UAV does not visit relay their data to another CH robot, which then forwards it. The cost optimization process includes choosing the transmission channels for transmitting robots. By taking into account the continuous battery capacity for the UAV, our contribution goes beyond the prevailing paradigms in the literature.
Table 1 exhibits the conventional routing models in WSN. Initially, the FCR used in [20] conserved energy in a capable manner with negligible delay; however, computational time was not examined. The RCSO used in [21] offered improved throughput with negligible delay, but cost metrics must be considered. The MOFPL used in [22] offered high network energy with lesser simulation time, but resource management is not analyzed here. In addition, the Taylor KFCM used in [23] provided high throughput with negligible delay; nevertheless, there was no deliberation on real-time experiments. Likewise, the FF-based model used in [24] improved EE efficiently with enhanced EE. However, FF suffered from local search issues. In addition, the MEACBM model used in [25] ensured minimal energy consumption and offered enhanced life span and throughput. Nevertheless, it required deliberation on the scalability of SNs in every cluster. The GWO model used in [26] offered a better life span for the network and balanced energy consumption. Nevertheless, fault tolerance was not considered. In addition, the BOA + ACO model used in [27] provided an additional number of alive nodes with condensed energy utilization. However, there was no consideration of fault tolerance. The LEACH method is deployed in [28]; the delay and loss are reduced, and the major drawback is that it has to consider the time analysis. In the NN model in [29], the advantage is that energy consumption is reduced and the throughput is high. The experimental analysis should be considered as the major drawback of the system. The IDCNN method is employed in [30]; the main advantages are that energy utilization is low and the life span is increased, but the major drawback is that it needs to consider the stability analysis. The cluster head selection is used in [31]; the advantage is that the cost is reduced, and the drawback is that it needs to consider the scalability analysis. Finally, cluster head selection is deployed in [32]; the major benefit is that energy consumption is reduced, and the drawback is that consistency is not maintained.
Algorithm 1 represents the pseudo-code of the proposed model.
Algorithm 1. Pseudo-code of the Proposed Model.
Input: ( x i 0 , y i 0 ) , i = 1 , 2 N
Output: Optimal CH
Choose the estimated energy of S W i
Update the energy by using Equation (7)
Update the security by using Equation (14)
Update the distance by using Equation (17)
Update the delay by using Equation (18)
Update the trust by using Equation (19)
Update the RSSI by using Equation (20)
The objective function is given in Equation (28)
Solve for optimal cluster head
End

3. A Short Portrayal of the WSN Network

The below section provides a detailed description of the network model, and the overall architecture of the proposed model is also provided.

Network Model

Spatially dispersed nodes in wireless sensor networks can convey information gleaned from a monitored or controlled field across a wireless channel. Due to the wide range of potential applications, including those for pressure, light, and other variables, WSNs are a significant area of research. The WSN contains varied SNs signified by Z S , and an SN acts as an active sensor throughout the broadcast of data amid BS and CH. Habitually, the WSN is related to data sensing, radio communiqué, allotment of the sensor, topology characteristics, and energy utilization. The sensor is distributed arbitrarily in manual mode at every application area. The SNs are linked to form into clusters, wherein the CH is preferred and CH’s count is implied by Z C . The SN in the cluster has to encompass a minimal distance from the CH. The whole SNs from the expected area gather correlated data and communicate it to the CH. The linked CH transmits the information to the BS. Each sink node’s transmission pattern is based on a uniform distribution and distributes data over the maximum radio range possible within the range. This cluster, which takes the shape of a network, is made up of sensor nodes. The phrase designates the relevant cluster head for every cluster. This method of propagating decrease of from the cluster to the BS is collectively referred to as cluster head-based routing. The network model refers to the distance from other nodes to the cluster head as the distance between the cluster head and the base station. For easy transmission, the cluster head is chosen. In the proposed model, the cluster head is chosen based upon the energy, delay, distance, security, trust, and RSSI. To conserve significantly more energy efficiency, power consumption, and energy load balance during each cycle of the sensor nodes, it is interesting to choose a cluster head.
The best way to identify the CH is to pick the node that uses the least amount of energy, allowing the CH to send out more data packets. The main factors used to identify the CH are energy or distance. Furthermore, security is regarded as a crucial component because it ensures protected data transmission. The pictorial representation of the BEA-SSA model is shown in Figure 1. Wherein, three cluster groups (Cluster 1, Cluster 2 and Cluster 3) are considered, from each group, CH is selected and connected with the base station. Here, the selection of the CH depends upon the following constraints: Energy, Trust, Distance, Security, RSSI, and Delay.

4. Parameters for the Optimal Election of CH

The varied constraints used to elect the optimal CH are as below:
  • Energy;
  • Security;
  • Distance;
  • Trust (direct and indirect);
  • Path quality (reliability);
  • Delay.

