You are currently viewing a new version of our website. To view the old version click .
Drones
  • Article
  • Open Access

14 November 2022

Ant Colony Optimization ACO Based Autonomous Secure Routing Protocol for Mobile Surveillance Systems

and
1
Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11653, Saudi Arabia
2
Department of Information Technology, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Security, Privacy and Reliability of Drone Communications for beyond 5G Networks

Abstract

Sensing plays a vital role in enabling smart cities. The mobile surveillance of different sectors, the retransmission of radio signals, and package delivery are the main applications conducted by unmanned vehicles in smart cities. Multiple unmanned vehicles or miniaturized real-time flying machines with onboard sensors, whether land- or air-based, communicate with each other to form a flying sensor network. Almost all of these machines are battery-operated. Therefore, power preservation is an extremely important factor to be taken into consideration. This paper proposes a power-aware biologically inspired secure autonomous routing protocol (P-BIOSARP) that depends on enhanced ant colony optimization (eACO). eACO autonomously and securely routes the data packet, and the power awareness maintains the power consumption of the flying sensor network. The novel intelligent power-aware routing protocol was implemented in network simulator 2 to perform a number of experiments with different scenarios. The scenarios included varying numbers of total nodes and mobile nodes, different packet rates, mobile source nodes, multiple mobile routing nodes, and, on the side of security, the injection of malicious nodes. The proposed protocol is compared with BIOSARP, E-BIOSARP, and SRTLD in terms of energy consumption, the delivery ratio, and traffic overhead. The analysis shows that the P-BIOSARP remarkably reduces energy consumption compared to other well-known protocols implemented on real testbeds.

1. Introduction

Monitoring is an essential requirement in many applications, such as agriculture [1], healthcare [2,3], water surveillance systems [4], parking [5], traffic [6], tracking [7], and police and military [8,9,10], and is increasing day by day due to the handling of multiple tasks by a single person, whether on-site or remotely. In surveillance systems, numerous high-tech devices, such as digital still and video cameras (CCTVs), charge-coupled devices (CCDs), active-pixel sensors (complementary metal–oxide semiconductor (CMOS) sensors) [11], GPSs, electronic toll takers, tapping devices, walking gait, biometrics, and drones, are used. Therefore, the deployment and maintenance of these systems are very costly and also require skilled people. Some places that are out of reach or are inaccessible require devices that are disposable. These miniaturized, low-cost devices are known as wireless sensor nodes, and multiple such devices form a wireless sensor network (WSN) [12]. These wireless sensor nodes work as the internet of things (IoT) when connected directly to the internet for transferring data without a gateway. The Fourth Industrial Revolution Industry 4.0, smart agriculture, and smart cities are enabled by attaching these sensor nodes and IoT to machines to control remotely [13], as shown in Figure 1.
Figure 1. Smart Future.
The future of connectivity is mostly wireless through the internet and sensor nodes that move, whether they are attached to some vehicle or in the form of unmanned aerial vehicles (UAVs). In mobile surveillance systems, the network scenario has changed from fixed nodes to mobile, meaning the network has a dynamic topology [14]. Some of the applications require the source nodes to be mobile, and in some, the gateway moves, as can be seen in Figure 1 for smart farming and Industry 4.0. As a result, the routing of data packets from the source node to the destination over multiple hops consumes a lot of power due to the re-establishment of routes [15]. Mobile sensor nodes that are battery-powered cannot afford fast battery depletion, which becomes a huge concern, especially in the case of disposable flying sensor nodes [16]. The efficiency of the routing protocol depends on the energy efficiency, multipath, QoS, scalability, location awareness, query, load balancing, fault tolerance, and data aggregation [17]. However, according to the application requirements, the routing protocol properties and type change [14].
In a network, when mobility is enabled, these mobile nodes affect the reliability of data transmission [18,19]. Many routing protocols address delay issues to enhance data availability [20]. Networks with a dynamic topology, where devices connect and disconnect rapidly, require a cost optimization mechanism that enables and disables features according to the data flow and device capability [21,22]. In [23], a sustainable routing protocol is introduced to provide flying sensor networks (FSNs) with better connectivity by complex free space propagation on the node to perform area detection. The nodes used in FSNs are low-cost and miniaturized with a slow processor, low memory, and small battery and are unable to handle complex algorithms in real-world scenarios [24]. The cluster-based routing protocol works well in static WSNs or IoT networks [25,26,27,28] but is unable to efficiently route data in an FSN because the node leaves and joins the network rapidly [29]. In [30], a cluster-based routing protocol for an FSN is presented that is based on the predefined static location of the sensor nodes and that of the cluster head. In terms of the mobile node, it remains in a specific area, making its movement strict. Many routing protocols to enhance the quality of secure data routing for WSNs with fixed nodes are based on simple nature-inspired optimization algorithms, such as in [31,32,33], which cannot handle mobility. Still, resource- or host-based routing support, privacy preservation, and ubiquitous support with simple AI techniques are required for future FSNs [34].
This paper proposes a power-aware ant colony optimization (ACO)-based autonomous secure routing protocol for FSNs. The ACO routing protocol is based on a probability function to calculate values by giving the maximum weight to energy and lower weights to link quality and delay parameters. The novel routing protocol helps in maintaining power consumption with secure transfer and privacy preservation, especially in network scenarios that involve massive mobile and malicious wireless nodes. The main contributions of this paper are as follows:
  • A power-aware biologically inspired secure self-organized routing protocol (P-BIOSARP) for FSNs in mobile surveillance systems is proposed.
  • P-BIOSARP, a biologically inspired self-organized routing protocol (BIOSARP), encryption-enabled E-BIOSARP, and secure real-time routing protocol with load distribution (SRTLD) routing protocols were implemented in network simulator 2 (NS-2).
  • Experiments were conducted and results were generated to show the variation in the total number of nodes and mobile nodes with different packet rates, multiple mobile routing, and mobile source nodes, and in terms of security, malicious nodes were injected.
  • The results prove that P-BIOSARP performs far better in terms of energy consumption, delivery ratio, and data packet overhead, even with a high number of flying mobile nodes and with malicious nodes.
The rest of the paper is organized as follows. The next section reviews the most relevant published literature. Section 3 explains the method and process flow of P_BIOSARP. Section 4 describes the implementation of the proposed and other routing protocols. Section 5 presents and provides a description of the experimental results. Section 6 discusses the findings. The concluding remarks and the future work are given in the last section, Section 7.

