Green Energy Efficient Routing with Deep Learning Based Anomaly Detection for Internet of Things (IoT) Communications

: Presently, a green Internet of Things (IoT) based energy aware network plays a signiﬁcant part in the sensing technology. The development of IoT has a major impact on several application areas such as healthcare, smart city, transportation, etc. The exponential rise in the sensor nodes might result in enhanced energy dissipation. So, the minimization of environmental impact in green media networks is a challenging issue for both researchers and business people. Energy efﬁciency and security remain crucial in the design of IoT applications. This paper presents a new green energy-efﬁcient routing with DL based anomaly detection (GEER-DLAD) technique for IoT applications. The presented model enables IoT devices to utilize energy effectively in such a way as to increase the network span. The GEER-DLAD technique performs error lossy compression (ELC) technique to lessen the quantity of data communication over the network. In addition, the moth ﬂame swarm optimization (MSO) algorithm is applied for the optimal selection of routes in the network. Besides, DLAD process takes place via the recurrent neural network-long short term memory (RNN-LSTM) model to detect anomalies in the IoT communication networks. A detailed experimental validation process is carried out and the results ensured the betterment of the GEER-DLAD model in terms of energy efﬁciency and detection performance. the applicability of various models, IoT is applied in army services, organizational ﬁelds, mobile communications, etc. The quantity of data balanced by IoT not been presented due to insufﬁcient storage space, request rate, and concentration of a tool. As persistent communication is provided, data management and its ﬂow get varied by means of time. Numerous data and allocation services are emanated for IoT users by simple requests and responses via end-to-end servers as well as gateways. In IoT model, low power and lossy network (LLN) comprised of numerous nodes with robust limitation of storage space, computation ability capacity, and energy. Based on this approach, nodes from IoT systems have diverse hardware abilities and application domains. The application of IoT is depicted in Figure 1, where the nodes are connected to the Internet. Unlike, alternate nodes from similar systems, because of the hardware constraints, a direct Internet connection is not possible and necessities the application of Internet-connected nodes to apply the physical services.


Introduction
The modern world adopts recent communication technologies to make a complete network coverage system and extended the intelligent object count which is correlated to the deployed system. One of the effective patterns named Internet of Things (IoT) is capable of increasing the volume of data generated from the Internet by connecting users and modern tools. Moreover, the IoT faces some issues, especially in location and time while connecting to humans and machines [1]. Moreover, IoT intends to achieve Quality of Service (QoS) such as energy, delay, throughput, etc. Bandwidth is one of the significant sources in the IoT platform, and appropriate management is essential to accomplish maximum QoS. Furthermore, the requirement for multimedia facilities in IoT platform is enhanced intensely. It finds useful in smart grids, smart homes, etc. [2,3]. Various services in IoT have distinct characteristics and QoS mechanisms. The fundamental strategy of IoT is to correlate one another with the help of the internet. In future, numerous applications might be developed and one among them is modern city. The exploitation of IoT has been increased rapidly and some of them are food, textiles, organization, transportation, academics, entertainment, and so forth. might be developed and one among them is modern city. The exploitation of IoT increased rapidly and some of them are food, textiles, organization, transportat demics, entertainment, and so forth.
Due to the applicability of various communication models, IoT is ap healthcare, army services, organizational fields, mobile communications, etc. The of data balanced by IoT has not been presented due to insufficient storage space rate, and concentration of a tool. As persistent communication is provided, data ment and its flow get varied by means of time. Numerous data and allocation ser emanated for IoT users by simple requests and responses via end-to-end server as gateways.
In IoT model, low power and lossy network (LLN) comprised of numerou with robust limitation of storage space, computation ability capacity, and energ on this approach, nodes from IoT systems have diverse hardware abilities and ap domains. The application of IoT is depicted in Figure 1, where the nodes are conn the Internet. Unlike, alternate nodes from similar systems, because of the hardw straints, a direct Internet connection is not possible and necessities the applicati ternet-connected nodes to apply the physical services. Form the content of low-power IoT systems, the routing protocols are class types on the basis of route developing strategies namely, Proactive and Reactive. proactive protocols simulate the deployment of routes between nodes with no a data message transmission. In general, route creation is accelerated by gateway n gathering data from alternate system (Multipoint-to-Point (MP2P) traffic). For pose, this kind of protocol has been applied extensively by periodical data collecti els. The significant module of proactive routing is IPv6 Routing Protocol (RPL) reactive protocols make routes if a node decides to forward a message to the Therefore, this kind of protocol is induced for a non-periodical traffic domain, in node transfers a message to some other destination (Point-to-Point (P2P) traffic).
The recently established and related reactive protocol for LLN is referr LOADng [4]. In the meantime, the increased IoT objectives have reasonable cybe problems due to the presence of attacks. In recent times, the deployment of Deep L (DL) and hardware system provides a way to predict the traffic state, data offload Form the content of low-power IoT systems, the routing protocols are classified as 2 types on the basis of route developing strategies namely, Proactive and Reactive. Initially, proactive protocols simulate the deployment of routes between nodes with no advanced data message transmission. In general, route creation is accelerated by gateway nodes by gathering data from alternate system (Multipoint-to-Point (MP2P) traffic). For this purpose, this kind of protocol has been applied extensively by periodical data collecting models. The significant module of proactive routing is IPv6 Routing Protocol (RPL). Unlike, reactive protocols make routes if a node decides to forward a message to the receiver. Therefore, this kind of protocol is induced for a non-periodical traffic domain, in which a node transfers a message to some other destination (Point-to-Point (P2P) traffic).
The recently established and related reactive protocol for LLN is referred to be LOADng [4]. In the meantime, the increased IoT objectives have reasonable cybersecurity problems due to the presence of attacks. In recent times, the deployment of Deep Learning (DL) and hardware system provides a way to predict the traffic state, data offloading, and cyber-attacks in the edge system. Adopting DL methods are highly essential and significant in several applications where MEC offers the decisive advantage for traffic Mathematics 2021, 9, 500 3 of 18 prediction and intrusion detection as huge data has been produced by IoT devices activates deep models to understand the workflow when compared with shallow methods. Feature learning with deep neural networks have shown considerable developed in the recent times [5,6].
Though several coding schemes as well as routing techniques are available in the literature, they are not integrated to one another to develop an effective framework for green IoT. Besides, the design of new anomaly detection techniques is yet to be deeply explored. This paper develops a novel Green Energy Efficient Routing with Deep Learning based Anomaly Detection (GEER-DLAD) technique for IoT applications. The presented model permits the IoT devices to exploit energy efficiency in such a way to rise the network span. The GEER-DLAD technique accomplishes the error lossy compression (ELC) model to mitigate the quantity of data over the network. Moreover, moth flame swarm optimization (MSO) algorithm based routing process takes place in the network. In addition, DLAD process takes place via the recurrent neural network-long short term memory (RNN-LSTM) model. The integration of the GEER with anomaly detection, compression process, and energy efficient routing process shows the novelty of the work. In order to determine the supremacy of the GEER-DLAD model, a series of simulations were carried out.

Related Works
This section performs a detailed review of energy efficient routing protocols and data reduction techniques available in the literature.

Existing Routing
In Yi et al. [7], developers have related LOADng with RPL in applications with diverse traffic patterns. Based on the attained results, it is clear that LOADng outperformed RPL in point-to-multipoint (P2MP) as well as P2P traffic scenes. However, in MP2P, RPL has projected considerable outcomes. Moreover, the proactive properties of RPL create a better environment for data gathering applications. Unlike, LOADng is capable to perform better with comprehensive traffic; however, it has projected a maximum delay due to the requirement of examining route discovery. The working function of LOADng in IoT domains with P2P as well as MP2P traffic pattern as defined in Sobral et al. [8]. The influence of route selection in LOADng has been studied extensively in Sobral et al. [9]. An enhancement of LOADng is presented in Hossain et al. [10]. Therefore, Neighbor-Disjoint Multipath for LOADng (LOADng + NDM) shows a new multipath mechanism applied for LOADng and decides to enhance network consistency and QoS. A small path has been initialized from the transmitter and receiver node. Followed by, it also manages to develop collective backup routes by eliminating the nodes.
Araújo et al. [11] projected the enhancement routine measure for RPL in IoT platforms with heterogeneous tools. Fuzzy systems apply the routing measures in the network process using the application demands. Hence, the performance results have shown that the newly developed models are capable to resolve the basic RPL measures by means of power utilization as well as Packet Delivery Ratio (PDR). The routing protocol for IoT systems depends upon the routing measures as depicted in Machado et al. [12]. Moreover, Routing by Energy and Link quality (REL) projects the application of Ad-hoc On-demand Distance Vector (AODV) that decides to enhance the scalability and energy efficiency. Then, a protocol applies weakLinks approach to find the connections with limited quality over a path where the route development with maximum weakLinks is eliminated. Afterward, REL surpassed the AODV with respect to delay, PDR, and network survival rate.
Araújo et al. [13] projected a solution based smartphone to enable the interoperability of IoT tools. Developers have presented a structure where a smartphone collects huge communications interfaces to be operated as a gateway for diverse techniques. Hence, the software-based model applies the default execution of various standards. A special testbed is developed to estimate the solution by means of storage space, CPU, and power consumption. In Javaid et al. [14], developers have introduced solutions for gateway identification in Mobile Ad Hoc Networks (MANETs). This approach depends upon the application of periodical control messages and assumes the networks with mobile nodes which is ineffective for low-power IoT devices. Hence, the working function of solutions is determined by means of PDR as well as end-to-end delay.

Existing Data Compression Approaches
Various data reduction approaches for energy consumption of IoT has been deployed in the state of art. In Tayeh et al. [15], researchers have introduced a data reduction approach according to the dual prediction. The merits of the prediction model are that the edge forecasts the sensed value with no requirement of radio communication is processed till reaching the predefined threshold value. In Alieksieiev [16], developers have presented a data aggregation model for input data stream from IoT relied monitoring networks. The accomplished results have implied that it is applicable to gain a compression to the greater iterations on temperature data. In Azar et al. [17], researchers have projected data compression mechanism which is advantageous of temporal correlation in gathered data. It depends upon elegant and effective processing in 1D Discrete Wavelet Transform (DWT) by lifting models as well as Differential Pulse Code Modulation (DPCM).
Compressive Sensing (CS) as well as transform domain compression mechanism are prominently applied for images and multivariate time series compression in IoT domains. In Gaeta et al. [18], developers have employed multi-signal compression mechanism on the basis of fuzzy transform. It is utilized on multi-signal surrounding data gathered using Wireless Sensor Network (WSN) and limited the data to certain extent. In Cheng et al. [19], developers have presented 2-D lifting wavelet transformation for the purpose of compressing multi-signal data gathered from various sensor nodes. Hence, the newly developed model applies Haar wavelet and accomplished a better compression ratio as well as recovery accuracy. Transform domain compression is classified by the potential of recovering data. Besides, CS definition is generated as effective model energy-proficiency in IoT modalities. In addition, some context-adaptive binary arithmetic coding (CABAC) technique and their extended versions are available in [20,21].

The Proposed GEER-DLAD Model
The overall system architecture of the presented GEER-DLAD model is depicted in Figure 2. As shown in figure, the IoT devices continuously gather the data. Then, they are compressed by the use of ELC technique. Subsequently, the IoT devices executed the routing technique using the MSO algorithm and select the optimal route to the destination. Upon the election of routes, the compressed data will be forwarded towards the time. At the time of data transmission, the DLAD technique is applied to detect the occurrence of anomalies in IoT communication networks.

ELC Based Data Reduction Technique
Initially, the IoT devices execute the data collection process to gather the data regarding the target environment. A lightweight model of compression named ELC is projected in [22]. It is a robust error-bounded lossy compression technique for High Performance Computing (HPC) domains. The actual SZ model compresses the incoming data files in binary form; it is composed of data structure and data types. In this literature, the SZ approach has been adopted for IoT tools by assuming the floating data type and eliminate alternate types that reduce the code size and simple execution. Hence, the strategy behind selecting SZ for IoT domains are listed below: • SZ enables compression of multivariate time series with distinct characteristics and varying scales. • SZ activates the data loss management with the help of error bound mechanism. • SZ results in maximum compression ratio when compared with multidimensional transform domains.

ELC based Data Reduction Technique
Initially, the IoT devices execute the data collection process to gather the data regarding the target environment. A lightweight model of compression named ELC is projected in [22]. It is a robust error-bounded lossy compression technique for High Performance Computing (HPC) domains. The actual SZ model compresses the incoming data files in binary form; it is composed of data structure and data types. In this literature, the SZ approach has been adopted for IoT tools by assuming the floating data type and eliminate alternate types that reduce the code size and simple execution. Hence, the strategy behind selecting SZ for IoT domains are listed below: • SZ enables compression of multivariate time series with distinct characteristics and varying scales. • SZ activates the data loss management with the help of error bound mechanism. • SZ results in maximum compression ratio when compared with multidimensional transform domains.
The gathered data are M × N array, where M and N define the reading and feature count. For instance, assume a sensor movement gathered from gyroscope and accelerometer metrics for 3 coordinate axes over a period P. At this point, M is allocated as 128, and N is 6. Initially, 2-D array is changed into 1-D array. Next, a flattened array undergoes The gathered data are M × N array, where M and N define the reading and feature count. For instance, assume a sensor movement gathered from gyroscope and accelerometer metrics for 3 coordinate axes over a period P. At this point, M is allocated as 128, and N is 6. Initially, 2-D array is changed into 1-D array. Next, a flattened array undergoes compression with the help of lossy SZ method. At last, final binary array has been sent to the edge.
The SZ compressor is started by reducing 1-D array under the application of adaptive curve-fitting methods [23]. The optimal step applies 3 prediction technologies namely, Preceding Neighbor Fitting (PNF), Linear-Curve Fitting (LCF), and Quadratic-Curve Fitting (QCF). The variations among the 3 schemes of precursor data points has to fit the actual value. Moreover, the nearest approximation has been provided as a result. It is apparent that the fitted data is converted as integer quantization and subjected to the encoding phase with the help of the Huffman tree. In case of error bound, absolute error bound is applied where compression and decompression errors are restricted within absolute error.

MSO Based GEER Technique
Next to the data reduction process, the compressed form of the collected data needs to be routed to the destination. To determine the optimal choices of routes, MSO based GEER technique is applied. The MSO algorithm is inspired by the process of choosing the Mathematics 2021, 9, 500 6 of 18 optimal discriminating features of mitosis cells. In general, Moth is a bug that belongs to the butterfly family called Lepidoptera. Around 160,000 moth species exist globally, and it is visible at night-time. By comparing moth and alternate species, phototaxis and Levy flight is considered to be important.

Phototaxis
The basic strategy of the moth is that; it often moves around the light named phototaxis. There is no accurate method for phototaxis and is composed of the main hypotheses to define the phototaxis model. Followed by, it is meant to be a significant hypothesis in the celestial direction that has been executed in transverse orientation at the flying time. At the same time, the angle is initialized from the light source and the moth is directed, however, it is not applicable to acquire the transform, as the celestial object is found to be external distance. Thus, it travels to the light source, since moths create flight orientation to gain the best location [24]. A spiral-path has been developed to move closer to the light source.

Levy Flight
Heavy-tailed, non-Gaussian statistics are examined as common methods under diverse applications. Alternatively, Drosophila indicates a Levy flight, however, the flight is approximated as energy supply with feature exponent with 3/2. Generally, the Levy distribution is expressed in Equation (1), Basically, moths have the properties closer to optimal one and fly in a Levy flight mechanism approximately. Else, it instructs the position and uses Levy flight by means of Equation (2), however, moth is insisted using Equation (2): where, X a j and X a+1 j refers to the original and refreshed location at generation a, however the current generation is implied as a. It is accomplished from Levy flight as represented by L(s). In problems of interest, scale factor defines the variable δ. Hence, equation to δ is illustrated in Equation (3): Then, W max denotes maximum walk step and value for W max depends upon the available problem. L(s) from above equation is reformed as, In s is meant to be higher than 0. Γ(x), indicates a gamma function. In prior to allocating from L(s) with α = 1.5 moths Levy flight has been initialized.

Fly Straight
The present moths are isolated from light source that flutters in straight line in the direction of light. This function of moth j is devised as, where X a best defines the optimal moth at a generation, λ indicates a scale factor. ϕ denotes acceleration factor.
Else, moth will move away from light source to final position. Hence, the final location of moth j is offered in Equation (6), For integrity, the location of moth j is insisted by incomplete percentage. The original, refreshed, and best location of moth is projected as X j , X j,new and, X best .λ, tried the techniques with enhanced population diversity. Figure 3 shows the flowchart of MSO techniques. Then, FF values of the GEER technique using MSO is projected for generating a competent routing path between two IoT devices are given below. Afterward, the distance (P) traversed with gateways are defined in Equation (7).
The values of gateway are the system is defined in Equation (8).
Routing is ensured by small traversal and minimum number of hops. Lastly, minimum crossing distance and hop results in maximum fitness value. Thus, solution with higher fitness value is assumed to be optimal solution and the proposed FF is depicted in Then, FF values of the GEER technique using MSO is projected for generating a competent routing path between two IoT devices are given below. Afterward, the distance (P) traversed with gateways are defined in Equation (7).
Mathematics 2021, 9, 500 The values of gateway are the system is defined in Equation (8).
Routing is ensured by small traversal and minimum number of hops. Lastly, minimum crossing distance and hop results in maximum fitness value. Thus, solution with higher fitness value is assumed to be optimal solution and the proposed FF is depicted in Equation (9).
where (u 1 , u 2 ) ∈ [0, 1] such that, u 1 + u 2 = 1 and Z 1 indicates proportionality stable. Routing fitness utility is used for managing the complete distance and count hop in a system.

RNN-LSTM Based DLAD Technique
During the data transmission process, the DLAD task is performed using RNN-LSTM model to determine the existence of anomalies in the IoT networks. The LSTM model is mainly used for predicting the anomalies in RNN. It seems like a remarkable RNN with a hidden layer, in which a normal node of hidden layer is replaced with the help of memory cell as depicted in Figure 4. To compute the references of memory cell, subscript c is employed.

RNN-LSTM Based DLAD Technique
During the data transmission process, the DLAD task is performed using RNN-LSTM model to determine the existence of anomalies in the IoT networks. The LSTM model is mainly used for predicting the anomalies in RNN. It seems like a remarkable RNN with a hidden layer, in which a normal node of hidden layer is replaced with the help of memory cell as depicted in Figure 4. To compute the references of memory cell, subscript c is employed. The elegant recurrent NN is composed of long-term memory by means of weights. It is changed in training duration, and encode the general knowledge about a data. Moreover, short-term memory interms of ephemeral functions, which are passed from single node to next nodes. In this module, LSTM approach signifies an intermediate type of memory cell. The units of LSTM cells are enumerated and described as shown in the following. For example, s refers a vector with measure of at each memory cell from a layer [25]. When subscript c is applied, then it assists in a single memory cell.
Input node: The labeled , is considered as a node that gains activation from input layer ( ) in recent duration and from hidden layer at previous time step ℎ ( ) .

•
Input gate: The gates are considered as exclusive property of LSTM method. The gate mimics a sigmoidal input node, which acquires the activation from recent data point ( ) and from hidden layers previously. It is named as gate because of the multiplied value of some other node. When 0 is allocated as a value, then it is called gate while the flow of other node is cut off. And, when 1 is allocated, then all flows are conveyed.
In addition, measure of input gate enhances the measure of input node.

•
Internal state: The kernel points of memory cells are node with linear activation The elegant recurrent NN is composed of long-term memory by means of weights. It is changed in training duration, and encode the general knowledge about a data. Moreover, short-term memory interms of ephemeral functions, which are passed from single node to next nodes. In this module, LSTM approach signifies an intermediate type of memory cell. The units of LSTM cells are enumerated and described as shown in the following. For example, s refers a vector with measure of s c at each memory cell c from a layer [25]. When subscript c is applied, then it assists in a single memory cell.
Input node: The labeled g c , is considered as a node that gains activation from input layer l (z) in recent duration and from hidden layer at previous time step h (z−1) .

•
Input gate: The gates are considered as exclusive property of LSTM method. The gate mimics a sigmoidal input node, which acquires the activation from recent data point l (z) and from hidden layers previously. It is named as gate because of the multiplied value of some other node. When 0 is allocated as a value, then it is called gate while the flow of other node is cut off. And, when 1 is allocated, then all flows are conveyed.
In addition, measure of input gate u c enhances the measure of input node. • Internal state: The kernel points of memory cells are node s c with linear activation called inner state of a cell. Hence, the interior state s c has self-connected recurrent edge in conjunction with fixed unit weight. Because of the edge of time steps with same weight, error flows across time steps under the inexistence of exploding. It is called a constant error container. In case of vector function, upgrade the internal state as s (z) = g (z) u (z) + s (z−1) where denotes point-wise multiplication task. • Forget gate: The gates f c has been developed. It is capable of learning the content of interior state. It is highly suitable in prominent networks. Under the application of forget gates, forward pass in internal state can be measured as given below: • Output gate: Value v c is emanated by memory cell that has been assumed as value of internal state s c and enhanced by final gate o c . Moreover, it is considered that internal state is executed using tanh activation function, as the final outcome of a cell with same dynamic range is produced. However, in NN, solved linear units are composed of maximum dynamic range which helps in simple training. Therefore, it is reasonable for nonlinear function in which internal state is eliminated.
Basically, the input node is called as g. Here, gates are known y in and y out but the conflicts of y show a better result in the ML approach. Based on the comprehensibility, the convention is classified and applies u, f , and o defines input, forget, and outcome gates.
The peephole relations passed from internal state to input and outcome gates of the same node lacks primary rules to be applied in outcome gate. Consider a network to estimate objects and emits required results when n objects are viewed. Moreover, the system identifies different numbers of activation to the internal state. Such activations have emerged within the internal state s c with constant error container and enhanced. When nth object is considered, the network requires to find the internal state. This is accomplished by using outcome gates o c to learn the satisfying form of internal state s c . Thus, s c should be an input to o c . The estimation of LSTM depends upon memory cells appropriately. The consecutive process is implemented for all iterations. The expressions applied for recent LSTM with forget gates are depicted as: The measure of hidden layer of LSTM at time z is depicted as vector h (z) , as h (z−1) defines the measure of memory cell in hidden layer at previous time. Assume the function with forget gate, even though the peephole connections are absent. The processing step becomes simple for LSTM with no forget gates and accomplished with f (z) = 1 to every z. However, LSTM is the activation function to g and sigmoid σ.
Simultaneously, by means of a forward pass, LSTM is known only when activation is induced for internal state. It is given that input gate has accomplished value 0, and no activation function is accomplished. Followed by, LSTM has implemented maximum ability to understand long-range dependencies as relevant to simple RNNs.

Performance Validation
The presented technique is implemented in a PC i5-8600k processor, GeForce 1050Ti, 4GB RAM, 16GB OS Storage and 250GB SSD File Storage. This section discusses the analysis of the result of the presented GEER-DLAD model interms of energy efficiency, lifetime, throughput, average delay, and detection performance. For validating the energyefficient performance, a series of comparative results analysis takes place with grasshopper optimization algorithm (GOA), glowworm swarm optimization algorithm (GSOA), multi-objective particle swarm optimization algorithm (MOPSOA), and particle swarm optimization algorithm (PSOA). Table 1 and Figure 5 analyses the energy consumption results of the GEER-DLAD with existing methods with respect to distinct IoT devices. The resultant figure reported that the PSOA technique has resulted in inferior performance by exhibited higher energy consumption. Followed by, the MOPSOA has revealed slightly reduced energy consumption over PSOA. At the same time, the GSOA and GOA models have demonstrated closer energy consumption. However the presented GEER-DLAD model has accomplished better performance by obtaining reduced energy consumption over all the other compared methods. For instance, on the applied 10 IoT devices, the GEER-DLAD model has exploited a minimum energy consumption of 35 mJ whereas the GSOA, GOA, MOPSOA, and PSOA models have depicted higher energy consumption of 40 mJ, 43 mJ, 46 mJ, and 55 mJ respectively. Simultaneously, on the given 50 IoT devices, the GEER-DLAD model has applied a minimum energy consumption of 105 mJ whereas the GSOA, GOA, MOPSOA, and PSOA methods have depicted higher energy consumption of 126 mJ, 135 mJ, 146 mJ, and 165 mJ respectively. Concurrently, on the applied 100 IoT devices, the GEER-DLAD model has employed low power consumption of 160 mJ whereas the GSOA, GOA, MOPSOA, and PSOA models have illustrated maximum energy consumption of 174 mJ, 195 mJ, 213 mJ, and 222 mJ respectively.  Table 2 and Figure 6 investigates the network lifetime analysis of the GEER-DLAD model under distinct IoT devices. From the figure, it is showcased that the PSOA and MOPSOA models have demonstrated least network lifetime over the other methods. At the same time, GOA and GSOA models have exhibited even better network lifetime, but not superior to GEER-DLAD model. However, the GEER-DLAD model has exhibited improved network lifetime when compared with other models. For sample, on the applied 10 IoT devices, the GEER-DLAD model has obtained a higher network lifetime of 5600 rounds whereas the GSOA, GOA, MOPSOA, and PSOA models have exhibited reduced network lifetime of 5500, 5200, 4800, and 4500 rounds. Eventually, on the applied 50 IoT tools, the GEER-DLAD approach has gained a higher network lifetime of 4900 rounds whereas the GSOA, GOA, MOPSOA, and PSOA models have shown limited network lifetime of 4700, 4500, 4000, and 3600 rounds. Along with that, on the applied 100 IoT devices, the GEER-DLAD scheme has achieved a maximum network lifetime of 3800 rounds while the GSOA, GOA, MOPSOA, and PSOA schemes have showcased limited network lifetime of 3300, 3100, 2900, and 2800 rounds.

No. of IoT Devices
Network Lifetime (Rounds)  GEER-DLAD  GSOA  GOA MOPSOA  PSOA  10  5600  5500  5200  4800  4500  20  5500  5300  5000  4500  4300  30  5300  5000  4800  4300  4200  40  5100  4900  4700  4200  3800  50  4900  4700  4500  4000  3600  60  4600  4300  4200  3700  3500  70  4400  4100  3900  3400  3300  80  4100  3800  3500  3300  3200  90  3900  3500  3300  3000  2900  100  3800  3300  3100 2900 2800     Table 4 and Figure 8 examines the average delay results of the GEER-DLAD with existing methods with respect to distinct IoT devices. The resultant figure reported that the PSOA technique has resulted in poor performance by exhibited higher average delay. Followed by, the MOPSOA has revealed slightly reduced average delay over PSOA. At the same time, the GSOA and GOA models have depicted closer average delay. However the presented GEER-DLAD model has accomplished better performance by gaining reduced average delay over all the other compared methods. For example, on the applied   Table 4 and Figure    In order to validate the anomaly detection performance of the RNN-LSTM model, a detailed simulation process was carried out on NSL-KDD dataset [26].  Table 5 and Figure 9 illustrates the detection results of the RNN-LSTM model on the detection of distinct attack types. On the detection of DoS attack, the RNN-LSTM model has reported a precision, recall, F-measure, and accuracy of 96.15%, 97.17%, 96.36%, and 96.58%. Likewise, on the prediction of R21 attack, the RNN-LSTM method has shown a precision, recall, F-measure, and accuracy of 97.19%, 97.41%, 97.30%, and 97.38%. Besides, on the examination of Probe attack, the RNN-LSTM model has exhibited a precision, recall, F-measure, and accuracy of 98.08%, 98.02%, 97.91%, and 97.89%. Additionally, on the prediction of U2r attack, the RNN-LSTM model has implied a precision, recall, F-measure, In order to validate the anomaly detection performance of the RNN-LSTM model, a detailed simulation process was carried out on NSL-KDD dataset [26].  Table 5 and Figure 9 illustrates the detection results of the RNN-LSTM model on the detection of distinct attack types. On the detection of DoS attack, the RNN-LSTM model has reported a precision, recall, F-measure, and accuracy of 96.15%, 97.17%, 96.36%, and 96.58%. Likewise, on the prediction of R21 attack, the RNN-LSTM method has shown a precision, recall, F-measure, and accuracy of 97.19%, 97.41%, 97.30%, and 97.38%. Besides, on the examination of Probe attack, the RNN-LSTM model has exhibited a precision, recall, F-measure, and accuracy of 98.08%, 98.02%, 97.91%, and 97.89%. Additionally, on the prediction of U2r attack, the RNN-LSTM model has implied a precision, recall, F-measure, and accuracy of 97.06%, 97.43%, 97.22%, and 97%. Furthermore, on the detection of normal attack, the RNN-LSTM model has showcased a precision, recall, F-measure, and accuracy of 96.71%, 97.20%, 97.09%, and 97.13%. Moreover, the average outcome of the RNN-LSTM model has attained maximum outcome of precision, recall, F-measure, and accuracy of 97.04%, 97.45%, 97.18%, and 97.20%.   Table 6 and Figure 10 provides the comparative results of the RNN-LSTM model with previous techniques [27][28][29]. The experimental results implied that the AK-NN method has accomplished inferior results with the minimum precision of 92.19%, recall of 93.76%, F-measure of 92.92%, and accuracy of 91.99%. Similarly, the DL model has achieved a considerable precision of 93.54%, recall of 94.87%, F-measure of 94.12%, and accuracy of 92.77%. Afterward, the DPC-DBN model has achieved a reasonable precision, recall, F-measure, and accuracy of 95.12%, 94.99%, 95.08%, and 94.98%. Similarly, the DT model has attained competing for precision, recall, F-measure, and accuracy of 96.59%, 92.84%, 95.42%, and 93.65%. At last, the proposed RNN-LSTM model has resulted in higher precision, recall, F-measure, and accuracy of 97.04%, 97.45%, 97.18%, and 97.20%.

Methods
Precision Recall F-Measure Accuracy Figure 9. The Classifier results analysis of the RNN-LSTM model. Table 6 and Figure 10 provides the comparative results of the RNN-LSTM model with previous techniques [27][28][29]. The experimental results implied that the AK-NN method has accomplished inferior results with the minimum precision of 92.19%, recall of 93.76%, F-measure of 92.92%, and accuracy of 91.99%. Similarly, the DL model has achieved a considerable precision of 93.54%, recall of 94.87%, F-measure of 94.12%, and accuracy of 92.77%. Afterward, the DPC-DBN model has achieved a reasonable precision, recall, Fmeasure, and accuracy of 95.12%, 94.99%, 95.08%, and 94.98%. Similarly, the DT model has attained competing for precision, recall, F-measure, and accuracy of 96.59%, 92.84%, 95.42%, and 93.65%. At last, the proposed RNN-LSTM model has resulted in higher precision, recall, F-measure, and accuracy of 97.04%, 97.45%, 97.18%, and 97.20%.

Conclusions
This paper has developed an efficient GEER-DLAD technique for IoT applications. The presented model permits the IoT devices to exploit the energy efficiently in such a way to rise the network span. Primarily, the IoT devices continuously gather the data. Then, they are compressed by the use of ELC technique. Subsequently, the IoT devices executed the routing technique using MSO algorithm and select the optimal route to destination. Upon the election of routes, the compressed data will be forwarded towards the time. At the time of data transmission, the DLAD technique is applied to detect the occurrence of anomalies in IoT communication networks. A comprehensive experimental validation process takes place and the results guaranteed the improvement of the GEER-DLAD model interms of energy efficiency and detection performance. In future, the detection performance of the DLAD can be improved by the use of learning rate scheduling approaches. Besides, the advanced deep learning architectures can be used instead of RNN-LSTM model for anomaly detection. Furthermore, the local optimal and inefficient global exploration ability of the MSO algorithm can be resolved in our future work. At last, the computational complexity analysis of the proposed model can be investigated as a part of future extension.

Conclusions
This paper has developed an efficient GEER-DLAD technique for IoT applications. The presented model permits the IoT devices to exploit the energy efficiently in such a way to rise the network span. Primarily, the IoT devices continuously gather the data. Then, they are compressed by the use of ELC technique. Subsequently, the IoT devices executed the routing technique using MSO algorithm and select the optimal route to destination. Upon the election of routes, the compressed data will be forwarded towards the time. At the time of data transmission, the DLAD technique is applied to detect the occurrence of anomalies in IoT communication networks. A comprehensive experimental validation process takes place and the results guaranteed the improvement of the GEER-DLAD model interms of energy efficiency and detection performance. In future, the detection performance of the DLAD can be improved by the use of learning rate scheduling approaches. Besides, the advanced deep learning architectures can be used instead of RNN-LSTM model for anomaly detection. Furthermore, the local optimal and inefficient global exploration ability of the MSO algorithm can be resolved in our future work. At last, the computational complexity analysis of the proposed model can be investigated as a part of future extension.