Next Article in Journal
A Flexible Wearable Sensor Based on Laser-Induced Graphene for High-Precision Fine Motion Capture for Pilots
Previous Article in Journal
Research on Alternating Current Field Measurement Method for Buried Defects of Titanium Alloy Aircraft Skin
Previous Article in Special Issue
A Self-Localization Algorithm for Mobile Targets in Indoor Wireless Sensor Networks Using Wake-Up Media Access Control Protocol
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Hop Clustering and Routing Protocol Based on Enhanced Snake Optimizer and Golden Jackal Optimization in WSNs

1
School of Electronic Information Engineering, Changchun University of Science and Technology, Changchun 130022, China
2
Company’s R&D Department, Changchun Guanghua Micro-Electronics Equipment Engineering Center Co., Ltd., Changchun 130022, China
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(4), 1348; https://doi.org/10.3390/s24041348
Submission received: 12 January 2024 / Revised: 7 February 2024 / Accepted: 8 February 2024 / Published: 19 February 2024

Abstract

:
A collection of smaller, less expensive sensor nodes called wireless sensor networks (WSNs) use their sensing range to gather environmental data. Data are sent in a multi-hop manner from the sensing node to the base station (BS). The bulk of these sensor nodes run on batteries, which makes replacement and maintenance somewhat difficult. Preserving the network’s energy efficiency is essential to its longevity. In this study, we propose an energy-efficient multi-hop routing protocol called ESO-GJO, which combines the enhanced Snake Optimizer (SO) and Golden Jackal Optimization (GJO). The ESO-GJO method first applies the traditional SO algorithm and then integrates the Brownian motion function in the exploitation stage. The process then integrates multiple parameters, including the energy consumption of the cluster head (CH), node degree of CH, and distance between node and BS to create a fitness function that is used to choose a group of appropriate CHs. Lastly, a multi-hop routing path between CH and BS is created using the GJO optimization technique. According to simulation results, the suggested scheme outperforms LSA, LEACH-IACA, and LEACH-ANT in terms of lowering network energy consumption and extending network lifetime.

1. Introduction

A WSN is a network made up of numerous sensor nodes dispersed within a certain region. To enable data collection, transfer, and analysis, these nodes can be wirelessly connected to one another [1,2]. WSNs are becoming more and more appealing for a wide range of application fields, including military applications, emergency response and security, environmental monitoring, health and medical, automated industrial control, smart cities, transportation and logistics, and entertainment [3,4,5]. WSNs’ low cost and ease of deployment have led to their widespread application in many different industries. But energy is scarce and sensor node batteries are hard to replace. Therefore, it is imperative to address the issue of the energy usage of networks and increase the network’s lifespan [6,7].
Given that the primary cause of node energy consumption is wireless communication [8], energy-efficient communication protocols are essential for drastically reducing network energy consumption and increasing network lifetime. Of these protocols, the clustering routing protocol is a notable example of an essential subset in the field of energy-efficient WSN communication protocols. It has proven to be a very successful method for energy conservation in WSNs with limited energy supplies. Organizing sensor nodes into multiple clusters, each with a CH and additional common nodes, is the core idea behind the cluster-based routing protocol. The common nodes in each cluster gather information and send it to the CH. Following data collection, the regular nodes’ data packets are received, combined, and processed by the CHs, which subsequently forward the processed and combined data to BS. The clustered routing protocol is essential for WSNs’ energy conservation since it reduces energy usage and helps manage overhead traffic [9,10,11,12].
The key idea of network clustering is intimately related to how well the clustered routing protocol affects network energy consumption. As communication distance reduces, so does the amount of energy used for communication inside clusters. Given that CHs use more energy to perform functions like receiving, fusing, and transferring data than normal nodes, choosing the right CHs is essential for enhancing network load balancing. Furthermore, the utilization of a multi-hop communication technique is efficacious in mitigating communication energy consumption, particularly in light of the high energy expenditure linked to long-distance communication. This work employs the SO optimization technique to solve the NP-hard problem [13,14,15,16,17] of optimal CH selection, and the best route between CHs is determined during the data transmission phase using the GJO optimization technique. Below is a summary of this research work’s main contributions:
(1)
The ESO-GJO method adds a Brownian motion function to the SO algorithm’s exploitation stage in order to avoid local optima.
(2)
The proposed approach uses SO to select the optimal CHs and considers variables such as energy and distance when building the fitness function.
(3)
The suggested algorithm uses GJO to determine the route from CH to BS and initializes the GJO population through backward learning.
The structure of the rest of the article is summarized below:
  • Section 2: Summarizes previous work in related fields.
  • Section 3: Introduces the energy model and network model.
  • Section 4: Offers a detailed introduction to the algorithm proposed in this article.
  • Section 5: Performance metrics simulation demonstration and comparison.
  • Section 6: Summarizes the research work in this paper and suggests future work to be carried out.