4.1. Energy Model

The chief issue related to WSNs is the exploitation of energy [33]. The re-energizing method is not applied for the WSN battery, and consequently, providing energy is impossible if the battery drops down. In addition, data transmitted to the BS from whole SNs is capably made via supplementary resources. Energy exploitation is very important to transmit data. The network needs supplementary energy owing to varied functions that comprise transmission, reception, aggregation, and sensing. Conventionally, the required energy for the overall broadcast of data is implied by Equation (1); however, as per the proposed energy model, the required energy for an overall broadcast of data is implied by Equation (2), where E i denotes initial energy. As per the specified modules, the electronic energy is implied as E e l , in which E e a denotes the energy for data time aggregation. E e l is implied by Equation (4). E T X ( Z : d i ) indicates the whole deployed energy needed to communicate Z bytes of packets at d i distance. For a good system, energy must be high.
The receiver energy, E R X , required to obtain Z bytes of packets at d i is shown in Equation (5), which indicates the energy necessary for amplification, E a m .
E T X ( Z : d i ) = E { E e l × Z + E r s × Z × d i 2 , i f    d i < d i 0 E e l × Z + E p w × Z × d i 2 , i f    d i d i 0
E T X ( Z : d i ) = E { E i E e l × Z + E r s × Z × d i 2 , i f    d i < d i 0 E i E e l × Z + E p w × Z × d i 2 , i f    d i d i 0
E e l = E T X + E e a
E R X ( Z : d i ) = E e l Z
E a m = E f r d i 2
d i 0 = E f r E p a m
In the above equations,
d i 0 represents threshold distance;
E p a m represents energy of PA;
E f r represents requisite energy as employing free space approach;
E 1 represents energy for entire idle state;
E C represents energy cost for whole sense phase.
The overall energy to transmit data is indicated by Equation (8).
E t o t a l = E T X + E R X + E 1 + E C
After computing the energy, the energy level prediction can be performed using improved DCNN. Based on this d i , the energy of SN can be predicted. For prediction, DCNN is used, which has d i as the input to predict the energy. The DCNN detects significant features with no human intermission. However, it requires large amounts of training data. Therefore, an improvisation is performed to enhance the performance of DCNN. DCNN covers three layers, namely, the Pooling layer, the Fully connected layer, and the Convolution layer. All neurons are connected with closer neurons in the preceding layer. At position ( r , t ) in the l th layer of correlated w th feature map, the features were designed as in Equation (8).
B r , t , w l = W w l T P I r , t l + D w l
In Equation (8), W w l represents weight and D w l represents the bias of w th filter linked to the l th layer. At the center location ( r , t ) of the l th layer, the patch input is indicated as P I r , t l . The activation value ( a c t r , t , w l ) related to convolutional features, and B r , t , w l is calculated as in Equation (9).
a c t r , t , w l = a c t ( B r , t , w l )
Pooling layer: For each pooling function, p o o l ( ) , related to a c t m , h , w l , the C r , t , w l value is considered, as in Equation (10), in which N N r , t represents neighbor’s close location ( r , t ) . The DCNN loss, P L , is exposed in Equation (11).
C r , t , w l = ( a c t m , h , w l ) p o o l , ( m . h ) N N r , t
P L = 1 w n h = 1 w n l ( θ ; C ( h ) , F ( h ) )
As per the improved DCNN, error and MSE are computed as shown in Equations (12) and (13), where t p i and y p i refer to the predicted and actual value of data, i , N refers to total data count, β refers to performance ratio, and W refers to neuron weight.
E r = β × MSE + ( 1 β ) × i ( W i ) 2
MSE = ( i = 1 N P = 1 P ( t p i y p i ) ) 1 N
The common variable associated with W w l and D w l is implied by θ . The output, the labels, and h th input feature is denoted as F ( h ) , C ( h ) , and P I ( h ) . Thus, energy ( E p ) is predicted using d i .

4.2. Security

Security mode: This selects the CH that satisfies the security needs. In Equation (8), q r & q s mentions security needs linked with CHS and security rank, in that order. The nodes are signified by CH, if q s q r .
Risky mode: Here, an existing CH is elected to achieve optimal CH for capturing each risk. As a result, this mode is called insistent mode during the CHS procedure.
γ -risky mode: The CH enduring the severe risk are chosen in γ -risky mode. Additionally, γ -risk is called u r i s k . Subsequently, γ point out the probability metric with γ = 0 and γ = 1 , much like the other two modes.
The likelihood of security variables is shown in Equation (14). In addition, if the chosen CH achieves the state q s > q r , the risk should be less than 50%. If the condition is 0 < q s q r 1 , the selection process would be implemented, and if the state is 1 < q s q r 2 , there will be a delay in the selection process. However, the CHS process would not be completed, and the corresponding function should continue for the state 2 < q s q r 5 . For the security analysis, the risk factor is considered. Therefore, the security must be low.
S e = { 0 i f q s q r 0 1 e ( q s q r ) 2 i f 0 < q s q r 1 1 e 3 ( q s q r ) 2 i f 1 < q s q r 2 1 i f 2 < q s q r 5

4.3. Distance

The distance of packets communicated to the CH from the usual node and from the CH to the BS is calculated as in Equation (15). For a good system, distance must be low.
D i = D i d i s t ( m ) D i d i s t ( n )
where ,   D i d i s t ( m ) = q = 1 d t = 1 M e d q n o r m M c t + M c t I k
D i d i s t ( n ) = q = 1 d t = 1 d d q n o r m d t n o r m
In Equation (15), m and n denote the counting variables, d q n o r m and d t n o r m denote the energy of the p th normal node and the energy of the q th normal node, and M c t is the nodes in the cluster.

4.4. Delay

Delay is calculated as in Equation (18), in which, d indicate whole cluster count in the network and M c e implies the associated CH. For a good system, delay must be minimum.
D e d e l = max ( M c t ) t = 1 M c e d

4.5. Trust

All hops in WSN offer higher trust to assess the trust level amid hops and adjoining hops [34]. There are two factors to evaluate trust: direct and indirect trust, as stated in Equation (19). For a good system, trust must be high.
T r = { T r d + T r i d }   
Direct trust: calculated as shown in Equation (20), in which, ( T r d ) y z denotes direct trust for y th transaction and z th time interval, s m denotes Satisfaction metric, z denotes Time interval, y denotes Transaction, o denotes Estimation hop, and o + 1 denotes Hop for assessment.
( O d ) y z ( o , o + 1 ) = s m y z ( o , o + 1 )
In Equation (21), s m is assessed as in Equation (21), wherein s m v denotes satisfaction value of the present transmission, s m y 1 z ( o , o + 1 ) denotes y 1 transmission satisfaction value at z th time interval, and η denotes weight.
s m y z ( o , o + 1 ) = η × s m v + ( 1 η ) × s m y 1 z ( o , o + 1 )
s m v = { 0 ; i f transmission   i s    u n s a t i s f a c t o r y 1 ; i f transmission   i s    s a t i s f a c t o r y ( 0 , 1 ) ;    e l s e
Indirect trust: Indirect trust of o th hop regarding ( o + 1 ) th is assessed as shown in Equation (23), wherein V denotes agent group interacting with o + 1 , a denotes hop, and K y z denotes feedback creditability. K y z is assessed by Equation (24), in which L y z denotes resemblance. The resemblance amid hops is assessed as in Equation (25), wherein l denotes similarity deviation constant, δ & ϖ denotes punishment and reward factor, and y z ( o , o + 1 ) denotes personalized difference.
( T r i d ) y z ( o , o + 1 ) = { a U { o } K y z ( o , a ) × ( T r d ) y z ( a , o + 1 ) a U { o } K y z ( o , a ) ; i f | V { o } | = 0 0 ;    i f | v { o } | > 0
K y z ( o , o + 1 ) = { 1 ln ( L y z ( o , o + 1 ) ) ln φ ;     i f ( L y z ( o , o + 1 ) ) > φ 0 ;    e l s e
L y z ( o , o + 1 ) = { L y 1 z ( o , o + 1 ) + 1 L y 1 z ( o , o + 1 ) ϖ ; i f y z ( o , o + 1 ) < l L y 1 z ( o , o + 1 ) 1 L y 1 z ( o , o + 1 ) δ ; e l s e

