1. Introduction
Underwater wireless sensor networks (UWSNs) have enabled important applications such as environmental monitoring, ocean exploration, underwater observation, surveillance, and security operations [
1]. Unlike terrestrial sensor networks, UWSNs primarily rely on acoustic communication, which severely constrains protocol design due to limited bandwidth, high propagation latency (≈1500 m/s), frequency-dependent absorption and scattering losses, strong spatiotemporal channel variability, multipath, and Doppler effects [
2]. Furthermore, the difficulty of recharging or replacing batteries causes energy limitations, which complicates network operation and protocol design. Furthermore, the difficulty of recharging or replacing batteries causes energy limitations, which complicates network operation and protocol design [
3]. While numerous protocols have been proposed for terrestrial and ad hoc networks, underwater acoustic channels introduce unique challenges that require specially tailored solutions. Compared to terrestrial networks, UWSNs typically involve higher manufacturing and deployment costs, lower node density due to installation constraints, greater inter-node separation, and significantly higher transmission energy requirements [
4,
5,
6].
Among the most promising strategies are evolutionary and bio-inspired algorithms, which have demonstrated effectiveness in addressing complex optimization problems in wireless sensor networks under dynamic conditions [
7,
8]. Techniques such as clustering, energy-aware routing, and fuzzy-logic-based decision mechanisms have been widely used to improve energy efficiency and network lifetime in wireless sensor networks [
9].
One of the most widely known clustering protocols is LEACH (Low-Energy Adaptive Clustering Hierarchy), which has been widely used as a baseline clustering protocol for wireless sensor networks and later adapted to underwater wireless sensor networks (UWSNs) [
10]. LEACH selects cluster head probabilistically and operates in two phases—setup and steady state—to reduce energy consumption and extend network lifetime. To mitigate collisions during cluster formation, S-LEACH was proposed, which divides the advertisement (ADV) phase into time slots. Additionally, C-LEACH introduces a centralized control node responsible for collecting and forwarding cluster information, reducing both collisions and energy consumption [
11]. Recent studies have further investigated LEACH-based clustering mechanisms to improve energy efficiency, load balancing, and network lifetime in wireless sensor networks [
12].
The issue of energy imbalance was addressed by applying an improved K-means algorithm to UWSNs [
13]. This approach uses the maximum distance method to determine initial cluster centers based on node depth and local density. It selects the cluster head according to residual energy and distance metrics, thereby balancing energy consumption, extending the network lifetime, and increasing data transmission. More recent K-means-based approaches have further incorporated node location, residual energy, and sink distance into cluster-head selection to reduce energy consumption and the number of dead nodes in underwater sensor networks [
14].
In the metaheuristic domain, ref. [
15] proposed a clustering scheme based on Particle Swarm Optimization (PSO), which improves clustering balance by considering cluster-head load, residual energy, and transmission power to reduce energy consumption and extend network lifetime. More recent PSO-based clustering methods have further explored unequal clustering and dynamic cluster-size adjustment to balance cluster-head load and reduce overall network energy consumption in underwater sensor networks [
16].
More recently, ref. [
17] introduced a glowworm swarm optimization-based protocol, where cluster head are selected using a fitness function that combines residual energy, total energy, and luciferin value. This method, known as SS-GSO, achieved significant improvements in energy efficiency, cluster lifetime, and packet delivery performance.
Another promising approach is the Dragonfly Algorithm (DA), introduced by Mirjalili [
18], which models separation, alignment, cohesion, attraction toward food, and distraction from enemies in a continuous search space. DA was later applied in ANC-UWSN [
19] as a clustering-oriented optimization approach for underwater sensor networks, where dragonfly optimization is used to support cluster formation and routing formation. This line of work was later extended in CDFO-UWSN [
20], where dragonfly optimization was combined with a multi-objective clustering formulation to improve network lifetime and energy efficiency in underwater sensor networks.
