You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

19 February 2024

Multi-Hop Clustering and Routing Protocol Based on Enhanced Snake Optimizer and Golden Jackal Optimization in WSNs

,
and
1
School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun 130022, China
2
Company’s R&D Department, Changchun Guanghua Micro-Electronics Equipment Engineering Center Co., Ltd., Changchun 130022, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Wireless Sensor Networks for Monitoring in Healthcare, Environment, and Industry

Abstract

A collection of smaller, less expensive sensor nodes called wireless sensor networks (WSNs) use their sensing range to gather environmental data. Data are sent in a multi-hop manner from the sensing node to the base station (BS). The bulk of these sensor nodes run on batteries, which makes replacement and maintenance somewhat difficult. Preserving the network’s energy efficiency is essential to its longevity. In this study, we propose an energy-efficient multi-hop routing protocol called ESO-GJO, which combines the enhanced Snake Optimizer (SO) and Golden Jackal Optimization (GJO). The ESO-GJO method first applies the traditional SO algorithm and then integrates the Brownian motion function in the exploitation stage. The process then integrates multiple parameters, including the energy consumption of the cluster head (CH), node degree of CH, and distance between node and BS to create a fitness function that is used to choose a group of appropriate CHs. Lastly, a multi-hop routing path between CH and BS is created using the GJO optimization technique. According to simulation results, the suggested scheme outperforms LSA, LEACH-IACA, and LEACH-ANT in terms of lowering network energy consumption and extending network lifetime.

1. Introduction

A WSN is a network made up of numerous sensor nodes dispersed within a certain region. To enable data collection, transfer, and analysis, these nodes can be wirelessly connected to one another [1,2]. WSNs are becoming more and more appealing for a wide range of application fields, including military applications, emergency response and security, environmental monitoring, health and medical, automated industrial control, smart cities, transportation and logistics, and entertainment [3,4,5]. WSNs’ low cost and ease of deployment have led to their widespread application in many different industries. But energy is scarce and sensor node batteries are hard to replace. Therefore, it is imperative to address the issue of the energy usage of networks and increase the network’s lifespan [6,7].
Given that the primary cause of node energy consumption is wireless communication [8], energy-efficient communication protocols are essential for drastically reducing network energy consumption and increasing network lifetime. Of these protocols, the clustering routing protocol is a notable example of an essential subset in the field of energy-efficient WSN communication protocols. It has proven to be a very successful method for energy conservation in WSNs with limited energy supplies. Organizing sensor nodes into multiple clusters, each with a CH and additional common nodes, is the core idea behind the cluster-based routing protocol. The common nodes in each cluster gather information and send it to the CH. Following data collection, the regular nodes’ data packets are received, combined, and processed by the CHs, which subsequently forward the processed and combined data to BS. The clustered routing protocol is essential for WSNs’ energy conservation since it reduces energy usage and helps manage overhead traffic [9,10,11,12].
The key idea of network clustering is intimately related to how well the clustered routing protocol affects network energy consumption. As communication distance reduces, so does the amount of energy used for communication inside clusters. Given that CHs use more energy to perform functions like receiving, fusing, and transferring data than normal nodes, choosing the right CHs is essential for enhancing network load balancing. Furthermore, the utilization of a multi-hop communication technique is efficacious in mitigating communication energy consumption, particularly in light of the high energy expenditure linked to long-distance communication. This work employs the SO optimization technique to solve the NP-hard problem [13,14,15,16,17] of optimal CH selection, and the best route between CHs is determined during the data transmission phase using the GJO optimization technique. Below is a summary of this research work’s main contributions:
(1)
The ESO-GJO method adds a Brownian motion function to the SO algorithm’s exploitation stage in order to avoid local optima.
(2)
The proposed approach uses SO to select the optimal CHs and considers variables such as energy and distance when building the fitness function.
(3)
The suggested algorithm uses GJO to determine the route from CH to BS and initializes the GJO population through backward learning.
The structure of the rest of the article is summarized below:
  • Section 2: Summarizes previous work in related fields.
  • Section 3: Introduces the energy model and network model.
  • Section 4: Offers a detailed introduction to the algorithm proposed in this article.
  • Section 5: Performance metrics simulation demonstration and comparison.
  • Section 6: Summarizes the research work in this paper and suggests future work to be carried out.

3. Preliminaries

This section furnishes details regarding the network model and energy model.

3.1. Network Model

Figure 1 illustrates the structure of the WSNs.
Figure 1. Cluster-based WSN with CHs.
The following factors are taken into account when creating the network model:
  • In WSNs, every sensor node has the same initial energy.
  • Distances between nodes are calculated using Euclidean distance.
  • Within the sensing area, sensor nodes are haphazardly placed and maintain a fixed location once deployed.
  • The BS can be positioned either within or outside the screening region, and it remains stationary.
  • The sensor node as a cluster member transmits the collected environmental data to the CH.
  • The aggregated data are transferred to the BS via CH.

3.2. Energy Model

The standard first-order radio model, as described in [30,31], is the foundation for this article’s estimation of the nodes’ energy consumption. Equation (1) gives the transmitting node’s energy usage, which is referred to as E T X ( l , d ) . This computation is useful when a node sends l bits of data to a receiving node that is located d away. Furthermore, Equation (2) establishes the receiving node’s energy consumption, which is represented by the symbol E R X ( l ) .
E T X ( l , d ) = l E e l e c + l ϵ f s d 2 , d d 0 l E e l e c + l ϵ m p d 4 , d > d 0
E R X ( l ) = l E e l e c
Here, ϵ f s and ϵ m p , respectively, represent the energy consumption coefficients of the amplifier circuit for the free-space fading model and the multipath fading model. Furthermore, the transmission and receiving circuits’ energy consumption coefficient is denoted by E e l e c . Equation (3) establishes the threshold, which is represented as d 0 and acts as the border between the two attenuation models. The transmission uses the free-space fading model if the distance d is less than d 0 , which results in an energy consumption of l ϵ f s d 2 for the amplifier circuit. On the other hand, the multipath fading model is applied where d > d 0 , resulting in an energy consumption of l ϵ m p d 4 for the amplifier circuit.
d 0 = ϵ f s ϵ m p
Data are received by the CH from the cluster, and it uses some energy to transfer the aggregated data to the BS. Consequently, it becomes imperative for the CH to possess a sufficient reservoir of energy to effectively relay data to the BS. The energy level of the CH is represented by the letter E C H ,
E C H = l · n k · E e l e c + E D A + l · ε m p · d t o B S 4
where E e l e c is the energy used by the transmitter. E D A is the energy necessary for data aggregating, and a data packet is represented by the symbol l. When transmitting over long distances to a base station, as shown by d t o B S 4 , the transmitter amplifier’s energy usage is represented by ϵ m p . The energy consumption of non-cluster heads is shown by E N C H .
E N C H = l · E e l e c + l · ε f s · d t o C H 4
Within a specific context, the symbol l denotes a data packet, E e l e c denotes the transmitter’s energy consumption, ϵ f s denotes a transmitter amplifier in a free condition, d t o B S 2 denotes the CH’s short distance, and d t o B S 4 denotes the BS’s long distance.

4. Proposed Method

We will provide a detailed introduction to the proposed ESO-GJO protocol in this section. Each iteration of the ESO-GJO protocol encapsulates both the CH selection phase and the subsequent data transmission stage, amalgamating these crucial processes within every round. In the cluster head selection phase, we use the SO optimization algorithm for cluster head selection and in the data transmission phase, we use the GJO optimization algorithm for optimal path selection. In addition, the fitness function plays a crucial role in the SO algorithm and GJO, which is an indicator of the degree of superiority of a solution, and provides a search direction for the algorithm. Through the rational design of the fitness function, we can help the algorithm to find the optimal solution of the problem faster. The choice of fitness function should be determined according to the needs of the specific problem, and it can be defined based on the constraints of the problem and the objective function. Figure 2 shows the flow block diagram of the ESO-GJO algorithm.
Figure 2. ESO-GJO flowchart.

4.1. CH Selection Stage

4.1.1. CH Selection Using SO

In this section, we describe how to use the SO [32] optimization algorithm for optimal cluster head set selection for wireless sensor networks. The suggested algorithm’s main goal is to carefully choose CHs from the pool of regular sensor nodes, strategically integrating considerations for energy conservation. This overarching aim is geared towards proactively elongating the network’s operational lifetime.
An individual in SO symbolizes a whole solution. It represents the ideal locations of the CHs for the proposed algorithm’s CH selection. Let X = X i , 1 ( t ) , X i , 2 ( t ) , X i , 3 ( t ) , , X i , D ( t ) represent the ith member of the population, and let X ( i , D ) ( t ) = x i d ( t ) , y i d ( t ) , 1 i N , 1 d D represent each component’s coordinates for the sensor nodes chosen to serve as CH. Every single person has the same number of dimensions represented by the letter D; this corresponds to the quantity of CH.
The snakes choose a random position during the exploration phase and adjust their position in relation to it if Q < 0.25 . The following steps are followed to mimic the exploration phase:
X i , m t + 1 = X r a n d , m ( t ) ± c 2 × A m × X m a x X m i n × r a n d + X m i n
The ith male position is shown by X i , m , the random male position is indicated by X r a n d , m , and the male’s ability to find food is indicated by A m . The calculation for this is as follows:
A m = e x p f r a n d , m f i , m
where c 2 = 0.05 is defined, the fitness of X r a n d , m is denoted by f r a n d , m , and the ith member of the male group’s fitness is denoted by f i , m .
X i , f = X r a n d , f t + 1 ± c 2 × A f × X m a x X m i n × r a n d + X m i n
where A f is the female’s capacity to locate food and may be computed as follows; a random female’s position is indicated by X r a n d , f ; and position of the ith female is indicated by X i , f .
A f = e x p f ( r a n d , f ) / f ( i , f )
In this case, the fitness of X r a n d , f is represented by f ( r a n d , f ) , and the ith member of the female group’s fitness is denoted by f i , f .
The constant coefficient c 3 is utilized to update the snake’s position throughout the exploiting phase. In this study, instead of using the constant coefficient c 3 , we use the Brownian motion function to keep the algorithm from reaching a local optimum. One of many physical processes in which a quantity continuously fluctuates between tiny, random fluctuations is called Brownian motion. It is believed that Brownian motion is a Markov process coupled with a Gaussian process. The normal (Gaussian) equation was altered by the algorithm’s changes to the size and number of agents, which are used to determine the Brownian motion steps, and the Brownian motion was finalized (Equation (10))
f ( δ ) = 1 2 π σ e x p ( δ μ ) 2 2 σ 2
The following formula can be used to define the temperature Temp.
T e m p = e x p t T
Here, t represents the current iteration, and T signifies the maximum number of iterations.
The definition of the quantity of food is Q. The following formula can be used to determine how much food is consumed.
Q = c 1 e x p t T T
where c 1 = 0.5 . If the t e m p e r a t u r e > 0.6 , snakes only travel in the direction of food.
X ( i , j ) ( t + 1 ) = X f o o d ± f ( δ ) × T e m p × r a n d × X f o o d X ( i , j ) ( t )
where X f o o d represents the best individual’s position and X i , j represents the individual’s position. The snake will go into either the fighting or mating mode if the temperature is less than 0.6.
In Fight Mode,
X i , m t + 1 = X i , m ( t ) + f ( δ ) × F M × r a n d × Q × X b e s t , f X i , m ( t )
where X i , m represents the male position, F M denotes the fighting prowess of the male agent, and X b e s t , f represents the best individual’s position within the female group.
X i , f t + 1 = X i , f ( t ) + f ( δ ) × F F × r a n d × Q × X b e s t , m X i , f ( t )
where F F denotes the female agent’s combat prowess, X i , f indicates that she is the top member of the male group, and X b e s t , m represents her position.
F M is represented by Equation (16) and F F is represented by Equation (17):
F M = e x p f b e s t , f f i
F F = e x p f b e s t , m f i
where f i is the agent fitness, f b e s t , m is the best agent of the male group, and f b e s t , f is the best agent of the female group. In Mating Mode,
X i , m t + 1 = X i , m ( t ) + f ( δ ) × M m × r a n d × Q × X i , f ( t ) X i , m ( t )
X i , f t + 1 = X i , f ( t ) + f ( δ ) × M f × r a n d × Q × X i , m ( t ) X i , f ( t )
where M m & M f denotes the ability of the male and female to mate, respectively; X i , f and X i , m , respectively, denote the positions of the ith agents within the female and male groups. These values can be calculated as follows:
M m = e x p f i , f f i , m
M f = e x p f i , m f i , f
Replacement of worst males and females selected from hatched eggs:
X w o r s t , m = X m i n + r a n d × X m a x X m i n
X w o r s t , f = X m i n + r a n d × X m a x X m i n
where X w o r s t , m is the worst individual in the male group; X w o r s t , f is the worst individual in the female group.
Finally, the globally optimal individual vector is used as the optimal CH set.

4.1.2. Fitness Function of SO

The fitness function used by the SO algorithm to determine the ideal set of CHs is made up of the following variables and formulas.
(1)
Energy consumption of CH:
This is the first parameter of the fitness function. Our goal is to prioritize nodes with low energy consumption as CH. Let E c C H i represent the C H i ’s energy consumption, and assume that 1 i K , K is the number of CHs.
Consequently, minimizing the objective function f 1 is our aim:
f 1 = 1 K i = 1 K E c C H i
(2)
Distance between node and BS:
This is the second parameter of the fitness function. Our goal is to prioritize the node with the shortest distance to the common node and BS as the CH. Let D s j , C H i be the distance from intra-cluster node s j to cluster head node C H i . Let D C H i , B S D C H i , B S be the distance from C H i to BS where 1 i K , K represents the quantity of CHs and 1 j M , M represents the quantity of cluster members. Consequently, minimizing the objective function f 2 is our aim:
f 2 = i = 1 K 1 M j = 1 M D s j , C H i + D C H i , B S
(3)
Node Degree of CH: This is the third parameter of the fitness function. High-degree nodes are given preference to become CH in the ESO-GJO CH selection process. Consequently, our goal is to maximize the objective function f 3 as follows
f 3 = N d e g C H i
Our suggested SO algorithm’s fitness function is to minimize the aforementioned f 1 , f 2 , and f 3 functions. As a result, the following is the fitness function for our algorithm:
f = δ 1 × f 1 + δ 2 × f 2 + δ 3 × f 3
where the weights for the goal function are provided by the constants δ 1 , δ 2 , and δ 3 . The total of these constants ought to equal one. Minimizing the cumulative objective function is our aim.

4.2. Data Routing Stage

4.2.1. Routing Algorithm Using GJO

The goal of the routing problem we will now solve is to reduce the maximum possible transmission distance between CHs in a routing path. The goal of the routing problem we will now solve is to reduce the maximum possible transmission distance between CHs in the routing path. This section describes how to use the GJO [33] optimization algorithm for optimal path selection for wireless sensor networks.
The starting population is generated by random initialization in the GJO methodology, yet this approach is vulnerable to the issue of an excessively dispersed or locally concentrated population.
Due to this circumstance, the population diversity of the classic GJO algorithm is inadequate, which significantly impairs the ensuing iterative optimization search.
Thus, in order to broaden the algorithm’s search space and boost population variety, we chose to initiate the population in this study using a backward learning technique.
The following is the definition of the reverse learning strategy:
Let X i t = x i , 1 t , x i , 2 t , , x i , j t , , x i , d t be the ith individual of the current population. The general inverse learning strategy produces a general inverse solution of X i t as O i t = o i , 1 t , o i , 2 t , , o i , j t , , o i , d t .
o i , j t = Z ( k ) A i t + B i t x i , j t
Z ( k ) = a Z ( k 1 ) + c m o d M
A j t = m i n x ( i , j ) t , B j t = m a x x ( i , j ) t
M is an enormous positive number, a is the multiplier of the interval 0 , M , and c is incremental. Z ( 0 ) is the seed of the random number. Z ( k ) approximately obeys a uniform distribution in the interval [ 0 , M 1 ] ; its maximum period is M, and Z ( k ) / M approximately obeys a uniform distribution in the interval [ 0 , 1 ) .
The two primary steps of the GJO algorithm are finding prey and encircling and attacking it. These processes represent the exploration and exploitation of populations, respectively.
(1)
The stage of exploration or hunting for prey
This section proposes GJO’s exploration plan. Jackals can sense and follow their prey due to their innate instincts, yet sometimes the prey escapes and is hard to catch. As a result, the females follow the males and lead the pack in search of additional prey.
Y 1 ( t ) = Y M ( t ) E . Y M ( t ) r l . P r e y ( t )
Y 2 ( t ) = Y F M ( t ) E . Y F M ( t ) r l . P r e y ( t )
where t is the current iteration. P r e y ( t ) represents the prey’s position vector, while Y M ( t ) and Y F M ( t ) represent the locations of the male and female jackals. The updated positions of the male and female jackals with respect to the prey are shown by Y 1 ( t ) and Y 2 ( t ) .
E indicates the prey’s evasive energy and is represented by Equation (33):
E = E 1 E 0
The prey’s initial energy level is represented by E 0 , while its decreasing energy is represented by E 1 .
E 0 = 2 r 1
where r can be any integer between 0 and 1.
E 1 = c 1 1 ( t / T )
where c 1 = 1.5 ; the rounds of iteration are denoted by T and r l is calculated by Equation (36):
r l = 0.05 L F ( y )
LF is calculated by Equation (37):
L F ( y ) = 0.01 × ( μ × σ ) / v ( 1 / β )
where μ and v are random numbers between 0 and 1, β = 1.5
Y ( t + 1 ) = Y 1 ( t ) + Y 2 ( t ) / 2
(2)
The stage of exploitation or encircling and leaping for prey
The mathematical model of joint roundup of male and female jackals is shown in Equations (39) and (40):
Y 1 ( t ) = Y M ( t ) E . r l . Y M ( t ) P r e y ( t )
Y 2 ( t ) = Y F M ( t ) E . r l . Y F M ( t ) P r e y ( t )
Finally, the position vector Y 1 is used as the optimal path.

4.2.2. Fitness Function of GJO

The GJO method builds the fitness function using the following parameters in order to find the optimal route between CH and BS:
(1)
Distance between CH and BS: The further the distance between the CH and the BS, the more energy is required to transmit the data. Therefore, the CH close to the BS is selected to form the best path. Consequently, minimizing the objective function f 1 is our aim:
f 1 = 1 / K ( i = 1 ) K D C H i , B S
(2)
The ratio of the distance between CH and BS to the inter-cluster head distance:
The fitness function’s second parameter will be this ratio. Here, maximizing the inter-cluster distance and minimizing the distance between C H i and BS are the main objectives. Consequently, minimizing the objective function f 2 is our aim:
f 2 = ( i = 1 ) K D C H i , B S / ( i = 1 , j = 1 ) K D C H i , C H j
(3)
Residual energy of CH: This is the fitness function’s third parameter. Our goal is to prioritize the CH with more remaining energy as the next hop. Let E r e s C H i denote the residual energy of CH; K denotes the number of CHs. Consequently, our goal is to maximize the objective function f 3 as follows:
f 3 = i = 1 K E r e s C H i
The following three functions f 1 , f 2 , and f 3 , are to be minimized as the fitness function for our suggested GJO method. As a result, the following is the fitness function for our algorithm:
f = ω 1 × f 1 + ω 2 × f 2 + ω 3 × 1 f 3
where ω 1 , ω 2 , and ω 3 are constants that give the objective functions weights. The total of these constants ought to equal 1. Minimizing the objective function is our aim.

4.3. The Pseudo-Code of the Proposed Algorithm

Algorithm 1 is a pseudo-code that uses the SO algorithm to select the best set of CHs and Algorithm 2 is a pseudo-code that uses the GJO method to find the best route between CH and BS.
Algorithm 1 SO-Clustering
  • Input: Set of sensor nodes: S = s 1 , s 2 , s 3 , , s n
  • Output:  Optimal positions of cluster heads C H = C H 1 , C H 2 , C H 3 , , C H m
  •  Step1: Initialize population X;
  •  Step2:
  • for i = 1:N do
  •   Calculate F i t n e s s X i using Equations (24)–(27);
  • end for
  •  Take the minimum value of Fitness as G b e s t ;
  •  Take the individual whose Fitness value is G b e s t as X f o o d ;
  •  /*Diving the swarm into two equal groups males and females*/
  •  Define N m = N 2 as the male individual numbers;
  •  Define N f = N N m as the female individual numbers;
  • for i = 1:N do
  •   Calculate F i t n e s s m X i , m ;
  • end for
  • for i = 1:N do
  •   Calculate F i t n e s s f X i , f ;
  • end for
  •  Take the minimum value of F i t n e s s m as f b e s t , m ;
  •  Take the minimum value of F i t n e s s f as f b e s t , f ;
  •  Take the male individual whose F i t n e s s m value is f b e s t , m as X b e s t _ m ;
  •  Take the female individual whose F i t n e s s f value is f b e s t , f as X b e s t _ f ;
  •  Step3:
  • while  t < t m a x   do
  •   Define T e m p using Equation (11);
  •   Define food Quantity Q using Equation (12);
  •   if  Q < 0.25   then
  •    /*Exploration phase (no food)*/
  •    for i = 1: N m  do
  •     Define A m using Equation (7);
  •     Update position of X n e w _ m using Equation (6);
  •    end for
  •    for i = N f :N do
  •     Define A f using Equation (9);
  •     Update position of X n e w _ f using Equation (8);
  •    end for
  •   else
  •    /*Exploitation phase (food exists)*/
  •    if  T e m p > 0.6   then
  •     for i = 1: N m  do
  •      Using the Brownian motion function to replace the constant coefficients C 3 ,
         Update position of X i , n e w _ f using Equation (13);
  •     end for
  •     for i = N F : N  do
  •      Using the Brownian motion function to replace the constant coefficients C 3 ,
         Update position of X i , n e w _ f using Equation (13);
  •     end for
  •    else
  •     if  r a n d > 0.6   then
  •      /*Fight Mode*/
  •      for i = 1: N m  do
  •       Define F M using Equation (16);
  •       Using the Brownian motion function to replace the constant coefficients C 3 ,
          Update position of X n e w _ m using Equation (14);
  •      end for
  •      for i = N f :N do
  •       Define F M using Equation (17);
  •       Using the Brownian motion function to replace the constant coefficients C 3 ,
          Update position of X n e w _ f using Equation (15);
  •      end for
  •     else
  •      /*Mating Mode*/
  •      for i = 1: N m  do
  •      Define M m using Equation (20);
  •      Using the Brownian motion function to replace the constant coefficients C 3 ,
         Update position of X n e w _ m using Equation (18);
  •      end for
  •      for i = N f :N do
  •       Define M f using Equation (21);
  •       Using the Brownian motion function to replace the constant coefficients C 3 ,
          Update position of X n e w _ f using Equation (19);
  •      end for
  •     end if
  •     Change the worst male and female Equations (22) and (23);
  •    end if
  •   end if
  •   if  f b e s t , m < f b e s t , f   then
  •     G b e s t = f ( b e s t , m ) ;
  •     X f o o d = X b e s t _ m ;
  •   else
  •     G b e s t = f ( b e s t , f ) ;
  •     X f o o d = X b e s t _ f ;
  •   end if
  •    t = t + 1 ;
  • end while
  •  Step4: Repeat Step3 until it reaches the maximum number of iterations;
  •  Step5: Return best solution X f o o d /*Optimal cluster head*/
Algorithm 2 GJO-Routing
  • Input: Set of cluster heads C H = C H 1 , C H 2 , C H 3 , , C H m
  • Output: Route R
  •  Initializing prey population Y using Equations (28)–(30);
  •  Step2:
  • while  t < t m a x   do
  •   for i = 1:N do
  •    Calculate F i t n e s s Y i using Equations (41)–(44);
  •   end for
  •   Sort the Fitness;
  •   The first value of F i t n e s s as f 1 (Male Jackal position);
  •   Take the prey whose Fitness value is f 1 as Y 1 ;
  •   The second value of F i t n e s s as f 2 (FeMale Jackal position);
  •   Take the prey whose Fitness value is f 2 as Y 2 ;
  •   for i = 1:N do
  •    Define the Evading Energy E of prey using Equations (33)–(35);
  •    Define r l using Equations (36) and (37);
  •    if  E > 1 then
  •     Update the position of male jackal Y 1 using Equation (31);
  •     Update the position of female jackal Y 2 using Equation (32);
  •     Update jackal position Y n e w using Equation (38);
  •    else
  •     Update the position of male jackal Y 1 using Equation (39);
  •     Update the position of female jackal Y 2 using Equation (40);
  •     Update jackal position Y n e w using Equation (38);
  •    end if
  •   end for
  •   for i = 1:N do
  •   if  F i t n e s s Y ( i , n e w ) < F i t n e s s Y i   then
  •     F i t n e s s Y i = F i t n e s s Y ( i , n e w ) ;
  •     Y i = Y ( i , n e w ) ;
  •   end if
  • end for
  •  Sort the F i t n e s s ;
  • Y 1 = b e s t p r e y
  • t = t + 1 ;
  • end while
  • Step 3: Repeat Step 2 until it reaches the maximum number of iterations;
  • Step 4: Return Y 1 , R R + Y i , 1

5. Simulation Results

5.1. Simulation Settings

Using the 100 × 100, 200 × 200, 300 × 300 (m2) setup area range for the experiment, compare the clustering impact of the technique proposed with the other three comparative algorithms. The following algorithms are compared with the suggested approaches: PSO-LSA [29], LEACH-IACA [22], and LEACH-ANT [23]. Identical sets of network input setup parameters are used by all methods. The simulation related parameters are shown in Table 1.
Table 1. Simulation-related parameter.

5.2. Residual Energy

This performance metric is the sum of the remaining energy of the surviving nodes in each round. For the length of the simulation, a fixed initial energy of 0.5 J has been used. The ESO-GJO technique presented in this research is compared with PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT residual energy for a scenario with 100 nodes. The results are displayed in Figure 3a. It is noted that LEACH-IACA and LEACH-ANT lost their remaining energy after 1500 cycles. On the other hand, PSO-LSA,EPOA-CHS, and ESO-GJO managed to live with 15.29 J, 16.41 J, and 18.13 J, respectively. All nodes of PSO-LSA and EPOA-CHS die after the 2400th round. However, the proposed ESO-GJO still has 0.08 J of energy remaining. Figure 3b shows the results of comparing the residual energy of ESO-GJO with other protocols for the scenario of 200 nodes. It is observed that at the end of 1000 rounds, all the energies of LEACH-IACA and LEACH-ANT are exhausted. However, PSO-LSA, EPOA-CHS, and ESO-GJO have 55.30 J, 55.01 J, and 56.79 J remaining, respectively. With PSO-LSA, all nodes die at round 2500. However, the proposed ESO-GJO still has 2.67 J of energy remaining. Figure 3c shows the results of comparing the residual energy of ESO-GJO with other protocols for the scenario of 300 nodes. It is observed that at the end of 800 rounds, all the energies of LEACH-IACA and LEACH-ANT are exhausted. However, PSO-LSA,EPOA-CHS, and ESO-GJO have 94.14 J, 94.95 J, and 95.40 J remaining, respectively. With PSO-LSA and EPOA-CHS, all nodes die at round 2350. However, the proposed ESO-GJO still has 0.05 J of energy remaining. Figure 3a–c show that the proposed ESO-GJO increases network residual energy over the compared LSA, LEACH-IACA, and LEACH-ANT protocols.
Figure 3. Residual energy in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.

5.3. Network Lifetime

This section compares the network lifetimes of the PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT algorithms with the suggested ESO-GJO algorithm. The time span from the sensor network’s inception to the death of the final node is referred to in this study as the network lifetime. Four different metrics, FND (First Node Death), HND (Half Nodes Death), MND (Most Nodes Death), and LND (Last Node Death), are analyzed for different protocols. Table 2 records the number of rounds in which each indicator occurs in different scenarios for ESO-GJO, PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT. Figure 4a–c shows more visually the results of ESO-GJO compared to other protocols for the four metrics in the section above for scenarios with 100 nodes, 200 nodes, and 300 nodes. Consequently, our suggested ESO-GJO can more effectively increase the network lifetime.
Table 2. Round and lifetime.

5.4. Live Nodes Number

The total lifespan of a WSN is indicated by the number of live nodes in the network. The proposed ESO-GJO protocol and the other three protocols are compared for the number of surviving nodes every round for the scenarios of 100, 200, and 300 nodes during the course of the network lifetime in Figure 5a–c. In the case of 100 sensors, the proposed ESO-GJO algorithm extends the network lifetime by about 8.14%, 5.24%, 119.87%, and 135.76%, respectively, compared to other routing protocols. In the case of 200 sensors, the proposed ESO-GJO algorithm extends the network lifetime by about 22.3%, 8.46%, 192.2%, and 180.6%, respectively, compared to other routing protocols. In the case of 300 sensors, the proposed ESO-GJO algorithm extends the network lifetime by about 16.9%, 4.97%, 181.5%, and 363.5%, respectively, compared to the other three protocols. As a result, the ESO-GJO protocol’s suggested approach can successfully lower energy dissipation and increase the network’s lifespan.

5.5. Packet Delivery

The total number of packets that the BS has received is the definition of this network performance indicator. Regarding network throughput, the ESO-GJO approach performs better than the LSA, LEACH-IACA, and LEACH-ANT algorithms in Figure 6a (100 nodes). Specifically, ESO-GJO’s network throughput outperformed PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT by 7.89%, 5.44%, 119.3%, and 133.1%, respectively. The ESO-GJO algorithm outperforms PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT in terms of network throughput when Figure 6b (200 nodes) is considered. Specifically, ESO-GJO’s network throughput outperformed PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT by 6.62%, 4.70%, 167.36%, and 156.22%, respectively. Finally, the ESO-GJO algorithm outperforms PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT in terms of network throughput when Figure 6c (300 nodes) is considered. Specifically, ESO-GJO’s network throughput outperformed PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT by 1.02%, 0.58%, 308.26%, and 149.70%, respectively. These outcomes unequivocally demonstrate the improved network throughput that the ESO-GJO algorithm achieves in many contexts as well as its superiority over the other protocols.
Figure 4. Network life cycle. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 5. Live nodes number in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 6. Packet delivery in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.

5.6. Energy Consumption

This network performance metric displays the total energy utilized by all of the active nodes in the network throughout each cycle. Based on simulation results, Figure 7a–c illustrate that the suggested ESO-GJO model outperforms PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT. By taking the objective function’s energy impact into account, the ESO-GJO algorithm reduces network energy consumption and lengthens the network’s lifespan.
Figure 7. Energy consumption in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.

6. Conclusions

We have created a novel ESO-GJO method for energy-constrained WSNs in this study. In order to minimize energy usage, we construct an objective function and select the set of optimal CHs. The experimental results have been published together with a comparison of the LSA, LEACH-IACA, and LEACH-ANT algorithms that are currently in use. In the test scenarios with 100, 200, and 300 sensor nodes, respectively, the algorithm is run. The results indicate that, in comparison to alternative protocols, the strategy outlined in this study is successful in reducing network energy consumption and improving network lifetime. However, the algorithm still has limitations; the performance metric FND falls short in large-scale networks. With the aforementioned restrictions in mind, future research can build on these findings to prolong the FND emergence period for large-scale WSNs.

Author Contributions

Conceptualization, Z.W.; Methodology, Z.W.; Software, Z.W.; Validation, Z.W.; Formal analysis, Z.W. and P.X.; Investigation, Z.W.; Resources, P.X.; Data curation, Z.W.; Writing—original draft, Z.W.; Writing—review & editing, Z.W. and P.X.; Visualization, Z.W.; Supervision, Z.W.; Project administration, Z.W.; Funding acquisition, J.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Project of Industrial Technology Research and Development in Jilin Province (2023C031-3), Science and Technology Development Program of Jilin Province (20220508152RC).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

Authors Zhen Wang and Pengzhan Xing were employed by the company Changchun Guanghua Micro-Electronics Equipment Engineering Center Co., Ltd. The remaining author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Fischione, C. An Introduction to Wireless Sensor Networks; KTH Royal Institute of Technology: Stockholm, Sweden, 2014. [Google Scholar]
  2. BenSaleh, M.S.; Saida, R.; Kacem, Y.H.; Abid, M. Wireless Sensor Network Design Methodologies: A Survey. J. Sens. 2020, 2020, 9592836. [Google Scholar] [CrossRef]
  3. Kandris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar] [CrossRef]
  4. Aranda, J.; Mendez, D.; Carrillo, H. Multimodal wireless sensor networks for monitoring applications: A review. J. Circuits, Syst. Comput. 2020, 29, 2030003. [Google Scholar] [CrossRef]
  5. Mohamed, R.E.; Saleh, A.I.; Abdelrazzak, M.; Samra, A.S. Survey on wireless sensor network applications and energy efficient routing protocols. Wirel. Pers. Commun. 2018, 101, 1019–1055. [Google Scholar] [CrossRef]
  6. Priyadarshi, R.; Gupta, B.; Anurag, A. Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues. J. Supercomput. 2020, 76, 7333–7373. [Google Scholar] [CrossRef]
  7. Amutha, J.; Sharma, S.; Nagar, J. WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wirel. Pers. Commun. 2020, 111, 1089–1115. [Google Scholar] [CrossRef]
  8. Croce, S.; Marcelloni, F.; Vecchio, M. Reducing power consumption in wireless sensor networks using a novel approach to data aggregation. Comput. J. 2008, 51, 227–239. [Google Scholar] [CrossRef]
  9. Fanian, F.; Rafsanjani, M.K. Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. J. Netw. Comput. Appl. 2019, 142, 111–142. [Google Scholar] [CrossRef]
  10. Wang, Q.; Lin, D.; Yang, P.; Zhang, Z. An energy-efficient compressive sensing-based clustering routing protocol for WSNs. IEEE Sens. J. 2019, 19, 3950–3960. [Google Scholar] [CrossRef]
  11. Shafiq, M.; Ashraf, H.; Ullah, A.; Tahira, S. Systematic Literature Review on Energy Efficient Routing Schemes in WSN—A Survey. Mob. Netw. Appl. 2020, 25, 882–895. [Google Scholar] [CrossRef]
  12. Nakas, C.; Kandris, D.; Visvardis, G. Energy efficient routing in wireless sensor networks: A comprehensive survey. Algorithms 2020, 13, 72. [Google Scholar] [CrossRef]
  13. Daniel, A.; Balamurugan, K.M.; Vijay, R.; Arjun, K. Energy aware clustering with multihop routing algorithm for wireless sensor networks. Intell. Autom. Soft Comput. 2021, 29, 233–246. [Google Scholar] [CrossRef]
  14. Saleem, M.M.; Alabady, S.A. Improvement of the WMSNs lifetime using multi-hop clustering routing protocol. Wirel. Netw. 2022, 28, 3173–3183. [Google Scholar] [CrossRef]
  15. Pantazis, N.A.; Nikolidakis, S.A.; Vergados, D. Energy-efcient routing protocols in wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 551–591. [Google Scholar] [CrossRef]
  16. Behera, T.M.; Samal, U.C.; Mohapatra, S.K.; Khan, M.S.; Appasani, B.; Bizon, N.; Thounthong, P. Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance. Electronics 2022, 11, 2282. [Google Scholar] [CrossRef]
  17. Al Aghbari, Z.; Khedr, A.M.; Osamy, W.; Arif, I.; Agrawal, D.P. Routing in wireless sensor networks using optimization techniques: A survey. Wirel. Pers. Commun. 2020, 111, 2407–2434. [Google Scholar] [CrossRef]
  18. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient commu nication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; Volume 1, p. 10. [Google Scholar]
  19. Liao, Q.; Zhu, H. An Energy Balanced Clustering Algorithm Based on LEACH Protocol. Appl. Mech. Mater. 2013, 341–342, 1138–1143. [Google Scholar] [CrossRef]
  20. Jerbi, W.; Guermazi, A.; Trabelsi, H. O-LEACH of routing protocol for wireless sensor networks. In Proceedings of the 13th International Conference Computer Vision Graphics and Image Processing (CGiV), Beni Mellal, Morocco, 29 March–1 April 2016; pp. 399–404. [Google Scholar]
  21. Neto, J.H.B.; Cardoso, A.R.; Celestino, J., Jr. MH-LEACH: A Distributed Algorithm for Multi-Hop Communication. Wirel. Sens. Netw. 2014, 2014, 55–61. [Google Scholar]
  22. Long, C.; Liao, S.; Zou, X.; Zhou, X.; Zhang, N. An improved LEACH multi-hop routing protocol based on intelligent ant colony algorithm for wireless sensor networks. J. Inf. Comput. Sci. 2014, 11, 2747–2757. [Google Scholar] [CrossRef]
  23. Agarwal, T.; Kumar, D.; Prakash, N.R. Prolonging Network Lifetime Using Ant Colony Optimization Algorithm on LEACH Protocol for Wireless Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2010; pp. 634–641. [Google Scholar]
  24. Natesan, G.; Konda, S.; de Prado, R.P.; Wozniak, M. A Hybrid Mayfly-Aquila Optimization Algorithm Based Energy-Efficient Clustering Routing Protocol for Wireless Sensor Networks. Sensors 2022, 22, 6405. [Google Scholar] [CrossRef]
  25. Yao, Y.; Xie, D.; Li, Y.; Wang, C.; Li, Y. Routing Protocol for Wireless Sensor Networks Based on Archimedes Optimization Algorithm. IEEE Sens. J. 2022, 22, 15561–15573. [Google Scholar] [CrossRef]
  26. Wang, Z.; Duan, J.; Xu, H.; Song, X.; Yang, Y. Enhanced Pelican Optimization Algorithm for Cluster Head Selection in Heterogeneous Wireless Sensor Networks. Sensors 2023, 23, 7711. [Google Scholar] [CrossRef] [PubMed]
  27. Punithavathi, R.; Kurangi, C.; Balamurugan, S.P.; Pustokhina, I.V.; Pustokhin, D.A.; Shankar, K. Hybrid BWO-IACO algorithm for cluster based routing in wireless sensor networks. Comput. Mater. Contin. 2021, 69, 433–449. [Google Scholar] [CrossRef]
  28. Vinitha, A.; Rukmini, M.S.S.; Sunehra, D. Energy-efficient multihop routing in WSN using the hybrid optimization algorithm. Int. J. Commun. Syst. 2020, 33, e4440. [Google Scholar] [CrossRef]
  29. Senthil, G.A.; Raaza, A.; Kumar, N. Internet of Things Energy Efficient Cluster-Based Routing Using Hybrid Particle Swarm Optimization for Wireless Sensor Network. Wirel. Pers. Commun. 2021, 122, 2603–2619. [Google Scholar] [CrossRef]
  30. Mantri, D.; Prasad, N.R.; Prasad, R. Grouping of clusters for efficient data aggregation (GCEDA) in wireless sensor network. In Proceedings of the 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 22–23 February 2013; pp. 132–137. [Google Scholar]
  31. Sajwan, M.; Gosain, D.; Sharma, A.K. CAMP: Cluster aided multi-path routing protocol for wireless sensor networks. Wirel. Netw. 2019, 25, 2603–2620. [Google Scholar] [CrossRef]
  32. Hashim, F.A.; Hussien, A.G. Snake Optimizer: A novel meta-heuristic optimization algorithm. Knowl.-Based Syst. 2022, 242, 108320. [Google Scholar] [CrossRef]
  33. Chopra, N.; Ansari, M.M. Golden jackal optimization: A novel nature-inspired optimizer for engineering applications. Expert Syst. Appl. 2022, 198, 116924. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.