4.6. RSSI

RSSI corrupts as the inverse square of distance amid receiver and sender based on Fris [35]. It can be modeled as shown in Equation (26), wherein B refers to distance and is computed as shown in Equation (27). For a good system, RSSI must be high.
RSSI = 36 × log ( B ) 55
B = 10 ( RSSI + 55 ) / 36

4.7. Objectives

The intention of the BEA-SSA-based scheme for electing the optimal CH is shown in Equation (28), where d i is the distance, E p is the energy, S e is the security, D e is the delay, T r is the trust, and RSSI is the Received Signal Strength Indicator. The objective function is shown below. Our objective function is distance, security, and delay should be minimum, but the remaining parameters of energy, trust, and RSSI must be maximum. Here, for security analysis, the risk factor is considered. Therefore, the risk factor must be minimum.
O b j = min [ ( w e 1 × d i ) + ( w e 2 × ( 1 E p ) ) + ( w e 3 × ( S e ) )    + ( w e 4 × D e ) + ( w e 5 × ( 1 T r ) ) + ( w e 6 ( 1 RSSI ) ) ]
In Equation (13), w e 1 w e 6 are weight factors that ranges from 0 to 1; w e 1 is assigned with 0.2, w e 2 is assigned with 0.3, w e 3 is assigned with 0.1, w e 4 is assigned with 0.2, w e 5 is assigned with 0.1, and w e 5 is assigned with 0.1.

5. Developed BEA-SSA for Optimal CHS

Solution encoding: as said earlier, CHs are optimally chosen via the BEA-SSA model. The input solution will be the nodes and the solution length will be 100, from which 10 nodes will be chosen as CH.

Proposed BEA-SSA Model

To augment the performance of the traditionalist SSA model [36], BES [37] is combined with it to form BEA-SSA. Usually, self-improvement in typical optimization schemes [38,39,40,41,42,43,44] outcome in superior accuracy. The following rules are included in BEA-SSA.
  • The producers usually have a significant amount of energy and give foraging locations or guidance to all scavengers. Further, it has the responsibility of locating places with abundant food supplies. The level of energy reserves is determined by an evaluation of the individuals’ fitness values.
  • Individual sparrows begin to chirp as alarm messages as they detect the predator. When the alarm value exceeds the safety level, the producers must direct all scavengers to the safe zone.
  • Every sparrow becomes a producer as much as it seeks out larger food sources; however, the proportion of scroungers and producers remains constant in the entire population.
  • The producers would act as the sparrows with the maximum energy. Numerous starving scavengers are inclined to fly toward different locations in search of food to gain energy.
  • Scroungers search for food by following the producer who can supply the healthiest food. Meanwhile, some scavengers might keep a close eye on the producers and fight for food to boost their predation rate.
  • When the sparrows present at the group’s edge become aware of the danger, they swiftly move into the safe region to obtain a higher position, but the sparrows in the center of the group arbitrarily walk to be adjacent to others.
The sparrows make use of virtual sparrows for searching for food in the simulated experimentation. As per BEA-SSA, the initialization is done using the chaotic map function via a sinusoidal map, as shown in Equation (29), where X r ( 0 , 1 ) .
X r + 1 = b X r 2 sin ( π X r )
Equation (30) is used to represent the position of sparrows.
X = [ X 1 , 1    X 1 , 2            X 1 , a X 2 , 1    X 2 , 2            X 2 , a .              .            .          .        .                             .            .          .        .                .            .          .        . X s , 1    X s , 2            X s , a ]
In Equation (30), s points out the sparrow count and a indicates the optimized variable’s dimension. The fitness of the sparrow is symbolized as in Equation (31), where F X point to the fitness value of the individual.
F X = [ f ( [ X 1 , 1    X 1 , 2            X 1 , a ] ) f ( [ X 2 , 1    X 2 , 2            X 2 , a ] )              .            .          .            .                           .            .          .            .                       .            .          .            .         f ( [ X s , 1    X s , 2            X s , a ] ) ]
The producers with large fitness levels in SSA contain a maximum possibility of attaining food all through the searching phase. The producers are reliable in discovering food and direct the moment of the entire populace; the producers look for foodstuff in more areas compared to scroungers.
The locations of producers are updated based on rules (a) and (b) of SSA, as per Equation (32).
X c , d r + 1 = { X c , d r . exp ( c α . i t max )              i f    C 2 < s t X c , d r + P . M           i f C 2 s t
In Equation (32), r denotes the present iteration, i t max refers to maximal iteration, α indicates arbitrary integer, s t and C 2 refer to safety threshold and alarm value, P denotes random number with normal distribution, and M Illustrate a matrix of 1 × d with element 1.
Conversely, the scroungers should pursue rules (d) and (e). As said earlier, various scroungers keep a close eye on producers. Because producers recognize good food, they depart their present position to fight for food. If they reach first, they instantaneously cover the producer’s food, or else they should pursue rule (e). As per BEA-SSA logic, the scrounger’s position is updated using BES, as specified in Equation (33). Here, X m e a n is computed using the geometric mean of all information from the previous points.
X ( i ) n e w = X ( i ) + Y ( i ) × ( X ( i ) X ( i + 1 ) ) Y b e s t + Y ( i ) × r a ( X ( i ) X m e a n )
If c > s / 2 , it is implied that the c th scrounger with worse fitness value is typically hungry. In addition, the mathematical model as per rules (f) is shown in Equation (34).
X c , d r + 1 = { X b e s t r + γ . | X c , d r X b e s t r |       i f    f c < f u X c , d r + Z . ( | X c , d r X w o r s t r | ( f c f w ) + ε )        i f    f c = f u
In Equation (34), γ indicates the step size control parameter with a variance of 1 and mean value of 0, R b e s t denotes the current global optimal location, Z [ 1 , 1 ] indicates the random number, f c indicates the fitness value of the current sparrow, f w and f u indicate worst fitness values and current global best, correspondingly, and ε indicates small constant for avoiding zero-division-error.
If f c > f u , it indicates that the sparrow is at the edge of the group, then X b e s t denotes the position at the center of the population. f c = f u denotes that the sparrows were at the center of the population, and Z denotes the route of movement of the sparrow. D denotes the count of producers, and L specifies the number of sparrows that perceive the danger. Figure 2 shows the flowchart of the BEA-SSA model.
Table 2 shows the list of symbols.

