You are currently viewing a new version of our website. To view the old version click .
Processes
  • Article
  • Open Access

9 February 2023

Energy-Efficient Bi-Objective Optimization Based on the Moth–Flame Algorithm for Cluster Head Selection in a Wireless Sensor Network

,
,
,
,
and
1
Hijjawi Faculty for Engineering Technology, Yarmouk University, Irbid 21163, Jordan
2
Department of Mechanical and Industrial Engineering, Faculty of Engineering, Liwa College of Technology, Abu Dhabi P.O. Box 41009, United Arab Emirates
3
College of Engineering, Al Ain University, Al Ain P.O. Box 64141, United Arab Emirates
4
Industrial Engineering Department, Faculty of Engineering, Istanbul Technical University, Istanbul 34469, Turkey
This article belongs to the Special Issue Design, Modeling, Optimization and Control in Manufacturing Industries and Energy System

Abstract

Designing an efficient wireless sensor network (WSN) system is considered a challenging problem due to the limited energy supply per sensor node. In this paper, the performance of several bi-objective optimization algorithms in providing energy-efficient clustering solutions that can extend the lifetime of sensor nodes were investigated. Specifically, we considered the use of the Moth–Flame Optimization (MFO) algorithm and the Salp Swarm Algorithm (SSA), as well as the Whale Optimization Algorithm (WOA), in providing efficient cluster-head selection decisions. Compared to a reference scheme using the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, the simulation results showed that integrating the MFO, SSA or WOA algorithms into WSN clustering protocols could significantly extend the WSN lifetime, which improved the nodes’ residual energy, the number of alive nodes, the fitness function and the network throughput. The results also revealed that the MFO algorithm outperformed the other algorithms in terms of energy efficiency.

1. Introduction

A wireless sensor network (WSN) is defined as a network with many embedded wireless sensors with various sensing devices [1,2]. It is an infrastructure-based network composed of communication, computing and sensing elements, which makes a sink node capable of reacting to events within a certain context [3,4]. Typically, it is a governmental, civil, industrial or commercial entity, where the environment could be an IT framework, a biological system or the physical world [5]. Usually, a WSN includes thousands of randomly deployed sensors. Theses sensors are battery-powered, and it is difficult to recharge them after deployment [6,7]. Hence, energy efficiency is a significant challenge in WSNs, and different mechanisms have been proposed to deal with this energy efficiency issue [8]. To establish which relaying mode is more energy-efficient and to solve the issue of energy efficiency optimization, a complete analysis of the energy efficiency of full-duplex and half-duplex amplify-and-forward relay-assisted 60 GHz dual-hop indoor wireless systems is presented in [9]. The cluster network topology concept is considered a promising strategy to enhance the energy performance of WSNs. The basic concept of the Low-Energy Adaptive Clustering Hierarchy, which is known as LEACH, is choosing the cluster node within an unsystematic cycle and handing over the entire energy of the network to every node of the sensor, as well as, on average, prolonging the network survival lifetime in addition to reducing energy consumption [10,11,12,13]. For instance, reducing the transmission task of sensor nodes in a WSN can result in extending the service life of the sensor nodes [14]. However, the random technique of choosing the cluster node means that every single node may turn into the cluster node, and there is a chance that a small energy node will turn out to be the cluster node. An additional technique that uses a weighted-objective optimization algorithm is the Moth–Flame Algorithm, which is known as the MFO algorithm and was proposed in [15]. The MFO algorithm has several advantages [16]. The MFO algorithm is popular due to its simple parameters and structure. Furthermore, since the MFO algorithm is efficient, robust and easy to implement within different computer languages, it has been widely used in many optimization applications [17]. The MFO algorithm combines a population-based algorithm and a local search strategy to yield an algorithm capable of global exploration and local exploitation [18]. Like other metaheuristics, the MFO algorithm is simple, flexible and easily implemented; as a result, it can be utilized to solve a wide range of problems [19]. Because of these merits, the MFO algorithm has been successfully applied to various optimization problems, including scheduling [20], the inverse problem and parameter estimation [21,22], classification [23], economics [24], medicine [25], power energy [26] and image processing [27].
Several studies have investigated energy-efficient bi-objective optimization for cluster head selection in wireless sensor networks. For instance, Latiff et al. proposed a novel clustering algorithm based on Particle Swarm Optimization (PSO) called Centralized-PSO (PSO-C); the cluster head (CH) selection process was formulated as a bi-objective optimization problem to find the optimal cluster head set to form one-hop clusters to balance energy consumption. The study considered each sensor node’s residual energy and each cluster head’s closeness to its sensor nodes. The proposed algorithm minimized the objective function to ensure that the sensor nodes with sufficient energy, as well as a minimum distance from their neighbors, were selected as cluster heads [28,29]. Jadhav and Shankar hybridized an energy-efficient CH algorithm based on the Whale Optimization Algorithm (WOA). The proposed WOA-C algorithm contributes to the selection of energy-aware CHs according to a fitness function that considers the node’s residual energy and the sum of the adjacent nodes’ energy. The proposed algorithm was evaluated in terms of energy efficiency, network lifetime, overall stability and throughput. Moreover, the WOA-C algorithm’s performance was evaluated and compared with other standard routing protocols, including the Low-Energy Adaptive Clustering Hierarchy (LEACH) [30]. Honey Bee Optimization (HBO) was proposed by Selvi et al. to minimize energy consumption through finding the optimal path, which is associated with a lower cost. The proposed algorithm showed improvements in the network lifetime and throughput. HBO also showed enhanced performance in terms of scalability and link quality [31]. Syed and Syed developed the Weighted Salp Swarm Algorithm (WSSA) based on the weighted distance position update for improving the convergence rate and performance of the SSA algorithm. The WSSA was validated by many benchmark functions, where it was compared with seven state-of-the-art algorithms. The results showed that the WSSA has an improved convergence rate and performance. In addition, the proposed algorithm was applied to the problem of optimal sensor deployment. The algorithm was applied on a probabilistic sensor model to maximize the coverage, while it was applied on a radio energy model to minimize the energy consumption [32]. Mann and Singh proposed an Improved Artificial Bee Colony (IABC) algorithm for optimal sensor deployment. The proposed algorithm was used for obtaining CHs and improved the energy efficiency. The results showed that the optimal base station position could be obtained by changing the distance to the sensor node number [33].
Hussain and Raziuddin proposed the Completely Informed Artificial Bee Colony (CABC) for optimal CH positions and used a probability sensor model for coverage for a wireless sensor network. The results showed improvements in the coverage rate in a WSN using the proposed algorithm [34]. Li et al. proposed Ant Colony Optimization (ACO) for an energy-efficient wireless sensor network. The algorithm saved on residual energy and the distance of neighbor nodes. According to the pheromone value, the subsequent hop was updated as the distance between nodes was compared. The proposed algorithm showed that a low energy node was not selected as the subsequent hop, which resulted in the efficient load balancing of the network energy [35,36]. Jia et al. studied the maintaining sensing problem coverage by optimizing energy consumption in a WSN. As opposed to the existing consistent sensing model, the authors considered an excess of sensors with a variable sensing radius to be randomly deployed in the monitoring area. A new coverage control format founded on a selective non-dominated sorting genetic algorithm, which is known as (NSGA-II), was implemented within a heterogeneous WSN. The algorithm was applied in a distributed manner by developing a cluster-based architecture [37,38]. Vijayalakshmi and Anandan investigated the choice of the best path within routing that develops a network’s energy efficiency and network lifespan. Different meta-heuristic methods, mainly PSO, have been efficiently utilized that have reduced the problem of local optima. The projected technique was included in the foundation of the algorithms of Tabu as well as PSO search. The results showed the effectiveness of the Tabu PSO that was proposed through the ornamental cluster-shaped number and the percentage of nodes alive, and the decrease in the average continuous delay and the average of the packet loss speed was illustrated [39,40]. Jameii, Faez and Dehghan projected a new algorithm for optimizing the lifetime, connectivity and coverage of a network within wireless sensor networks. NSGA-II was applied to make the best use of the exposure area for presenting the consumption of the balanced energy as well as for reducing the conduction variety of the nodes [41]. Jameii, Faez and Dehghan used NSGA-II to optimize the rate of the coverage of the observing area, the consumption of the balanced energy, and number of active sensor nodes while adaptively mutating the rates and assigning crossover to advance the performance of the algorithm of optimization through learning automata [42]. Bara’a, Khalil and Cosar used NSGA-II to choose mobile sensor locations, offering a long network lifetime as well as a high coverage. The planned system included mobile sensors and a number of targets. The most important idea of the algorithm was making the most of the detected targets number and the network lifetime together [43].
Following an investigation on the best bi-objective optimization algorithm technique for increasing the WSN life span, we found few research that had been conducted on the use of the moth–flame algorithm for cluster head selection in a wireless sensor network. Therefore, this research proposes a bi-objective optimization algorithm based on MFO as a WSN clustering technique by making use of a weighted-sum approach. This study also compared the proposed algorithm with SSA, WOA and LEACH, some of the most well-known hierarchical routing protocols for wireless sensor networks. The adopted algorithm (MFO) demonstrated superior performance regarding efficiency (the speed at which an algorithm finds accurate answers, converges and computes) and effectiveness (an algorithm’s capacity for generating high-quality solutions) in solving wireless sensor optimization problems. This paper is organized as follows. The introduction is presented in Section 1. Related works and background are provided in Section 2. Section 3 is devoted to the WSN energy consumption model as well as the complexity analysis. The simulation results and discussion are addressed in Section 4. Conclusions and further work are covered in Section 5.