3. Methodology

In this section, the in-depth architecture of the power-aware ant colony optimization (ACO) routing protocol (P-BIOSARP) is presented. P-BIOSARP is an extension of the enhanced E-BIOSARP, which includes an encryption mechanism. In E-BIOSARP, as discussed in Section 2, the parameters include link quality (α), delay (β), and remaining energy (δ) for deciding the most optimal node based on the probability ( P ) function, as in Equation (1), among the neighboring nodes to forward the data packet to so that it can reach the destination. On top of the optimal value calculation, the encryption is enabled to secure the packet information with a mathematical encryption function.
P c n ε = α c n ε w α · β c n ε w β · δ c n ε w γ k   ϵ   c n α c n ε w α · β c n ε w β · δ c n ε w γ
where P c n ε is the calculated probability of the neighboring node ID ε for data packets that need to be transferred from current node c to the neighboring node n, w is the weight of each parameter, is the link-quality weight, is the delay weight, and w γ is the remaining energy weight. Other parameters in Equation (2) include min and max, which are the minimum value and the maximum value, respectively.
In P-BIOSARP, the parameter remaining energy (δ) is given the maximum w, and the other two, link quality (α) and delay (β), are given the smallest w when calculating the probability of n by Equation (2).
P c n ε = α c n ε m a x w α · β c n ε m i n ( w β ) · δ c n ε m i n w γ k   ϵ   c n α c n ε m a x w α · β c n ε m i n w β · δ c n ε m i n w γ
The process starts when the node is turned on, and the initial battery capacity that is calculated by the battery power management [45] is stored in the variable (batti) by Equation (3).
batti = tbcbattce
where tbc is the total battery capacity, and battce is the current energy of the battery or batteries connected to the sensor node. batti is then attached to the current time (ct), based on which the energy consumption (battec) is measured. battec is based on the average battec rate multiplied by the time taken for a single operation. battec is the result of transmitting, receiving, and processing the signals in addition to the consumption in inactive mode [46,47]. Every time any process takes place in the node, δ is updated as in Equation (3) [45].
δ = battibattec
The δ parameter is mostly known as the state of charge (SoC), expressed as a percentage, where an empty battery is 0% and full is 100%. In the P-BIOSARP case, δ is retained to avoid multiple calculations and battery consumption. P-BIOSARP depends on BIOSARP, that is, an on-demand routing protocol, which means that when it is necessary to forward the data packet, the neighbor information is collected and stored in a routing table to generate the optimal n decision, as shown in the flow chart in Figure 2.
Figure 2. P-BIOSARP process flow.
Therefore, the source node begins with the broadcasting of route request (RREQ) packets, and all of the neighboring nodes at a single hop, meaning those in the range of the source node, receive them. In response, the node receives the RREQ packet, builds the route reply (RREP) packet with its own information, and sends the RREP packet to the source node. This RREP packet of the WSN with MAC and physical layers of IEEE standard 802.15.4 includes the δ value. P-BIOSARP running at the source node decrypts and stores the information in its routing table with the n identity (ID), as shown in Figure 2.
When the route discovery procedure is completed, the source node starts calculating the probability of each n in the routing table by Equation (2). The P c n ε value is also recorded in the routing table for each n. After filling all of the required fields of the routing table, the source node searches for the highest P c n ε value and returns the n ID against it. The data packets in the queue are then forwarded to the selected n. In the event of rerouting or forwarding the data packet, the same process of selecting the best n is conducted, and it continues until the destination and the sink node of the WSN.
The proposed mechanism was developed with the assumption that the included mobile nodes do not move at high speed. The mobile nodes do not move out of the given region. The gateway or the sink node is a trusted body. If no neighboring node is found, the mobile node moves towards the location of the gateway. The pseudo-random function to provide the master key and the ID of the nodes is embedded in the program. The collision avoidance and the channels between devices are managed by the 802.15.4 MAC layer.

4. Implementation

A real scenario of a WSN with IEEE 802.15.4 MAC and physical layers was implemented in NS-2. The scenario TCL file was edited with the values given in Table 2. In an 8-node-based scenario, as shown in Figure 3, a one-to-one (node ID 8 as the source and node ID 0 as the destination) traffic pattern was used. The traffic pattern of 4 source nodes to 1 destination node was used in 50-node (source node IDs 25, 31, 37, and 43), as shown in Figure 4, and 121-node scenarios (source node IDs 90, 100, 110, and 120), as shown in Figure 5.
Table 2. TCL script configuration.
Figure 3. Scenario with 8 nodes and 4 malicious nodes.
Figure 4. Scenario with 50 nodes and 20 malicious nodes.
Figure 5. Scenario with 121 nodes and 20 malicious nodes.
The simulation results were generated by running multiple simulations with variations in scenarios and with different routing protocols, which are E-BIOSARP, BIOSARP, SRTLD, and the novel P-BIOSARP.
The metrics for performance evaluation are battec, packet delivery ratio (PDR), and traffic overhead. First, battec is calculated based on the difference between batti and battce by Equation (5) [24,33].
battec = battibattce
The PDR of the data packet is calculated by Equation (6) based on T P s , the total number of packets sent by the source node or nodes, divided by T P d , the total number of data packets received at the destination node [24,35,38].
P D R = T P d / T P s
The packet overhead (PO) is estimated by Equation (7), where total data packets T P d received at the destination node is divided by the total control packets TCP [24,35,38].
P D R = T P d / T C P

5. Results

The results shown in Table 3 are the average values generated by implementing the power-aware biologically inspired self-organized routing protocol (P-BIOSARP), the encryption-enabled biologically inspired self-organized routing protocol (E-BIOSARP), the biologically inspired self-organized routing protocol (BIOSARP), and the secure real-time routing protocol with load distribution (SRTLD) in NS-2. A total of about ninety-two experiments were performed with different scenarios, which included initially varying the number of nodes, using different packet rates, increasing the node speed, using mobile nodes, and on the security side, injecting malicious nodes.
Table 3. Experimental Results.
In addition to the results given in Table 3, the time complexity of the algorithm with the communication results is
s14.58793_8_RTR---41biosarp
r14.59118_7_RTR---41biosarp
where the difference in sending and receiving the RTR packet is 0.00325 s.
The energy comparison between P-BIOSARP and E-BIOSARP is shown in Figure 6, where the number of nodes is changed from 8 to 50 and then to 121 while keeping the packet rate at 3.6 packets per second (p/s), and the simulation was run for 300 s. In the scenario with a total of eight nodes, the number of malicious nodes is four, namely, 2, 4, 6, and 7, as shown in Figure 3. In the scenarios with 50, as shown in Figure 4, and 121 nodes, the number of malicious nodes is increased to twenty, namely, 2, 4, 6, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, and 24, as shown in Figure 5.
Figure 6. battec vs. Number of Nodes Comparison between P-BIOSARP and E-BIOSARP.
Figure 7 shows the results of experimentation with the same scenario and compares the PDR between P-BIOSARP and E-BIOSARP.
Figure 7. PDR vs. Number of Nodes Comparison between P-BIOSARP and E-BIOSARP.
The PO, that is, the control packets required to transfer a single data packet, between P-BIOSARP and E-BIOSARP is shown in Figure 8.
Figure 8. PO vs. Number of Nodes Comparison between P-BIOSARP and E-BIOSARP.
In addition to varying the number of nodes in scenarios, the energy comparison between P-BIOSARP and E-BIOSARP was compared, the results of which are shown in Figure 9, by increasing malicious nodes in the network, as given in Figure 5. The number of malicious nodes was altered from 4 (malicious node IDs 22, 24, 14, and 16) to 8 (malicious node IDs 22, 24, 14, 16, 21, 23, 15, and 13), 12 (malicious node IDs 22, 24, 14, 16, 21, 23, 15, 13, 18, 10, 11, and 19), 16 (malicious node IDs 22, 24, 14, 16, 21, 23, 15, 13, 18, 10, 11, 19, 4, 8, 2, and 6), and then 20 (malicious node IDs 22, 24, 14, 16, 21, 23, 15, 13, 18, 10, 11, 19, 4, 8, 2, 6, 9, 17, 12, and 20), while the number of nodes was fixed at 121, the packet rate was fixed at 3.6 p/s, and the total time was 300 s.
Figure 9. battec vs. Number of Malicious Nodes Comparison between P-BIOSARP and E-BIOSARP.
Figure 10 shows the results of experimentation with the same scenario to compare the PDR between P-BIOSARP and E-BIOSARP. The PO comparison between P-BIOSARP and E-BIOSARP is shown in Figure 11.
Figure 10. PDR vs. Number of Malicious Nodes Comparison between P-BIOSARP and E-BIOSARP.
Figure 11. PO vs. Number of Malicious Nodes Comparison between P-BIOSARP and E-BIOSARP.
Furthermore, the scenarios were varied with different packet rates, starting with 0.33 per second, followed by 0.7/s, 1.5/s, 2.2/s, and 3.6/s. In these scenarios, the number of total nodes was fixed to 121, of which 20 were malicious nodes (IDs 22, 24, 14, 16, 21, 23, 15, 13, 18, 10, 11, 19, 4, 8, 2, 6, 9, 17, 12, and 20), as shown in Figure 5, and the simulation was run for 300 s. The energy comparison between P-BIOSARP, E-BIOSARP, BIOSARP, and SRTLD is shown in Figure 12.
Figure 12. battec vs. Packet Rate Comparison between P-BIOSARP, E-BIOSARP, SRTLD, and BI-OSARP.
The results of experimentation with the same scenario to compare the PDR between P-BIOSARP, E-BIOSARP, BIOSARP, and SRTLD are shown in Figure 13. The PO comparison between P-BIOSARP, E-BIOSARP, BIOSARP, and SRTLD is shown in Figure 14.
Figure 13. PDR vs. Packet Rate Comparison between P-BIOSARP, E-BIOSARP, SRTLD, and BI-OSARP.
Figure 14. PO vs. Packet Rate Comparison between P-BIOSARP, E-BIOSARP, SRTLD, and BIOSARP.
P-BIOSARP and E-BIOSARP were further tested under full load with a scenario that included 20 malicious nodes (IDs 22, 24, 14, 16, 21, 23, 15, 13, 18, 10, 11, 19, 4, 8, 2, 6, 9, 17, 12, and 20) and 12 mobile nodes, where 4 are source nodes that generate the data. The results were obtained with different packet rates, starting with 0.33 per second, followed by 1.5/s, 2.2/s, and 3.6/s. In these scenarios, the number of total nodes was fixed to 121, as shown in Figure 5, and the simulation was run for 300 s. The energy comparison between P-BIOSARP and E-BIOSARP is shown in Figure 15.
Figure 15. battec vs. Packet Rate Comparison between P-BIOSARP, E- BIOSARP with Malicious Nodes and with Mobility.
The results of experimentation with the same scenario to compare the PDR between P-BIOSARP and E-BIOSARP are shown in Figure 16. The PO comparison between P P-BIOSARP and E-BIOSARP is shown in Figure 17.
Figure 16. PDR vs. Packet Rate Comparison between P-BIOSARP, E- BIOSARP with Malicious Nodes and with Mobility.
Figure 17. PO vs. Packet Rate Comparison between P-BIOSARP and E-BIOSARP with Malicious Nodes and with Mobility.

6. Discussion

The results in figures and also in tabular form in Table 3 demonstrate that the power consumption is reduced when using P-BIOSARP because, as described in the methodology (Section 3), the maximum weight is given to the energy parameter when calculating and making decisions with the most optimal node. The best node is selected from the neighboring nodes, with the node with the highest remaining battery chosen over the rest.
In Figure 6, the battec of P-BIOSARP is far better than E-BIOSARP when the simulation was run with 121 nodes for 300 s. This shows that if the network is increased with more nodes and needs to be deployed for a longer period, battec will become increasingly better. In addition, the PDR is a bit lower in Figure 7, and the traffic overhead is higher in Figure 8, which is a shortcoming of giving a large rise to a single property, and it eventually depends on the application requirements.
Furthermore, in the scenario where the malicious nodes are increased from 4 to 20, on average, battec, as shown in Figure 9, is less required with P-BIOSARP than with E-BIOSARP. However, the PDR in Figure 10 and traffic overhead in Figure 11 are a little bit higher. This shows that when a high level of security is required, parameters that can raise the quality of traffic all need to be enabled.
In the scenario with a maximum of 121 nodes in an 80 m2 area and run for 300 s where the packet rate increases from 0.33/s to 3.6/s, Figure 12 shows that there is a significant difference in battec, which is an average of 17% less with P-BIOSARP compared to the E-BIOSARP, BIOSARP, and SRTLD routing protocols. The PDR is lower, as shown in Figure 13, and PO is high, as shown in Figure 14, with P-BIOSARP. Analyzing the trends in Figure 12, Figure 13, and Figure 14 shows that with more traffic in the network, P-BIOSARP performs much better in all aspects, whether battec, PDR, or PO is considered.
In the case where the scenario is configured with 20 malicious nodes and 12 mobile nodes with source nodes, meaning with a full load on the network routing protocols to establish and route the data packets, the P-BIOSARP results are far better than those of the other routing protocols in terms of battec, as shown in Figure 15, PDR, as shown in Figure 16, and PO, as shown in Figure 17. Hence, the results prove that when the network is heavily loaded and needs to save energy, P-BIOSARP should be employed. Otherwise, when high quality is required for data routing, parameters related to reliability should be considered when making the optimal decision. P-BIOSARP is able to secure the FSN from spoofing, HELLO flood attacks, Sybil attacks, eavesdropping, selective forwarding, acknowledgment spoofing, brute-force or exhaustive key search, replaying or altering of routing information, data-tampering attacks, and cloning, as it is the enhanced version of [38].

7. Conclusions

This paper proposes a power-aware ant colony optimization (ACO)-based autonomous secure routing protocol for FSNs in mobile surveillance systems. The decision of the next hop to the destination is based on a probability value that is calculated based on three parameters. The remaining battery power is given the maximum weight in P-BIOSARP, and a lower weight is assigned to the link quality and the packet delay. As a result, the optimal choice of the neighboring flying sensor node is mainly related to the remaining battery power, but the link quality and delay are also taken under consideration with less priority. P-BIOSARP transfers data packets securely by encrypting important header information to preserve privacy. FSN scenarios were configured with variations in the number of mobile nodes and malicious nodes. The experimental analysis supports that P-BIOSARP consumes 17% less energy with a better delivery ratio and with less data packet overhead compared to the E-BIOSARP, BIOSARP, and SRTLD routing protocols. Moreover, the results show that P-BIOSARP performance rises with the increase in time, nodes, and the packet rate.
In the future, P-BIOSARP will be tested on real flying sensor nodes by varying the parameter weights. Furthermore, additional testing will be performed based on the distribution function.

Author Contributions

Conceptualization, I.A. and K.S.; methodology, K.S.; software, K.S.; validation, I.A. and K.S.; formal analysis, K.S.; investigation, K.S.; resources, I.A. and K.S.; writing—original draft preparation, K.S.; writing—review and editing, I.A. and K.S.; visualization, I.A. and K.S.; supervision, I.A. and K.S.; project administration, I.A. and K.S.; funding acquisition, I.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research work was funded by Institutional Fund Projects under grant no. IFPIP-1254-611-1442. Therefore, the authors gratefully acknowledge technical and financial support from the Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

Data Availability Statement

Not applicable.

Acknowledgments

This research work was funded by Institutional Fund Projects under grant no. (IFPIP-1254-611-1442). Therefore, the authors gratefully acknowledge technical and financial support from the Ministry of Education and King Abdulaziz University, DSR, Jeddah, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akhtar, M.N.; Shaikh, A.J.; Khan, A.; Awais, H.; Bakar, E.A.; Othman, A.R. Smart Sensing with Edge Computing in Precision Agriculture for Soil Assessment and Heavy Metal Monitoring: A Review. Agriculture 2021, 11, 475. [Google Scholar] [CrossRef]
  2. BinDhim, N.F.; Althumiri, N.A.; Basyouni, M.H.; Alageel, A.A.; Alghnam, S.; Al-Qunaibet, A.M.; Almubarak, R.A.; Aldhukair, S.; Ad-Dab’bagh, Y. Saudi Arabia Mental Health Surveillance System (MHSS): Mental health trends amid COVID-19 and comparison with pre-COVID-19 trends. Eur. J. Psychotraumatol. 2021, 12, 1875642. [Google Scholar] [CrossRef] [PubMed]
  3. Ullah, I.; Alomari, A.; Ul Amin, N.; Khan, M.A.; Khattak, H. An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things. Electronics 2019, 8, 1171. [Google Scholar] [CrossRef]
  4. Keshaviah, A.; Hu, X.C.; Henry, M. Developing a Flexible National Wastewater Surveillance System for COVID-19 and Beyond. Environ. Health Perspect. 2021, 129, 045002. [Google Scholar] [CrossRef] [PubMed]
  5. Ke, R.; Zhuang, Y.; Pu, Z.; Wang, Y. A Smart, Efficient, and Reliable Parking Surveillance System With Edge Artificial Intelligence on IoT Devices. IEEE Trans. Intell. Transp. Syst. 2021, 22, 4962–4974. [Google Scholar] [CrossRef]
  6. Pramanik, A.; Sarkar, S.; Maiti, J. A real-time video surveillance system for traffic pre-events detection. Accid. Anal. Prev. 2021, 154, 106019. [Google Scholar] [CrossRef]
  7. Jha, S.; Seo, C.; Yang, E.; Joshi, G.P. Real time object detection and trackingsystem for video surveillance system. Multimed. Tools Appl. 2021, 80, 3981–3996. [Google Scholar] [CrossRef]
  8. Janbandhu, A.C.; Sharma, S.; Ansari, I.A.; Bajaj, V. Drone-based vision system: Surveillance during calamities. In Computational Intelligence Based Solutions for Vision Systems; IOP Publishing Ltd.: Bristol, UK, 2022. [Google Scholar]
  9. Srivastava, A.; Badal, T.; Garg, A.; Vidyarthi, A.; Singh, R. Recognizing human violent action using drone surveillance within real-time proximity. J. Real-Time Image Process. 2021, 18, 1851–1863. [Google Scholar] [CrossRef]
  10. Santamaria, A.F.; Raimondo, P.; Tropea, M.; De Rango, F.; Aiello, C. An IoT Surveillance System Based on a Decentralised Architecture. Sensors 2019, 19, 1469. [Google Scholar] [CrossRef]
  11. Sukhavasi, S.B.; Sukhavasi, S.B.; Elleithy, K.; Abuzneid, S.; Elleithy, A. CMOS Image Sensors in Surveillance System Applications. Sensors 2021, 21, 488. [Google Scholar] [CrossRef]
  12. Ouni, R.; Saleem, K. Framework for Sustainable Wireless Sensor Network Based Environmental Monitoring. Sustainability 2022, 14, 8356. [Google Scholar] [CrossRef]
  13. Amiri-Zarandi, M.; Hazrati Fard, M.; Yousefinaghani, S.; Kaviani, M.; Dara, R. A Platform Approach to Smart Farm Information Processing. Agriculture 2022, 12, 838. [Google Scholar] [CrossRef]
  14. Khan, M.A.; Kumar, N.; Mohsan, S.A.H.; Khan, W.U.; Nasralla, M.M.; Alsharif, M.H.; Żywiołek, J.; Ullah, I. Swarm of UAVs for Network Management in 6G: A Technical Review. IEEE Trans. Netw. Serv. Manag. 2022, 1-1. [Google Scholar] [CrossRef]
  15. Bhushan, B.; Sahoo, G. Routing Protocols in Wireless Sensor Networks. In Computational Intelligence in Sensor Networks; Mishra, B.B., Dehuri, S., Panigrahi, B.K., Nayak, A.K., Mishra, B.S.P., Das, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2019; pp. 215–248. [Google Scholar]
  16. Mohamed, R.E.; Saleh, A.I.; Abdelrazzak, M.; Samra, A.S. Survey on Wireless Sensor Network Applications and Energy Efficient Routing Protocols. Wirel. Pers. Commun. 2018, 101, 1019–1055. [Google Scholar] [CrossRef]
  17. Guleria, K.; Verma, A.K. Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks. Wirel. Netw. 2019, 25, 1159–1183. [Google Scholar] [CrossRef]
  18. Yue, Y.-G.; He, P. A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions. Inf. Fusion 2018, 44, 188–204. [Google Scholar] [CrossRef]
  19. Rady, A.; El-Rabaie, E.L.-S.M.; Shokair, M.; Abdel-Salam, N. Comprehensive survey of routing protocols for Mobile Wireless Sensor Networks. Int. J. Commun. Syst. 2021, 34, e4942. [Google Scholar] [CrossRef]
  20. Kumaran, K.M.; Chinnadurai, M. A Competent Ad-hoc Sensor Routing Protocol for Energy Efficiency in Mobile Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 116, 829–844. [Google Scholar] [CrossRef]
  21. Del-Valle-Soto, C.; Mex-Perera, C.; Nolazco-Flores, J.A.; Velázquez, R.; Rossa-Sierra, A. Wireless Sensor Network Energy Model and Its Use in the Optimization of Routing Protocols. Energies 2020, 13, 728. [Google Scholar] [CrossRef]
  22. Sara, G.S.; Sridharan, D. Routing in mobile wireless sensor network: A survey. Telecommun. Syst. 2014, 57, 51–79. [Google Scholar] [CrossRef]
  23. Khan, M.A.; Qureshi, I.M.; Khanzada, F. A Hybrid Communication Scheme for Efficient and Low-Cost Deployment of Future Flying Ad-Hoc Network (FANET). Drones 2019, 3, 16. [Google Scholar] [CrossRef]
  24. Saleem, K.; Fisal, N.; Al-Muhtadi, J. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol. IEEE Sens. J. 2014, 14, 2232–2239. [Google Scholar] [CrossRef]
  25. Hosen, A.S.M.S.; Cho, G.H. An Energy Centric Cluster-Based Routing Protocol for Wireless Sensor Networks. Sensors 2018, 18, 1520. [Google Scholar] [CrossRef]
  26. Liu, Y.; Wu, Q.; Zhao, T.; Tie, Y.; Bai, F.; Jin, M. An Improved Energy-Efficient Routing Protocol for Wireless Sensor Networks. Sensors 2019, 19, 4579. [Google Scholar] [CrossRef] [PubMed]
  27. Behera, T.M.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Daneshmand, M.; Gandomi, A.H. Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application. IEEE Internet Things J. 2019, 6, 5132–5139. [Google Scholar] [CrossRef]
  28. Rodríguez, A.; Del-Valle-Soto, C.; Velázquez, R. Energy-Efficient Clustering Routing Protocol for Wireless Sensor Networks Based on Yellow Saddle Goatfish Algorithm. Mathematics 2020, 8, 1515. [Google Scholar] [CrossRef]
  29. Fanian, F.; Kuchaki Rafsanjani, M. Cluster-based routing protocols in wireless sensor networks: A survey based on methodology. J. Netw. Comput. Appl. 2019, 142, 111–142. [Google Scholar] [CrossRef]
  30. Zafar, S.; Bashir, A.; Chaudhry, S.A. Mobility-Aware Hierarchical Clustering in Mobile Wireless Sensor Networks. IEEE Access 2019, 7, 20394–20403. [Google Scholar] [CrossRef]
  31. Saleem, K.; Chaudhry, J.; Orgun, M.A.; Al-Muhtadi, J. A bio-inspired secure IPv6 communication protocol for Internet of Things. In Proceedings of the 2017 Eleventh International Conference on Sensing Technology (ICST), Sydney, Australia, 4–6 December 2017; pp. 1–6. [Google Scholar]
  32. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H.-J. An Improved Routing Schema with Special Clustering Using PSO Algorithm for Heterogeneous Wireless Sensor Network. Sensors 2019, 19, 671. [Google Scholar] [CrossRef]
  33. Rathee, M.; Kumar, S.; Gandomi, A.H.; Dilip, K.; Balusamy, B.; Patan, R. Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. IEEE Trans. Eng. Manag. 2021, 68, 170–182. [Google Scholar] [CrossRef]
  34. Wheeb, A.H.; Nordin, R.; Samah, A.A.; Alsharif, M.H.; Khan, M.A. Topology-Based Routing Protocols and Mobility Models for Flying Ad Hoc Networks: A Contemporary Review and Future Research Directions. Drones 2022, 6, 9. [Google Scholar] [CrossRef]
  35. Ahmed, A.A.; Fisal, N.F. Secure real-time routing protocol with load distribution in wireless sensor networks. Secur. Commun. Netw. 2011, 4, 839–869. [Google Scholar] [CrossRef]
  36. Saleem, K.; Fisal, N.; Baharudin, M.A.; Ahmed, A.A.; Hafizah, S.; Kamilah, S. Ant colony inspired self-optimized routing protocol based on cross layer architecture for wireless sensor networks. WSEAS Trans. Commun. 2010, 9, 669–678. [Google Scholar]
  37. Saleem, K.; Fisal, N.; Hafizah, S.; Rashid, R.A. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP; Springer: Berlin/Heidelberg, Germany, 2011; pp. 118–126. [Google Scholar]
  38. Saleem, K.; Derhab, A.; Orgun, M.A.; Al-Muhtadi, J.; Rodrigues, J.J.P.C.; Khalil, M.S.; Ali Ahmed, A. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks. Sensors 2016, 16, 460. [Google Scholar] [CrossRef] [PubMed]
  39. Rubeaai, S.F.A.; Abd, M.A.; Singh, B.K.; Tepe, K.E. 3D Real-Time Routing Protocol With Tunable Parameters for Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 843–853. [Google Scholar] [CrossRef]
  40. López-Matencio, P. An ACOR-Based Multi-Objective WSN Deployment Example for Lunar Surveying. Sensors 2016, 16, 209. [Google Scholar] [CrossRef]
  41. Rupérez Cañas, D.; Sandoval Orozco, A.L.; García Villalba, L.J.; Kim, T.-h. A Family of ACO Routing Protocols for Mobile Ad Hoc Networks. Sensors 2017, 17, 1179. [Google Scholar] [CrossRef]
  42. Zou, Z.; Qian, Y. Wireless sensor network routing method based on improved ant colony algorithm. J. Ambient Intell. Humaniz. Comput. 2019, 10, 991–998. [Google Scholar] [CrossRef]
  43. Khobahi, S.; Soltanalian, M.; Jiang, F.; Swindlehurst, A.L. Optimized Transmission for Parameter Estimation in Wireless Sensor Networks. IEEE Trans. Signal Inf. Processing Over Netw. 2020, 6, 35–47. [Google Scholar] [CrossRef]
  44. Jain, R. Ant Colony Inspired Energy Efficient OLSR (AC-OLSR) Routing Protocol in MANETS. Wirel. Pers. Commun. 2022, 124, 3307–3320. [Google Scholar] [CrossRef]
  45. Mokrenko, O.; Vergara-Gallego, M.; Lombardi, W.; Lesecq, S.; Albea, C. WSN power management with battery capacity estimation. In Proceedings of the 2015 IEEE 13th International New Circuits and Systems Conference (NEWCAS), Grenoble, France, 7–10 June 2015; pp. 1–4. [Google Scholar]
  46. Chen, S.; Yao, J.; Wu, Y. Analysis of the Power Consumption for Wireless Sensor Network Node Based on Zigbee. Procedia Eng. 2012, 29, 1994–1998. [Google Scholar] [CrossRef]
  47. Du, W.; Mieyeville, F.; Navarro, D. Modeling Energy Consumption of Wireless Sensor Networks by SystemC. In Proceedings of the 2010 Fifth International Conference on Systems and Networks Communications, Nice, France, 22–27 August 2010; pp. 94–98. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.