6. Results and Discussion

In the results and discussion section, the simulation parameters are discussed and analyzed regarding the delay, distance, trust, and so on.

6.1. Simulation Procedure

The employed scheme for CHS in WSNs using BEA-SSA was executed in MATLAB. The constraints utilized for simulation are shown in Table 3. Further, the assessment was performed for two node groups, i.e., 100 nodes and 200 nodes. The study was performed for two variants of nodes concerning delay, PDR, distance, RSSI, security, throughput, alive nodes, trust, and energy. Here, the improvement of delay was confirmed over GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, Hunger Games Search (HGS), SSO, RCSO [21], and FCR [20]. Figure 3 represents the node location of the deployed scheme for 100 and 200 nodes. Here, the centre of the node (sink node) is denoted as red color, where the normal nodes are defined in green color.

6.2. Analysis of Delay and Distance

The analysis of delay and distance using the BEA-SSA method compared to GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20] is shown in Figure 4 and Figure 5. The examination was performed for two sets of nodes (100 and 200). The delay for transferring packets must be the smallest for good performance of the system. Likewise, the distance between the CH and the BS should be less for good performance of the system. Here, the delay is symbolized in seconds. In Figure 4, it is noticed that, as the round count rises, the delay also increases. At first, at 0th round, the delay for 100 nodes using BEA-SSA is only 1 × 10−7. As the round increases, i.e., at the 2000th round, the delay value for 100 nodes using the BEA-SSA technique is 1.5 × 10−7 s. Similarly, as the round count rises, the distance also increases. At the 0th round, the distance for 200 nodes using BEA-SSA is 27. As the round increases, i.e., at the 2000th round, the distance value for 200 nodes using the BEA-SSA technique is 47. Moreover, the BEA-SSA scheme is superior to the compared GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20] models. To choose the best CH in WSN, an improved Deep Convolutional Neural Network (DCNN) predicts the energy level. The RSSI, PDR, and residual energy are all high for the Bald Eagle Assisted SSA (BEA-SSA) model. The WSN uses the BEA-SSA to determine which CH is the best. These developments are attributable to the BEA-SSA-based CHS’s deployment and the improved energy evaluation and prediction using DCNN. This enhancement is due to the improved energy evaluation and prediction using DCNN.

6.3. Statistical Performance

Table 4 and Table 5 show the statistical study for 100 nodes and 200 nodes using the employed BEA-SSA model compared with conventional models (GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20]). The met heuristic schemes are stochastic, and to substantiate their fair evaluation, each model is analyzed a significant number of times to accomplish minimal residual energy. In Table 4, the proposed BEA-SSA technique has achieved minimal residual energy values (−0.00058) for the best case for 200 nodes. Amongst every scheme, conservative PRO has achieved the worst values for every scenario for the GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20] schemes. This is due to the improved energy evaluation and prediction using IDCNN and the adopted BEA-SSA-based CHS.

6.4. Analysis of Alive Nodes

The study of the BEA-SSA model concerning alive nodes is shown in Figure 6. The improvement of BEA-SSA over GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20] was established. Here, assessment is carried out for 100 and 200 nodes. The alive node count has to be higher for superior performance. Here, the count of an alive node is lowered with a rise in the count of rounds. In Figure 6a, the alive nodes for BEA-SSA at the 0th round is 100, while at the 2000th round the alive node count for BEA-SSA is 40. Likewise, in Figure 6b, the alive nodes for BEA-SSA at the 0th round is 200, while at the 2000th round the alive node count for BEA-SSA is 65. Thus, for both 100 and 200 nodes, the alive nodes are high, up to 700 rounds; after that, the count of alive nodes starts lessening with the rise in rounds.

6.5. Analysis of Residual Energy, RSSI, and PDR

The RSSI, PDR, and residual energy study using the BEA-SSA method compared with other conservative models, GWO [26], MOFPL [22], PRO, SSA [36], BES [7], ROA, HGS, SSO, RCSO [21], and FCR [20], is portrayed in this section. The more superior the remaining energy, the more superior will be the performance of the system. In Figure 7a, the remaining energy continues to reduce with the rise in rounds. In Figure 7a, the remaining energy for BEA-SSA and conservative models is 0.6 at round 0; however, as the rounds increase, the remaining energy starts deteriorating. Similarly, in Figure 8, the RSSI is high at the 250th round for 100 nodes, while for 200 nodes the RSSI is high at the 750th and 1000th rounds. In Figure 9, the PDR fluctuates for every round. In Figure 9a, the PDR is high at the 500th round for 100 nodes, while for 200 nodes the PDR is high at the 1000th round. However, when compared with GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20], the BEA-SSA model poses high residual energy, high RSSI, and high PDR. An improved Deep Convolutional Neural Network (DCNN) is utilized to choose the best CH in WSN by predicting the energy level. The WSN chooses the best CH using the BEA-SSA. The Bald Eagle Assisted SSA (BEA-SSA) model has high RSSI, PDR, and residual energy. These developments are due to the installation of the BEA-SSA-based CHS and the improved energy evaluation and prediction using DCNN. These enhancements are due to the improved energy evaluation and prediction using DCNN and the adopted BEA-SSA-based CHS.