Recent advances in UWSN clustering have improved energy efficiency and packet delivery; however, several limitations remain. Many methods assume static node positions, even though underwater nodes are often affected by current-induced displacement. In addition, several optimization-based approaches rely on fixed-weight objective aggregation, which may bias the search toward particular criteria and reduce adaptability under dynamic conditions. In the case of Dragonfly-based methods applied to UWSNs, previous studies have mainly used continuous representations and weighted formulations [
19,
20], leaving limited exploration of binary cluster encoding and Pareto-based decision strategies.
To address these limitations, this paper proposes BMDA-UWSN, a binary multi-objective Dragonfly-based framework for cluster-head selection and clustering configuration in underwater wireless sensor networks. The contribution of the proposed method does not lie in introducing a fundamentally new swarm theory, but in reformulating the clustering problem so that candidate solutions are represented and optimized in a binary decision space suitable for UWSN clustering. In contrast to previous Dragonfly-based UWSN approaches that rely on continuous representations and fixed-weight objective aggregation, the proposed method jointly considers cluster-head selection and member assignment through binary encoding, evaluates the robustness of candidate clustering configurations under semicircular mobility conditions, and applies Pareto-based ranking with post-Pareto compromise selection to reduce dependence on fixed weights during decision making.
The proposed approach considers three optimization criteria: energy consumption, end-to-end latency, and load balance. In addition, a semicircular mobility model with angular variation of ±45° is incorporated to represent node oscillation caused by underwater currents within a controlled two-dimensional simulation scenario. The main contributions of this work are: (i) the adaptation of the Dragonfly-based search process to a binary decision space for UWSN clustering, (ii) the joint evaluation of clustering configurations through multi-objective optimization without relying on fixed-weight aggregation during the search stage, and (iii) the integration of a mobility-aware evaluation model to assess clustering behavior under dynamic underwater conditions. The remainder of this article is organized as follows.
Section 2 presents the proposed methodology, including the network initialization procedure, the physical and communication models, the multi-objective formulation, the Dragonfly-based optimization process, and the mobility-aware evaluation simulation scenario.
Section 3 describes the experimental setup and comparative evaluation.
Section 4 presents the main results and their discussion. Finally,
Section 5 summarizes the conclusions and outlines future work.
2. Methodology
This section presents the BMDA-UWSN methodology, which is organized into five main components, as summarized in the flowchart shown in
Figure 1. First, the initialization and binary encoding stage defines node deployment, the binary representation of candidate solutions, and the initial assignment of member nodes to cluster heads. Second, the physical network models describe the communication-related mechanisms considered in the study, including energy consumption, acoustic latency, propagation loss, and load balance. Third, the semicircular mobility model represents the controlled node displacement caused by underwater currents. Fourth, the multi-objective formulation defines the optimization criteria used to evaluate candidate clustering configurations. Fifth, the optimization stage describes the binary adaptation of the Dragonfly Algorithm and the search process used to obtain the final clustering solution. The following subsections describe each component in detail.
The diagram illustrates the main stages of the framework, including network initialization, multi-objective optimization using the binary Dragonfly algorithm, Pareto-based selection of the best global solution, and the simulation-based performance evaluation.
2.2. Physical Network Models
This subsection defines the physical and communication models used to evaluate each candidate clustering configuration in BMDA-UWSN. Specifically, the framework considers energy consumption, acoustic latency, propagation loss, and load balancing. These models provide the objective values used in the multi-objective optimization process and allow the algorithm to assess the cost of each solution under underwater communication constraints.
2.2.1. Energy Model
The energy consumption model is used in this work as a simplified network-level approximation of the communication cost associated with packet transmission and reception [
21]. Its purpose is to compare candidate clustering configurations in terms of relative communication cost per round. Although this formulation does not represent the full physical behavior of underwater acoustic power consumption by itself, underwater-specific channel effects are incorporated separately in the framework through the acoustic latency, propagation-loss, and attenuation models described in
Section 2.2.2 and
Section 2.2.3 [
22]. Thus, the energy model should be interpreted as a communication-cost abstraction for network optimization rather than as a complete acoustic physical-layer power model.
Energy consumed when receiving the packet:
where
is the energy consumed by the node’s electronics,
is the energy of the transmission amplifier,
is the distance to the destination, and
is the packet size in bits. These expressions are used to estimate the transmission and reception cost associated with each communication link during intra-cluster and inter-cluster forwarding. In this way, the model provides a consistent basis for comparing candidate solutions, while underwater acoustic effects are evaluated separately through latency and propagation-loss modeling.