3. Materials and Methods

3.1. The Wireless Network Energy Consumption Model

We investigated a network configuration with the following characteristics: the base station remained intact and was positioned within the sensor network region. Each sensor node was fixed and was capable of sensing. Sensor nodes executed their work and transmitted data to the base station (BS). Each node could operate in cluster head (CH) mode or detecting mode depending on the residual energy level. The wireless energy model states that the transmitted power attenuation decays exponentially as the transmission distance increases.
Firstly, Equation (1) was used to determine the expected number of cluster heads, k.
k = n / 2
where the ceil-up operator (⌈⌉) was used, and (n) is the number of sensor nodes in the networks, from which k nodes were selected for the initialization of the cluster centers. The wireless energy model for the sensors utilized as a part of the protocol depends on the first-order wireless model that was used as a part of [66,67]. The wireless energy model relies on the consumption of the energy transmission. The energy consumption formula for the transmission from node a to node b, with distance d and packet size K, is given as:
E T a b K , d = K E e l e c t + K ε f s d a b 2 ,   d < d o K E e l e c t + K ε m p d a b 4 ,   d d o
where “ ε f s     is the free space fading energy, and “ ε m p   ” is the multi-path fading energy. E e l e c t refers to the energy consumed in an electronic circuit to transmit or receive a signal. d a b   is the Euclidean distance between nodes a and b. d o is the constant-threshold estimation of the transmission distance, which is given as:
d o = ε f s     ε m p    
The appropriate energy consumption model is determined by the threshold distance as a function of the distance (d) between any communication nodes. Since the cluster head’s location determines the distance (d), then (d) changes along with the cluster head. The first part of the mathematical formula (2) represents the free-space path-loss consumed energy, while the second part quantifies the multi-path fading model.
The energy consumption of receiving the data packet, which only depends on the circuit loss, was calculated as
  E R K = K * E e l e c t
The energy consumption at the cluster head was calculated as
  E c = n E R + E T C B S    
where n is related to the number of packets to be sent, and   E TCBS is related to the energy consumption while transmitting from the cluster head to the base station. The energy consumption of transmission from the node to the cluster head within a given cluster was calculated as [68]
  E n = n E T n c        
The parameters listed in Table 1 are used to determine how much energy is consumed by a wireless sensor network.
Table 1. Energy consumption radio parameters in WSN.

3.2. Weighted-Sum-Based Bi-Objective Optimization

Communication between the CH and the node selected should be modest in terms of both distance and energy consumption. The network must have a massive amount of energy, which means that it must use just a small amount of energy when transmitting data. Thus, one optimized solution will have trade-offs among diverse objectives, and a group of solutions is necessary for characterizing the most efficient solution for every objective [67,68].
The bi-objective function in this study was designed to select the cluster head within every cluster while optimizing two objectives (distance and energy), which are given as
f o b j = α × f 1 + 1 α × f 2 ,                     α = 0.5
f 1 = m i n n o d e   i     C k d n o d e   i ,     C H k C k  
f 2 = i = 1 N E n o d e i j = 1 k E C H j  
where f1 defines the majority great of the Euclidean distance between nodes, nodei cluster Ck, for the cluster heads CHk, C k is the number of nodes that are managed by cluster Ck within f2 and N is the number of nodes that are selected as cluster-heads. This ensures the selection of the nodes’ average energy supplies and the best average distance to the nodes from the selected cluster heads. The constant α demonstrates the weight of f1 and f2 within the objective f(x). The target function aims to decrease the intra-cluster average distances and improve the energy consumption in the network.
Note that f1 represents the distance, namely, the distance from every node to the cluster head and the distance from the cluster head to the base station. f2 represents the ratio of the starting energy of all living nodes in the network (a sensor node is alive when its energy is greater than zero) to the cluster head’s total current energy in the current round. This ensures the selection of a cluster head with high remaining energy. The optimization function reflects a tradeoff between the two objectives. The factor α is a scaling factor that determines the importance of f1 and f2, where the factor is selected as 0 ≤ α ≤ 1. The constant factor α is utilized to evaluate the weight of every sub-objective. The fitness function in Equation (7) has the purpose of concurrently reducing the distance between the cluster head and the nodes, while the network energy efficiency optimization is quantified via f2. This results in weighted-sum-based bi-objective optimization. When α = 0,   f o b j = f 2 , and the fitness function only optimizes the network energy efficiency. When α = 1,   f o b j = f 1 . This only optimizes the distance between the nodes and the cluster heads. When α is equal to 0.5 in Equation (7), both sub-objectives are optimized equally.

3.3. Complexity Analysis

The complexity analysis is an important metric in evaluating an algorithm’s run time that is defined according to the algorithm implementation and structure. The MFO algorithm’s computational complexity depends on the number of moths, the number of variables, the number of maximum iterations and a flame-sorting mechanism in each iteration. As the quicksort algorithm was used, the computational complexity of the sort was in the order of O(n2) and O(nlogn) in the worst- and best-case scenarios, respectively. With the P function, the overall computational complexity can be defined as follows:
  O M F O = O t O Q u i c k   s o r t + O p o s i t i o n   u p d a t e
  O M F O = O t n 2 + n × d = O t n 2 + t n d
where n is the number of moths, t is the number of maximum iterations and d is the number of variables. In order to understand how the MFO algorithm can be effective for solving optimization problems theoretically, some observations include:
  • The procedure of updating positions allows finding neighboring solutions around the flames, which is a mechanism for typically promoting exploitation.
  • As the MFO algorithm uses a population of moths, the local optima avoidance will be high.
  • The search space exploration is increased and the local optima stagnation probability is decreased by assigning each moth a flame and then updating the flames sequence within each iteration.
  • Taking into consideration current best-obtained solutions up to the present as the number of flames saves promising solutions as moth guides.
  • The adaptive flames number balances exploration and exploitation.
  • The adaptive convergence constant (r) results in accelerated convergence around the flames on the iterations course.
Such observations make the MFO algorithm able to enhance the initial random solutions as well as the convergence into an enhanced point within the search space.

4. Simulation Results and Discussion

This paper presents a performance evaluation and comparison between three main bi-objective optimization algorithms, namely the whale optimization algorithm (WOA), the salp swarm algorithm (SSA) and the moth–flame optimization (MFO) algorithm in terms of their ability to provide efficient clustering decisions. Some critical metrics for the evaluation process were used, such as the fitness function, the number of alive nodes, the throughput and the residual energy. Then, the algorithm with the best performance was compared with the low-energy adaptive clustering hierarchy (LEACH) protocol.
The proposed algorithms were tested using Matlab R2022. Simulations were carried out on a network with 30 sensor nodes that were deployed in a 100 m × 100 m field, as shown in Figure 1. A mobile working sensor with a fixed trajectory was used that could be placed at different locations within the deployment area. This could significantly improve the data delivery rate and reduce the energy dissipation of the sensor nodes. The selection of cluster heads was carried out whenever a re-clustering was needed (e.g., when the energy level of the current cluster head fell below a certain threshold). Hence, the selection was not a one-time optimization. The MFO algorithm started creating moths randomly within the solution space, and a random population of sensor nodes were produced through iterations. The nodes were generated after the system reached its statistical foundation, i.e., a steady state status, using the residual analysis. The numbers of generations and search agents were set to 10,000 and 5, respectively. The parameters used in the simulation are shown in Table 2.
Figure 1. Cluster head selection in WSN via WOA, MFO and SSA.
Table 2. Simulation parameters of the network.

4.1. First Stage of Analysis

The simulations began by comparing the performance of the WOA, SSA and MFO algorithms in terms of exploration and exploitation, as well as four different metrics (number of alive nodes, network throughput, residual energy and fitness function).

4.1.1. Exploration and Exploitation Process

An effective method for analyzing the exploration and exploitation process is to compare new individuals to the existing population. If a new individual’s similarity to the population is poor, the algorithm will prioritize exploration. The degree of similarity between a new individual and the old population is high during the exploitation process. The following formula was used to determine the similarity of two individuals using the Euclidean distance:
x . y = i = 1 n x i y i 2
The new individual’s similarity (S) to the population is determined by the distance between the new individual and its closest neighbor as follows:
S i n d n e w . P = min i n d   P i n d n e w .   i n d
If the similarity value exceeds a threshold value that determines the neighborhood boundary, the procedure is termed exploration; otherwise, it is called exploitation [69]. We defined the threshold value in this study as 1% of the search space. The percentage of individuals exploring the search space for each iteration throughout the optimization process is depicted in Figure 2.
Figure 2. Ratio of individuals exploring the search space.
As illustrated in Figure 2, the number of exploring individuals decreased faster in the WOA and SSA algorithms than in the MFO method. Thus, as compared to the other two algorithms, the MFO method assigned more balanced weights to exploration and exploitation, ensuring sufficient diversity and thus increase the likelihood of converging on the global optima.

4.1.2. Number of Alive Nodes

The number of alive nodes is used to calculate the network lifetime. It is an instantaneous count of all the nodes that have not yet used up all of their energy. Alive nodes are sensor nodes that contain non-zero energy. Figure 3a illustrates a comparison of the performance evaluation between the MFO, SSA and WOA algorithms in terms of the number of alive nodes relative to the number of rounds. A higher number of alive nodes within a network extends the network lifetime. Based on this, the MFO algorithm outperformed the WOA and SSA algorithms. Figure 3b shows the progression of how nodes died using the MFO, WOA and SSA algorithms for 30 sensor nodes over the period (0, 550). The lifetime of the network was increased by using the MFO algorithm, as shown in Figure 3c. For the WOA, MFO, and SSA algorithms, the performance comparison of the number of living nodes vs. the number of rounds was improved. Figure 3 illustrates that there were differences in the performance evaluation between the three algorithms. Considering the timing of the death of the first node for the different protocols, the MFO algorithm had a better performance compared with the SSA and WOA methods. Moreover, the nodes in the MFO and WOA algorithms started to die after 550 rounds. However, the network lifetime of the MFO algorithm was the highest, as the last node died after 2190 rounds, compared to 2130 and 2020 rounds for the SSA and WOA methods, respectively.
Figure 3. The number of rounds versus the number of alive nodes in MFO, SSA and WOA.

4.1.3. Network Throughput

The network throughput is a significant metric that reflects the performance of a protocol. It represents the number of packets delivered to the base station. Cluster member nodes send the sensed information to the CH in the form of packets. Then, the CH combines the received packets and sends them to the BS. Throughout this phase, if the CH energy is insufficient to transmit, receive or combine the information, the information will be lost, which significantly reduces the network throughput. The throughput performance of the WOA, MFO and SSA algorithms is presented in Figure 4. The MFO algorithm provided the best performance, as shown in Figure 4a, followed by the WOA and SSA methods in the initial interval (0, 700). The MFO algorithm outperformed both the SSA and WOA methods in terms of network throughput during the interval (1850, 2140). However, the MFO algorithm outperformed the SSA and WOA in terms of network throughput during the timeframe (2140, 2200) as shown in Figure 4b.
Figure 4. Variation in throughput in MFO, SSA and WOA.

4.1.4. Residual Energy

To ensure the network’s long-term viability, limited resources must be used wisely. When it comes to wireless networks, energy conservation is the most important factor in their design and execution. Having information about the present distribution of residual energy in a network may assist the user in deciding what kind of measures to take. Figure 5 shows the number of rounds versus the residual energy in the MFO, SSA and WOA algorithms. This figure reveals that the MFO algorithm achieved the best energy performance. The number of rounds for the MFO algorithm exceeded that of the SSA and WOA algorithms.
Figure 5. The number of rounds versus residual energy within WOA, MFO and SSA.

4.1.5. Fitness Function

The bi-objective function in this study was designed to select the cluster head within every cluster while optimizing two objectives; the first one minimized the distance from every node to the cluster head and the distance from the cluster head to the base station, while the second one ensured the selection of a cluster head with high remaining energy. Figure 6 displays the quantity of the bi-objective function optimization for all the algorithms, with the MFO protocol outperforming the others because it produced the smallest objective function.
Figure 6. The number of rounds versus fitness function within WOA, MFO and SSA.
In summary, the simulation results revealed that the moth–flame algorithm performed better than the other two algorithms in terms of exploration and exploitation, along with four additional criteria (number of alive nodes, network throughput, residual energy and fitness function).

4.2. Second Stage of Analysis

This stage of the analysis compared the performance of the MFO algorithm with the LEACH algorithm over the wireless network energy consumption model in terms of the number of alive nodes, the network throughput, the residual energy, and the fitness function. The LEACH protocol shares critical characteristics with the MFO algorithm such as purpose and concept, operational structure and process and routing category [70,71,72]. They both aim to rotate sensor nodes as cluster heads so that the high energy dissipation in communicating with the BS is distributed to all the sensor nodes in the network. That is, they maintain a balanced energy usage, responsibility for the CH is rotated and a new cluster is established in each round [73,74]. As an added benefit, the LEACH and MFO methods conduct local data compression, lowering the quantity of data transmitted between clusters and the BS and, as a result, extending the system lifespan and reducing power consumption [75]. Considering their operational structure and process, the MFO and LEACH methods operate in rounds. Each round is divided into two phases: setup and steady state. Clusters are organized during the setup phase, and data transmission occurs during the steady-state phase. Furthermore, both use a simple radio model to describe how energy is dissipated through electronic equipment, such as the transmitter, power amplifier and receiver [76,77,78]. In terms of the routing category, both the MFO and LEACH methods fall in the same category of proactive routing protocols (centralized, source-driven). They both use a link-state routing protocol, where each node determines the channel condition and network topology and forwards it to a centralized location that computes the routing table for all the nodes in the network [79]. In addition, the network can execute dependable operations by adopting hierarchical protocols for data communication, which can save energy for network nodes [80].
In summary, the proposed optimization algorithm’s performance was compared to that of the LEACH method due to the following primary advantages [81,82,83,84,85,86]: (1) The LEACH protocol’s clustering minimizes the amount of energy required for communication between sensor nodes and the BS, allowing the network to last longer. (2) By lowering the linked data locally, the CH’s data aggregation saves a substantial amount of energy. (3) The nodes in the network are placed into sleep mode. As a result, cluster collisions are avoided, and the sensor node’s battery life is increased. (4) In the LEACH protocol, every sensor node has an equal chance of becoming the CH at least once. The network’s longevity is increased by this randomized rotation of the CH. Figure 7 illustrates the performance of the LEACH and MFO algorithms in terms of the number of alive nodes with respect to the number of rounds. The MFO algorithm outperformed LEACH. Figure 7b shows the network’s lifetime for the period (0, 815). Figure 7c illustrates that the nodes survived for approximately 2380 rounds for the MFO algorithm. The performance comparison showed that the MFO algorithm significantly outperformed LEACH. Considering the timing of the death of the first node in the different protocols, the MFO algorithm showed a better performance compared to the LEACH method. Moreover, the last node in the LEACH method died earlier than the last node in the MFO algorithm, as shown in Figure 7b. Moreover, the lifetime of the MFO algorithm was much longer than that of the LEACH method (Figure 7c).
Figure 7. The number of rounds versus the number of alive nodes in MFO and LEACH.
Figure 8 plots the network throughput for the two protocols in terms of the number of rounds. The clustering within the moth–flame algorithm extended the network’s lifetime by preserving the residual energy of the nodes. The MFO algorithm’s throughput was higher than that of the LEACH method, as shown in Figure 8b.
Figure 8. Variation in throughput in MFO and LEACH.
As demonstrated in Figure 9a, the MFO algorithm outperformed the LEACH approach in terms of residual energy. The number of rounds in the MFO algorithm case exceeded 2000 rounds, whereas in the LEACH method case there were about 1800 rounds. Furthermore, Figure 9b shows that the MFO algorithm’s fitness function was significantly lower than that of the LEACH method.
Figure 9. (a) The number of rounds versus the residual energy within MFO and LEACH. (b) The number of rounds versus fitness function for MFO and LEACH.

5. Conclusions and Future Work

In this paper, an MFO-based clustering algorithm for enhancing the network lifetime was proposed and evaluated. The performance of the proposed algorithm was compared with existing clustering protocols (SSA, WOA and LEACH) in terms of four different metrics (fitness function, network lifetime evaluation, energy evaluation and throughput). The MFO algorithm achieved a significant performance improvement with an enhanced energy consumption compared to the SSA and WOA algorithms as well as the LEACH protocol. The proposed algorithm extended the sensor network’s lifetime, preserved the nodes’ energy, extended the network’s lifetime and improved the network throughput. For a future work direction, it is recommended to use specified operators to solve multi-objective algorithms utilizing the MFO algorithm.

Author Contributions

Conceptualization, M.Z.M., M.A.A., L.H. and R.A.-S.; data curation, M.A.A.; formal analysis, M.Z.M., H.A.B.S., L.H. and R.A.-S.; investigation, M.Z.M., M.A.A. and O.F.B.; methodology, M.Z.M., H.A.B.S., M.A.A., O.F.B., L.H. and R.A.-S.; project administration, M.Z.M.; software, M.A.A., O.F.B., L.H. and R.A.-S.; supervision, M.Z.M. and H.A.B.S.; validation, M.Z.M., H.A.B.S., M.A.A., O.F.B., L.H. and R.A.-S.; writing—original draft, M.Z.M.; writing—review and editing, M.Z.M. and H.A.B.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aguirre, E.; Lopez-Iturri, P.; Azpilicueta, L.; Astrain, J.J.; Villadangos, J.; Santesteban, D.; Falcone, F. Implementation and Analysis of a Wireless Sensor Network-Based Pet Location Monitoring System for Domestic Scenarios. Sensors 2016, 16, 1384. [Google Scholar] [CrossRef] [PubMed]
  2. Sarammal, K.; Roseline, R.A. A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools. Int. J. Comput. Trends Technol. 2013, 4, 7. [Google Scholar]
  3. Sohraby, K.; Minoli, D.; Znati, T. Wireless Sensor Networks: Technology, Protocols, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
  4. Raj, P.; Deka, G.C. Handbook of Research on Cloud Infrastructures for Big Data Analytics. IGI Global, 1AD. Available online: https://www.igi-global.com/book/handbook-research-cloud-infrastructures-big/www.igi-global.com/book/handbook-research-cloud-infrastructures-big/95028 (accessed on 10 December 2021).
  5. Kharazian, A. Adaptive Clustering in Wireless Sensor Network: Considering Nodes with Lowest Energy. Int. J. Ad Hoc Sens. Ubiquitous Comput. 2012, 3, 1–12. [Google Scholar] [CrossRef]
  6. Djedouboum, A.C.; Ari, A.A.A.; Gueroui, A.M.; Mohamadou, A.; Aliouat, Z. Big Data Collection in Large-Scale Wireless Sensor Networks. Sensors 2018, 18, 4474. [Google Scholar] [CrossRef]
  7. Konstantinidis, A.; Yang, K. Multi-objective energy-efficient dense deployment in Wireless Sensor Networks using a hybrid problem-specific MOEA/D. Appl. Soft Comput. 2011, 11, 4117–4134. [Google Scholar] [CrossRef]
  8. Elshrkawey, M.; Elsherif, S.M.; Wahed, M.E. An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks. J. King Saud Univ. -Comput. Inf. Sci. 2018, 30, 259–267. [Google Scholar] [CrossRef]
  9. Wei, Z.; Zhu, X.; Sun, S.; Huang, Y.; Dong, L.; Jiang, Y. Full-duplex versus half-duplex amplify-and-forward relaying: Which is more energy efficient in 60-GHz dual-hop indoor wireless systems? IEEE J. Sel. Areas Commun. 2015, 33, 2936. [Google Scholar] [CrossRef]
  10. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2002; Volume 2, p. 10. [Google Scholar] [CrossRef]
  11. Salah-ddine, K. Recent Advances of Hierarchical Routing Protocols for AdHoc and Wireless Sensor Networks: A Literature Survey. Int. J. Inform. Technol. 2016, 9, 71–79. [Google Scholar]
  12. Liaqat, M.; Gani, A.; Anisi, M.H.; Ab Hamid, S.H.; Akhunzada, A.; Khan, M.K.; Ali, R.L. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks. PLoS ONE 2016, 11, e0161340. [Google Scholar] [CrossRef]
  13. Tong, M.; Tang, M. LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Caen, France, 28 June–2 July 2010; pp. 1–4. [Google Scholar] [CrossRef]
  14. Wang, R.; Wu, N.; Yu, X. Design of Digital Aerial Photography System for Unmanned Aerial Vehicle Based on Wireless Sensor Network. J. Appl. Sci. Eng. Technol. Educ. 2020, 14, 12. [Google Scholar]
  15. Mirjalili, S. Moth-Flame Optimization Algorithm: A Novel Nature-inspired Heuristic Paradigm. Knowl. -Based Syst. 2015, 89, 228–249. [Google Scholar] [CrossRef]
  16. Anbarasan, P.; Jayabarathi, T. Optimal reactive power dispatch using moth-flame optimization algorithm. Int. J. Appl. Eng. Res. 2017, 12, 3690–3701. [Google Scholar]
  17. Xu, Y.; Chen, H.; Luo, J.; Zhang, Q.; Jiao, S.; Zhang, X. Enhanced Moth-flame optimizer with mutation strategy for global optimization. Inf. Sci. 2019, 492, 181–203. [Google Scholar] [CrossRef]
  18. Shehab, M.; Abualigah, L.; AlHamad, H.; Alabool, H.; Al Shinwan, M.; Khasawneh, A. Moth–flame optimization algorithm: Variants and applications. Neural Comput. Appl. 2020, 32, 9859–9884. [Google Scholar] [CrossRef]
  19. Jangir, N.; Pandya, M.H.; Trivedi, I.N.; Bhesdadiya, R.H.; Jangir, P.; Kumar, A. Moth-Flame optimization Algorithm for solving real challenging constrained engineering optimization problems. In Proceedings of the 2016 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 5–6 March 2016; pp. 1–5. [Google Scholar] [CrossRef]
  20. Elsakaan, A.A.; El-Sehiemy, R.A.; Kaddah, S.S.; Elsaid, M.I. An enhanced moth-flame optimizer for solving non-smooth economic dispatch problems with emissions. Energy 2018, 157, 1063–1078. [Google Scholar] [CrossRef]
  21. Allam, D.; Yousri, D.A.; Eteiba, M.B. Parameters extraction of the three diode model for the multi-crystalline solar cell/module using Moth-Flame Optimization Algorithm. Energy Convers. Manag. 2016, 123, 535–548. [Google Scholar] [CrossRef]
  22. Hazir, E.; Erdinler, E.S.; Koc, K.H. Optimization of CNC cutting parameters using design of experiment (DOE) and desirability function. J. For. Res. 2017, 29, 1423–1434. [Google Scholar] [CrossRef]
  23. Zawbaa, H.M.; Emary, E.; Parv, B.; Sharawi, M. Feature selection approach based on moth-flame optimization algorithm. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 4612–4617. [Google Scholar] [CrossRef]
  24. Trivedi, I.N.; Kumar, A.; Ranpariya, A.H.; Jangir, P. Economic Load Dispatch problem with ramp rate limits and prohibited operating zones solve using Levy flight Moth-Flame optimizer. In Proceedings of the 2016 International Conference on Energy Efficient Technologies for Sustainability (ICEETS), Nagercoil, India, 7–8 April 2016; pp. 442–447. [Google Scholar] [CrossRef]
  25. Wang, M. Toward an optimal kernel extreme learning machine using a chaotic moth-flame optimization strategy with applications in medical diagnoses. Neurocomputing 2017, 267, 69–84. [Google Scholar] [CrossRef]
  26. Yousri, D.A.; AbdelAty, A.M.; Said, L.A.; AboBakr, A.; Radwan, A.G. Biological inspired optimization algorithms for cole-impedance parameters identification. AEU -Int. J. Electron. Commun. 2017, 78, 79–89. [Google Scholar] [CrossRef]
  27. Aziz, M.A.E.; Ewees, A.A.; Hassanien, A.E. Whale Optimization Algorithm and Moth-Flame Optimization for multilevel thresholding image segmentation. Expert Syst. Appl. 2017, 83, 242–256. [Google Scholar] [CrossRef]
  28. Latiff, N.M.A.; Tsimenidis, C.C.; Sharif, B.S. Energy-Aware Clustering for Wireless Sensor Networks using Particle Swarm Optimization. In Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Montreal, QC, Canada, 3–7 September 2007. [Google Scholar]
  29. Lavanya, N.; Shankar, T. Energy Efficient Cluster Head Selection using Hybrid Squirrel Harmony Search Algorithm in WSN. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 477–487. [Google Scholar] [CrossRef]
  30. Jadhav, A.R.; Shankar, T. Whale Optimization Based Energy-Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks. arXiv 2017, arXiv:1711.09389. [Google Scholar]
  31. Selvi, M.; Nandhini, C.; Thangaramya, K.; Kulothungan, K.; Kannan, A. HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the 2016 Eighth International Conference on Advanced Computing (ICoAC), Chennai, India, 19–21 January 2017; pp. 89–92. [Google Scholar] [CrossRef]
  32. Syed, M.A.; Syed, R. Weighted Salp Swarm Algorithm and its applications towards optimal sensor deployment. J. King Saud Univ. -Comput. Inf. Sci. Jul. 2022, 34, 1285–1295. [Google Scholar] [CrossRef]
  33. Mann, P.; Singh, S. Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks. J. Netw. Comput. Appl. 2017, 83, 40–52. [Google Scholar] [CrossRef]
  34. Hussain, Z.; Raziuddin, S. Completely Informed Artificial Bee Colony for Dynamic Problems and Optimal Sensor Placement. Int. J. Pure Appl. Mathe 2017, 114, 12. [Google Scholar]
  35. Li, P.; Nie, H.; Qiu, L.; Wang, R. Energy optimization of ant colony algorithm in wireless sensor network. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717704831. [Google Scholar] [CrossRef]
  36. Narasegouda, S.; Salma, M.U.; Patil, A.N. Nature Inspired Algorithm Approach for the Development of an Energy Aware Model for Sensor Network. In Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2019; pp. 55–77. [Google Scholar] [CrossRef]
  37. Jia, J.; Chen, J.; Chang, G.; Wen, Y.; Song, J. Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius. Comput. Math. Appl. 2009, 57, 1767–1775. [Google Scholar] [CrossRef]
  38. Peiravi, A.; Mashhadi, H.; Javadi, S.H. An optimal energy-efficient clustering method in wireless sensor networks using multi-objective genetic algorithm. Int. J. Commun. Syst. 2013, 26, 114–126. [Google Scholar] [CrossRef]
  39. Kumaravel, V.; Panneerselvam, A. A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN. Clust. Comput. 2019, 22, 12275–12282. [Google Scholar] [CrossRef]
  40. Attea, B.A.; Okay, F.Y.; Özdemi, S.; Akcayol, M.A. Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks. In Proceedings of the 2012 6th International Conference on Application of Information and Communication Technologies (AICT), Tbilisi, Georgia, 17–19 October 2012; pp. 1–6. [Google Scholar] [CrossRef]
  41. Jameii, S.M.; Faez, K.; Dehghan, M. Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 363815. [Google Scholar] [CrossRef]
  42. Jameii, S.M.; Faez, K.; Dehghan, M. AMOF: Adaptive multi-objective optimization framework for coverage and topology control in heterogeneous wireless sensor networks. Telecommun. Syst. 2016, 61, 515–530. [Google Scholar] [CrossRef]
  43. Attea, B.; Khalil, E.; Cosar, A. Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks. Soft Comput. 2014, 61, 515–530. [Google Scholar] [CrossRef]
  44. Chávez-Bosquez, O.; Pozos-Parra, P.; Hernández-Ocaña, B. On Combining Numerical Optimization Techniques with a Belief Merging Approach. In Proceedings of the Eleventh Latin American Workshop on New Methods of Reasoning (LANMR), Puebla, Mexico, 15-16 November 2018; 2018; pp. 51–62. [Google Scholar]
  45. Blum, C.; Roli, A. Metaheuristics in combinatorial optimization: Overview and conceptual comparison. ACM Comput. Surv. 2003, 35, 268–308. [Google Scholar] [CrossRef]
  46. Voss, S. Meta-heuristics: The state of the art. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2148, pp. 1–23. [Google Scholar]
  47. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey Wolf Optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  48. Consoli, S. The development and application of metaheuristics for problems in graph theory: A computational study. Ph.D. Thesis, Brunel University, London, UK, 2008. [Google Scholar]
  49. Brownlee, J. Clever Algorithms: Nature-inspired Programming Recipes; Lulu Press: Morrisville, CA, USA, 2011. [Google Scholar]
  50. El-Omari, D.N.K.T. Sea Lion Optimization Algorithm for Solving the Maximum Flow Problem. Int. J. Comput. Sci. Netw. Secur. 2020, 20, 30–68. [Google Scholar] [CrossRef]
  51. Hussain, K.; Salleh, M.N.M.; Cheng, S.; Shi, Y. Metaheuristic research: A comprehensive survey. Artif. Intell. Rev. 2019, 52, 2191–2233. [Google Scholar] [CrossRef]
  52. Prakasam, A.; Savarimuthu, N. Metaheuristic Algorithms and Polynomial Turing Reductions: A Case Study Based on Ant Colony Optimization. Procedia Comput. Sci. 2015, 46, 388–395. [Google Scholar] [CrossRef]
  53. AL-Shammari, M.Q.; Muniyandi, R.C. Optimised Tail-based Routing for VANETs using Multi-Objective Particle Swarm Optimisation with Angle Searching. Int. J. Adv. Comput. Sci. Appl. IJACSA 2020, 11, 224–232. [Google Scholar] [CrossRef]
  54. Ryser-Welch, P.; Miller, J. A Review of Hyper-Heuristic Frameworks. In Proceedings of the 50th Annual Convention of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour, AISB 2014, London, UK, 1–4 April 2014. [Google Scholar]
  55. Lam, A.Y.S.; Li, V.O.K. Chemical-Reaction-Inspired Metaheuristic for Optimization. IEEE Trans. EComput. 2010, 14, 381–399. [Google Scholar] [CrossRef]
  56. Khan, M.F.; Aadil, F.; Maqsood, M.; Bukhari, S.H.R.; Hussain, M.; Nam, Y. Moth Flame Clustering Algorithm for Internet of Vehicle (MFCA-IoV). IEEE Access 2019, 7, 11613–11629. [Google Scholar] [CrossRef]
  57. Hu, H.; Bai, Y.; Xu, T. A whale optimization algorithm with inertia weight. WSEAS Trans. Comput. 2016, 15, 8. [Google Scholar]
  58. Li, Z.; Zhang, S.; Song, J. Lévy-Flight Moth-Flame Algorithm for Function Optimization and Engineering Design Problems. Math. Probl. Eng. 2016, 2016, 1423930. [Google Scholar] [CrossRef]
  59. Liu, Z.-F.; Ge, S.-Y.; Yu, Y. Optimal reactive power dispatch using chaotic particle swarm optimization algorithm. IEEE Access 2005, 29, 53–57. [Google Scholar]
  60. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  61. Nasiri, J.; Khiyabani, F.M. A whale optimization algorithm (WOA) approach for clustering. Cogent Math. Stat. 2018, 5, 1483565. [Google Scholar] [CrossRef]
  62. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  63. Jain, R.; Kshirsagar, M.; Malik, L. Analysis of Setup Energy of LEACH Protocol for Wireless Sensor Networks. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar]
  64. Kohli, S.; Bhattacharya, P.; Jha, M. Implementation of Homogeneous LEACH Protocol in Three-Dimensional Wireless Sensor Networks. Int. J. Sens. Wirel. Commun. Control 2015, 6, 4–11. [Google Scholar] [CrossRef]
  65. Salleh, M.N.M.; Hussain, K.; Cheng, S.; Shi, Y.; Muhammad, A.; Ullah, G.; Naseem, R. Exploration and Exploitation Measurement in Swarm-Based Metaheuristic Algorithms: An Empirical Analysis; Springer: Berlin/Heidelberg, Germany, 2018; pp. 24–32. [Google Scholar] [CrossRef]
  66. Amiri, E.; Keshavarz, H.; Alizadeh, M.; Zamani, M.; Khodadadi, T. Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization. Int. J. Distrib. Sens. Netw. Jul. 2014, 10, 768936. [Google Scholar] [CrossRef]
  67. Dey, A.; Sarkar, T.; Ullah, M.; Nahar, N. Implementation of Improved Harmony Search Based Clustering Algorithm in Wireless Sensor Networks. In Proceedings of the 1st International Conference on Advanced Information and Communication Technology 2016; Chittagong Independent University: Chattogram, Bangladesh, 2016. [Google Scholar]
  68. Amouzgar, K. Multi-Objective Optimization Using Genetic Algorithms. Available online: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-19851 (accessed on 10 December 2021).
  69. Hayajneh, T.; Doomun, R.; Al-Mashaqbeh, G.; Mohd, B. An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Netw. 2014, 7, 2015–2038. [Google Scholar] [CrossRef]
  70. Miah, M.S. Performance Analysis of ILEACH and LEACH Protocols for Wireless Sensor Networks. J. Inf. Commun. Converg. Eng. 2012, 10, 384–389. [Google Scholar] [CrossRef]
  71. Braman, A. A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey. Int. J. Adv. Res. Comput. Commun. Eng. 2014, 3, 8. [Google Scholar]
  72. Liu, Z.; Liu, Z. A Dynamic Clustering Protocol for Wireless Sensor Networks. In Proceedings of the 2011 International Conference on Computational and Information Sciences, Chengdu, China, 23 October 2011; pp. 777–779. [Google Scholar] [CrossRef]
  73. Nazir, B.; Hasbullah, H. Energy Efficient Multi Hierarchy Clustering Protocol for Wireless Sensor Network (EMHC). In Proceedings of the International Conference on Intelligent and Information Technology 2010, Lahore, Pakistan, 28–30 October 2010; p. 6. [Google Scholar]
  74. Tarng, W.; Huang, K.-J.; Deng, L.-Z.; Hsie, K.-R.; Chen, M. A Study of Dynamic Clustering Method to Extend the Lifetime of Wireless Sensor Network. Int. J. Electron. Commun. Eng. 2010, 4, 61. [Google Scholar]
  75. Muthusamy, M.; Nallasamy, S. Enhancements of LEACH Algorithm for Wireless Networks: A Review. ICTACT J. Commun. Technol. 2013, 4, 821–827. [Google Scholar] [CrossRef]
  76. Gupta, A.; Malik, S.; Goyal, M.; Gupta, P. Clustering Approach for Enhancing Network Energy using LEACH Protocol in WSN. Int. J. Wired Wirel. Commun. 2012, 2, 20–25. [Google Scholar]
  77. Farooq, M.O.; Dogar, A.B.; Shah, G.A. MR-LEACH: Multi-hop Routing with Low Energy Adaptive Clustering Hierarchy. In Proceedings of the 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, Italy, 18–25 July 2010; pp. 262–268. [Google Scholar] [CrossRef]
  78. Bani-Hani, R.; Ijjeh, A. A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks. J. Commun. Eng. Technol. Publ. 2013, 8, 192. [Google Scholar] [CrossRef]
  79. Ahmedy, I.; Ngadi, M.A.; Omar, S.N.; Chaudhry, J. A review on wireless sensor networks routing protocol: Challenge in energy perspective. Sci. Res. Essays 2011, 6, 5628–5649. [Google Scholar] [CrossRef]
  80. Kumar, D.; Aseri, T.C.; Patel, R.B. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Comput. Commun. 2009, 32, 662–667. [Google Scholar] [CrossRef]
  81. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 16. [Google Scholar] [CrossRef]
  82. Kaur, M.; Munjal, A. Data Aggregation Algorithms for Wireless Sensor Network: A Review. Ad Hoc Netw. 2020, 100, 102083. [Google Scholar] [CrossRef]
  83. Liu, Y.; Wu, Q.; Zhao, T.; Tie, Y.; Bai, F.; Jin, M. An Improved Energy-Efficient Routing Protocol for Wireless Sensor Networks. Sensors 2019, 19, 4579. [Google Scholar] [CrossRef] [PubMed]
  84. Wu, X.; Lu, K.; Zhu, G. A Survey on Software-Defined Wide Area Networks. J. Commun. 2018, 13, 253–258. [Google Scholar] [CrossRef]
  85. Alotaibi, Y. A New Database Intrusion Detection Approach Based on Hybrid Meta-heuristics. Comput. Mater. Contin. 2021, 66, 1879–1895. [Google Scholar] [CrossRef]
  86. Salem, A.O.A.; Shudifat, N. Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquitous Comput. 2019, 23, 901–907. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.