6.6. Convergence Analysis

The convergence of the BEA-SSA technique compared with GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20] for diverse iterations is shown in Figure 10. As needed, the BEA-SSA has achieved the least cost values with an increase in iterations for both nodes. From Figure 10a, from the 7th to the 10th iteration, the cost has reduced to 0.435 for 100 nodes. Likewise, in Figure 10b, from the 4th to the 10th iteration, the cost has reduced to 0.19 for 200 nodes. The other evaluated schemes, GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20], reveal a comparatively elevated cost value. The energy level is predicted using an enhanced Deep Convolutional Neural Network (DCNN), which is used to select the best CH in WSN. The BEA-SSA is used in the WSN to select the best CH. The RSSI, PDR, and residual energy are all high for the Bald Eagle Assisted SSA (BEA-SSA) model. The implementation of the BEA-SSA-based CHS and the enhanced energy evaluation and prediction utilizing DCNN are responsible for these advancements. Thus, with the BEA-SSA-based optimization, improved results are obtained for CHS.

6.7. Analysis of Throughput, Trust, and Security

The analysis of trust, security, and throughput using the BEA-SSA scheme compared with GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20] is shown in Figure 11, Figure 12 and Figure 13. Here, evaluation is performed for 100 and 200 nodes. Throughput is a measure of how many units of information a system can process in a given amount of time. Throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets per second (p/s or pps) or data packets per time slot. The throughput has to be high as it plays a chief role in transferring data. In Figure 11a, the throughput is high at 750th rounds for 100 nodes, while for 200 nodes the throughput is high at 1000–1250th rounds. In Figure 12, the trust factor is high at the initial rounds, but as the rounds increase, trust values lessen. However, when distinguished over GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20], the BEA-SSA model poses high trust. Likewise, the security in terms of risk is lesser for the BEA-SSA method, while, GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21] and FCR [20] shows high-security risk. Chooses the best CH in WSN by predicting energy level using an improved Deep Convolutional Neural Network (DCNN). The BEA-SSA is used to choose the WSN’s top CH. The Bald Eagle Assisted SSA (BEA-SSA) model has high RSSI, PDR, and residual energy. These improvements are attributable to better energy evaluation and prediction using DCNN and the installed BEA-SSA-based CHS. Using an improved Deep Convolutional Neural Network (DCNN), which is used to choose the best CH in WSN, predicts energy level. In the WSN, the best CH is chosen using the BEA-SSA. The Bald Eagle Assisted SSA (BEA-SSA) model has high RSSI, PDR, and remaining energy. These improvements are the result of the BEA-SSA-based CHS being implemented, as well as the improved energy evaluation and prediction using DCNN. This promises the superior performance of the BEA-SSA approach.

6.8. Discussion

In the analysis of delay and distance, first, the delay for 100 nodes utilizing BEA-SSA at round zero is just 1 × 10−7. At the 2000th round, for example, the delay value for 100 nodes using the BEA-SSA approach is 1.5 × 10−7 s. Similarly, as the number of rounds rises, so does the distance. In fact, for the system to operate well, the packet transmission latency must be as minimal as possible. Table 4 shows that in the best-case scenario for 200 nodes, the suggested BEA-SSA approach has significantly reduced residual energy values (−0.00058). It is because BEA-SSA-based CHS was implemented and IDCNN was used to improve energy evaluation and prediction. For both nodes, the BEA-SSA has attained the least cost values as needed with an increase in iteration. The throughput is crucial for data transport; hence it must be high. For 100 nodes, the throughput peaks at the 750th round, while for 200 nodes, it peaks at the 1000th to 1250th rounds. In round 12, the trust factor is high at first, but it decreases as more rounds are played. The BEA-SSA model, however, poses high trust and the security risk is lower for the BEA-SSA approach; however, it is higher for the GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, RCSO [21], and FCR [20]. Moreover, the BEA-SSA model posed significant residual energy, high RSSI, and high PDR compared to GWO [26], MOFPL [22], PRO, SSA [36], BES [37], ROA, HGS, SSO, and RCSO [21]. The best CH in WSN is chosen by predicting the energy level using an improved Deep Convolutional Neural Network (DCNN). The BEA-SSA is used to choose the WSN’s top CH. The Bald Eagle Assisted SSA (BEA-SSA) model has high RSSI, PDR, and residual energy. These improvements are attributable to better energy evaluation and prediction using DCNN and the installed BEA-SSA-based CHS.

7. Conclusions

This study recommended an optimal CHS model for WSNs’ highly secure and energy-efficient routing. Here, it was decided to use optimal CH in consideration of RSSI, distance, energy, security (risk probability), delay, and trust assessment (direct and indirect trust). Improved DCNN was used in this case to estimate the energy level. BEA-SSA was used to select the best CH in WSN. According to the results, for 100 nodes, the RSSI peaked at round 250, whereas for 200 nodes it peaked at rounds 750 and 1000. Additionally, the PDR reached its peak for 100 nodes at round 500, and for 200 nodes at round 1000. In addition, the PDR was high at the 500th round for 100 nodes, while for 200 nodes the PDR was high at the 1000th round. However, when compared with GWO, MOFPL, PRO, SSA, BES, ROA, HGS, SSO, RCSO, and FCR, the BEA-SSA model posed high residual energy, high RSSI, and high PDR. In the future, fault tolerance should be examined, which will improve the clustering algorithm mechanism.

Author Contributions

The paper investigation, resources, data curation, writing—original draft preparation, writing—review and editing, and visualization were carried out by S.G. The paper conceptualization and software were conducted by P.S. The validation and formal analysis, methodology, supervision, project administration, and funding acquisition of the version to be published were conducted by R.P.d.P. and M.W. All authors have read and agreed to the published version of the manuscript.

Funding

The authors acknowledge contributions to this project from the Rector of the Silesian University of Technology under proquality grant no. 09/010/RGJ22/0068. In addition, this research is supported by Spanish Research Projects P18-RT-4040 and PID2020-119082RB-C21.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alagumuthukrishnan, S.; Geetha, K. A Locality Based Clustering and M-Ant Routing protocol for QoS in Wireless Semsor Networks. Dep. Sci. Eng. 2016, 6, 14. [Google Scholar]
  2. Yuvaraja, M.; Sabrigiriraj, M. Lifetime Enhancement of WSN using Energy-Balanced Distributed Clustering Algorithm with Honey Bee Optimization. Asian J. Res. Soc. Sci. Humanit. 2016, 6, 11. [Google Scholar] [CrossRef]
  3. Ni, Q.; Pan, Q.; Du, H.; Cao, C.; Zhai, Y. A Novel Cluster Head Selection Algorithm Based on Fuzzy Clustering and Particle Swarm Optimization. IEEE/ACM Trans. Comput. Biol. Bioinform. 2017, 4, 76–84. [Google Scholar] [CrossRef] [PubMed]
  4. Kang, S.H.; Nguyen, T. Distance Based Thresholds for Cluster Head Selection in Wireless Sensor Networks. IEEE Commun. Lett. 2012, 16, 1396–1399. [Google Scholar] [CrossRef]
  5. Leu, J.; Chiang, T.; Yu, M.; Su, K. Energy Efficient Clustering Scheme for Prolonging the Lifetime of Wireless Sensor Network with Isolated Nodes. IEEE Commun. Lett. 2015, 19, 259–262. [Google Scholar] [CrossRef]
  6. Sumathi, J.; Velusamy, R.L. A review on distributed cluster-based routing approaches in mobile wireless sensor networks. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 835–849. [Google Scholar] [CrossRef]
  7. Jin, W.; Cao, Y.; Li, B.; Kim, H.; Lee, S. Particle swarm optimization-based clustering algorithm with mobile sink for WSNs. Future Gener. Comput. Syst. 2017, 76, 452–457. [Google Scholar]
  8. Shishupal, K.; Lal, N.; Chaurasiya, V.K. A forwarding strategy based on ANFIS in internet-of-things-oriented wireless sensor network (WSN) using a novel fuzzy-based cluster head protocol. Ann. Telecommun. 2018, 73, 627–638. [Google Scholar]
  9. Jia, D.; Zhu, H.; Zou, S.; Hu, P. Dynamic Cluster Head Selection Method for Wireless Sensor Network. IEEE Sens. J. 2016, 16, 2746–2754. [Google Scholar] [CrossRef]
  10. Mehra, P.S.; Doja, M.N.; Alam, B. Fuzzy based enhanced cluster head selection (FBECS) for WSN. J. King Saud Univ.-Sci. 2020, 32, 390–401. [Google Scholar] [CrossRef]
  11. Sara, A.; Ouni, R. Reliable and energy-efficient multi-hop LEACH-based clustering protocol for wireless sensor networks. Sustain. Comput. Inform. Syst. 2018, 20, 1–13. [Google Scholar]
  12. Nigam, G.K.; Dabas, C. ESO-LEACH: PSO based energy efficient clustering in LEACH. J. King Saud Univ.-Comput. Inf. Sci. 2021, 33, 947–954. [Google Scholar] [CrossRef]
  13. Priyadarshini, R.R.; Sivakumar, N. Cluster head selection based on Minimum Connected Dominating Set and Bi-Partite inspired methodology for energy conservation in WSNs. J. King Saud Univ.-Comput. Inf. Sci. 2018, 33, 1132–1144. [Google Scholar] [CrossRef]
  14. Daanoune, I.; Abdennaceur, B.; Ballouk, A. A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks. Ad Hoc Netw. 2021, 114, 102409. [Google Scholar] [CrossRef]
  15. Mahajan, S.; Malhotra, J.; Sharma, S. An energy balanced QoS based cluster head selection strategy for WSN. Egypt. Inform. J. 2014, 15, 189–199. [Google Scholar] [CrossRef] [Green Version]
  16. Muthukumaran, K.; Chitra, K.; Selvakumar, C. An energy efficient clustering scheme using multilevel routing for wireless sensor network. Comput. Electr. Eng. 2018, 69, 642–652. [Google Scholar]
  17. Darabkh, K.A.; Odetallah, S.M.; Al-qudah, Z.; Khalifeh, A.F.; Shurman, M.M. Energy-Aware and Density-Based Clustering and Relaying Protocol (EA-DB-CRP) for gathering data in wireless sensor networks. Appl. Soft Comput. 2019, 80, 154–166. [Google Scholar] [CrossRef]
  18. Kannan, G.; Raja, T.S.R. Energy efficient distributed cluster head scheduling scheme for two tiered wireless sensor network. Egypt. Inform. J. 2015, 16, 167–174. [Google Scholar] [CrossRef] [Green Version]
  19. Palvinder, S.M.; Singh, S. Improved metaheuristic based energy-efficient clustering protocol for wireless sensor networks. Eng. Appl. Artif. Intell. 2017, 57, 142–152. [Google Scholar]
  20. Sarkar, A.; Murugan, T.S. Analysis on dual algorithms for optimal cluster head selection in wireless sensor network. Evol. Intel. 2022, 15, 1471–1485. [Google Scholar] [CrossRef]
  21. Shyjith, M.B.; Maheswaran, C.P.; Reshma, V.K. Optimized and Dynamic Selection of Cluster Head Using Energy Efficient Routing Protocol in WSN. Wirel. Pers Commun 2021, 116, 577–599. [Google Scholar] [CrossRef]
  22. Bhardwaj, R.; Kumar, D. MOFPL: Multi-objective fractional particle lion algorithm for the energy aware routing in the WSN. Pervasive Mob. Comput. 2019, 58, 101029. [Google Scholar] [CrossRef]
  23. Augustine, S.; Ananth, J.P. Taylor kernel fuzzy C-means clustering algorithm for trust and energy-aware cluster head selection in wireless sensor networks. Wirel. Netw 2020, 26, 5113–5132. [Google Scholar] [CrossRef]
  24. Goswami, P.; Yan, Z.; Mukherjee, A.; Yang, L.; Routray, S.; Palai, G. An energy efficient clustering using firefly and HML for optical wireless sensor network. Optik 2019, 182, 181–185. [Google Scholar] [CrossRef]
  25. Toor, A.S.; Jain, A.K. Energy Aware Cluster Based Multi-hop Energy Efficient Routing Protocol using Multiple Mobile Nodes (MEACBM) in Wireless Sensor Networks. AEU-Int. J. Electron. Commun. 2019, 102, 41–53. [Google Scholar] [CrossRef]
  26. Daneshvar, S.M.M.H.; Mohajer, P.A.A.; Mazinani, S.M. Energy-Efficient Routing in WSN: A Centralized Cluster-Based Approach via Grey Wolf Optimizer. IEEE Access 2019, 7, 170019–170031. [Google Scholar] [CrossRef]
  27. Maheshwari, P.; Sharma, A.K.; Verma, K. Energy efficient cluster based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization. Ad Hoc Netw. 2020, 110, 102317. [Google Scholar] [CrossRef]
  28. Sanhaji, F.; Satori, H.; Satori, K. Cluster head selection based on neural networks in wireless sensor networks. In Proceedings of the 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco, 3–4 April 2019. [Google Scholar]
  29. Krishnaraj, N. Selection of Cluster Head in Wireless Sensor Network using Convolution Neural Network Algorithm. IRO J. Sustain. Wirel. Syst. 2022, 4, 46–54. [Google Scholar] [CrossRef]
  30. Kumar, M.; Mukherjee, P.; Verma, K.; Verma, S.; Rawat, D.B. Improved Deep Convolutional Neural Network Based Malicious Node Detection and Energy-Efficient Data Transmission in Wireless Sensor Networks. IEEE Trans. Netw. Sci. Eng. 2021, 9, 3272–3281. [Google Scholar] [CrossRef]
  31. Gul, O.M.; Erkmen, A.M.; Kantarci, B. UAV-Driven Sustainable and Quality-Aware Data Collection in Robotic Wireless Sensor Networks. IEEE Internet Things J. 2022. [Google Scholar] [CrossRef]
  32. Gul, O.M.; Erkmen, A.M. Energy-efficient cluster-based data collection by a UAV with a limited-capacity battery in robotic wireless sensor networks. Sensors 2020, 20, 5865. [Google Scholar] [CrossRef] [PubMed]
  33. Shankar, A.; Jaisankar, N.; Khan, M.S.; Patan, R.; Balamurugan, B. Hybrid model for security-aware cluster head selection in wireless sensor networks. IET Wirel. Sens. Syst. 2019, 9, 68–76. [Google Scholar] [CrossRef]
  34. Celik, E.; Olson, E.; Titi, E.S. Spectral Filtering of Interpolant Observables for a Discrete-in-Time Downscaling Data Assimilation Algorithm. SIAM J. Appl. Dyn. Syst. 2019, 18, 1118–1142. [Google Scholar] [CrossRef] [Green Version]
  35. Ivanic, M.; Mezei, I. Distance Estimation Based on RSSI Improvements of Orientation Aware Nodes. In Proceedings of the 2018 Zooming Innovation in Consumer Technologies Conference (ZINC), Novi Sad, Serbia, 30–31 May 2018; pp. 140–143. [Google Scholar] [CrossRef]
  36. Xue, J.; Shen, B. A novel swarm intelligence optimization approach: Sparrow search algorithm. Syst. Sci. Control Eng. 2020, 8, 22–34. [Google Scholar] [CrossRef]
  37. Alsattar, H.A.; Zaidan, A.A.; Zaidan, B.B. Novel meta-heuristic bald eagle search optimisation algorithm. ArtifIntell. Rev. 2020, 53, 2237–2264. [Google Scholar] [CrossRef]
  38. Marsaline Beno, M.; Valarmathi, I.R.; Swamy, S.M.; Rajakumar, B.R. Threshold prediction for segmenting tumour from brain MRI scans. Int. J. Imaging Syst. Technol. 2014, 24, 129–137. [Google Scholar] [CrossRef]
  39. Renjith, T.; Rangachar, M.J.S. Hybrid Optimization based DBN for Face Recognition using Low-Resolution Images. Multimed. Res. 2018, 1, 33–43. [Google Scholar]
  40. Devagnanam, J.; Elango, N.M. Optimal Resource Allocation of Cluster using Hybrid Grey Wolf and Cuckoo Search Algorithm in Cloud Computing. J. Netw. Commun. Syst. 2020, 3, 31–40. [Google Scholar]
  41. Shareef, S.M.; Rao, D.R. A Hybrid Learning Algorithm for Optimal Reactive Power Dispatch under Unbalanced Conditions. J. Comput. Mech. Power Syst. Control 2018, 1, 26–33. [Google Scholar]
  42. Khan, F.; Zahid, M.; Gürüler, H.; Tarımer, İ.; Whangbo, T. An Efficient and Reliable Multicasting for Smart Cities. Comput. Mater. Contin. 2022, 72, 663–678. [Google Scholar] [CrossRef]
  43. Khan, F.; Ahmad, S.; Gürüler, H.; Cetin, G.; Whangbo, T.; Kim, C.-G. An Efficient and Reliable Algorithm for Wireless Sensor Network. Sensors 2021, 21, 8355. [Google Scholar] [CrossRef] [PubMed]
  44. Tay, M.; Senturk, A. A New Energy-Aware Cluster Head Selection Algorithm for Wireless Sensor Networks. Wirel. Pers. Commun. 2022, 122, 2235–2251. [Google Scholar] [CrossRef]
Figure 1. Pictorial representation of the proposed method. Different color star denotes three cluster groups, where cluster head is selected and connected with the base station.
Figure 1. Pictorial representation of the proposed method. Different color star denotes three cluster groups, where cluster head is selected and connected with the base station.
Sensors 22 09921 g001
Figure 2. Flowchart of BEA-SSA model.
Figure 2. Flowchart of BEA-SSA model.
Sensors 22 09921 g002
Figure 3. Simulation outcomes using BEA-SSA model for node counts of (a) 100 and (b) 200.
Figure 3. Simulation outcomes using BEA-SSA model for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g003
Figure 4. Delay analysis using BEA-SSA compared with other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Figure 4. Delay analysis using BEA-SSA compared with other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g004
Figure 5. Distance analysis using BEA-SSA compared with other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Figure 5. Distance analysis using BEA-SSA compared with other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g005
Figure 6. Alive node analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Figure 6. Alive node analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g006
Figure 7. Residual energy analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Figure 7. Residual energy analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g007
Figure 8. RSSI analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Figure 8. RSSI analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g008
Figure 9. PDR analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Figure 9. PDR analysis using BEA-SSA compared with the other models [20,21,22,26] for node counts of (a) 100 and (b) 200.
Sensors 22 09921 g009
Figure 10. Convergence of BEA-SSA approach compared with the other models [20,21,22,26] for (a) 100 and (b) 200 nodes.
Figure 10. Convergence of BEA-SSA approach compared with the other models [20,21,22,26] for (a) 100 and (b) 200 nodes.
Sensors 22 09921 g010
Figure 11. Throughput analysis using BEA-SSA over other models [20,21,22,26] for node count of (a) 100 (b) 200.
Figure 11. Throughput analysis using BEA-SSA over other models [20,21,22,26] for node count of (a) 100 (b) 200.
Sensors 22 09921 g011
Figure 12. Trust analysis using BEA-SSA over other conventional models [20,21,22,26] for node count of (a) 50 (b) 100.
Figure 12. Trust analysis using BEA-SSA over other conventional models [20,21,22,26] for node count of (a) 50 (b) 100.
Sensors 22 09921 g012
Figure 13. Security analysis using BEA-SSA over other conventional models [20,21,22,26] for node count of (a) 50 (b) 100.
Figure 13. Security analysis using BEA-SSA over other conventional models [20,21,22,26] for node count of (a) 50 (b) 100.
Sensors 22 09921 g013
Table 1. Reviews on CHS models in WSN.
Table 1. Reviews on CHS models in WSN.
AuthorProposed MethodFeaturesChallenges
Amit al. [20]FCRHigh delay
High EE
Computational time needs to be analyzed
Shyjith et al. [21]RCSOLess delay
Higher throughput
Should consider cost metrics
Reeta and Dinesh [22]MOFPLLesser time
Higher network energy
Need to compute cost efficiency
Augustine and Ananth [23]Taylor KFCM modelHigh energy and throughput Least delayNo concern about practical experimentation
Goswamiet al. [24]FFNegligible cost function
Enhanced EE
Endures from local searching issues
Toor and Jain [25]MEACBMMinimal energy employment Amplified throughputNo concern about Scalability
Daneshvar et al. [26]GWOLower energy utilization
Higher network lifespan
No concern about Fault tolerance.
Prachi et al. [27]


Sanhaji et al. [28]


Krishna et al. [29]


Kumar et al. [30]



Gul et al. [31]


Gul et al. [32]
BOA & ACO


LEACH


Neural Network


IDCNN



Cluster head Selection

Cluster head Selection
High alive nodes
Less energy deployment

Delay is reduced
Loss is also reduced

Energy consumption is reduced

Throughput is high
The energy utilization is low
The life span is increased

The cost is reduced


The energy consumption is reduced
Should deliberate fault tolerance

Need to consider the time analysis

The experimental result should be considered

Need to consider the
Stability analysis


Need to consider the Scalability analysis

The quantity and accuracy of data from various CH robots may vary
Table 2. List of Symbols.
Table 2. List of Symbols.
SymbolsDescription
E i Initial Energy
E e l Electronic Energy
E e a Data time aggregation
d i Distance
d i 0 Threshold energy
E p a m Energy of power allocation
E f r Requisite Energy
E 1 Energy for idle state
E C Energy Cost
t p i Predicted Value
y p i Actual values
X m e a n Geometric Mean
Table 3. Simulation Parameters.
Table 3. Simulation Parameters.
ParameterValue
Path construction 100 × 100 m2
Sink node location (50,50)-i.e., center of the node
Count of nodes100
Initial energy0.5 J
Transmission energy50 nJ
Reception energy50 nJ
Electric energy50 nJ
Transmit amplifier type10 × 10−12
Amplifier energy0.0013
Data aggregation energy5 nJ
Count of rounds2000
Data packet size4000
PDR0.96 to 1
Security0 to 5
Table 4. Statistical Analysis on BEA-SSA compared with other models for 100 nodes.
Table 4. Statistical Analysis on BEA-SSA compared with other models for 100 nodes.
MetricsBEA-SSAGWO [26]MOFPL [22]PROSSABESROAHGSSSORCSO [21]FCR [20]
Best0.0070.0010.0090.0020.0030.0020.0010.0030.0020.0020.002
Worst0.5970.5970.5980.5980.5980.5980.5980.5980.5970.5970.597
Mean0.2200.2110.2090.2370.2280.2080.2290.2130.2140.2130.211
Median0.1700.1590.1610.2170.1960.1580.1990.1670.1670.1670.162
STD0.1870.1930.1950.1940.1930.1960.1920.1920.1920.1920.194
Table 5. Statistical Analysis on BEA-SSA compared with other models for 200 nodes.
Table 5. Statistical Analysis on BEA-SSA compared with other models for 200 nodes.
MetricsBEA-SSAGWO [26]MOFPL [22]PROSSABESROAHGSSSORCSO [21]FCR [20]
Best0.0095.4300.00031.3490.0021.7801.9500.0011.6100.0010.007
Worst0.5980.5970.5970.5970.5970.5970.5980.5980.5980.5980.598
Mean0.2230.2230.2130.2120.2130.2140.2170.2150.2190.2140.214
Median0.1750.1840.1650.1650.1660.1660.1730.1670.1770.1670.166
STD0.1870.1900.1920.1930.1920.1910.1910.1900.1920.1910.192
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gurumoorthy, S.; Subhash, P.; Pérez de Prado, R.; Wozniak, M. Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction. Sensors 2022, 22, 9921. https://doi.org/10.3390/s22249921

AMA Style

Gurumoorthy S, Subhash P, Pérez de Prado R, Wozniak M. Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction. Sensors. 2022; 22(24):9921. https://doi.org/10.3390/s22249921

Chicago/Turabian Style

Gurumoorthy, Sasikumar, Parimella Subhash, Rocio Pérez de Prado, and Marcin Wozniak. 2022. "Optimal Cluster Head Selection in WSN with Convolutional Neural Network-Based Energy Level Prediction" Sensors 22, no. 24: 9921. https://doi.org/10.3390/s22249921

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop