Secure Routing-Based Energy Optimization for IoT Application with Heterogeneous Wireless Sensor Networks

: Wireless sensor networks (WSNs) and the Internet of Things (IoT) are increasingly making an impact in a wide range of domain-speciﬁc applications. In IoT-integrated WSNs, nodes generally function with limited battery units and, hence, energy efﬁciency is considered as the main design challenge. For homogeneous WSNs, several routing techniques based on clusters are available, but only a few of them are focused on energy-efﬁcient heterogeneous WSNs (HWSNs). However, security provisioning in end-to-end communication is the main design challenge in HWSNs. This research work presents an energy optimizing secure routing scheme for IoT application in heterogeneous WSNs. In our proposed scheme, secure routing is established for conﬁdential data of the IoT through sensor nodes with heterogeneous energy using the multipath link routing protocol (MLRP). After establishing the secure routing, the energy and network lifetime is improved using the hybrid-based TEEN (H-TEEN) protocol, which also has load balancing capacity. Furthermore, the data storage capacity is improved using the ubiquitous data storage protocol (U-DSP). This routing protocol has been implemented and compared with two other existing routing protocols, and it shows an improvement in performance parameters such as throughput, energy efﬁciency, end-to-end delay, network lifetime and data storage capacity.


Introduction
The IoT and WSNs are becoming viable solutions that are widely utilized in real-time data collection and monitoring applications, which include automated irrigation, target monitoring, observing clinical records, tracking landslides and predictions for forest fire and disaster management.A WSN consists of numerous effective sensor nodes (SNs) that monitor climatic disasters found in harsh or remote areas.Furthermore, the SNs examine the atmospheric factors such as pressure, temperature, humidity, sound and moisture content representing intense symptoms.After an SN completes its sensing operation, the Energies 2022, 15, 4777 2 of 16 information is gathered and transmitted to the base station (BS).The sensor and data communication units of SNs consume more energy and once the entire energy is exhausted, it expires or is unable to process [1].Hence, a node that is considered dead is unsuitable for either replacing with or recharging using an alternate power source.Hence, balancing the power utilization of a SN is more essential.To overcome these challenges, several developers have used clustering approaches [2], which can scale up the network lifetime and provide remarkable efficiency.Furthermore, it is supportive in maintaining power as numerous reliable clusters are formed.These clusters, based on the techniques used, can either be considered temporary or permanent.Moreover, clustering distributes the nodes that are placed jointly, which is accomplished based on similarity metrics such as the distance from the base station (BS), radius of transmission and density of the cluster.After the clusters are formed, a node from the cluster is chosen as the cluster head (CH) whose responsibility is to organize the data gathered from cluster members (CM) and transmit those data to the BS.When a single node cluster is considered, it mandatorily communicates with the sink rather than the BS, which finally results in a reduction in power utilization.In WSNs, the serious threats, along with the technical challenges, which arise due to the nature of resource constraints and its limited availability [3], have to be focused on to ensure revision and distribution.With WSNs in an open area, the sensors are more vulnerable to the unfriendly environment that arises due to humidity, increased temperature, pressure, snow, rain, dust and so on.These affect the functions of the wireless sensor network, and hence a demand arises to introduce robust and flexible SNs.Moreover, general and future challenges are constrained to the limited resources, the limited ability of communication, fault tolerance, stability, mobility, bandwidth, precision, reliability, availability, heterogeneity, accountability, uncontrollable setup and denial of service (DoS).Above all, some specific challenges have turned the attention of the researchers towards the utilization of power, network duration, throughput, security and routing protocols.In WSNs, during communication, energy consumption is a highly prominent issue that seeks attention.Energy efficiency has a greater impact on the entire performance of the network and acts as a significant function in the lifespan of a WSN [4].The metrics that are essential while routing and estimating the cost function (CF) in a WSN are total energy, energy consumed and residual energy.Energy is one of the most significant aspects of the efficient working of wireless sensor networks.The longevity of the network is totally dependent upon the optimum use of the available energy; therefore, optimization is much needed for the efficient utilization of energy.Routing protocol, considered as an important factor, has to be selected carefully to route the data packets safely to the destination with less overhead because of the resource constraints of SNs, namely, their limited power and shorter range for communication.Numerous efforts have been made to bring out the best solutions for WSNs, yet extraordinary works are required [5].The benefits of the IoT are as follows.An urban IoT has many facilities that may bring a number of benefits such as the management and optimization of traditional public services, including transport and parking facilities, lighting, the surveillance and maintenance of public areas, preservation of cultural heritage, garbage collection, public health care, i.e., hospitals, and schools.Therefore, the availability of different types of data that will store in the cloud or be collected by a data warehouse in the urban IoT should increase the transparency and promote the actions of the local government or municipality towards the citizens, which can increase the awareness of people about the status of their city and their life style.Therefore, the application of the IoT paradigm to the smart city is attractive and expansive for local government and administrations; however, it take times to adopt IoT technology in a wide manner.
This research is organized as follows: A detailed review of the literature related to this research is described in Section 2. The design, algorithms and functionality of the proposed protocol are elaborated on in Section 3. The simulation results of the proposed protocol are presented in Section 4, which is followed by the conclusion in Section 5.