2. Related Works

Numerous routing methods have been developed with the goal of increasing energy efficiency and lengthening network lifetime in order to address the problem of limited energy in WSNs. LEACH [18] is one of the most well-known clustering routing methods for WSNs. Each iteration of the LEACH protocol is divided into two stages: clustering and stabilization. During the clustering phase, each node generates a random integer between 0 and 1, which it subsequently compares to the value obtained from a threshold calculation. The node is not elected as CH in the following round if the random number is less than the threshold and it was not elected in the preceding 1 / p (p is the proportion of nodes that became CH in the current round) rounds. During the stabilization phase, the sensor nodes transmit the information they have collected to the CH. After completing data fusion on the gathered data, CH sends the information in a single hop to the aggregate node. The CH needs more energy to run because it has a higher mission load than other nodes, which is a major drawback of the LEACH algorithm. The energy-efficient multi-hop routing protocol L-LEACH (Energy Balanced) [19] solely takes the distance component into account. Like LEACH, L-LEACH is divided into two phases. Every round, the energy load is split equally among the network nodes and new CHs are chosen. Nonetheless, a noteworthy constraint of the algorithm is its disregard for the algorithm’s intricacy and the corresponding network overhead. This oversight could be considered a negative in assessing the overall performance of L-LEACH. In order to send data from orphan nodes in the network that cannot be fully covered to the BS, Jerbi et al. [20] designed the O-LEACH (orphan-LEACH) protocol. The protocol proposes two solutions. One method is to have a cluster member serve as a gateway, enabling non-clustered nodes to join the cluster by designating that gateway node as the CH, so that the data of the isolated nodes can be sent through the gateway node aggregation to the CH of the cluster where the gateway node is located. Another solution is that cluster members can form subclusters with orphan nodes, and the first orphan node to join will serve as the cluster head for that subcluster. It is important to remember that this approach works only in situations when there is a finite number of cluster members. The Multi-Hop LEACH (MH-LEACH) protocol was created by Neto et al. [21] to find the best pathways to the BS via several intermediate CHs. According to this protocol, each CH broadcasts an advertisement message in order to build its routing table according to the strength of the signal it receives. However, they are forwarded to the CH to be checked for possible looping or an opposite direction before employing these routes. C Long et al. [22] and Tanushree Agarwal et al. [23] propose LEACH-ANT and LEACH-IACA protocols, respectively, both of which are based on LEACH for cluster head selection and utilize an ant colony algorithm to find the optimal path in the inter-cluster transfer phase. However, the algorithm suffers from local optimization and slow convergence speeds.
Swarm intelligence has a lot of potential for WSN routing optimization. In order to extend the network life cycle, Gobi Natesan et al. [24] proposed a clustering algorithm combining Mayfly and Aquila called MFA-AOA. The algorithm uses MFA for CH selection using variables like energy and distance, among others, to build the fitness function and choose CHs. The algorithm uses AOA to select the optimal route between CH and BS. But the algorithm does not adequately consider the complexity. Y. Yao et al. [25] presented the IAOAR routing protocol, which is based on the Archimedean optimization technique and can reduce energy efficiency. The algorithm selects the optimal CH based on AOA. Based on variables such the CH’s residual energy, the distance between clusters, and the CH’s distance from the BS, IAOAR builds the fitness function for choosing the best CHs.To determine the shortest path between CHs, the algorithm employs an ant colony optimization technique. However, it is important to remember that this approach does not handle network heterogeneity, which could be considered in future enhancements. An energy-efficient clustering technique, called EPOA-CHS (Enhanced Pelican Optimization Algorithm for Selecting Optimal CH Set), was proposed by Wang, Z. et al. [26]. The algorithm uses POA for optimal CH selection. EPOA-CHS builds the fitness function for choosing the CH set using characteristics like node energy and inter-cluster distance. However, EPOA-CHS is designed as a single-hop clustering protocol, which means that it can only operate within single-hop communication. This characteristic may affect its applicability in specific network scenarios where multi-hop communication is more advantageous. Punithavathi et al. [27] introduced BWO-IACO, an energy-efficient clustering approach based on the combination of Ant Colony Optimization and Black Widow Optimization. Using BWO, the algorithm chooses a suitable set of CHs. The fitness function used to choose CHs is composed of several criteria, including node centrality, node degree, and intra-cluster. The algorithm uses improved ACO for inter-cluster routing. However, the technique does not account for how data aggregation affects data transmission energy. Vinitha et al. [28] suggested a multi-hop routing protocol with Cat Swarm Optimization (CSO) and Salp Swarm Optimization (SSA) to lower the energy consumption and latency of wireless sensor networks. The algorithm uses LEACH to select CHs and C-SSA to select the optimal hops. Energy, distance, and latency are among the elements that make up the fitness function used to choose the best hops. However, the applicability of the algorithm to large-scale networks has not been fully considered, which may be a topic for development or further research. To minimize network power consumption, Senthil, G.A. et al. [29] proposed a routing protocol capable of efficient cluster head election and path optimization. The protocol combines Lightning Search Algorithm and Particle Swarm Optimization and is called PSO-LSA. However, the protocol focuses too much on orphan nodes, which may lead to degradation of the performance of the protocol.

3. Preliminaries

This section furnishes details regarding the network model and energy model.

3.1. Network Model

Figure 1 illustrates the structure of the WSNs.
The following factors are taken into account when creating the network model:
  • In WSNs, every sensor node has the same initial energy.
  • Distances between nodes are calculated using Euclidean distance.
  • Within the sensing area, sensor nodes are haphazardly placed and maintain a fixed location once deployed.
  • The BS can be positioned either within or outside the screening region, and it remains stationary.
  • The sensor node as a cluster member transmits the collected environmental data to the CH.
  • The aggregated data are transferred to the BS via CH.

3.2. Energy Model

The standard first-order radio model, as described in [30,31], is the foundation for this article’s estimation of the nodes’ energy consumption. Equation (1) gives the transmitting node’s energy usage, which is referred to as E T X ( l , d ) . This computation is useful when a node sends l bits of data to a receiving node that is located d away. Furthermore, Equation (2) establishes the receiving node’s energy consumption, which is represented by the symbol E R X ( l ) .
E T X ( l , d ) = l E e l e c + l ϵ f s d 2 , d d 0 l E e l e c + l ϵ m p d 4 , d > d 0
E R X ( l ) = l E e l e c
Here, ϵ f s and ϵ m p , respectively, represent the energy consumption coefficients of the amplifier circuit for the free-space fading model and the multipath fading model. Furthermore, the transmission and receiving circuits’ energy consumption coefficient is denoted by E e l e c . Equation (3) establishes the threshold, which is represented as d 0 and acts as the border between the two attenuation models. The transmission uses the free-space fading model if the distance d is less than d 0 , which results in an energy consumption of l ϵ f s d 2 for the amplifier circuit. On the other hand, the multipath fading model is applied where d > d 0 , resulting in an energy consumption of l ϵ m p d 4 for the amplifier circuit.
d 0 = ϵ f s ϵ m p
Data are received by the CH from the cluster, and it uses some energy to transfer the aggregated data to the BS. Consequently, it becomes imperative for the CH to possess a sufficient reservoir of energy to effectively relay data to the BS. The energy level of the CH is represented by the letter E C H ,
E C H = l · n k · E e l e c + E D A + l · ε m p · d t o B S 4
where E e l e c is the energy used by the transmitter. E D A is the energy necessary for data aggregating, and a data packet is represented by the symbol l. When transmitting over long distances to a base station, as shown by d t o B S 4 , the transmitter amplifier’s energy usage is represented by ϵ m p . The energy consumption of non-cluster heads is shown by E N C H .
E N C H = l · E e l e c + l · ε f s · d t o C H 4
Within a specific context, the symbol l denotes a data packet, E e l e c denotes the transmitter’s energy consumption, ϵ f s denotes a transmitter amplifier in a free condition, d t o B S 2 denotes the CH’s short distance, and d t o B S 4 denotes the BS’s long distance.