Intra-cluster energy (member node → CH). For each member node
assigned to its CH leader (
):
where
: Total energy consumed in communication between the member node i and its cluster head.
: Energy consumed by the node’s electronics.
: Energy consumed by the transmission amplifier.
: Transmitted packet size.
: Euclidean distance between the node i and its cluster head.
Inter-cluster energy (backbone CH → sink). The multi-hop path from a cluster head to the sink is denoted by
, with links
The total energy required for inter-cluster transmission is given by
where
Total energy consumed to transmit information from a CH to the sink node through multiple hops.
Set of links (u→v) forming the multi-hop path from the cluster head to the sink.
u, v = successive transmitting and receiving nodes on the path (u→v).
: Energy consumed by the node’s electronics.
: Energy consumed by the transmission amplifier.
: Size of the transmitted packet.
Distance between the transmitting node u y and the receiving node v on the multi-hop route.
Total energy per round. To quantify the total energy consumption of a candidate clustering configuration, the model considers two communication stages in each round. First, each member node transmits its packet to its assigned cluster head, while the corresponding CH consumes energy when receiving that packet. Second, only the cluster heads participate in the backbone communication toward the sink. In this stage, each backbone hop involves transmission energy at the sending CH and reception energy at the receiving CH (or at the sink, if it is the final destination). Therefore, the total energy per round is defined as the sum of intra-cluster and inter-cluster communication costs:
where:
Objective function 1, defined as represents the total energy consumed in one communication round for a given candidate solution
Cluster head assigned to node .
Energy required to transmit a packet of k bits at a distance d.
Energy required to receive a packet of k bits.
Euclidean distance between the node i and its cluster head.
Multi-hop route from cluster head to the sink.
Distance between the transmitting node u and the receiving node v on the multi-hop route.
The first term represents intra-cluster communication, where member nodes send data to their assigned CHs. The second term represents inter-cluster backbone communication, where only CHs forward data toward the sink through multi-hop transmission.
2.2.3. Total Propagation Loss
Total acoustic propagation loss [
25], when the signal weakens when traveling underwater. It combines two effects: geometric dispersion (energy is “spread out” as the wave expands) and absorption (water attenuates more as frequency increases).
d: Distance between transmitter and receiver (m).
: Represents the propagation loss exponent appropriate to the environment (10 cylindrical, 15 intermediate, 20 spherical).
The attenuation due to absorption in dB/km, for frequency
f in kHz, given by Thorp’s approximation:
For each link, the total path loss is first calculated:
where
d is the distance between the transmitter and receiver and
f is the carrier frequency. This value
U reflects how much attenuation the signal suffers in the acoustic channel. Based on
U, the system does not directly modify the latency but rather decides what transmission rate is sustainable for that link. In the current implementation, the total path loss is used to characterize underwater channel conditions and to determine the transmission rate that can be sustained on each link. Therefore, the propagation-loss model directly affects latency and link feasibility, while the communication energy model is treated separately as a network-level approximation of transmission and reception cost.
To do this, loss thresholds are defined and associated with acceptable rate levels , which represent different modulation/coding modes of the acoustic modem.
The decision rule is expressed as:
where
Transmission rate.
Total path loss value.
Transmission rates available in the model.
Threshold loss values in dB that define the regions of operation.
This separation allows the framework to capture the main underwater communication constraints while maintaining a computationally tractable objective evaluation during the optimization process.
The end-to-end latency of the node
i is obtained by adding its intra-cluster hop and the backbone hops to the sink:
where
End-to-end latency from node i to the sink.
Latency between the member node i and its cluster head CH(i).
Set of links in the multi-hop path from the cluster head CH(i) to the sink.
Total latency associated with the link between consecutive nodes n and m on the path.
To quantify the overall temporal performance of the network, it is averaged. Thus, the objective function:
where
Objective function 2, average end-to-end latency in the network given the solution ϕ.
: Total number of sensor nodes in the network.
End-to-end latency of the node i (defined in the previous equation).
2.5. Optimization with the Dragonfly Algorithm
The Dragonfly Algorithm (DA) models two patterns observed in these insects: static swarming (around food sources) and dynamic swarming (during migration) [
18]. In optimization terms, these patterns are associated, respectively, with exploitation which intensifies the search in promising solutions, and exploration which promotes the examination of new regions of the search space. This duality is particularly suitable for the UWSN clustering problem because the search process must simultaneously handle a large combinatorial space of possible cluster-head selections and clustering configurations, while also refining candidate solutions according to multiple conflicting objectives such as energy consumption, latency, and load balance. In addition, underwater communication conditions and mobility-induced topology perturbations make it desirable to preserve sufficient exploration capability before converging toward stable high-quality clustering configurations.
The choice of a binary Dragonfly-based optimizer is motivated by the nature of the UWSN clustering problem addressed in this work. Cluster-head selection and clustering configuration are inherently discrete decision processes, which makes a binary search representation more suitable than continuous formulations. In addition, UWSN clustering requires balancing multiple conflicting objectives under complex communication constraints, which demands both broad exploration of alternative configurations and refinement of promising solutions. In this context, the Dragonfly search mechanism is attractive because it explicitly balances exploration and exploitation through neighborhood interaction operators. For the proposed framework Binary Dragonfly Algorithm is adopted here as a suitable search strategy for jointly handling binary clustering decisions, multi-objective evaluation, and robustness assessment under underwater mobility conditions.
The relevance of DA in related scenarios is supported by recent work: ref. [
28] reports binary variants applied to feature selection with competitive results compared to classical approaches; in [
29], energy distribution networks are optimized by addressing multivariate binary variables; and ref. [
30] introduces enriched search mechanisms (e.g., quantum mutations) to improve exploratory capacity without penalizing convergence. In the fields of communications networks, ref. [
31] uses DA for clustering in VANET, focusing on energy consumption, while ref. [
32] applies it in terrestrial WSNs to extend network life and reduce delay. This background motivates our choice of a binary/multi-objective variant adapted to the problem of joint cluster head selection and partitioning in UWSNs. DA is based on five local influences on each individual: separation (avoiding crowding), alignment (synchronizing the average direction), cohesion (attracting to the center of the neighborhood), attraction to food (moving toward promising regions), and repulsion from enemies (moving away from unfavorable regions). In our implementation, these influences are modeled as vector terms that update the status of each candidate solution.
These terms are weighted by coefficients (
s,
a,
c,
f,
e), which decrease linearly over the course of iterations, and are complemented by an inertia term (
w). This dynamic weighting regulates the balance between exploration (searching in new regions), exploitation (refining promising solutions), and avoiding premature convergence.
where
Increase in position (speed-like state) of the individual i in iteration t + 1.
Separation—vector that pushes i away from the center of its neighbors (avoids crowding).
: Alignment—vector towards the average direction of neighbors (synchronizes movement).
Cohesion—vector towards the centroid of neighbors (keeps the group together).
Food attraction—vector towards a “desirable” position/solution (best individuals/targets).
Repulsion from the enemy—vector that moves away from “undesirable” positions (worst individuals/regions).
These pieces enable the algorithm to achieve a balance like the actual behavior of dragonflies. They move in a coordinated manner, search for food efficiently, and avoid threats, in terms of optimization, this means intelligently traversing the solution space.
After calculating the velocity vectors, the next step is to calculate the position vector:
where
is the new position of the individual in iteration
t + 1,
is the position of the individual in iteration
i and
is the position increment calculated by combining local influences and inertia (previous equation).
Although the original Dragonfly Algorithm (DA) updates positions in a continuous space, in our approach each solution is represented as a binary vector. To perform this adaptation, the continuous position update is projected onto the binary domain using a V-shaped transfer function, as proposed by [
32]. This function maps the continuous variation Δ
x to a value in the interval [0, 1], which is interpreted as the probability of switching each bit (0 ↔ 1). Consequently, the resulting binary vector represents the selection of leading nodes at each iteration. The V-shaped transfer function used in this work is defined as:
where
is the value of the transfer function associated with the increment
is in the range (0, 1) and is interpreted as the probability that the bit will change state.
is the continuous increment calculated in the position update stage (before the binary projection).
Binary update: to decide the state change in each bit, a random number r (0, 1) is generated.
where
: Binary position of the individual in the previous iteration t.
Value of the transfer function applied to the increment, interpreted as a probability in [0, 1].
That is, the bit “changes” when the randomness falls below the probability emitted by the sigmoid.
Multi-hop transmission is restricted only between the cluster head of each cluster, following the approach proposed by [
33]. This strategy reduces overhead and energy consumption, as members only transmit to their leader and the calculation of energy-optimal routes using Dijkstra is performed only between leaders, thus simplifying management and extending the network life.
In underwater environments, TDMA is particularly suitable because, by assigning exclusive time slots to each node, it prevents collisions and reduces the energy consumption caused by retransmissions, as demonstrated by recent studies on energy-efficient MACs for UWSNs [
4].
3. Results
This section presents the results obtained from the simulations, considering key performance metrics in UWSN: number of live nodes, end-to-end latency, residual energy, and packet delivery rate. These metrics allow us to evaluate the energy efficiency, quality of service, and robustness of the proposed algorithm.
Algorithm 1 shows the proposed pseudocode, detailing its main phases:
| Algorithm 1: BMDA-UWSN
|
1. Define network parameters: 2. Define BMDA-UWSN parameters (dragonfly algorithm): 3. Create initial population (100 binary solutions): 4. Generate positions (x_nodes, y_nodes) randomly in the area. 5. Section B: BMDA-UWSN evolution (selection of cluster head) 6. for = 1 to 100 each individual 7. ) 8. Identify Food and Enemy solutions 9. For each individual i in the population: 10. Update velocity vector (s ∗ S + a ∗ A + c ∗ C + f ∗ F + e ∗ E) + w ∗ DeltaX 11. Transfer function. 12. ) 13. Non-dominated Pareto sorting ⇒ 14. Selection by elitism (Normalized) ⇒ update Population 15. End, → the best global solution (BestSolution) is taken. 16. Section C: Initial assignment of clusters and cluster head 17. cluster assignment ← for each node, assign to the nearest CH 18. Section D: Evaluation of the best global solution 19. for = 1 to 500 each individual 20. Each node sends data to CH (costs ETX, ERX) 21. CH sends data to Sink 22. Move nodes (±45°): 23. Update residual energies and live nodes 24. End |
The simulations were implemented in MATLAB 2020 on a 9th generation Ryzen 5 system with 16 GB of RAM. The experimental scenario was defined in an area of 500 m × 500 m with 100 nodes deployed. The nodes were initially assumed to be static but subject to mobility induced by sea currents under controlled conditions.
Table 1 shows the specific configuration used to perform this optimization.
To ensure a fair and unbiased comparison, all the evaluated algorithms were tested under the same simulation environment and using identical parameter settings. Specifically, the network topology, number of nodes, deployment area, transmission range, number of iterations, and acoustic communication parameters were kept constant across all experiments. This setup guarantees that any observed performance differences are exclusively attributable to the characteristics of each algorithm rather than to variations in the simulation configuration.
Figure 4 shows the evolution of live nodes. The direct transmission scheme shows the worst performance. From iteration 58 onwards, the network has already been reduced to 50 active nodes and barely retains 1 node at the end, showing that the absence of clustering quickly depletes energy. LEACH and C-LEACH improved substantially. However, LEACH dies out completely in iteration 400 and C-LEACH reaches 500 with 5 nodes, reflecting sustained losses in the middle of the experiment (around iteration 248 it drops to 50 active nodes).
Among the metaheuristics, the firefly algorithm maintains a robust queue, maintaining a quantity of 43 at the end, although its curve begins to decline after iteration 300. CDFO-UWSN exhibits a broad initial plateau, with the first node deactivating at iteration 95 and remaining above SS-GSO for much of the middle of the journey, but it declines around 330 iteration and accelerates the loss of nodes, ending with 22 nodes.
The BMDA-UWSN proposal offers the best overall balance: the first node is deactivated at iteration 126, the network drops to 50 active nodes only at iteration 471, maintains 42 nodes at the end, and, on average, retains the largest fraction of the network active throughout the experiment.
The results of
Table 2 show that the BMDA-UWSN proposal significantly delays the onset of node mortality.
is the percentage of iterations in which 50 nodes remain alive of the total number of iterations.
This feature is especially valuable in critical applications where maximum node availability is sought during monitoring phases.
Figure 5 shows the evolution of average latency (end-to-end time node → CH → sink) of over 500 iterations for the six schemes evaluated. The comparison of the six schemes reveals two clear trends: classic protocols partially reduce latency compared to direct transmission, but it is the bio-inspired approaches that make a substantial difference in the stability of the accumulated delay.
As shown in
Table 3, the Direct scheme achieves an average of 30.04 s and an extreme value of 49.79 s, reflecting accelerated latency growth throughout the process. In contrast, LEACH and C-LEACH moderate this behavior with averages around 21 s and final delays of 35 s; however, their reduction compared to the base scheme (≈30%) is insufficient in scenarios where precise synchronization is critical.
For their part, metaheuristic algorithms not only reduce average latency but also achieve a much more controlled closure. SS-GSO maintains an average of 16.79 s and a final value of 28.22 s, achieving an improvement of 43%. The CDFO-UWSN algorithm drops even further to 14.73 s and concludes with 27.99 s, confirming that dynamic route construction allows the network to remain less congested.
Finally, the BMDA-UWSN proposal exhibits the best consistency: with an average of 14.48 s and a final delay of 27.00 s, it achieves the greatest reduction compared to the direct model (46%). Beyond the specific values, it is noteworthy that its growth curve is more progressive and less abrupt, which means that delays accumulate slowly, and the network preserves its efficient transmission capacity for longer.
In practical terms, this stability is as important as the absolute reduction in seconds, as it ensures that events and packets arrive in a more synchronized and reliable manner, reinforcing the robustness of the underwater network.
Figure 6 compares the cumulative number of packets correctly received at the sink with over 500 iterations for the six schemes evaluated.
As shown in
Table 4, there are significant differences between classical and bio-inspired algorithms in terms of packet delivery capacity across the network.
The Direct Transmission scheme offers the lowest values, reaching only 8344 packets in iteration 250 and a total of 9393 in iteration 500. This result reflects its fundamental limitation: rapid energy depletion of the nodes generates inefficient routes and accumulated information losses.
In contrast, LEACH and C-LEACH achieve significant improvements thanks to clustering. LEACH reaches 17,180 packets at the end of the experiment (+83% vs. direct), while C-LEACH surpasses it with 27,440 packets (+192%). However, both protocols have a more moderate slope, suggesting some loss of efficiency in prolonged scenarios.
Metaheuristic algorithms stand out significantly. SS-GSO achieves 38,180 packets at the end, representing a 306% increase over the base model. Similarly, CDFO-UWSN delivers 33,330 packets (+255%), demonstrating that dynamic route optimization favors a more sustained flow of information.
Finally, the BMDA-UWSN proposal achieves the best overall performance: 23,400 packets halfway through the process and 39,900 at the end, with a 325% improvement over direct transmission. Beyond this absolute value, the stability of its progression stands out: it maintains continuous growth throughout the experiment, avoiding the intermediate stagnations observed in LEACH and C-LEACH.
In practical terms, this behavior means that the proposal not only extends the network’s useful life, but also maximizes data collection efficiency, ensuring that most of the information generated by the nodes effectively reaches the sink.
Figure 7 shows the comparative evaluation of residual energy (all curves start at 500 J per node).
Table 5 shows the results of residual energy development, the first phase, all algorithms still show high energy levels. However, BMDA-UWSN retains 427 J, the highest value among all, which is ≈3 times more than Direct Transmission (130.5 J) and an additional 4% over CDFO-UWSN (411.4 J). This indicates that from the outset, the proposal manages consumption more efficiently, avoiding early energy losses.
The difference widens significantly: BMDA-UWSN maintains 205.7 J, while CDFO-UWSN and SS-GSO register 156.1 J and 124.3 J, respectively. In contrast, classic protocols such as LEACH barely retain 17.13 J and Direct Transmission only 5.44 J. This means that, halfway through the experiment, the proposal retains ≈38 times more energy than Direct Transmission and ≈12 times more than LEACH.
In the critical phase, when the network begins to run out of power, BMDA-UWSN continues to show robust performance with 34.73 J of residual energy, compared to 41.04 J for SS-GSO and 21.71 J for CDFO-UWSN. The classic protocols are already completely depleted (0–0.2 J). Although SS-GSO retains a slight advantage in absolute energy, the proposal remains competitive, clearly outperforming CDFO-UWSN (+60%) and tripling the final energy of C-LEACH.
The analysis reveals that BMDA-UWSN is the most efficient protocol in the early and intermediate stages, ensuring balanced consumption and extending the network’s useful life. In the final stage, it remains among the best, consolidating a sustained energy-saving strategy that far exceeds traditional schemes and remains competitive with bio-inspired algorithms such as SS-GSO.
4. Discussion
The results obtained show that classic protocols such as LEACH and C-LEACH, improve upon Direct Transmission. However, their performance is limited in prolonged scenarios with high energy demand. These protocols demonstrate early node exhaustion and accelerate residual energy loss, which compromises monitoring continuity. This is consistent with the literature, which recognizes that fixed clustering schemes tend to lose efficiency as the experiment progresses.
In contrast, the bio-inspired algorithms analyzed—SS-GSO, CDFO-UWSN, and BMDA-UWSN—confirm the ability of metaheuristics to better balance energy consumption, maintain more stable hierarchical routes, and reduce end-to-end latency. The SS-GSO algorithm shows an advantage in final residual energy, reflecting its strength in dynamic load redistribution. However, the performance of BMDA-UWSN stands out for its overall consistency: it delays the death of the first node longer, maintains a stable level of latency, and achieves the highest cumulative packet delivery. This consistency across several metrics suggests that the combination of binary multi-objective search and mobility-aware evaluation favors more resilient and sustainable clustering behavior under the evaluated conditions.
A direct comparison with CDFO-UWSN reinforces this point: although both employ strategies derived from the Dragonfly Algorithm, the replacement of fixed-weight aggregation during the search stage with Pareto-based ranking may help BMDA-UWSN reduce premature bias toward a single objective and maintain a more balanced trade-off between energy, delay, and transmission efficiency. This results in not only being a longer-lasting network, but also one that is more reliable in terms of the quality of the data collected.
Beyond the numerical comparison, these trends can be interpreted considering the methodological design of BMDA-UWSN.
A deeper interpretation of the observed performance of BMDA-UWSN suggests that the improvement is likely associated with the interaction of several methodological components rather than with a single isolated factor. First, the binary representation allows candidate solutions to be expressed directly in a decision space aligned with the discrete nature of cluster-head selection. This reduces the mismatch between the clustering problem and the search representation, which may favor more coherent candidate configurations during optimization.
Second, the Pareto-based multi-objective strategy avoids imposing fixed objective weights during the search stage. Instead of privileging a predefined combination of energy, latency, and load balance, the search process preserves multiple non-dominated alternatives and defers the final choice to a post-Pareto compromise step. Under the evaluated simulation conditions, this strategy may help preserve solution diversity and produce more balanced clustering configurations than approaches based on fixed-weight aggregation.
Third, the Dragonfly-based search process contributes through its balance between exploration and exploitation. Exploration allows the algorithm to examine alternative clustering arrangements, while exploitation refines promising candidate solutions. This behavior is particularly relevant in UWSN clustering, where the search space is combinatorial and the objectives are mutually conflicting. In this sense, the observed improvements are plausibly related to the combined effect of binary encoding, Pareto-based ranking, and Dragonfly search dynamics.
At the same time, the mobility model used in this work should be interpreted as part of the evaluation stage rather than as a dynamic re-optimization mechanism. Therefore, the results under node displacement are better understood as evidence of robustness of the optimized clustering configuration under controlled topology perturbations. A formal component-wise analysis isolating the individual contribution of binary encoding, Pareto-based decision, and Dragonfly search dynamics were not included in the current manuscript. This remains an important direction for future work.