Related Works
Mostly, in large scale networks such as the IoT and SNs with restricted constraints, the demanding factor is energy conservation.Generally, in networks based on clusters [6], the controlling entity is CH, whose significant role is to gather data and transmit them.Furthermore, in large scale WSNs integrated with the IoT, the crucial part is to route data securely as they involve constrained resources.Several existing approaches do not provide reliable and secure data routing in the network as they lack protection schema against threats [7].A low-energy adaptive clustering hierarchy (LEACH) protocol consists of multi-stages [8].The LEACH protocol's performance was improved by applying a multi-hop basis for transmitting information [9].The design elucidated the unstable consumption of energy as the clusters were randomly created.Moreover, the multi-hop paths created were not optimized, which resulted in route breaks.In a chain-chain-based routing protocol (CCBRP) [10], the principles of LEACH as well as Power-Efficient Gathering in Sensor Information Systems (PEGASIS) were integrated, which resulted in scalable energy conservation in SNs while forwarding data.This hybrid CCBRP protocol, which was executed in two stages, reflected the drawback of a higher energy consumption in the nodes and the production of high latency.Subsequently, as the scalability is restricted, CCBRP was not suitable for larger networks.Kumar et al., proposed a data collection as well as a load balancing scheme that was designed to save energy.The network performance was improved in this scheme as the aggregating data were sequenced by data forwarding [11].A vigorous authentication protocol for energy efficiency was developed for an industrial IoT-based WSN, which provided scalable data security.In this method, mutual authentication was followed between nodes, but the energy was consumed gratuitously, thereby compromising the network lifetime [12].Likewise, the Shamir secret sharing method comprised two phases, namely, share generation as well as reconstruction.The generated secret was distributed among nodes and the secret key was reconstructed by the usage of any nodes of the subset.The data transmission using this method consumed additional energy leading to routing overheads [13].If the flow entry exists, the forwarding is performed according to the flow table, and if not, the packet-in message is sent to the subset.After receiving the packet-in message, the subset will make a decision.An improved three-layer hybrid clustering method (ETL-HCM) analysed and limited the control traffic specifically while selecting CH.This method achieved an 18% improvement in the lifetime of the network as well as half of the nodes being alive compared with the hybrid hierarchical clustering approach (HHCA).However, this method was not suitable for selecting the grid head (GH) [14].To beat hateful attacks such as Sybil, wormholes and a black hole, a novel protocol was introduced by Haseeb et al. to ensure reliable routing and data transmission [15].The functioning of a combined GIN with GEAR protocol resulted in being too complicated to achieve data security [16].A voting-based hybrid ensemble classification method was introduced for predicting the availability of parking lots, wherein 96% of the accuracy and 89% of the availability rate was achieved [17].An optimal network coding backpressure routing (NCBPR) method was developed for a large-scale IoT to divert the flow of data packets from highly congested nodes to low ones, thereby balancing the load and optimizing the battery power [18].The nodes in the network were formed as clusters and the CHs were selected based on the battery power.Moreover, an efficient data aggregation model was involved to improve the network throughput, wherein the redundant data packets were eliminated.An efficient load balancing optimization algorithm for the employment of energy effectual routing as well as a load balancing protocol were used to enhance the network lifetime [19,20].The authors in [21] explored the cluster-based backpressure routing algorithm for IoTs, which discusses the energy and congestion issues in IoT environment.A brief discussion is also presented related to the sustainable development through the Internet of Things in [22,23].
A novel framework was proposed to handle environmental monitoring using wireless sensors connected with the internet, wherein two distinctive SNs were involved.Moreover, clients observed the information using the web application on the internet from anywhere.When the information of the SN surpassed the specified range, a notification was sent to the Energies 2022, 15, 4777 4 of 16 clients insisting on the environmental setup being altered accordingly [24][25][26].Energy is a critical issue in WSNs and the IoT, specifically when deployed in smart city applications and this was discussed briefly in [27][28][29][30].
To establish secure routing for confidential data of the IoT through sensor nodes with heterogeneous energy utilizing MLRP. 2.
To optimize the energy and improve the network lifetime using a hybrid-based TEEN (H-TEEN) protocol that has load balancing capacity. 3.
To improve the storage capacity using the ubiquitous data storage protocol (U-DSP).

Proposed Methodology
The proposed routing protocol with a storage capacity protocol has been discussed in three phases.The first phase implements data routing with the security of the sensor nodes for confidential data through the IoT, which has heterogeneous energy using a multipath link routing protocol (MLRP).The next phase is to incorporate the H-TEEN protocol, which has load balancing capacity for sensor nodes that helps in attaining the energy optimization of nodes.Then the transmission of data is carried out using the security and optimization of energy.Finally, the data are stored with improved capacity using the ubiquitous data storage protocol (U-DSP).The architecture is given in Figure 1.
Energies 2022, 15, x FOR PEER REVIEW 4 of 16 Moreover, clients observed the information using the web application on the internet from anywhere.When the information of the SN surpassed the specified range, a notification was sent to the clients insisting on the environmental setup being altered accordingly [24][25][26].Energy is a critical issue in WSNs and the IoT, specifically when deployed in smart city applications and this was discussed briefly in [27][28][29][30].
Research Objectives 1.To establish secure routing for confidential data of the IoT through sensor nodes with heterogeneous energy utilizing MLRP.
2. To optimize the energy and improve the network lifetime using a hybrid-based TEEN (H-TEEN) protocol that has load balancing capacity.
3. To improve the storage capacity using the ubiquitous data storage protocol (U-DSP).

Proposed Methodology
The proposed routing protocol with a storage capacity protocol has been discussed in three phases.The first phase implements data routing with the security of the sensor nodes for confidential data through the IoT, which has heterogeneous energy using a multipath link routing protocol (MLRP).The next phase is to incorporate the H-TEEN protocol, which has load balancing capacity for sensor nodes that helps in attaining the energy optimization of nodes.Then the transmission of data is carried out using the security and optimization of energy.Finally, the data are stored with improved capacity using the ubiquitous data storage protocol (U-DSP).The architecture is given in Figure 1.

Multipath Link Routing Protocol (MLRP)
MLRP comprises five various stages, namely, detecting neighbors, constructing topology, distributing pairwise keys, forming a cluster and transmitting data.Every process is described in detail below.
Detection of neighbors and construction of topology: It is considered that every node holds an ID{IDx}, certificate {CERTx}, public key {Kbs} and unique shared key {Kxbs}.To

Multipath Link Routing Protocol (MLRP)
MLRP comprises five various stages, namely, detecting neighbors, constructing topology, distributing pairwise keys, forming a cluster and transmitting data.Every process is described in detail below.
Detection of neighbors and construction of topology: It is considered that every node holds an ID{ID x }, certificate {CERT x }, public key {K bs } and unique shared key {K xbs }.To identify the neighbors, node broadcasts and receives NBR DET packet containing its ID as well as its CERT as in Equation (1).
x → * : Energies 2022, 15, 4777 5 of 16 The node receiving the NBR_DET packet initially authenticates the ID of the node by verifying CERT x .When authenticated, the ID is added to the neighbor list by the receiver, or else the packet is dropped such that the unauthenticated node does not participate in this process of detecting neighbors.Once broadcasting is complete, neighbor information is forwarded to BS as in Equations ( 2) and (3).
An intermediate node that is receiving the NBR_INFO packet performs few functions such as: 1.
The authentication of the SN is verified by its certificate.

2.
When the ID of the node is authorized, the packet is again broadcasted by the receiver node.

3.
When the receiver receives a similar packet having a similar ID again, the packet is simply dropped.
Hence, a table is maintained by every node termed as a receiver packet table.Thus, the network traffic is reduced and node energy is saved to some extent.Once the NBR INFO packet is reached at BS, BS verifies MAC for authenticity and integrity; then neighbor information is authenticated using K xbs between SN and BS.MAC, obtained from the data and by encrypting K xbs , is used such that the intruder cannot either alter or spoof neighbor information.

Distribution of Pairwise Key
Once the information about the neighbor is obtained from the network nodes, BS analyzes the exact network topology and generates the neighbor matrix.Then the DFS algorithm is applied by which multiple paths are identified from BS to each source node.Beforehand, for each neighbor pair, BS generates the secret key, a random number, termed as pairwise key with the help of the hash function given by Equations ( 4)- (6).
BS unicasts this key to the corresponding node as The packet holds its type, sequence number, the ID of BS, neighbor and destination, certificate of BS, pairwise key and MAC of entire data.Every intermediate node that receives the packet performs the following operations: (1) The certificate of BS is verified with the public key.
(2) The sequence number as well as the node pair is checked in the receiver packet table.
When no such value is found, sequence number, type of the packet and node pair along with packet rebroadcasting is stored or else dropped.(3) When the ID of the destination is identical to its ID, the pairwise key is encrypted, MAC is verified and the encrypted packet of neighbor with nonce as well as its ID encrypted using a pairwise key is sent, which is given by Equation (7).
x → y : CH ALLENGE ID y E K yb , K xy E(K xy , ID x nonce) Energies 2022, 15, 4777 6 of 16 The packet at node y is decrypted using unique shared key K yb and the pairwise key is generated followed by decrypting the next packet using the generated pairwise key then forwards the packet to x, which is given by Equation (8).
Both the neighboring nodes verify one another by swapping the challenge packet as well as reducing overhead of resending pairwise key to y from BS.In end, each pair of nodes holds a pairwise key.When the CHALLENGE_REP packet is not received at node x in the expected form, node x reports about the fake node to BS.

Cluster Formation
BS initiates cluster formation and cluster head (CH) is selected based on residual energy.It is assumed that the energy level of the node does not change after the cluster is formed.In total, 5-8% of the cluster nodes are selected as CH with the criteria given below: (1) Two cluster heads should not be neighbors; (2) every CH has not less than 7-10% nodes as a neighbor.Then BS unicasts CH INT to CH along the route from CH to BS as illustrated in Figure 2. By considering that the node is next hop in route, the format of the packet CH INT is given by Equation (9).
→ : Both the neighboring nodes verify one another by swapping the challenge packet as well as reducing overhead of resending pairwise key to y from BS.In end, each pair of nodes holds a pairwise key.When the CHALLENGE_REP packet is not received at node x in the expected form, node x reports about the fake node to BS.

Cluster Formation
BS initiates cluster formation and cluster head (CH) is selected based on residual energy.It is assumed that the energy level of the node does not change after the cluster is formed.In total, 5-8% of the cluster nodes are selected as CH with the criteria given below: (1) Two cluster heads should not be neighbors; (2) every CH has not less than 7-10% nodes as a neighbor.Then BS unicasts CH INT to CH along the route from CH to BS as illustrated in Figure 2. By considering that the node is next hop in route, the format of the packet CH INT is given by Equation (9).
Every node that receives the packet performs the following: (1) ID of the next hop is checked, if identical to its own, routing path (PATH) is decrypted and next hop from PATH is identified or else packet is dropped.( 2) The sequence number is checked in the receiver packet table, then store packet type and sequence number if the sequence number did not exist in the table, and the changes needed are made, or else it is stopped.(3) Preceding hop is assigned its ID, while the subsequent one with the ID is found in PATH.(4) Routing table is stored in memory along with the previous one, as well as next hop, such that it helps in transmitting the data to BS. ( 5) PATH, as well as the sequence path for the subsequent hop, are encrypted with a pairwise key and the updated packet is forwarded.While CH is receiving the CH INT packet, decryption of PATH takes place and the data are verified by the MAC; then acknowledgement (ACK) is sent to BS via the same path.Every node that receives the packet performs the following: (1) ID of the next hop is checked, if identical to its own, routing path (PATH) is decrypted and next hop from PATH is identified or else packet is dropped.(2) The sequence number is checked in the receiver packet table, then store packet type and sequence number if the sequence number did not exist in the table, and the changes needed are made, or else it is stopped.(3) Preceding hop is assigned its ID, while the subsequent one with the ID is found in PATH.(4) Routing table is stored in memory along with the previous one, as well as next hop, such that it helps in transmitting the data to BS. ( 5) PATH, as well as the sequence path for the subsequent hop, are encrypted with a pairwise key and the updated packet is forwarded.While CH is receiving the CH INT packet, decryption of PATH takes place and the data are verified by the MAC; then acknowledgement (ACK) is sent to BS via the same path.
When ACK is not received by BS within certain time from CH, the path is recomputed and the CH INT packet is sent again.A few criteria are involved in determining the routing path including the path having residual energy and power consumed.A path is selected with more residual energy and small hops count.To form a cluster, a CH ADV packet is sent by CHs to publicize their will.
ID and CERT are present in CH and the ADV packet, such that the receiving node ensures authentication.Nodes receiving several CH and ADV select CH based on two factors: (1) checking if the pairwise key is present in the ID advertised and (2) signal strength of advertisement forwarded.Once CH is selected, the will of the nodes is forwarded by CH JOIN packet with ID as well as MAC with pairwise key and a nonce.Once entire CH JOIN is received, information of the cluster members is sent to the BS by CH, and the TDMA schedule is created based on the total nodes in the cluster and unicast to every member.The packet has the following format by Equations ( 10)- (12).

Data Transmission
The data transmission phase comprises three subphases; (1) The data sensed with encrypted and authenticated format transmitted by the member node to CH and when not linked to any route, can sleep so that energy is saved.(2) The received data are aggregated and compressed by CH to generate a new signal, which is then transmitted to BS through the route specified.(It is considered that node j is subsequent hop in routing table.)(3) Base station uses an exclusively shared key for decryption and authentication of the data received.
These subphases are observed with the form as given in Equations ( 13) and ( 14).
x → CH : Once the data are received, they are aggregated by CH and then forwarded to BS by Equation (15). (15)  AGGR_DATA specifies the type of the packet, ID ch and ID j denote the previous and next hop in the path, respectively; the packet reply is verified with the encrypted sequence number when AGGR_DATA packet is received by any node with identical sequence number, then packet is dropped.D ch represents encrypted data for BS and MAC, which supports maintenance of the packet integrity and authentication.The following operations are performed by the node receiving this packet: (1) ID of the next hop is checked; when similar to its ID, the sequence number is decrypted.(2) The packet sequence number is verified in the receiver packet table, if not found, packet type and the sequence number is entered or else left out.(3) The entry of the subsequent hop is modified with the ID of the subsequent hop nodes and that of the preceding hops with its ID. ( 4) The sequence number is encrypted using the pairwise key of subsequent hop as well as then forwarded again.In this manner, data reach the BS through the route specified and BS uses an exclusively shared key (K chbs ), which evaluates the data efficiency.

Incorporation of H-TEEN
In H-TEEN, after selecting the CHs, CHs forwards the following parameters: 1.
Attributes (A): This physical set of parameters helps the user to collect the data.

2.
Thresholds: This is composed of hard and soft thresholds denoted by HT and ST, respectively.HT is the particular value that triggers the node to broadcast the data.ST is a little alteration in the significance that triggers the node to rebroadcast the information.

3.
Schedule: It is scheduled by TDMA that allows the slot to each node.4.
TimeCount (TC): This is the utmost duration of the pair consecutive reports forwarded by a node.This is the numerous length of the schedule that accounts for the practical component.In a WSN, closer nodes form a cluster that senses analogous data and forwards them concurrently, which leads to collisions.TDMA schedule is introduced so that every cluster member is assigned a slot for transmission.

U-DSP
In a storage system, businesses store data in the data server located remotely, and hence data authenticity is assured.When, occasionally, unauthorized users delete or modify data, the server is compromised and/or randomly leads to Byzantine failures.As this is the initial process for recovering the storage errors quickly, cloud storage systems introduce a flexible as well as effective distributed approach with explicit dynamic data support for distribution of files in a cloud server.The homomorphic token is computed with the help of a universal hash function and is integrated with verification of erasure-coded data.Moreover, servers that misbehave are also identified.At last, file retrieving and error recovering procedures based on erasure-correcting code are defined.

Performance Analysis and Discussion
The efficiency of the secure routing protocol with energy optimization and data storage was evaluated with several simulation experiments with randomly varying topology.NS-2 version 2.34 was the simulation tool used and considered a multi-hop network with 1000 m × 1000 m size located in a randomized grid with SNs from 50 to 200.The sink node was at the centre of the network.Traffic was CBR of 600 packets/sec and packet size was 316 bytes.The heterogeneity of the network was proven in the simulation by testing the environment with different sets of nodes.The simulation parameters are shown in Table 1.The performance measures considered were throughput, end-to-end delay, energy efficiency, the lifetime of the network and data storage capacity.
End-to-end delay, an important metric, is considered to deal with real-time traffic and transmit data packets within the stipulated time.End-to-end delay is the difference in the time taken between the source node transmitting data and the sink receiving it.It is the sum of the delay in transmission, propagation, queuing and processing at every hop.
Table 2 shows a comparison of the end-end delay.Figure 3 depicts the end-end delay for the proposed MLRP-HTEEN-UDSP protocol and Figure 4 compares it with the other protocols such as LEACH, CCBRP and PEGASIS.It suggests that the proposed protocol performs better than other protocols.The delay is at a minimum since the hierarchical architecture of the CHs for all the times chooses the route that has fewer hops with good quality links. in the time taken between the source node transmitting data and the sink receiving it.It is the sum of the delay in transmission, propagation, queuing and processing at every hop.
Table 2 shows a comparison of the end-end delay.Figure 3 depicts the end-end delay for the proposed MLRP-HTEEN-UDSP protocol and Figure 4 compares it with the other protocols such as LEACH, CCBRP and PEGASIS.It suggests that the proposed protocol performs better than other protocols.The delay is at a minimum since the hierarchical architecture of the CHs for all the times chooses the route that has fewer hops with good quality links.    in the time taken between the source node transmitting data and the sink receiving it.It is the sum of the delay in transmission, propagation, queuing and processing at every hop.
Table 2 shows a comparison of the end-end delay.Figure 3 depicts the end-end delay for the proposed MLRP-HTEEN-UDSP protocol and Figure 4 compares it with the other protocols such as LEACH, CCBRP and PEGASIS.It suggests that the proposed protocol performs better than other protocols.The delay is at a minimum since the hierarchical architecture of the CHs for all the times chooses the route that has fewer hops with good quality links.Throughput is the total packets received by the sink within a specified duration.The comparison of throughput is shown in Table 3.  Figure 5 depicts the throughput of MLRP-HTEEN-UDSP, while Figure 6 compares the throughput of the proposed protocol with other protocols.The selection of multiple paths and minimum delay balances the load and uses the wireless spectrum efficiently.Thus, it achieves a higher throughput than other protocols.Throughput is the total packets received by the sink within a specified duration.The comparison of throughput is shown in Table 3. Figure 5 depicts the throughput of MLRP-HTEEN-UDSP, while Figure 6 compares the throughput of the proposed protocol with other protocols.The selection of multiple paths and minimum delay balances the load and uses the wireless spectrum efficiently.Thus, it achieves a higher throughput than other protocols.Throughput is the total packets received by the sink within a specified duration.The comparison of throughput is shown in Table 3. Figure 5 depicts the throughput of MLRP-HTEEN-UDSP, while Figure 6 compares the throughput of the proposed protocol with other protocols.The selection of multiple paths and minimum delay balances the load and uses the wireless spectrum efficiently.Thus, it achieves a higher throughput than other protocols.Table 4 shows a comparison of the energy efficiency.The average energy efficiency is represented in Figure 7 where we can realize that our proposed protocol MLRP-HTEEN-UDSP has less energy dissipation compared with other protocols (LEACH, CCBRP and PEGASIS) as shown in Figure 8 with various node numbers.Table 4 shows a comparison of the energy efficiency.The average energy efficiency is represented in Figure 7 where we can realize that our proposed protocol MLRP HTEEN-UDSP has less energy dissipation compared with other protocols (LEACH CCBRP and PEGASIS) as shown in Figure 8 with various node numbers.Table 5 shows the comparison of the network lifetime.Figure 9 presents the network lifetime for the proposed MLRP-HTEEN-UDSP and Figure 10 shows a comparison of the network lifetime between the proposed and existing techniques.Table 4 shows a comparison of the energy efficiency.The average energy efficiency is represented in Figure 7 where we can realize that our proposed protocol MLRP-HTEEN-UDSP has less energy dissipation compared with other protocols (LEACH, CCBRP and PEGASIS) as shown in Figure 8 with various node numbers.Table 5 shows the comparison of the network lifetime.Figure 9 presents the network lifetime for the proposed MLRP-HTEEN-UDSP and Figure 10 shows a comparison of the network lifetime between the proposed and existing techniques.Table 5 shows the comparison of the network lifetime.Figure 9 presents the network lifetime for the proposed MLRP-HTEEN-UDSP and Figure 10 shows a comparison of the network lifetime between the proposed and existing techniques.Table 7 represents the overall parameter comparison of the proposed and existing techniques, and Figure 13 is the graphical representation of the overall comparison.Table 7 represents the overall parameter comparison of the proposed and existing techniques, and Figure 13 is the graphical representation of the overall comparison.

Figure 4 .
Figure 4. Comparison of end-to-end delay.

Figure 4 .
Figure 4. Comparison of end-to-end delay.Figure 4. Comparison of end-to-end delay.

Figure 4 .
Figure 4. Comparison of end-to-end delay.Figure 4. Comparison of end-to-end delay.

Figure 12 .
Figure 12.Comparison of data storage.Table 7 represents the overall parameter comparison of the proposed and existing techniques, and Figure13is the graphical representation of the overall comparison.

Figure 12 .
Figure 12.Comparison of data storage.

Figure 12 .
Figure 12.Comparison of data storage.

Table 2 .
Comparison of end-end delay.

Table 2 .
Comparison of end-end delay.

Table 2 .
Comparison of end-end delay.

Table 3 .
Comparison of throughput.

Table 3 .
Comparison of throughput.

Table 3 .
Comparison of throughput.

Table 4 .
Comparison of energy efficiency.

Table 4 .
Comparison of energy efficiency.

Table 4 .
Comparison of energy efficiency.

Table 6 .
Comparison of data storage.