4. Proposed Method

We will provide a detailed introduction to the proposed ESO-GJO protocol in this section. Each iteration of the ESO-GJO protocol encapsulates both the CH selection phase and the subsequent data transmission stage, amalgamating these crucial processes within every round. In the cluster head selection phase, we use the SO optimization algorithm for cluster head selection and in the data transmission phase, we use the GJO optimization algorithm for optimal path selection. In addition, the fitness function plays a crucial role in the SO algorithm and GJO, which is an indicator of the degree of superiority of a solution, and provides a search direction for the algorithm. Through the rational design of the fitness function, we can help the algorithm to find the optimal solution of the problem faster. The choice of fitness function should be determined according to the needs of the specific problem, and it can be defined based on the constraints of the problem and the objective function. Figure 2 shows the flow block diagram of the ESO-GJO algorithm.

4.1. CH Selection Stage

4.1.1. CH Selection Using SO

In this section, we describe how to use the SO [32] optimization algorithm for optimal cluster head set selection for wireless sensor networks. The suggested algorithm’s main goal is to carefully choose CHs from the pool of regular sensor nodes, strategically integrating considerations for energy conservation. This overarching aim is geared towards proactively elongating the network’s operational lifetime.
An individual in SO symbolizes a whole solution. It represents the ideal locations of the CHs for the proposed algorithm’s CH selection. Let X = X i , 1 ( t ) , X i , 2 ( t ) , X i , 3 ( t ) , , X i , D ( t ) represent the ith member of the population, and let X ( i , D ) ( t ) = x i d ( t ) , y i d ( t ) , 1 i N , 1 d D represent each component’s coordinates for the sensor nodes chosen to serve as CH. Every single person has the same number of dimensions represented by the letter D; this corresponds to the quantity of CH.
The snakes choose a random position during the exploration phase and adjust their position in relation to it if Q < 0.25 . The following steps are followed to mimic the exploration phase:
X i , m t + 1 = X r a n d , m ( t ) ± c 2 × A m × X m a x X m i n × r a n d + X m i n
The ith male position is shown by X i , m , the random male position is indicated by X r a n d , m , and the male’s ability to find food is indicated by A m . The calculation for this is as follows:
A m = e x p f r a n d , m f i , m
where c 2 = 0.05 is defined, the fitness of X r a n d , m is denoted by f r a n d , m , and the ith member of the male group’s fitness is denoted by f i , m .
X i , f = X r a n d , f t + 1 ± c 2 × A f × X m a x X m i n × r a n d + X m i n
where A f is the female’s capacity to locate food and may be computed as follows; a random female’s position is indicated by X r a n d , f ; and position of the ith female is indicated by X i , f .
A f = e x p f ( r a n d , f ) / f ( i , f )
In this case, the fitness of X r a n d , f is represented by f ( r a n d , f ) , and the ith member of the female group’s fitness is denoted by f i , f .
The constant coefficient c 3 is utilized to update the snake’s position throughout the exploiting phase. In this study, instead of using the constant coefficient c 3 , we use the Brownian motion function to keep the algorithm from reaching a local optimum. One of many physical processes in which a quantity continuously fluctuates between tiny, random fluctuations is called Brownian motion. It is believed that Brownian motion is a Markov process coupled with a Gaussian process. The normal (Gaussian) equation was altered by the algorithm’s changes to the size and number of agents, which are used to determine the Brownian motion steps, and the Brownian motion was finalized (Equation (10))
f ( δ ) = 1 2 π σ e x p ( δ μ ) 2 2 σ 2
The following formula can be used to define the temperature Temp.
T e m p = e x p t T
Here, t represents the current iteration, and T signifies the maximum number of iterations.
The definition of the quantity of food is Q. The following formula can be used to determine how much food is consumed.
Q = c 1 e x p t T T
where c 1 = 0.5 . If the t e m p e r a t u r e > 0.6 , snakes only travel in the direction of food.
X ( i , j ) ( t + 1 ) = X f o o d ± f ( δ ) × T e m p × r a n d × X f o o d X ( i , j ) ( t )
where X f o o d represents the best individual’s position and X i , j represents the individual’s position. The snake will go into either the fighting or mating mode if the temperature is less than 0.6.
In Fight Mode,
X i , m t + 1 = X i , m ( t ) + f ( δ ) × F M × r a n d × Q × X b e s t , f X i , m ( t )
where X i , m represents the male position, F M denotes the fighting prowess of the male agent, and X b e s t , f represents the best individual’s position within the female group.
X i , f t + 1 = X i , f ( t ) + f ( δ ) × F F × r a n d × Q × X b e s t , m X i , f ( t )
where F F denotes the female agent’s combat prowess, X i , f indicates that she is the top member of the male group, and X b e s t , m represents her position.
F M is represented by Equation (16) and F F is represented by Equation (17):
F M = e x p f b e s t , f f i
F F = e x p f b e s t , m f i
where f i is the agent fitness, f b e s t , m is the best agent of the male group, and f b e s t , f is the best agent of the female group. In Mating Mode,
X i , m t + 1 = X i , m ( t ) + f ( δ ) × M m × r a n d × Q × X i , f ( t ) X i , m ( t )
X i , f t + 1 = X i , f ( t ) + f ( δ ) × M f × r a n d × Q × X i , m ( t ) X i , f ( t )
where M m & M f denotes the ability of the male and female to mate, respectively; X i , f and X i , m , respectively, denote the positions of the ith agents within the female and male groups. These values can be calculated as follows:
M m = e x p f i , f f i , m
M f = e x p f i , m f i , f
Replacement of worst males and females selected from hatched eggs:
X w o r s t , m = X m i n + r a n d × X m a x X m i n
X w o r s t , f = X m i n + r a n d × X m a x X m i n
where X w o r s t , m is the worst individual in the male group; X w o r s t , f is the worst individual in the female group.
Finally, the globally optimal individual vector is used as the optimal CH set.

4.1.2. Fitness Function of SO

The fitness function used by the SO algorithm to determine the ideal set of CHs is made up of the following variables and formulas.
(1)
Energy consumption of CH:
This is the first parameter of the fitness function. Our goal is to prioritize nodes with low energy consumption as CH. Let E c C H i represent the C H i ’s energy consumption, and assume that 1 i K , K is the number of CHs.
Consequently, minimizing the objective function f 1 is our aim:
f 1 = 1 K i = 1 K E c C H i
(2)
Distance between node and BS:
This is the second parameter of the fitness function. Our goal is to prioritize the node with the shortest distance to the common node and BS as the CH. Let D s j , C H i be the distance from intra-cluster node s j to cluster head node C H i . Let D C H i , B S D C H i , B S be the distance from C H i to BS where 1 i K , K represents the quantity of CHs and 1 j M , M represents the quantity of cluster members. Consequently, minimizing the objective function f 2 is our aim:
f 2 = i = 1 K 1 M j = 1 M D s j , C H i + D C H i , B S
(3)
Node Degree of CH: This is the third parameter of the fitness function. High-degree nodes are given preference to become CH in the ESO-GJO CH selection process. Consequently, our goal is to maximize the objective function f 3 as follows
f 3 = N d e g C H i
Our suggested SO algorithm’s fitness function is to minimize the aforementioned f 1 , f 2 , and f 3 functions. As a result, the following is the fitness function for our algorithm:
f = δ 1 × f 1 + δ 2 × f 2 + δ 3 × f 3
where the weights for the goal function are provided by the constants δ 1 , δ 2 , and δ 3 . The total of these constants ought to equal one. Minimizing the cumulative objective function is our aim.

4.2. Data Routing Stage

4.2.1. Routing Algorithm Using GJO

The goal of the routing problem we will now solve is to reduce the maximum possible transmission distance between CHs in a routing path. The goal of the routing problem we will now solve is to reduce the maximum possible transmission distance between CHs in the routing path. This section describes how to use the GJO [33] optimization algorithm for optimal path selection for wireless sensor networks.
The starting population is generated by random initialization in the GJO methodology, yet this approach is vulnerable to the issue of an excessively dispersed or locally concentrated population.
Due to this circumstance, the population diversity of the classic GJO algorithm is inadequate, which significantly impairs the ensuing iterative optimization search.
Thus, in order to broaden the algorithm’s search space and boost population variety, we chose to initiate the population in this study using a backward learning technique.
The following is the definition of the reverse learning strategy:
Let X i t = x i , 1 t , x i , 2 t , , x i , j t , , x i , d t be the ith individual of the current population. The general inverse learning strategy produces a general inverse solution of X i t as O i t = o i , 1 t , o i , 2 t , , o i , j t , , o i , d t .
o i , j t = Z ( k ) A i t + B i t x i , j t
Z ( k ) = a Z ( k 1 ) + c m o d M
A j t = m i n x ( i , j ) t , B j t = m a x x ( i , j ) t
M is an enormous positive number, a is the multiplier of the interval 0 , M , and c is incremental. Z ( 0 ) is the seed of the random number. Z ( k ) approximately obeys a uniform distribution in the interval [ 0 , M 1 ] ; its maximum period is M, and Z ( k ) / M approximately obeys a uniform distribution in the interval [ 0 , 1 ) .
The two primary steps of the GJO algorithm are finding prey and encircling and attacking it. These processes represent the exploration and exploitation of populations, respectively.
(1)
The stage of exploration or hunting for prey
This section proposes GJO’s exploration plan. Jackals can sense and follow their prey due to their innate instincts, yet sometimes the prey escapes and is hard to catch. As a result, the females follow the males and lead the pack in search of additional prey.
Y 1 ( t ) = Y M ( t ) E . Y M ( t ) r l . P r e y ( t )
Y 2 ( t ) = Y F M ( t ) E . Y F M ( t ) r l . P r e y ( t )
where t is the current iteration. P r e y ( t ) represents the prey’s position vector, while Y M ( t ) and Y F M ( t ) represent the locations of the male and female jackals. The updated positions of the male and female jackals with respect to the prey are shown by Y 1 ( t ) and Y 2 ( t ) .
E indicates the prey’s evasive energy and is represented by Equation (33):
E = E 1 E 0
The prey’s initial energy level is represented by E 0 , while its decreasing energy is represented by E 1 .
E 0 = 2 r 1
where r can be any integer between 0 and 1.
E 1 = c 1 1 ( t / T )
where c 1 = 1.5 ; the rounds of iteration are denoted by T and r l is calculated by Equation (36):
r l = 0.05 L F ( y )
LF is calculated by Equation (37):
L F ( y ) = 0.01 × ( μ × σ ) / v ( 1 / β )
where μ and v are random numbers between 0 and 1, β = 1.5
Y ( t + 1 ) = Y 1 ( t ) + Y 2 ( t ) / 2
(2)
The stage of exploitation or encircling and leaping for prey
The mathematical model of joint roundup of male and female jackals is shown in Equations (39) and (40):
Y 1 ( t ) = Y M ( t ) E . r l . Y M ( t ) P r e y ( t )
Y 2 ( t ) = Y F M ( t ) E . r l . Y F M ( t ) P r e y ( t )
Finally, the position vector Y 1 is used as the optimal path.

4.2.2. Fitness Function of GJO

The GJO method builds the fitness function using the following parameters in order to find the optimal route between CH and BS:
(1)
Distance between CH and BS: The further the distance between the CH and the BS, the more energy is required to transmit the data. Therefore, the CH close to the BS is selected to form the best path. Consequently, minimizing the objective function f 1 is our aim:
f 1 = 1 / K ( i = 1 ) K D C H i , B S
(2)
The ratio of the distance between CH and BS to the inter-cluster head distance:
The fitness function’s second parameter will be this ratio. Here, maximizing the inter-cluster distance and minimizing the distance between C H i and BS are the main objectives. Consequently, minimizing the objective function f 2 is our aim:
f 2 = ( i = 1 ) K D C H i , B S / ( i = 1 , j = 1 ) K D C H i , C H j
(3)
Residual energy of CH: This is the fitness function’s third parameter. Our goal is to prioritize the CH with more remaining energy as the next hop. Let E r e s C H i denote the residual energy of CH; K denotes the number of CHs. Consequently, our goal is to maximize the objective function f 3 as follows:
f 3 = i = 1 K E r e s C H i
The following three functions f 1 , f 2 , and f 3 , are to be minimized as the fitness function for our suggested GJO method. As a result, the following is the fitness function for our algorithm:
f = ω 1 × f 1 + ω 2 × f 2 + ω 3 × 1 f 3
where ω 1 , ω 2 , and ω 3 are constants that give the objective functions weights. The total of these constants ought to equal 1. Minimizing the objective function is our aim.

4.3. The Pseudo-Code of the Proposed Algorithm

Algorithm 1 is a pseudo-code that uses the SO algorithm to select the best set of CHs and Algorithm 2 is a pseudo-code that uses the GJO method to find the best route between CH and BS.
Algorithm 1 SO-Clustering
  • Input: Set of sensor nodes: S = s 1 , s 2 , s 3 , , s n
  • Output:  Optimal positions of cluster heads C H = C H 1 , C H 2 , C H 3 , , C H m
  •  Step1: Initialize population X;
  •  Step2:
  • for i = 1:N do
  •   Calculate F i t n e s s X i using Equations (24)–(27);
  • end for
  •  Take the minimum value of Fitness as G b e s t ;
  •  Take the individual whose Fitness value is G b e s t as X f o o d ;
  •  /*Diving the swarm into two equal groups males and females*/
  •  Define N m = N 2 as the male individual numbers;
  •  Define N f = N N m as the female individual numbers;
  • for i = 1:N do
  •   Calculate F i t n e s s m X i , m ;
  • end for
  • for i = 1:N do
  •   Calculate F i t n e s s f X i , f ;
  • end for
  •  Take the minimum value of F i t n e s s m as f b e s t , m ;
  •  Take the minimum value of F i t n e s s f as f b e s t , f ;
  •  Take the male individual whose F i t n e s s m value is f b e s t , m as X b e s t _ m ;
  •  Take the female individual whose F i t n e s s f value is f b e s t , f as X b e s t _ f ;
  •  Step3:
  • while  t < t m a x   do
  •   Define T e m p using Equation (11);
  •   Define food Quantity Q using Equation (12);
  •   if  Q < 0.25   then
  •    /*Exploration phase (no food)*/
  •    for i = 1: N m  do
  •     Define A m using Equation (7);
  •     Update position of X n e w _ m using Equation (6);
  •    end for
  •    for i = N f :N do
  •     Define A f using Equation (9);
  •     Update position of X n e w _ f using Equation (8);
  •    end for
  •   else
  •    /*Exploitation phase (food exists)*/
  •    if  T e m p > 0.6   then
  •     for i = 1: N m  do
  •      Using the Brownian motion function to replace the constant coefficients C 3 ,
         Update position of X i , n e w _ f using Equation (13);
  •     end for
  •     for i = N F : N  do
  •      Using the Brownian motion function to replace the constant coefficients C 3 ,
         Update position of X i , n e w _ f using Equation (13);
  •     end for
  •    else
  •     if  r a n d > 0.6   then
  •      /*Fight Mode*/
  •      for i = 1: N m  do
  •       Define F M using Equation (16);
  •       Using the Brownian motion function to replace the constant coefficients C 3 ,
          Update position of X n e w _ m using Equation (14);
  •      end for
  •      for i = N f :N do
  •       Define F M using Equation (17);
  •       Using the Brownian motion function to replace the constant coefficients C 3 ,
          Update position of X n e w _ f using Equation (15);
  •      end for
  •     else
  •      /*Mating Mode*/
  •      for i = 1: N m  do
  •      Define M m using Equation (20);
  •      Using the Brownian motion function to replace the constant coefficients C 3 ,
         Update position of X n e w _ m using Equation (18);
  •      end for
  •      for i = N f :N do
  •       Define M f using Equation (21);
  •       Using the Brownian motion function to replace the constant coefficients C 3 ,
          Update position of X n e w _ f using Equation (19);
  •      end for
  •     end if
  •     Change the worst male and female Equations (22) and (23);
  •    end if
  •   end if
  •   if  f b e s t , m < f b e s t , f   then
  •     G b e s t = f ( b e s t , m ) ;
  •     X f o o d = X b e s t _ m ;
  •   else
  •     G b e s t = f ( b e s t , f ) ;
  •     X f o o d = X b e s t _ f ;
  •   end if
  •    t = t + 1 ;
  • end while
  •  Step4: Repeat Step3 until it reaches the maximum number of iterations;
  •  Step5: Return best solution X f o o d /*Optimal cluster head*/
Algorithm 2 GJO-Routing
  • Input: Set of cluster heads C H = C H 1 , C H 2 , C H 3 , , C H m
  • Output: Route R
  •  Initializing prey population Y using Equations (28)–(30);
  •  Step2:
  • while  t < t m a x   do
  •   for i = 1:N do
  •    Calculate F i t n e s s Y i using Equations (41)–(44);
  •   end for
  •   Sort the Fitness;
  •   The first value of F i t n e s s as f 1 (Male Jackal position);
  •   Take the prey whose Fitness value is f 1 as Y 1 ;
  •   The second value of F i t n e s s as f 2 (FeMale Jackal position);
  •   Take the prey whose Fitness value is f 2 as Y 2 ;
  •   for i = 1:N do
  •    Define the Evading Energy E of prey using Equations (33)–(35);
  •    Define r l using Equations (36) and (37);
  •    if  E > 1 then
  •     Update the position of male jackal Y 1 using Equation (31);
  •     Update the position of female jackal Y 2 using Equation (32);
  •     Update jackal position Y n e w using Equation (38);
  •    else
  •     Update the position of male jackal Y 1 using Equation (39);
  •     Update the position of female jackal Y 2 using Equation (40);
  •     Update jackal position Y n e w using Equation (38);
  •    end if
  •   end for
  •   for i = 1:N do
  •   if  F i t n e s s Y ( i , n e w ) < F i t n e s s Y i   then
  •     F i t n e s s Y i = F i t n e s s Y ( i , n e w ) ;
  •     Y i = Y ( i , n e w ) ;
  •   end if
  • end for
  •  Sort the F i t n e s s ;
  • Y 1 = b e s t p r e y
  • t = t + 1 ;
  • end while
  • Step 3: Repeat Step 2 until it reaches the maximum number of iterations;
  • Step 4: Return Y 1 , R R + Y i , 1

5. Simulation Results

5.1. Simulation Settings

Using the 100 × 100, 200 × 200, 300 × 300 (m2) setup area range for the experiment, compare the clustering impact of the technique proposed with the other three comparative algorithms. The following algorithms are compared with the suggested approaches: PSO-LSA [29], LEACH-IACA [22], and LEACH-ANT [23]. Identical sets of network input setup parameters are used by all methods. The simulation related parameters are shown in Table 1.

5.2. Residual Energy

This performance metric is the sum of the remaining energy of the surviving nodes in each round. For the length of the simulation, a fixed initial energy of 0.5 J has been used. The ESO-GJO technique presented in this research is compared with PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT residual energy for a scenario with 100 nodes. The results are displayed in Figure 3a. It is noted that LEACH-IACA and LEACH-ANT lost their remaining energy after 1500 cycles. On the other hand, PSO-LSA,EPOA-CHS, and ESO-GJO managed to live with 15.29 J, 16.41 J, and 18.13 J, respectively. All nodes of PSO-LSA and EPOA-CHS die after the 2400th round. However, the proposed ESO-GJO still has 0.08 J of energy remaining. Figure 3b shows the results of comparing the residual energy of ESO-GJO with other protocols for the scenario of 200 nodes. It is observed that at the end of 1000 rounds, all the energies of LEACH-IACA and LEACH-ANT are exhausted. However, PSO-LSA, EPOA-CHS, and ESO-GJO have 55.30 J, 55.01 J, and 56.79 J remaining, respectively. With PSO-LSA, all nodes die at round 2500. However, the proposed ESO-GJO still has 2.67 J of energy remaining. Figure 3c shows the results of comparing the residual energy of ESO-GJO with other protocols for the scenario of 300 nodes. It is observed that at the end of 800 rounds, all the energies of LEACH-IACA and LEACH-ANT are exhausted. However, PSO-LSA,EPOA-CHS, and ESO-GJO have 94.14 J, 94.95 J, and 95.40 J remaining, respectively. With PSO-LSA and EPOA-CHS, all nodes die at round 2350. However, the proposed ESO-GJO still has 0.05 J of energy remaining. Figure 3a–c show that the proposed ESO-GJO increases network residual energy over the compared LSA, LEACH-IACA, and LEACH-ANT protocols.

5.3. Network Lifetime

This section compares the network lifetimes of the PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT algorithms with the suggested ESO-GJO algorithm. The time span from the sensor network’s inception to the death of the final node is referred to in this study as the network lifetime. Four different metrics, FND (First Node Death), HND (Half Nodes Death), MND (Most Nodes Death), and LND (Last Node Death), are analyzed for different protocols. Table 2 records the number of rounds in which each indicator occurs in different scenarios for ESO-GJO, PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT. Figure 4a–c shows more visually the results of ESO-GJO compared to other protocols for the four metrics in the section above for scenarios with 100 nodes, 200 nodes, and 300 nodes. Consequently, our suggested ESO-GJO can more effectively increase the network lifetime.

5.4. Live Nodes Number

The total lifespan of a WSN is indicated by the number of live nodes in the network. The proposed ESO-GJO protocol and the other three protocols are compared for the number of surviving nodes every round for the scenarios of 100, 200, and 300 nodes during the course of the network lifetime in Figure 5a–c. In the case of 100 sensors, the proposed ESO-GJO algorithm extends the network lifetime by about 8.14%, 5.24%, 119.87%, and 135.76%, respectively, compared to other routing protocols. In the case of 200 sensors, the proposed ESO-GJO algorithm extends the network lifetime by about 22.3%, 8.46%, 192.2%, and 180.6%, respectively, compared to other routing protocols. In the case of 300 sensors, the proposed ESO-GJO algorithm extends the network lifetime by about 16.9%, 4.97%, 181.5%, and 363.5%, respectively, compared to the other three protocols. As a result, the ESO-GJO protocol’s suggested approach can successfully lower energy dissipation and increase the network’s lifespan.

5.5. Packet Delivery

The total number of packets that the BS has received is the definition of this network performance indicator. Regarding network throughput, the ESO-GJO approach performs better than the LSA, LEACH-IACA, and LEACH-ANT algorithms in Figure 6a (100 nodes). Specifically, ESO-GJO’s network throughput outperformed PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT by 7.89%, 5.44%, 119.3%, and 133.1%, respectively. The ESO-GJO algorithm outperforms PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT in terms of network throughput when Figure 6b (200 nodes) is considered. Specifically, ESO-GJO’s network throughput outperformed PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT by 6.62%, 4.70%, 167.36%, and 156.22%, respectively. Finally, the ESO-GJO algorithm outperforms PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT in terms of network throughput when Figure 6c (300 nodes) is considered. Specifically, ESO-GJO’s network throughput outperformed PSO-LSA, EPOA-CHS, LEACH-IACA, and LEACH-ANT by 1.02%, 0.58%, 308.26%, and 149.70%, respectively. These outcomes unequivocally demonstrate the improved network throughput that the ESO-GJO algorithm achieves in many contexts as well as its superiority over the other protocols.
Figure 4. Network life cycle. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 4. Network life cycle. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Sensors 24 01348 g004
Figure 5. Live nodes number in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 5. Live nodes number in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Sensors 24 01348 g005
Figure 6. Packet delivery in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 6. Packet delivery in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Sensors 24 01348 g006

5.6. Energy Consumption

This network performance metric displays the total energy utilized by all of the active nodes in the network throughout each cycle. Based on simulation results, Figure 7a–c illustrate that the suggested ESO-GJO model outperforms PSO-LSA,EPOA-CHS, LEACH-IACA, and LEACH-ANT. By taking the objective function’s energy impact into account, the ESO-GJO algorithm reduces network energy consumption and lengthens the network’s lifespan.

6. Conclusions

We have created a novel ESO-GJO method for energy-constrained WSNs in this study. In order to minimize energy usage, we construct an objective function and select the set of optimal CHs. The experimental results have been published together with a comparison of the LSA, LEACH-IACA, and LEACH-ANT algorithms that are currently in use. In the test scenarios with 100, 200, and 300 sensor nodes, respectively, the algorithm is run. The results indicate that, in comparison to alternative protocols, the strategy outlined in this study is successful in reducing network energy consumption and improving network lifetime. However, the algorithm still has limitations; the performance metric FND falls short in large-scale networks. With the aforementioned restrictions in mind, future research can build on these findings to prolong the FND emergence period for large-scale WSNs.

Author Contributions

Conceptualization, Z.W.; Methodology, Z.W.; Software, Z.W.; Validation, Z.W.; Formal analysis, Z.W. and P.X.; Investigation, Z.W.; Resources, P.X.; Data curation, Z.W.; Writing—original draft, Z.W.; Writing—review & editing, Z.W. and P.X.; Visualization, Z.W.; Supervision, Z.W.; Project administration, Z.W.; Funding acquisition, J.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Project of Industrial Technology Research and Development in Jilin Province (2023C031-3), Science and Technology Development Program of Jilin Province (20220508152RC).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

Authors Zhen Wang and Pengzhan Xing were employed by the company Changchun Guanghua Micro-Electronics Equipment Engineering Center Co., Ltd. The remaining author declares that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Fischione, C. An Introduction to Wireless Sensor Networks; KTH Royal Institute of Technology: Stockholm, Sweden, 2014. [Google Scholar]
  2. BenSaleh, M.S.; Saida, R.; Kacem, Y.H.; Abid, M. Wireless Sensor Network Design Methodologies: A Survey. J. Sens. 2020, 2020, 9592836. [Google Scholar] [CrossRef]
  3. Kandris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar] [CrossRef]
  4. Aranda, J.; Mendez, D.; Carrillo, H. Multimodal wireless sensor networks for monitoring applications: A review. J. Circuits, Syst. Comput. 2020, 29, 2030003. [Google Scholar] [CrossRef]
  5. Mohamed, R.E.; Saleh, A.I.; Abdelrazzak, M.; Samra, A.S. Survey on wireless sensor network applications and energy efficient routing protocols. Wirel. Pers. Commun. 2018, 101, 1019–1055. [Google Scholar] [CrossRef]
  6. Priyadarshi, R.; Gupta, B.; Anurag, A. Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues. J. Supercomput. 2020, 76, 7333–7373. [Google Scholar] [CrossRef]
  7. Amutha, J.; Sharma, S.; Nagar, J. WSN strategies based on sensors, deployment, sensing models, coverage and energy efficiency: Review, approaches and open issues. Wirel. Pers. Commun. 2020, 111, 1089–1115. [Google Scholar] [CrossRef]
  8. Croce, S.; Marcelloni, F.; Vecchio, M. Reducing power consumption in wireless sensor networks using a novel approach to data aggregation. Comput. J. 2008, 51, 227–239. [Google Scholar] [CrossRef]
  9. Fanian, F.; Rafsanjani, M.K. Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. J. Netw. Comput. Appl. 2019, 142, 111–142. [Google Scholar] [CrossRef]
  10. Wang, Q.; Lin, D.; Yang, P.; Zhang, Z. An energy-efficient compressive sensing-based clustering routing protocol for WSNs. IEEE Sens. J. 2019, 19, 3950–3960. [Google Scholar] [CrossRef]
  11. Shafiq, M.; Ashraf, H.; Ullah, A.; Tahira, S. Systematic Literature Review on Energy Efficient Routing Schemes in WSN—A Survey. Mob. Netw. Appl. 2020, 25, 882–895. [Google Scholar] [CrossRef]
  12. Nakas, C.; Kandris, D.; Visvardis, G. Energy efficient routing in wireless sensor networks: A comprehensive survey. Algorithms 2020, 13, 72. [Google Scholar] [CrossRef]
  13. Daniel, A.; Balamurugan, K.M.; Vijay, R.; Arjun, K. Energy aware clustering with multihop routing algorithm for wireless sensor networks. Intell. Autom. Soft Comput. 2021, 29, 233–246. [Google Scholar] [CrossRef]
  14. Saleem, M.M.; Alabady, S.A. Improvement of the WMSNs lifetime using multi-hop clustering routing protocol. Wirel. Netw. 2022, 28, 3173–3183. [Google Scholar] [CrossRef]
  15. Pantazis, N.A.; Nikolidakis, S.A.; Vergados, D. Energy-efcient routing protocols in wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 551–591. [Google Scholar] [CrossRef]
  16. Behera, T.M.; Samal, U.C.; Mohapatra, S.K.; Khan, M.S.; Appasani, B.; Bizon, N.; Thounthong, P. Energy-Efficient Routing Protocols for Wireless Sensor Networks: Architectures, Strategies, and Performance. Electronics 2022, 11, 2282. [Google Scholar] [CrossRef]
  17. Al Aghbari, Z.; Khedr, A.M.; Osamy, W.; Arif, I.; Agrawal, D.P. Routing in wireless sensor networks using optimization techniques: A survey. Wirel. Pers. Commun. 2020, 111, 2407–2434. [Google Scholar] [CrossRef]
  18. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient commu nication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; Volume 1, p. 10. [Google Scholar]
  19. Liao, Q.; Zhu, H. An Energy Balanced Clustering Algorithm Based on LEACH Protocol. Appl. Mech. Mater. 2013, 341–342, 1138–1143. [Google Scholar] [CrossRef]
  20. Jerbi, W.; Guermazi, A.; Trabelsi, H. O-LEACH of routing protocol for wireless sensor networks. In Proceedings of the 13th International Conference Computer Vision Graphics and Image Processing (CGiV), Beni Mellal, Morocco, 29 March–1 April 2016; pp. 399–404. [Google Scholar]
  21. Neto, J.H.B.; Cardoso, A.R.; Celestino, J., Jr. MH-LEACH: A Distributed Algorithm for Multi-Hop Communication. Wirel. Sens. Netw. 2014, 2014, 55–61. [Google Scholar]
  22. Long, C.; Liao, S.; Zou, X.; Zhou, X.; Zhang, N. An improved LEACH multi-hop routing protocol based on intelligent ant colony algorithm for wireless sensor networks. J. Inf. Comput. Sci. 2014, 11, 2747–2757. [Google Scholar] [CrossRef]
  23. Agarwal, T.; Kumar, D.; Prakash, N.R. Prolonging Network Lifetime Using Ant Colony Optimization Algorithm on LEACH Protocol for Wireless Sensor Networks; Springer: Berlin/Heidelberg, Germany, 2010; pp. 634–641. [Google Scholar]
  24. Natesan, G.; Konda, S.; de Prado, R.P.; Wozniak, M. A Hybrid Mayfly-Aquila Optimization Algorithm Based Energy-Efficient Clustering Routing Protocol for Wireless Sensor Networks. Sensors 2022, 22, 6405. [Google Scholar] [CrossRef]
  25. Yao, Y.; Xie, D.; Li, Y.; Wang, C.; Li, Y. Routing Protocol for Wireless Sensor Networks Based on Archimedes Optimization Algorithm. IEEE Sens. J. 2022, 22, 15561–15573. [Google Scholar] [CrossRef]
  26. Wang, Z.; Duan, J.; Xu, H.; Song, X.; Yang, Y. Enhanced Pelican Optimization Algorithm for Cluster Head Selection in Heterogeneous Wireless Sensor Networks. Sensors 2023, 23, 7711. [Google Scholar] [CrossRef] [PubMed]
  27. Punithavathi, R.; Kurangi, C.; Balamurugan, S.P.; Pustokhina, I.V.; Pustokhin, D.A.; Shankar, K. Hybrid BWO-IACO algorithm for cluster based routing in wireless sensor networks. Comput. Mater. Contin. 2021, 69, 433–449. [Google Scholar] [CrossRef]
  28. Vinitha, A.; Rukmini, M.S.S.; Sunehra, D. Energy-efficient multihop routing in WSN using the hybrid optimization algorithm. Int. J. Commun. Syst. 2020, 33, e4440. [Google Scholar] [CrossRef]
  29. Senthil, G.A.; Raaza, A.; Kumar, N. Internet of Things Energy Efficient Cluster-Based Routing Using Hybrid Particle Swarm Optimization for Wireless Sensor Network. Wirel. Pers. Commun. 2021, 122, 2603–2619. [Google Scholar] [CrossRef]
  30. Mantri, D.; Prasad, N.R.; Prasad, R. Grouping of clusters for efficient data aggregation (GCEDA) in wireless sensor network. In Proceedings of the 2013 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 22–23 February 2013; pp. 132–137. [Google Scholar]
  31. Sajwan, M.; Gosain, D.; Sharma, A.K. CAMP: Cluster aided multi-path routing protocol for wireless sensor networks. Wirel. Netw. 2019, 25, 2603–2620. [Google Scholar] [CrossRef]
  32. Hashim, F.A.; Hussien, A.G. Snake Optimizer: A novel meta-heuristic optimization algorithm. Knowl.-Based Syst. 2022, 242, 108320. [Google Scholar] [CrossRef]
  33. Chopra, N.; Ansari, M.M. Golden jackal optimization: A novel nature-inspired optimizer for engineering applications. Expert Syst. Appl. 2022, 198, 116924. [Google Scholar] [CrossRef]
Figure 1. Cluster-based WSN with CHs.
Figure 1. Cluster-based WSN with CHs.
Sensors 24 01348 g001
Figure 2. ESO-GJO flowchart.
Figure 2. ESO-GJO flowchart.
Sensors 24 01348 g002
Figure 3. Residual energy in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 3. Residual energy in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Sensors 24 01348 g003
Figure 7. Energy consumption in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Figure 7. Energy consumption in each round. Scenarios with (a) 100 nodes; (b) 200 nodes; (c) 300 nodes.
Sensors 24 01348 g007
Table 1. Simulation-related parameter.
Table 1. Simulation-related parameter.
ParametersValue
Network Area100 × 100, 200 × 200, 300 × 300 (m2)
Number of nodesN = 100, 200, 300
Sink node location(50 m, 150 m)
(100 m, 250 m)
(150 m, 350 m)
E 0 0.5 J
Packet Size4000 Bits
E e l e c 50 nJ/bit
ϵ f s 10 nJ/bit/m2
ϵ m p 0.0013 pJ/bit/m4
E D A 5 nJ/bit/signal
d 0 70 m
Table 2. Round and lifetime.
Table 2. Round and lifetime.
No. of Rounds
Simulation ScenarioProtocolFNDHNDMNDLND
Number of nodes is 100ESO-GJO2080235023832448
PSO-LSA1805219122332332
EPOA-CHS1920224922902392
LEACH-IACA755106011161214
LEACH-ANT701102310351094
Number of nodes is 200ESO-GJO1091223122872863
PSO-LSA1698249226282402
EPOA-CHS1322233424242623
LEACH-IACA7758899131012
LEACH-ANT8219259471038
Number of nodes is 300ESO-GJO683233323932737
PSO-LSA1275223022752407
EPOA-CHS879226823432565
LEACH-IACA483546553584
LEACH-ANT6539019341010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Duan, J.; Xing, P. Multi-Hop Clustering and Routing Protocol Based on Enhanced Snake Optimizer and Golden Jackal Optimization in WSNs. Sensors 2024, 24, 1348. https://doi.org/10.3390/s24041348

AMA Style

Wang Z, Duan J, Xing P. Multi-Hop Clustering and Routing Protocol Based on Enhanced Snake Optimizer and Golden Jackal Optimization in WSNs. Sensors. 2024; 24(4):1348. https://doi.org/10.3390/s24041348

Chicago/Turabian Style

Wang, Zhen, Jin Duan, and Pengzhan Xing. 2024. "Multi-Hop Clustering and Routing Protocol Based on Enhanced Snake Optimizer and Golden Jackal Optimization in WSNs" Sensors 24, no. 4: 1348. https://doi.org/10.3390/s24041348

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop