Next Article in Journal
Real-Time Automated Solubility Screening Method Using Deep Neural Networks with Handcrafted Features
Next Article in Special Issue
Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics
Previous Article in Journal
Cloud and Precipitation Profiling Radars: The First Combined W- and K-Band Radar Profiler Measurements in Italy
Previous Article in Special Issue
DNS Tunnelling, Exfiltration and Detection over Cloud Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks

by
Mohammed Ayad Saad
1,2,
Rosmina Jaafar
1 and
Kalaivani Chellappan
1,*
1
Department of Electrical, Electronics & System Engineering, Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia (UKM), Bangi 43600, Selangor, Malaysia
2
Department of Medical Instrumentations Technique Engineering, Al-Kitab University, Kirkuk 36001, Iraq
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(12), 5526; https://doi.org/10.3390/s23125526
Submission received: 9 January 2023 / Revised: 26 May 2023 / Accepted: 27 May 2023 / Published: 12 June 2023
(This article belongs to the Special Issue Data Privacy, Security, and Trust in New Technological Trends)

Abstract

:
Data gathering in wireless sensor networks (WSNs) is vital for deploying and enabling WSNs with the Internet of Things (IoTs). In various applications, the network is deployed in a large-scale area, which affects the efficiency of the data collection, and the network is subject to multiple attacks that impact the reliability of the collected data. Hence, data collection should consider trust in sources and routing nodes. This makes trust an additional optimization objective of the data gathering in addition to energy consumption, traveling time, and cost. Joint optimization of the goals requires conducting multiobjective optimization. This article proposes a modified social class multiobjective particle swarm optimization (SC-MOPSO) method. The modified SC-MOPSO method is featured by application-dependent operators named interclass operators. In addition, it includes solution generation, adding and deleting rendezvous points, and moving to the upper and lower class. Considering that SC-MOPSO provides a set of nondominated solutions as a Pareto front, we employed one of the multicriteria decision-making (MCDM) methods, i.e., simple additive sum (SAW), for selecting one of the solutions from the Pareto front. The results show that both SC-MOPSO and SAW are superior in terms of domination. The set coverage of SC-MOPSO is 0.06 dominant over NSGA-II compared with only a mastery of 0.04 of NSGA-II over SC-MOPSO. At the same time, it showed competitive performance with NSGA-III.

1. Introduction

Data gathering in wireless sensor networks (WSNs) is a process of collecting data from a field equipped with many sensors and occupying a wide area using single- or multisink WSNs [1,2]. This process is not effective in a large-scale environment due to the increasing cost of deploying a large number of stationary links. Multiple sinks and multiple mobile sinks are more sustainable approaches to managing data transmission to multiple endpoints in a WSN [3]. However, deploying multisink or multiple mobile sinks in a WSN for data gathering is a mathematically complex process. It involves various determinations, namely, the number of mobile sinks [4]; their trajectories, which consist of a sequence of rendezvous points; and selecting [5] the depth or number of hops that are required for collecting the data [6]. The above-stated challenges have encouraged development of a simulator to optimize the performance of wireless sensor networks’ data gathering [7]. This study aimed to compute an optimal decision support algorithm by considering cost, energy consumption, traveling time, and trust [8]. Trust-aware data gathering is regarded as a multiobjective optimization problem because it involves simultaneously optimizing multiple objectives, which are often in conflict with each other. The main objectives of trust-aware data gathering are maximizing the accuracy of the collected data, minimizing the impact of unreliable or malicious sources, maximizing the amount of collected data, and minimizing the cost of data collection. These objectives often conflict with each other, as increasing the amount of collected data may come at the cost of lower accuracy or increased risk of unreliable or malicious sources [9] Correspondingly, improving the accuracy of the data may come at the cost of reducing the amount of data collected. In addition, trust-aware data gathering involves making decisions in a complex and uncertain environment, which makes it challenging to optimize the objectives. The trustworthiness of a source may change over time, or a source may deliberately provide misleading data [10].
Therefore, to address these challenges and optimize conflicting objectives, techniques such as meta-heuristic searching have been extensively used to solve optimization problem with a multiobjective nature [11]. This method starts with the initial setting of random solutions, and it determines the heuristic interactions between the solutions for reaching a set of nondominated solutions after a set of iterations [12]. Multiobjective optimization is evaluated from various perspectives, namely, the Pareto front, hypervolume, delta metric, and generation distance [13]. The quality of the solutions is assessed from various perspectives including domination, diversity, and enabling more choices for the decision-maker [14]. There are numerous algorithms used for various types of meta-heuristics including evolutionary genetic algorithm and particle swarm optimization [15]. However, the meta-heuristic searching algorithm is a specific application that requires developing application-oriented operators that are specifically designed for the problem at hand. These operators are used to generate new candidate solutions during the search process. The effectiveness of these operators can greatly impact the performance of the algorithm and the quality of the solutions obtained [16].
Social class multiobjective particle swarm optimization (SC-MOPSO) is a type of multiobjective particle swarm optimization algorithm that was developed to support variable-length solution spaces [17]. However, SC-MOPSO was developed based on blind mobility operators that do not consider the specific nature of the data-gathering application [18]. Additionally, it has not been extended to be used for multiobjective data gathering with trust-awareness applications using mobile sinks [19].
This study aimed to modify SC-MOPSO for use in multi-mobile sink data-gathering applications with optimal design support capacity. This adaptation involved the development of application-oriented operators and the extension of the algorithm to a multiobjective space with four objectives: trust, energy consumption, cost, and time of collection. The aim was to create an algorithm that can effectively balance these objectives and optimize the data-gathering process for multiple mobile sink systems. In summary, this article proposes an adaptation of the SC-MOPSO algorithm for use in multiple mobile sink data-gathering applications with trust awareness.

2. Literature Survey

This section presents a literature survey. It consists of two subsections, namely, trust-aware data-gathering and multicriteria decision-making (MCDM) models that can be used to optimize data gathering in a network.

2.1. Trust-Aware Data Gathering

The literature on trust-aware data collection refers to the process of data collection from WSNs, which includes varying degrees of sensor trust. Considering other data-gathering factors, namely, energy consumption, journey time, and cost of the network, necessitates a nonlinear data-gathering mechanism that prioritizes the trajectory of mobile sinks with greater closeness to the trust nodes.
There are many different algorithms that have been used for trust-aware data collection in the literature. A model for gathering reliable data was presented [6] based on edge computing (EC) and the Internet of Things (IoT) The sensor nodes in this model are assessed over a wide range of attributes to obtain accurately measured trust levels. Additionally, by virtually mapping a node’s trust value, the optimum mobility route with high trust was built for mobile data collection. Furthermore, a portable edge data collector was used to access and gather reliable data from sensors with quantifiable degrees of trust [19]. The potential for sliding into local minima when the total amount of virtual forces reaches zero is a limitation of this approach. The model used also only supports one mobile collector. Additionally, the total trust makes the erroneous assumption that there is a linear relationship between several components. In one study [20], it was recommended to use a probabilistic graphical model to completely evaluate the dependability of the sensor nodes utilizing a mobile edge-computing-based intelligent trust-assessment technique. The suggested approach analyzes data collection and communication behavior to assess the reliability of sensor nodes. The proposed mechanism evaluates trust based on data collection and communication behavior and plans the edge nodes’ movement path to increase the likelihood of direct trust evaluation while minimizing travel distance. However, this method ignores the various dimensions of trust and operates with only one mobile collector. Authors [21] also looked at the use of unmanned aerial vehicles (UAVs) as mobile sinks. The problem was recast as a multiobjective joint optimization problem as a result, with a large number of constraints, leading to a typical K-center problem. Then, a lightweight authority authentication model using certain stages was examined to overcome the major security issues with UAV-aided trustworthy data collecting. This architecture needs reliable sensors and UAVs with a tolerable authentication latency to carry out the data-gathering session. Smart data collecting with cloud services (S-SDC), a secure mobile sensor network-based protocol, was suggested in a study using mobile sensors to enable information dissemination in dynamic networks with the least loss and power consumption [22]. Additionally, the method supports authoritative routing and offers network consistency and availability for the collected data with cloud enterprises. The fitness-based fuzzy C-means (Fit-FCM) algorithm, which gathers nodes’ residual energy and utilizes the energy to pick new CHs while discarding nodes with the lowest energy, was proposed as a UAV-based CH selection (CHS) technique for usage in WSNs [23]. The created Fit-FCM algorithm, which takes into consideration fitness functions including energy, distance, and trust, is used to conduct CHS after simulating UAV-based WSN nodes. An IoT-based trust evaluation was carried out [24] to determine whether the target object can consistently carry out defined actions. The target object’s direct interaction history or other recommenders’ suggested data are both considered in the valid time domain. Two types of trust—active trust and recommended trust—were offered to characterize the trust evaluation process for Internet of Things devices. A temperature-aware trusted routing scheme (TTRS), a multifactor routing strategy based on the remaining energy, the hop count, and the trust value of sensor nodes, was proposed [25] to find the shortest and most reliable route. The scheme includes a hotspot node detection algorithm to detect malicious relay nodes and a route discovery and management mechanism. In a study [26], a belief-based trust evaluation mechanism was developed that uses a Bayesian estimation approach to distinguish hostile nodes from trustworthy nodes and protect against attacks such as bad-mouthing, on-off, and denial of service. In the work of [27], an aggregate signature-based trust routing (ASTR) scheme was developed to ensure safe data collection in WSNs. The scheme uses aggregate signatures to maintain data integrity and employs a detour routing scheme to verify the safe delivery of data to the sink. The trustworthiness of a path is determined by its success rate.
In [28], a trust-based data gathering approach is proposed that focuses on collecting data in a sensor-driven environment through data aggregation and reconstruction. The concept of multidimensional trust was introduced, incorporating communication, data, resource, and forwarding trust. However, the approach has limitations as the aggregation method used is based on the weighted average rule, which may lead to suboptimality. In [29], the secure and energy aware data gathering technique (SEEDGT) was proposed as a secure and energy-efficient data gathering technique that combines trust, public key algorithms, and compressive sensing (CS) methods to achieve security while maintaining a fair energy load balance in IoT–WSN. The SEEDGT technique is divided into three phases: cluster formation, network operation, and reconfiguration. During the cluster formation phase, energy-efficient and trust-based methods are used to form clusters and select cluster heads. The network operation phase focuses on securing network data during the data-collection process using a public key algorithm. Additionally, the CS strategy is employed to reduce the size of the original data, thus reducing energy consumption. Finally, the reconfiguration phase considers any changes that may occur during network operations. In [30], for data aggregation, the cluster head is selected using the emperor penguin optimization (EPO) algorithm, and STELR is used to ensure routing security. Secure communication is achieved by determining a node’s trustworthiness. In [31], a fog-based hierarchical trust mechanism is proposed, consisting of two components: trust in the underlying structure and trust between cloud service providers (CSPs) and sensor service providers (SSPs). To enhance the trust in the underlying structure, a behavior-monitoring component was established and implemented in wireless sensor networks (WSNs), while the more fine-grained and complex data analysis component was moved to the fog layer. The fog layer focuses on the real-time comparisons of service parameters, gathering exception information in WSNs, performing targeted quantitative evaluations of entities, and performing other aspects to establish trust between CSPs and SSPs. In [32], a trust evaluation model based on trust transitivity along a chain is proposed, which relies on the relatively strong computing and storage capabilities of mobile edge nodes. The authors first designed calculation methods for various trust chains to determine their trust levels. Then, they proposed an improved version of Dijkstra’s algorithm for collecting trust information from sensor nodes by the mobile edge nodes. In [33], a method is proposed for encoding returned verification messages in order to reduce the cost of obtaining verification messages for IoT devices. Additionally, the authors applied an adaptive active trust detection technique that considers the varying energy consumption of IoT devices in order to obtain reliable device trust while preserving network lifetime. The cloud distributes tasks to all available mobile edge units (MEUs). The publication includes the topology of the sensor network and the location of each sensor node. Upon receiving the publication, interested MEUs report their evaluation quality, coverage area, and expected price to the cloud. These three factors form a bid. The cloud then determines the winning set of MEUs and assigns tasks based on the bids. The selected MEUs use their mobile capabilities to collect sensor data and determine if object nodes are malicious. The cloud then aggregates the results reported by the MEUs to obtain the final trust evaluation of each sensor.
Nondominated sorting genetic Algorithm 2 (NSGA-II) [34] and nondominated sorting genetic Algorithm 3 (NSGA-III) [35] are both optimization algorithms used for solving multiobjective optimization problems, where multiple conflicting objectives need to be simultaneously optimized. NSGA-II is an improvement over the original NSGA algorithm and has become a benchmark for multiobjective optimization algorithms. It sorts the population of candidate solutions into different levels of nondomination, creating a front of solutions with a tradeoff between objectives. The algorithm uses the crowding distance measure to maintain diversity among the solutions and prevent premature convergence. NSGA-II has been widely used in various engineering and scientific applications.
NSGA-III, on the other hand, is a further improvement over NSGA-II that addresses some of its limitations. It uses an external archive to store the best nondominated solutions found so far, which is used to guide the search process toward the optimal solutions. NSGA-III also uses a K-means clustering method to divide the population into smaller groups, which allows for a more targeted search and faster convergence. Additionally, NSGA-III has a more flexible problem-specific ideal point, which provides a better reference point for the optimization process. These improvements make NSGA-III a more efficient and effective algorithm for solving multiobjective optimization problems.
A summary of the various methods in terms of different comparison criteria is presented in Appendix A.
Overall, none of the current algorithms for trust-aware data collection consider the collection of trust using multiple mobile data collectors or the dynamic adjustment of their trajectories for achieving the optimal trust values and network performance aspects such as cost, energy consumption, delay, and quality of service. Due to the partial conflict between the objectives, dealing with this object requires a multiobjective optimization approach.

2.2. MCDM for Data Gathering

The second part of the literature survey presents the usage of MCDM models in various WSN–IoT applications. In [36], entropy-based technique for order preference by similarity to an ideal solution is a multiobjective decision-making method (TOPSIS). the field observation instruments networks (FOINs) clustering routing algorithm (ETC) was proposed in this method. Through several variables, the ETC algorithm selects the perfect cluster head (optimal CH). It primarily addresses the issue that certain multiobjective optimization algorithms in use today cannot assign weights in a dynamic and objective manner. Each decision-making criterion for the issue reflects a characteristic for o multi-objective decision-making problem of CHs selection in the clustering routing method. As a result, the decision-making criteria are treated as characteristics and any node in the FOIN having values for the various criteria is chosen as an alternative.
In [37], the use trusted, energy- and spatial-aware dynamic distance source routing is suggested. The method determines the assessment metrics that are stated in the QoS. In addition, this model introduces a novel hierarchical trust method that uses several features of numerous wireless sensor nodes in accordance with data transfer speed, data size, energy consumption, and suggestions.
In [38], an MCDM framework was used to resolve challenging routing issues under the assumption of metric threshold limitations. Such needs are captured by the mathematical framework, which also determines the routing.
In [39], a hybrid network architecture for disaster area wireless networks (DAWNs) is proposed. To find the ideal next-hop node in DAWNs, researchers applied a multi-criteria decision-making method for emergency communication protocol (MCDM-ECP) that makes use of the analytic hierarchy process (AHP) method and the technique for order preference by similarity to an ideal solution (TOPSIS) method.
Authors [40] put forward a framework for sensor selection and correlation that allows a reported irregularity in the monitored environment to be activated and verified. It frames and solves the sensor selection problem as a multiobjective optimization (MOO) problem, taking into account the edge gateway device’s free CPU and RAM, network quality, remaining battery life, sensor correlation value, and power requirement of the sensors. In order to validate the anomaly, the sensor nodes are chosen using a multicriteria decision-making process (MCDM)
Authors [41] created a route design technique that is optimized for energy efficiency, extending network lifespan and improving connectivity. The method consists of four steps. The first divides the sensing field into equal sections based on the number of mobile sinks that have been deployed to solve the energy-hole issue. A stable election algorithm (SEA), a heuristic clustering technique, was developed to reduce message transmission between sensor nodes and avoid frequent cluster head rotation. In order to determine the ideal site for the sinks to halt and gather data from cluster heads, a sojourn location determination technique was suggested based on the minimal weighted vertex cover problem (MWVCP). Finally, using multiobjective evolutionary algorithms, three optimization strategies are used to assess the trajectory of the modified mobile sinks (MOEAs). They provided that the multiobjective evolutionary algorithms (MOEAs) may be deemed as an optimum solution for multiple-criteria decision-making (MCDM) problems because MOEAs’ evaluation encompasses many metrics. However, no explicit MCDM algorithm was provided for selecting a solution.
Overall, it was found in Table 1 that none of the existing approaches in WSNs applies MCDM for enabling decision makers to select one solution out of the set of nondominated solutions in the data gathering based on the factors of trust, effort, cost, and time. Hence, we aimed filling this gap by using the simple additive weighting (SAW) from MCDM for this purpose.

3. Methodology

Almost all of the symbols in the paper are represented in Table 2.

3.1. Definitions

This section presents several definitions used for building our methodology.

3.1.1. Definition 1: Class

A class is a portion that represents the set of all same size and types solutions in the problem space. More formally, for all x class C , then l e n g t h x = N C , where N C denotes the length of solutions inside class C , and t y p e ( x i ) is the same as t y p e ( y i ) for two decision variables x i and y i , belonging to x and y , respectively, where x   and   y are from the same class.

3.1.2. Definition 2: FAM

The matrix of fitness adjacencies F A M represents a matrix with many columns equal to the number of objective functions and many rows equal to the number of solutions. The fitness value of the solution with each objective function is represented by an entry in the matrix. When displaying the solution’s fitness to the different objective, FAM is useful. In the equation, FAM is a represented by.
F A M = f a m 11 . . . f a m 1 n f a m 21 . . . f a m 1 n . . . . . . . . . . f a m m n . . . f a m m n
where f a m i j denotes fitness solution j with regard to objective i .

3.1.3. Definition 3: RAM

The reduced adjacency matrix ( R A M ) is a matrix with a row count equal to the number of classes in the solution space and a column count equal to the number of objectives. Concerning the appropriate objective function, each entry in the matrix denotes an operator that is applied to the class’s solutions. The average, minimum, maximum, and median are a few examples of possible operators.
R A M = r a m 11 . . . r a m 1 n r a m 21 . . . r a m 2 n . . . . . . . . . . r a m m n . . . r a m m n
where r a m i j denotes the fitness value of class j concerning objective i .
There are several approaches to depict the fitness value of a given class. We focused on these three: 1. the class’s lowest fitness value for solutions; 2. the class’s average fitness score; 3. the subject class’s set coverage in comparison with that of other classes.

3.1.4. Definition 4: WCT

The weak classes threshold (WCT) is a measure of how many solutions are used in a given class to make it a weak class. When a class has fewer solutions than the WCT, the class becomes weak.

3.1.5. Definition 5: SCT

The strong class threshold (SCT) is a measure of how many solutions are utilized to make a certain class a strong class. When the class has more solutions than the SCT, the class becomes a strong class.

3.2. Overview of SC-MOPSO

The pseudocode of SC-MOPSO is presented in Algorithm 1. As shown, the inputs of the algorithms are NumOfParticles, which indicates the number of particles; NumOfIterations, which indicates the number of iterations; Boundary, which identifies the outermost search; DimensionsRange, which indicates the range of dimension; ObjectiveFunctions, which indicates to the objective functions that need to be optimized. In addition, the parameters of the traditional particle swarm optimization, namely, inertia, C 1 , and C 2 are given. Furthermore, the algorithm accepts two thresholds, namely, adaptive timeout and classMinThreshold. The former indicates the threshold that allows moving a particle from one class to another, and the latter indicates the minimum number of particles within a class. The outputs of the algorithm are the Pareto front and Pareto set.
The particle distribution among the classes is the algorithm’s foundation. The first step in the distribution of the particles involves employing two random number generators: one to assign each particle in class and the other to generate the values of the decision variables of the particle. In this context, the term “class” refers to a subset of the solution space that only includes solutions from the same dimension and type of decision variable; all other dimension solutions are found in other classes.
The pseudocode for Algorithm 1 presents the first swarm initialization phase (lines 3 to 8). The solutions are projected into their classes using the command on line 8. The algorithm then executes for the specified number of iterations (NumOfIterations). The algorithm runs over each class one by one with each iteration. The algorithm runs through each class’s particles one at a time and uses the function selectExemplar (Classes) to choose an exemplar for each particle. Any particle’s exemplar is chosen from the same class as the particle. The particle is then moved to a new position by the algorithm depending on its input parameters: (Inertia, C1, and C2) and exemplar. The algorithm evaluates any potential improvement in the fitness functions after transferring the particle. Afterward, the algorithm adds one to the nonimprovement counter if there is no improvement; otherwise, the improvement counter is reset. The improvement counter’s purpose is to make it possible for the logic to move the particle from one class to another if no improvement happens after a certain number of repetitions, which is represented by the adaptiveTimeOut threshold. A minimal number of particles must exist within a specific class in order for logic to move particles from one class to another. This is represented by another threshold, which is classMinThreshold.
Algorithm 1 Pseudocode of SC-MOSPO for the V-length problem [42]
Input
1-NumOfParticles
2-NumOfIterations
3-Boundary
4-DimensionsRange
5-ObjectiveFunctions
6-Inertia,C1,C2
7-adaptiveTimeOut
8-classMinThreshold
Output
1-ParetoFront
2-ParetoSet
Start Algorithm
1: initSwarm(NumOfParticles)
2: numOfClass = DimensionsRange.Max − DimensionsRange.Min + 1;
3: for i = 1 until NumOfParticles
4:    Dimension = genRan(DimensionsRange)
5:    particle = genRan(Dimension,Boundary)
6:    add particle to swarm
7: end
8: Classes = Distribute(swarm)
9: for iteration = 1 until NumOfIterations
10:  for classIndex = 1 until length(Classes)
11:      for each particle of Classes(classIndex)
12:      exemplar = selectExemplar(Classes(classIndex)//-1-
13:      newParticle = moveParticle(particle,exemplar,Inertia,C1,C2)
14:       if(NoImprove(newParticle,particle))
15:          particle.counter = particle.counter + 1;
16:       else
17:          particle.counter = 0;
18:          particle = newParticle;
19:       end
20:      end
21:      end
22:      for classIndex = 1 until length(Classes)
23:      for each particle of Classes(classIndex)
24:       adaptiveTimeOut = timeoutUpdate(particle.nonImpWindow, maxTimeOut)
25:       if(particle.counter > adaptiveTimeOut and length(particle. Class) > classMinThreshold)
26:          Class = selectNewClass(particle)
27:          particle = moveToNewClass(particle, Class)
28:       end
29:     end
30:      end
31:  end
32: end
End Algorithm
The existing variant of SC-MOPSO assumes that the solution is homogenous. In other words, it considers that the definition of the decision variable is the same for all components of the solution vector. However, this does not apply to the problem of trust-aware data gathering. In such a problem, the decision variable is different from one component to another, i.e., some components indicate the number of mobile sinks, others indicate the number of rendezvous points, others indicate the number of hops, and others indicate their locations. To resolve this problem, we developed a novel variant of SC-MOPSO. We named it SC-MOPSO for data gathering or SC-MOPSO-DG. It provides application-dependent operators named interclass operators. The operators include solution generation, addition and deletion of rendezvous points, moving to an upper class, and moving to a lower class with an awareness of the representation of data gathering solution. This is presented in the next subsection.

3.3. SC-MOPSO-DG

This section presents our novel algorithm SC-MOPSO-DG. First, we present the mathematical model of the objective space in Section 3.3.1. It is composed of the initialization, which is presented in Section 3.3.2. Next, the adding and deletion of RendezVous point RV is presented in Section 3.3.3. Then, the algorithm for moving to an upper class is presented in Section 3.3.4, and the algorithm for moving to a lower class is given in Section 3.3.5. Next, the main algorithm is presented in Section 3.3.6. Lastly, simple additive weighting (SAW) is presented in Section 3.3.7.

3.3.1. Mathematical Model of Objective Space

For conducting optimization, we need to mathematically model each of the objectives, namely, trust, energy, cost, and time using the decision variables. The decision variables are defined using Equation (3):
x = ( N m s , N R v i , N H i , j )
where N m s denotes the number of mobile sinks; N R v i denotes the number of rendezvous points for mobile sink i ; N H i , j denotes the number of hops for mobile sink i at rendezvous point j .
(1)
Trust
In a wireless sensor network, the trust of a sensor can be defined as the degree of confidence that can be placed in the accuracy, reliability, and security of the data generated by that sensor. A high degree of trust in a sensor implies that the data it generates are accurate, reliable, and secure, while a low degree of trust implies the opposite.
The trust of a sensor can be quantified as an integer value between 1 and 10 based on a number of factors: 1, sensor calibration: a sensor that is properly calibrated and periodically maintained is more trustworthy than one that is not; 2, sensor accuracy: a sensor that consistently generates accurate data is more trustworthy than one that generates inaccurate data; 3, sensor reliability: a sensor that consistently operates without interruption is more trustworthy than one that frequently fails; 4, security: a sensor that is secure and protected against tampering is more trustworthy than one that is not; 5, data integrity: a sensor that generates data that are consistent with other sources of information is more trustworthy than one that generates inconsistent data; 6, age and usage: a new sensor that has not been extensively used is generally more trustworthy than an older sensor that has been in use for a long time.
Based on these and other factors, the trust of a sensor can be quantified as an integer value between 1 and 10, with a value of 1 indicating very low trust and a value of 10 indicating very high trust. This quantification provides a simple, intuitive way to express the degree of trust in a sensor and can be used to inform decisions about how to use and rely on the data generated by that sensor within the wireless sensor network.
Trust is calculated based on the number of mobile sinks, the set of a rendezvous points for each one, and the number of assumed hops for each rendezvous point. We also assume that increasing the number of hops implies obtaining trust, which is the minimum among all hops, as provided in Equation (4).
i = 1 N m s j = 1 N r v T j 1 i + m i n T j 1 i , T j 2 i + m i n T j 1 i , T j 2 i , T j 3 i + + min T j 1 i , T j 2 i , T j N h o p i N r v
where T j k i denotes the trust of sensor that sending data to mobile sink i at RV j from hop index k , T j k i { 1,10 } .
(2)
Energy Consumption
Second, the energy consumption is calculated based on the energy at each sink and rendezvous point as described in Equation (5).
E n e r g y = i = 1 N m s   j = 1 N r v i   k = 1 N i , j   E i , j , k + k = 1 N j , 1   E i , j , k + + k = 1 N j , N H o p s   E i , j , k
where N r v i denotes the number of rendezvous points for mobile sink i ; N i , j denotes the number of sensors at the rendezvous point j for mobile sink i ; E i , j , k denotes the energy consumption at sensor k , rendezvous point j , and mobile sink i .
(3)
Cost
Third, the cost is calculated as the number of mobile sinks. Fourth, the time is calculated as the longest travelling time among all mobile sinks, as described in Equation (6).
C o s t = A 1 N m s + A 2
(4)
Time
The time indicates the longest mobile sink in terms of collecting data from its associated sensors, as described in Equation (7).
T i m e = max d 1 , d 2 , . , d N m s
where d i denotes the distance travelled by mobile sink i , and it is calculated based on the summation of the distance between every two consecutive distances, as provided in Equation (8).
d i = J = 2 N R v , i R P j R P j 1 2
where R P j denotes the rendezvous point.
(5)
Noncoverage
Noncoverage indicates to the number of sensors that have not been covered by the mobile sink. It is calculated based on subtracting the number of connected sensors N c o n n from the total number of sensors N s , as described in Equation (9).
N o n C o v e r a g e = N s N c o n n

3.3.2. Initialization

The solution representation is heterogeneous because it combines different types of decision variables. Therefore, the process of constructing solutions should be carefully approached to ensure that the solutions are distributed over the range of each variable. To initialize the process, we use a random process while also considering the boundary information of each variable to ensure that each solution does not violate any constraints. The constraints are defined based on the boundary information given in several variables: 1, lower and upper boundary of positions B P L and B P H respectively; 2, lower and upper boundary of other decision variables B D L and B D H , respectively; 3, index of number mobile sink boundaries within B D L and B D H , and it is denoted by I M S ; 4, index of number of rendezvous points boundaries within B D L and B D H , and it is denoted by I R ; 5, index of number of hops boundaries within B D L and B D H , denoted by I N H .
The pseudocode is presented in Algorithm 2. As shown, the solution is created as a structure. Next, a random process is used for initializing the number of mobile sinks. Afterward, a for loop is conducted on the mobile sink, and other information is generated including the number of rendezvous points, the location of each rendezvous point, and the number of hops using an internal loop.
Algorithm 2 Initialization of SC-MOPSO-DG
Inputs
1- B P H  
2- B P L  
3- B D H  
4- B D L  
Output:
1- S o l  
2- C l a s s  
3- D i m  
Start Algorithm
1: S o l = struct()
2: S o l . ms = struct()
3: Nms= randi( B D L ( I M S )) B D L ( I M S ))])
4: class= Nms
5: dim = 0
6: for i = 1:Nms do
7:  solution.ms(i).NRP = struct()
8:  Nrv = randi([ B D L ( I R V ) B D L ( I R V )])
9:  for j = 1:Nrv do
10:   solution.ms(i).NRP(j).pos = [rand*( B P H (XI) − B P L (XI) − rand*( B P H (YI) − B P L (YI))]
11:   solution.ms(i).NRP(j).nHops = randi([ B D L ( I R V ) B D H ( I R V )])
12: End for
13: dim = dim + Nrv*length of one RV information
14: class = strcat(num2str(class),num2str(Nrv))
15: end for
End Algorithm

3.3.3. Addition and Deletion of Rendezvous Point

An issue with moving a solution from one class to another is the need to add more information to the solution when the destination class is higher or to delete older information from the solution when the destination class is lower. To handle this, an algorithm for addition and deletion was developed. The algorithm receives the destination class as the c l a s s input, an exemplar that represents a leader selected from the destination class; and OldSolution, which represents the subject solution that is being moved from the source class to the destination class.
As shown, the Algorithm 3 starts operating by initiating newSolution, which represents the solution after being moved to the destination class. First, newSolution takes all the information of the oldSolution. Next, assuming that all solutions have the same number of mobile sinks, the differences between the number of rendezvous points in the oldSolution and in the corresponding newSolution is calculated. There are two possibilities: (1) the difference is negative, which means that rendezvous points are to be added; (2) the difference is positive, which means that rendezvous points are to be deleted. In the first case, we randomly select one rendezvous point from the exemplar and add it to the solution until equality. In the second case, we select one rendezvous point from the subject solution and delete it until the difference is 0, which means that the solution is already transformed to the new class.
Algorithm 3 Pseudocode of adding and removing rendezvous points
Input
1-class: class for moving to it.
2-exemplar: individual solution of new class.
3-oldSolution: the particle needed to moved.
Output
1-newSolution
Start Algorithm
1: newSolution = oldSolution
2: for each ms of newSolution do
3:  difference = number of RV(ms) of exemplar − number of RV(ms)
4:  if difference > 0 then
5:   for i = 1 until difference do
6:     select RVs randomly from exemplar
7:     add them to ms newSolution
8:   end for
9:   else if difference < 0 then
10:   for i = 1 until difference do
11:     delete RV randomly
12:   end for
13:  end if
14: end for
End Algorithm

3.3.4. Moving to a Higher Class

Assume that we have an oldParticle, exemplar, class, and difference. Algorithm 4 plays the role of adding the same number provided in the difference in mobile sinks to the oldParticle. In other words, we select a random mobile sink from the exemplar and add it to the oldParticle, then we call the adding and deleting of the rendezvous point until the number of newly added mobile sink values is equal to the difference. Hence, in this case, we consider that the solution has been moved from a lower class to an upper class.
Algorithm 4 Move to higher class
Input
1-class: class for moving to it.
2-exemplar: individual solution of new class.
3-oldParticle: the particle needed to moved.
4-difference: difference between the number of mobile sinks of old and new class particle
Output
1-newParticle.
Start Algorithm
1: newParticle = oldParticle
2: for i = 1 until difference do
3:  select random ms(exemplar) and add it to newParticle
4: end for
5: newParticle = AddDeleteRVs(newParticle, exemplar, class)
End Algorithm

3.3.5. Moving to a Lower Class

Assume that we have an oldParticle, exemplar, class, and difference. Algorithm 5 plays the role of detecting the same number provided in the difference in the mobile sinks from the oldParticle. In other words, we select a random mobile sink from the oldParticle, then we call the deletion of the rendezvous point until the number of deleted mobile sink value is equal to the difference. Hence, in this case, we consider that the solution has been moved from an upper class to a lower class.
Algorithm 5 Move to a lower class
Input
1-class: class for moving to it.
2-exemplar: individual solution of new class.
3-oldParticle: the particle needed to moved.
4-difference: difference between the number of mobile sinks of old and new class particle.
Output
1-newParticle.
Start Algorithm
1: newParticle = oldparticle
2: for i = 1 until difference) do
3:  delete random ms from newParticle
4: end for
5: newParticle = AddDeleteRVs(exampler,newParticle,class)
End Algorithm

3.3.6. Main Algorithm

To accomplish the movement function of social class MOPSO DG, we use the pseudocode provided in the main algorithm. As shown, the algorithm uses the standard movement equation of particle swarm optimization that is provided in Algorithm 6 on line 13.
The pseudocode of the algorithm is presented in Algorithm 6. It accepts the setupParameters as inputs, and it provides the Pareto front as the output. The algorithm starts with the initialization of the population, evaluating the population based on objective functions, determining nondominant solutions, creating the repository, and initializing the AMC and RAM matrices. Next, the algorithm enters a set of iterations until reaching the quantity of iterations. Each time the algorithm iterates, it updates the parameters, then considers the classes one by one, selects a random exemplar within the class, moves the solutions toward their exemplar according to the mobility equations of the algorithm, and checks for crossing the boundary and fixing the solutions, in this case, to be maintained within the boundaries. Afterward, it provides the mutation and updates the solution in case of domination in the new position. In addition, it updates the improvement counter.
The second part of Algorithm 6 considers the classes again and updates the enhancement time out. Next, it considers the solution of each class and checks whether the solution has reached its timeout within the class without improvement. In this case, the solutions are moved from their present class to a different one. This leads to calling the process of moving, which has two functions: (1) moving to the upper class if the destination class has more mobile sinks and (2) moving to the lower class if the new class has a smaller number of mobile sinks. Next, the matrices of F A M and RAM are updated.
Our developed variable-length multiobjective SC-MOPSO-DG optimization algorithm is presented in Algorithm 4. It accepts the solution dimension d, the population size n, the max iteration, and the objective functions. It returns the Pareto front. It operates by starting with an initialization of the population according to its size. Next, it evaluates the member of the population, and it updates the values of F A M and RAM. Afterward, it performs nondominated sorting based on the pseudocode presented in Algorithm 4. Next, it enters the for loop that has a maximum equal to the maximum number of iterations Each time the algorithm iterates, it selects an exemplar for each class, applies the movement equations of SC-MOPSO-DG optimization, and corrects the solution when exceeding the boundary of the solution space. Next, the algorithm updates the improvement counter of each solution. For the nonimproving solutions, the algorithm moves them from their class to another class. Lastly, the algorithm deletes weak classes. Lastly, the algorithm calls the archive controller algorithm and updates F A M and RAM.
Algorithm 6 Pseudocode of SC-MOPSO
Input
1- d solution dimension
2- n population size
3-max_iteration
4- f = [ f 1 X 1 f 2 X 1 f m X 1 ] multi objective functions
Output
1-Pareto front
Start Algorithm
1: Initialize the SC-MOPSO-DG population based on the number n
2: Evaluate the fitness of population using objective functions
3: It updates FAM and RAM matrices
4: Perform nondominated sorting on the population
5: Determine nondominated solutions and add them to archive using archive controller
6: For i = 1 until max_iteration
7:  select exemplar from each class based on F A M based probability density function
8:  Update particle positions using algorithm Equations (1)–(4) and selected exemplars
9:  Check if any search agent goes beyond the search space and amend it
10:  Calculate fitness values of solutions,
11:  update improvement counter for each solution
12:  move weak solutions from their class to other class in case they are not improving
13:  deletes weak class
14:  call archive controller and update F A M and RAM
15: Return archive
End Algorithm

3.3.7. Simple Additive Weighting (SAW)

Simple additive weighting (SAW) is one approach as in Figure 1 to the multiattribute decision-making problem. The fundamental idea behind the SAW approach is to calculate the average of the weighted performance ratings for each option across all criteria. It calls for a procedure to convert the choice matrix (X) to a scale that can be compared with all the ratings of available options. In our optimization, we have four criteria, namely, cost, energy, time, and trust.
We extract the solutions from the Pareto front (PF), and we provide them to table the PF. Next, we require the decision maker to provide the weights of the criteria according to their preferences. We normalize the matrix, and we perform the ranking based on the weighted sum. The solution that accomplishes a higher rank is selected. The weights of the criteria are given in Table 3, the Pareto front is given in Table 4, and the overall evaluation is given in the Pareto front in Table 4. The process of SAW is depicted in Figure 2, The ranking of solutions provided in the Table 5.
We present the pseudocode of selecting the solution from the Pareto front in Algorithm 7.
Algorithm 7 Pseudocode of selecting solution from Pareto front using simple additive weight (SAW)
Input:
paretoFront
W objectives’ weights
Output:
objectivesOptFuncs
Start:
objectivesFuncs = paretoFront.solutionsObjectiveValues
minValue = min(objectivesFuncs)
maxValue = max(objectivesFuncs)
normObjectives = (objectivesFuncs − minValue)/(maxValue − minValue)
sumWObj = sum(normObjectives.*W)
[minValues,index] = min(sumWObj)
objectivesOptFuncs = paretoFront.solutionsObjectiveValues(index)
End

3.4. Example

Assume that we have two solutions, s o l 1 and s o l 2 . The first solution s o l 1 contains two mobile sinks, namely, ms(1,1) and ms(1,2). The second solution s o l 2 contains three mobile sinks, namely, ms(1), ms(2), and ms(3). Each mobile sink has its own number of rendezvous points. For the mobile sink ms(1,1), we have three RVs, namely, [150 400], [200 144], and [160 350]. In addition, each RV has its own number of hops. The number of hops of R V ( i , j , k ) is 2 for i = j = k = 1 , as represented in Table 6.

3.5. Performance Metrics

For evaluating our developed algorithm, we generated two types of metrics: multi-objective optimization (MOO) and application-oriented metrics. For the first type, we calculated the hyper-volume, set coverage, delta, and the number of nondominated solutions. For the second type, we calculated time-series-based metrics for the packet delivery ratio (PDR), end to end delay (E2E-delay), and energy consumption. The equations of the second type are presented in Section 5 while the equations of the first type are presented in this section.
The effectiveness of search algorithms was assessed using the hyper-volume (HV) metric in evolutionary and swarm multiobjective optimization. In relation to the poorest solution (the reference point), it calculates the volume of the dominated area of the objective space; this region is the union of the hypercube whose diagonal is the separation between the reference point and a solution x from the Pareto set (Ps). More preferable solutions are indicated by higher values of this measure indicator, as shown in Equation (10).
H V = v o l u m e U   H y p e r C u b e ( x )
The set coverage, or C metric, which compares the Pareto sets Ps1 and Ps2, is shown in Equation (11).
c ( P s 1 , P s 2 ) = | { y P s 2 | x P s 1 : x < ¬ y } | | P s 2 |
C is equal to the proportion of Ps2’s nondominated solutions to Ps1’s nondominated solutions divided by Ps2’s total number of solutions. Therefore, it is crucial to reduce the value of C(X, Ps) for all Pareto sets X while assessing a set of Ps.

4. Experiment and Results

This section presents the experimental methods and results. It consists of two subsections, namely, MOO evaluation, which is presented in Section 4.1, and networking measures, which are presented in Section 4.2. The generation of the experimental results was performed using MATLAB 2020b using a computer i7 core 2.30 GHZ 16GB RAM. The parameters that were used for conducting the experimental evaluation are presented in Table 7. As shown in the table, we used 100 iterations for all algorithms. Furthermore, the boundary dimension of all algorithms ranged between [1,2,2] and [3,4,6], which indicates the range of [ n u m b e r   o f   m o b i l e S i n k ,   n u m b e r   o f   R V ,   n u m b e r   o f   h o p s ] .

4.1. MOO Evaluation

This section presents our experiments and results. We present the set coverage to show the domination performance of the benchmarks and of our created algorithm. A comparison is provided with two benchmarks, namely, NSGA-II and NSGA-III. Afterward, we present the hyper-volume, which shows diverse behavior. Lastly, we present the number of nondominated solutions.

4.1.1. Set Coverage

As shown in Figure 3, the domination of our developed algorithm with those of each of NSGA-II and NSGA-III is presented. It was observed that the set coverage of SC-MOPSO was 0.06 over NSGA-II compared with only a domination of 0.04 of NSGA-II over SC-MOPSO.
The set coverage of SC-MOPSO with NSGA-II is presented in Figure 3. There is a blue rectangle between Q1 and Q3. The maximum and minimum are represented in black. The median is represented in red line. The results show more domination of SC-MOPSO over NSGA-II. The domination percentage in terms of median value is almost 0.06. On the other side, the domination of NSGA-II over SC-MOPSO is approximately 0.025 in terms of the median value. Similarly, we present the set coverage of SC-MOPSO with NSGA-III in Figure 4. The results show equivalent domination in terms of the median value with value close to 0.01. This provides that the domination is almost the same between the two algorithms. However, there is more interquartile range for the domination of NSGA-III over SC-MOPSO due to the higher distance between minimum and maximum.

4.1.2. Hyper-Volume

The hyper-volume results are presented in Figure 5. We observed that SC-MOPSO slightly outperformed NSGA-III in terms of hyper-volume, while NSGA-II produced a result of approximately 2.4 × 10 4 . Reading these figures together with that for set coverage showed that SC-MOPSO outperformed NSGA-II in terms of set coverage, while it outperformed NSGA-III in terms of hyper-volume.

4.1.3. Number of Nondominated Solution

The number of nondominated solutions is presented in Figure 6. All algorithms generated the same level of number of nondominated solutions (NDSs). The size of the population for each algorithm was 200. This led to a number of nondominated solutions of 200. This was interpreted with the high number of objectives, which led to the high number of nondominated solutions.

4.1.4. Convergence Graphs

For additional evaluation, we present a boxplot convergence curve of each of the objectives with respect to the generation from the starting point of the optimization until the end. We can observe from the figures that SC-MOPSO had fewer outliers than the other two algorithms, namely, NAGA-II and NSGA-III. This was generalizable to the trust results in Figure 7.
Contrary to expectations, the energy consumption profile decreased as the number of iterations increased from 10 to 100 for all three algorithms. The energy consumption for each algorithm started at 0.05 and decreased as the number of iterations increased. A similar pattern can be observed for all three algorithms in Figure 8. However, both NSGA-II and NSGA-III had more outliers than SC-MOPSO-DG.
Contrary to expectations, the cost profile decreased as the number of iterations increased from 10 to 100 for all three algorithms. The cost for each algorithm started at 0.05 and decreased as the number of iterations increased. A similar pattern can be observed for all three algorithms in Figure 9. However, both NSGA-II and NSGA-III had more outliers than SC-MOPSO-DG.
The outcomes of our study are depicted in Figure 10, where we compare the performance of our newly developed SC-MOPSO-DG algorithm with that of two existing benchmarks. The results demonstrate that the median value of SC-MOPSO-DG significantly improved and reached a level below 1500, which is comparable to that of the other two benchmarks. Moreover, we observed that NSGA-II, one of the benchmark algorithms, had a higher number of outliers and incurred a greater cost than the other two algorithms. Overall, these findings indicate that SC-MOPSO-DG is a promising algorithm that can achieve comparable or better results than the existing benchmarks while being less susceptible to outliers and reducing the overall cost of the optimization process.
The final metric that we analyzed was noncoverage, which is shown in Figure 11. The results indicate that the noncoverage of SC-MOPSO-DG significantly decreased to 40%, which is much lower than that of NSGA-II (48%) and NSGA-III (62%). This finding suggests that SC-MOPSO-DG outperforms the other two algorithms in terms of noncoverage, which is a desirable characteristic in multiobjective optimization. Therefore, our results demonstrate the superiority of SC-MOPSO-DG over the other two benchmarks and highlight its potential for addressing complex optimization problems that involve multiple objectives.

4.2. Networking Measures

This section presents the networking evaluation. It is decomposed into four parts, namely, E2E delay, energy consumption, PDR, and trust.

4.2.1. E2E Delay

The time series is presented in Figure 12 of the E2E delay shows that the best performance was achieved by SC-MOPSO, which produced a delay with level 0.3; NSGA-II and NSGA-III generated a higher E2E delay. In addition, we observed that the behavior of SC-MOPSO produced a transient state that slowly increased until reaching a steady state case at 0.3, while NSGA-III produced a different pattern of the transient state, which started high and slowly decreased until reaching the steady state of 0.5 s.

4.2.2. Energy Consumption

The energy consumption is presented in Figure 13. We found that the solution provided by SC-MOPSO generated a higher level of energy consumption with an increasing pattern than NSGA-II and NSGA-III. This is consistent with the self-conflicting nature of objectives.

4.2.3. PDR

The other metric that was calculated was the packet delivery ratio (PDR) for the solutions generated from our developed method and the two benchmarks. As shown in Figure 14, SC-MOPSO generated the highest PDR, reaching a value of 100% compared with a PDR of around 90% for NSGA-II and of around 40% for NSGA-III.

4.2.4. Trust

The last metric that was calculated was trust, and it is given in Figure 15. The results show that trust reached a value of 10 for NSGA-II, which is higher than the around 8 for NSGA-III and around 6 for SC-MOPSO. However, considering that we selected a solution from the Pareto front, it is normal for one objective to be dominant over other objectives.

5. Discussion

The problem of gathering data through the use of multiple mobile sinks, multiple rendezvous points, and various numbers of hops is a multiobjective problem. As a result, two types of metrics were used to compare the results. The first type was MOO metrics, where set coverage, hyper-volume, number of nondominated solutions, and convergence graphs were utilized. Networking metrics, including E2E delay, energy consumption, PDR, and trust, were also calculated.
Regarding the first type, the results demonstrated that SC-MOPSO-DG is superior to NSGA-II in terms of most metrics and comparable to NSGA-III in terms of some metrics, while being superior to NSGA-III in terms of hyper-volume. For example, it was competitive with NSGA-III in terms of domination and was superior in terms of hyper-volume.
Regarding the second type, we only chose one solution from the Pareto front of each algorithm and generated the corresponding time series of the solution. The results were superior to those of the benchmarks in terms of PDR and E2E delay, demonstrating an excellent quality of service. Additionally, it showed a higher energy consumption profile and less trust, which is normal given the domination aspect of the solutions in the Pareto front and the self-conflicting nature between the objectives. The overall superiority of our developed SC-MOPSO-DG is attributable to the developed operators for class interaction, which enables moving solutions among various classes and consequently enabling variable-length searching.

6. Conclusions and Future Work

In a WSN, sensor nodes are typically deployed to monitor the environment and collect data. Trust-aware data gathering involves determining which nodes can be trusted to reliably collect and transmit data. Social class assignment is a mechanism used to classify sensor nodes into different groups based on their trustworthiness or reliability. Nodes in higher social classes are considered more reliable and are given higher priority in data-gathering tasks. The proposed algorithm addresses the challenge of finding an optimal social class assignment for sensor nodes. It introduces a variable-length encoding scheme to represent the social class assignment, allowing for flexibility in the number of social classes and their sizes. This enables the algorithm to adapt to different network conditions and requirements. The optimization problem is formulated as a multiobjective problem, simultaneously considering multiple conflicting objectives. Typical objectives in trust-aware data gathering include maximizing data reliability, minimizing energy consumption, and balancing the network load. The algorithm uses a combination of evolutionary particle swarm optimization, solution generation, and addition and deletion of rendezvous points to enable moving to an upper class or a lower class. Once the algorithm converges, it provides a set of multiobjective optimization metrics, namely, set coverage, hyper-volume, and the number of nondominated solutions, representing different trade-offs between the objectives followed by statistical analysis and selecting a suitable solution based on the specific requirements and priorities of the WSN. In an effort to confirm the proposed design’s performance, a simulation was run to generate the time series of E2E delay, packet delivery ratio, trust, and energy consumption for each of the proposed designs. The SC-MOPSO set coverage was 0.06 over NSGA II compared with only a domination of 0.04 of NSGA-II over SC-MOPSO, while it showed competitive performance with NSGA-III. We concluded that VL-MOSCO is a promising approach for optimizing social class assignment in trust-aware data gathering in wireless sensor networks. By considering multiple objectives and using variable-length encoding, it offers flexibility and adaptability to different network conditions, ultimately improving the overall performance and reliability of the network.

Author Contributions

Conceptualization, K.C.; Methodology, M.A.S.; Validation, K.C.; Formal analysis, M.A.S.; Investigation, M.A.S.; Writing—review & editing, M.A.S. and K.C.; Supervision, R.J. and K.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. An overview of existing methods for data gathering in terms of various comparison criteria.
Table A1. An overview of existing methods for data gathering in terms of various comparison criteria.
ArticleMultiple Data CollectorMobile SensorsDimension of TrustworthinessCommunication TrustDistance
between the
Sensors
Packet LossThird-Party
Recommendation
EnergyNumber of SensorsAreaAlgorithms UsedLimitationSimulation
[43] × × Multiple dimensions 100300 × 300Virtual force-based modelingSubject to local minimaMATLAB
[20] × × Multiple dimensions × × 250100 × 100Probabilistic graphIgnores various dimensions of trustMATLAB
[24] × × Two dimensions × × 550200 × 200secondary path optimization strategyIgnores various dimensions of trustMATLAB
[25] × × Multiple dimensions × × --Temperature-Aware Trusted Routing Scheme (TTRS)Sink is fixedMATLAB
[21] × One dimension × × 2000-elliptic curve digital signature algorithm NSGA-IIIt does not contain multi-dimensionMATLAB
[22] × One dimension × × × --Energy-efficient mobile nodes-based algorithm using clusteringIt does not contain a multi-dimension-based model for trustNS3
[26] × × Two dimensions × × 50100 × 100 mBelieve based trustFixed single sinkOMNET ++
[27] × Multiple dimensions × × --Aggregate Signature based Trust RoutingFixed data aggregator
[28] × × Multiple dimensions × × 54100 × 100Trust-based data gatheringStationary sinkMATLAB
NS2
[31] × Multiple dimensions × 30-Trust Model based on the weighted averageStationary sinkMATLAB
[29] × Multiple dimensions × 300100 × 100ClusteringStationary sinkMATLAB
[23] × Single dimension × × × 5 0200 × 200ClusteringStationary sink-
[32] × Multiple dimensions × 50100 × 100DijkstraSingle mobile sinkMATLAB
[33] × × Single dimension × × -ProtocolFixed no NodesMATLAB
[44] Multiple dimensions × 1000100 × 100Trust Model based on weighted averageIt requires cloud managementMATLAB
OUR Multiple dimensions 100200 × 200RLMultiple mobile sinkMATLAB

References

  1. Kirmani, S.; Mazid, A.; Khan, I.A.; Abid, M. A Survey on IoT-Enabled Smart Grids: Technologies, Architectures, Applications, and Challenges. Sustainability 2023, 15, 717. [Google Scholar] [CrossRef]
  2. Mohapatra, S.; Behera, P.K.; Sahoo, P.K.; Ojha, M.K.; Swarup, C.; Singh, K.U.; Pandey, S.K.; Kumar, A.; Goswami, A. Modified Ring Routing Protocol for Mobile Sinks in a Dynamic Sensor Network in Smart Monitoring Applications. Electronics 2023, 12, 281. [Google Scholar] [CrossRef]
  3. Liu, D.; Chen, S.; Lu, Z.; Jin, S.; Zhao, Y. CRLB Analysis for Passive Sensor Network Localization Using Intelligent Reconfigurable Surface and Phase Modulation. Electronics 2023, 12, 202. [Google Scholar] [CrossRef]
  4. Hamzah, F.M.; Seenc, W.K.; Asshaari, I.; Rusiman, M.S.; Kamarudin, M.K.A.; Sabrif, S.R.M. Modelling of Sea Water Level during High Tide Using Statistical Method and Neural Network; Penerbit Universiti Kebangsaan Malaysia: Bangi, Selangor, Malaysia, 2022. [Google Scholar]
  5. Jebi, R.C.; Baulkani, S. Mitigation of coverage and connectivity issues in wireless sensor network by multi-objective randomized grasshopper optimization based selective activation scheme. Sustain. Comput. Inform. Syst. 2022, 35, 100728. [Google Scholar] [CrossRef]
  6. El-Fouly, F.H.; Kachout, M.; Alharbi, Y.; Alshudukhi, J.S.; Alanazi, A.; Ramadan, R.A. Environment-Aware Energy Efficient and Reliable Routing in Real-Time Multi-Sink Wireless Sensor Networks for Smart Cities Applications. Appl. Sci. 2023, 13, 605. [Google Scholar] [CrossRef]
  7. Sathesh, A. Optimized multi-objective routing for wireless communication with load balancing. J. Trends Comput. Sci. Smart Technol. 2019, 1, 106–120. [Google Scholar]
  8. Sun, M.; Zhou, Z.; Wang, J.; Du, C.; Gaaloul, W. Energy-efficient IoT service composition for concurrent timed applications. Future Gener. Comput. Syst. 2019, 100, 1017–1030. [Google Scholar] [CrossRef]
  9. Rauniyar, A.; Engelstad, P.; Moen, J. A new distributed localization algorithm using social learning based particle swarm optimization for Internet of Things. In Proceedings of the 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), Porto, Portugal, 3–6 June 2018; IEEE: New York, NY, USA, 2018; pp. 1–7. [Google Scholar]
  10. Cai, J.; Peng, P.; Huang, X.; Xu, B. A Hybrid Multi-phased Particle Swarm Optimization with Sub Swarms. In Proceedings of the 2020 International Conference on Artificial Intelligence and Computer Engineering (ICAICE), Beijing, China, 23–25 October 2020; pp. 104–108. [Google Scholar]
  11. Jawad, H.M.; Jawad, A.M.; Nordin, R.; Gharghan, S.K.; Abdullah, N.F.; Ismail, M.; Abu-AlShaeer, M.J. Accurate empirical path-loss model based on particle swarm optimization for wireless sensor networks in smart agriculture. IEEE Sens. J. 2019, 20, 552–561. [Google Scholar] [CrossRef]
  12. Saida, H.B.; Nordinb, R.; Abdullahb, N.F. Energy Models of Zigbee-Based Wireless Sensor Networks for Smart-Farm. J. Kejuruter. 2019, 31, 77–83. [Google Scholar] [CrossRef]
  13. Xu, X.; Tang, J.; Xiang, H. Data Transmission Reliability Analysis of Wireless Sensor Networks for Social Network Optimization. J. Sens. 2022, 2022, 3842722. [Google Scholar] [CrossRef]
  14. Wala, T.; Chand, N.; Sharma, A.K. Identification of optimal location points for efficient data gathering in IoT environment. Int. J. Commun. Syst. 2021, 34, e4843. [Google Scholar] [CrossRef]
  15. Gurewitz, O.; Shifrin, M.; Dvir, E. Data Gathering Techniques in WSN: A Cross-Layer View. Sensors 2022, 22, 2650. [Google Scholar] [CrossRef] [PubMed]
  16. Prakash, N.; Rajalakshmi, M.; Nedunchezhian, R. Optimized energy aware routing based on suitable based antlion group with advanced algorithm (SA-AOA) in wireless sensor network. Wirel. Pers. Commun. 2020, 113, 59–77. [Google Scholar] [CrossRef]
  17. Kaur, T.; Kumar, D. A survey on QoS mechanisms in WSN for computational intelligence based routing protocols. Wirel. Netw. 2020, 26, 2465–2486. [Google Scholar] [CrossRef]
  18. Sumathi, M.; Anitha, G.S. Link Aware Routing Protocol for Landslide Monitoring Using Efficient Data Gathering and Handling System. Wirel. Pers. Commun. 2020, 112, 2663–2684. [Google Scholar] [CrossRef]
  19. Lateef, H.H.; Burhan, A.M. Time-cost-quality trade-off model for optimal pile type selection using discrete particle swarm optimization algorithm. Civ. Eng. J. 2019, 5, 2461–2471. [Google Scholar] [CrossRef]
  20. Wang, T.; Luo, H.; Jia, W.; Liu, A.; Xie, M. MTES: An intelligent trust evaluation scheme in sensor-cloud-enabled industrial Internet of Things. IEEE Trans. Ind. Inform. 2019, 16, 2054–2062. [Google Scholar] [CrossRef]
  21. Tao, M.; Li, X.; Yuan, H.; Wei, W. UAV-Aided trustworthy data collection in federated-WSN-enabled IoT applications. Inf. Sci. 2020, 532, 155–169. [Google Scholar] [CrossRef]
  22. Haseeb, K.; Jan, Z.; Alzahrani, F.A.; Jeon, G. A Secure Mobile Wireless Sensor Networks based Protocol for Smart Data Gathering with Cloud. Comput. Electr. Eng. 2022, 97, 107584. [Google Scholar] [CrossRef]
  23. Refaee, E.A.; Shamsudheen, S. Trust-and energy-aware cluster head selection in a UAV-based wireless sensor network using Fit-FCM. J. Supercomput. 2021, 78, 5610–5625. [Google Scholar] [CrossRef]
  24. Ouyang, Y.; Liu, W.; Yang, Q.; Mao, X.; Li, F. Trust based task offloading scheme in UAV-enhanced edge computing network. Peer-to-Peer Netw. Appl. 2021, 14, 3268–3290. [Google Scholar] [CrossRef]
  25. Khan, T.; Singh, K.; Manjul, M.; Ahmad, M.N.; Zain, A.M.; Ahmadian, A. A Temperature-Aware Trusted Routing Scheme for Sensor Networks: Security Approach. Comput. Electr. Eng. 2022, 98, 107735. [Google Scholar] [CrossRef]
  26. Anwar, R.W.; Zainal, A.; Outay, F.; Yasar, A.; Iqbal, S. BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener. Comput. Syst. 2019, 96, 605–616. [Google Scholar] [CrossRef]
  27. Tang, J.; Liu, A.; Zhao, M.; Wang, T. An aggregate signature based trust routing for data gathering in sensor networks. Secur. Commun. Netw. 2018, 2018, 1–30. [Google Scholar] [CrossRef]
  28. Karthik, N.; Ananthanarayana, V. Trust based data gathering in wireless sensor network. Wirel. Pers. Commun. 2019, 108, 1697–1717. [Google Scholar] [CrossRef]
  29. Salim, A.; Osamy, W.; Aziz, A.; Khedr, A.M. SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs. J. Netw. Comput. Appl. 2022, 202, 103353. [Google Scholar] [CrossRef]
  30. Rajesh, L.; Mohan, H. EPO Based Clustering and Secure Trust-Based Enhanced LEACH Routing in WSN, in Sustainable Communication Networks and Application. In Proceedings of the ICSCN 2021, Sanya, China, 23–24 July 2021; pp. 41–54. [Google Scholar]
  31. Wang, T.; Zhang, G.; Bhuiyan, M.Z.A.; Liu, A.; Jia, W.; Xie, M. A Novel Trust Mechanism Based on Fog Computing in Sensor–Cloud System. Future Gener. Comput. Syst. 2018, 109, 573–582. [Google Scholar] [CrossRef]
  32. Wang, T.; Wang, P.; Cai, S.; Zheng, X.; Ma, Y.; Jia, W.; Wang, G. Mobile edge-enabled trust evaluation for the Internet of Things. Inf. Fusion 2021, 75, 90–100. [Google Scholar] [CrossRef]
  33. Mo, W.; Wang, T.; Zhang, S.; Zhang, J. An active and verifiable trust evaluation approach for edge computing. J. Cloud Comput. 2020, 9, 51. [Google Scholar] [CrossRef]
  34. Deb, K.; Agrawal, S.; Pratap, A.; Meyarivan, T. A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II. In Proceedings of the 6th International Conference, Paris, France, 18–20 September 2000; pp. 849–858. [Google Scholar]
  35. Mkaouer, W.; Kessentini, M.; Shaout, A.; Koligheu, P.; Bechikh, S.; Deb, K.; Ouni, A. Many-objective software remodularization using NSGA-III. ACM Trans. Softw. Eng. Methodol. 2015, 24, 1–45. [Google Scholar] [CrossRef]
  36. Yang, J.; Huo, J.; Al-Neshmi, H.M.M. Multi-Objective Decision-Making of Cluster Heads Election in Routing Algorithm for Field Observation Instruments Network. IEEE Sens. J. 2021, 21, 25796–25807. [Google Scholar] [CrossRef]
  37. Mythili, V.; Suresh, A.; Devasagayam, M.M.; Dhanasekaran, R. SEAT-DSR: Spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks. Cogn. Syst. Res. 2019, 58, 143–155. [Google Scholar] [CrossRef]
  38. Redha Bouakouk, M.; Abdelli, A.; Mokdad, L.; Ben Othman, J. Dealing with complex routing requirements using an MCDM based approach. arxiv 2022, arXiv:2204.01876. [Google Scholar]
  39. Wang, X.; Li, D.; Zhang, X.; Cao, Y. MCDM-ECP: Multi criteria decision making method for emergency communication protocol in disaster area wireless network. Appl. Sci. 2018, 8, 1165. [Google Scholar] [CrossRef]
  40. Ghosh, A.; Misra, S.; Udutalapally, V. Multiobjective Optimization and Sensor Correlation Framework for IoT Data Validation. IEEE Sens. J. 2022, 22, 23581–23589. [Google Scholar] [CrossRef]
  41. Al-Kaseem, B.R.; Taha, Z.K.; Abdulmajeed, S.W.; Al-Raweshidy, H.S. Optimized Energy–Efficient Path Planning Strategy in WSN with Multiple Mobile Sinks. IEEE Access 2021, 9, 82833–82847. [Google Scholar] [CrossRef]
  42. Jubair, A.M.; Hassan, R.; Aman, A.H.M.; Sallehudin, H. Social class particle swarm optimization for variable-length Wireless Sensor Network Deployment. Appl. Soft Comput. 2021, 113, 107926. [Google Scholar] [CrossRef]
  43. Liu, Q.; Wang, J.; Kang, S.A.; Thoreen, C.C.; Hur, W.; Ahmed, T.; Sabatini, D.M.; Gray, N.S. Discovery of 9-(6-aminopyridin-3-yl)-1-(3-(trifluoromethyl)phenyl)benzo[h][1,6]naphthyridin-2(1H)-one (Torin2) as a potent, selective and orally available mTOR inhibitor for treatment of cancer. J. Med. Chem. 2010, 54, 1473–1480. [Google Scholar] [CrossRef]
  44. Wang, H.; Tang, X.; Kuo, Y.-H.; Kifer, D.; Li, Z. A simple baseline for travel time estimation using large-scale trip data. ACM Trans. Intell. Syst. Technol. 2019, 10, 1–22. [Google Scholar] [CrossRef]
Figure 1. Simple additive weighting chart.
Figure 1. Simple additive weighting chart.
Sensors 23 05526 g001
Figure 2. Flowchart of social class multiobjective particle swarm optimization data-gathering algorithm.
Figure 2. Flowchart of social class multiobjective particle swarm optimization data-gathering algorithm.
Sensors 23 05526 g002
Figure 3. Set coverage comparison between NAGA-II and SC-MOPSO.
Figure 3. Set coverage comparison between NAGA-II and SC-MOPSO.
Sensors 23 05526 g003
Figure 4. Set coverage comparison between NAGA-III and SC-MOPSO. Red is median, Blue is Q1 and Q3. Black is minimum and Maximum.
Figure 4. Set coverage comparison between NAGA-III and SC-MOPSO. Red is median, Blue is Q1 and Q3. Black is minimum and Maximum.
Sensors 23 05526 g004
Figure 5. Hyper-volume results of SC-MOPSO and the benchmarks.
Figure 5. Hyper-volume results of SC-MOPSO and the benchmarks.
Sensors 23 05526 g005
Figure 6. Comparing SC-MOPSO with benchmarks in terms of the number of nondominated solutions.
Figure 6. Comparing SC-MOPSO with benchmarks in terms of the number of nondominated solutions.
Sensors 23 05526 g006
Figure 7. Boxplot representation of trust starting from first generation until the end. The + sign indicates the outliers.
Figure 7. Boxplot representation of trust starting from first generation until the end. The + sign indicates the outliers.
Sensors 23 05526 g007
Figure 8. Boxplot representation of energy starting from first generation until the end. The + sign indicates the outliers.
Figure 8. Boxplot representation of energy starting from first generation until the end. The + sign indicates the outliers.
Sensors 23 05526 g008
Figure 9. Boxplot representation of cost starting from first generation until the end. The + sign indicates the outliers.
Figure 9. Boxplot representation of cost starting from first generation until the end. The + sign indicates the outliers.
Sensors 23 05526 g009
Figure 10. Boxplot representation of time cost starting from first generation until the end. The + sign indicates the outliers.
Figure 10. Boxplot representation of time cost starting from first generation until the end. The + sign indicates the outliers.
Sensors 23 05526 g010
Figure 11. Boxplot representation of the noncoverage from the first generation until the end. The + sign indicates the outliers.
Figure 11. Boxplot representation of the noncoverage from the first generation until the end. The + sign indicates the outliers.
Sensors 23 05526 g011
Figure 12. Time series of E2E generated from our developed algorithm and the benchmarks.
Figure 12. Time series of E2E generated from our developed algorithm and the benchmarks.
Sensors 23 05526 g012
Figure 13. Time series of energy generated from our developed algorithm and the benchmarks.
Figure 13. Time series of energy generated from our developed algorithm and the benchmarks.
Sensors 23 05526 g013
Figure 14. Time series of PDR generated from our developed algorithm and the benchmarks.
Figure 14. Time series of PDR generated from our developed algorithm and the benchmarks.
Sensors 23 05526 g014
Figure 15. Time series of trust generated from our developed algorithm and the benchmarks.
Figure 15. Time series of trust generated from our developed algorithm and the benchmarks.
Sensors 23 05526 g015
Table 1. Overview of existing MCDM-based approaches in WSNs.
Table 1. Overview of existing MCDM-based approaches in WSNs.
ArticleApplicationMCDMOptimizationDomain
[36]ClusteringTOPSISGreedyWSNs
[37]RoutingSEAT-DSR-WSNs
[39]RoutingAHP and TOPSIS-WSNs
[40]Sensor selection--WSNs
[41]Path planning-multiobjective evolutionary algorithms (MOEAs)WSNs
Table 2. An overview of mathematical symbols used in the article and their meaning.
Table 2. An overview of mathematical symbols used in the article and their meaning.
Symbol Meaning
FAMMatrix of fitness adjacencies
N C Length of solutions inside the class
RAMReduced adjacency matrix
r a m i j Fitness value of class j concerning objective i
WCTWeak classes threshold
SCTStrong class threshold
N m s Number of mobile sinks
N R v i Number of rendezvous points for mobile sink i
N H i , j Number of hops at mobile sink i at rendezvous point j
T j k i Trust of sensor that sending data to mobile sink i at rv j
d i Distance travelled by mobile sink i
N i , j Number of sensors at the rendezvous point j for mobile sink i
E i , j , k Energy consumption at sensor k , rendezvous point j , and mobile sink i
R P j Rendezvous point
Table 3. The weights that are given to the criterion.
Table 3. The weights that are given to the criterion.
CriterionWeightValue
C(i)Very Less important 1
Less important2
important3
High important 4
very high importance5
Table 4. Pareto front table.
Table 4. Pareto front table.
NoAlternativeC1C2C3C4
Solution x ( i ) x ( i ) f 1 ( x i ) f 2 ( x i ) f 3 ( x i ) f 4 ( x i )
Table 5. Ranking of solutions provided in the Pareto front table.
Table 5. Ranking of solutions provided in the Pareto front table.
No.AlternativeC1C2C3C4Ranking
Weight w 1 w 2 w 3 w 4
Solution x ( i ) x ( i ) f 1 ( x i ) f 2 ( x i ) f 3 ( x i ) f 4 ( x i ) V i = j = 1 n w j f j ( x i )
Table 6. Two candidate solutions and their corresponding metameric variables.
Table 6. Two candidate solutions and their corresponding metameric variables.
Solution
s o l i = { N m s i , N R v i , j , N H i , j , k , { x i , j , , y } }
Mobile Sink
m s ( i , j )
Index of RV
R V ( i , j , k )
POS
[ x , y ]
Index of nHops
n h ( i , j , k )
NHops
s o l 1 = [ 2 , 3 , 2 , 150   400 , 200   144 ,
160   350 , 549   988 , 234   633 , 2 , 3 , 2 , 1 , 3 ]
m s ( 1 , 1 ) RV ( 1 , 1 , 1 ) [150 400] n h ( 1 , 1 , 1 ) 2
RV(1,1,2)[200 144]nh(1,1,2)3
RV(1,1,3)[160 350]nh(1,1,3)2
ms(1,2)RV(1,2,1)[549 988]nh(1,2,1)1
RV(1,2,2)[234 633]nh(1,2,2)3
s o l 2 = [ 3 , 2 , 1 , 3 , 237 , 645 , 455 , 744 ,
753 , 433 , 543 , 865 , 236 , 765 , [ 653 , 778 ] ]
ms(2,1)RV(2,1,1)[237 645]nh(2,1,1)3
RV(2,1,2)[455 744]nh(2,1,2)2
ms(2,2)RV(2,2,1)[753 433]nh(2,2,1)1
ms(2,3)RV(2,3,1)[543 865]nh(2,3,1)2
RV(2,3,2)[236 765]nh(2,3,2)1
RV(2,3,3)[653 778]nh(2,3,3)2
Table 7. Parameters values of SC-MOPSO and the experimental results.
Table 7. Parameters values of SC-MOPSO and the experimental results.
ParametersSC-MOPSONSGA IINSGA III
Lower boundary positions X = 0, y = 0X = 0, y = 0X = 0, y = 0
Coverage radius100100100
Higher boundary positionsX = 1000, y = 1000X = 1000, y = 1000X = 1000, y = 1000
Lower boundary dimensions [1,2,2][1,2,2][1,2,2]
Higher boundary dimensions[3,4,6][3,4,6][3,4,6]
Velocity min [0,0,0]N/AN/A
Velocity max [200,200,2]N/AN/A
Number of iterations 100100100
Repository size 200N/AN/A
Percentage mutation 1N/AN/A
Mutated ration 0.50.5N/A
Number of grids7N/AN/A
Alpha 0.1N/AN/A
Weight0.5N/AN/A
Scale 0.10.10.1
Shrink0.50.50.5
FractionN/A0.50.5
Min No. of particles3N/AN/A
Coverage radius 100100100
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Saad, M.A.; Jaafar, R.; Chellappan, K. Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks. Sensors 2023, 23, 5526. https://doi.org/10.3390/s23125526

AMA Style

Saad MA, Jaafar R, Chellappan K. Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks. Sensors. 2023; 23(12):5526. https://doi.org/10.3390/s23125526

Chicago/Turabian Style

Saad, Mohammed Ayad, Rosmina Jaafar, and Kalaivani Chellappan. 2023. "Variable-Length Multiobjective Social Class Optimization for Trust-Aware Data Gathering in Wireless Sensor Networks" Sensors 23, no. 12: 5526. https://doi.org/10.3390/s23125526

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop