Next Article in Journal
Measurement and Analysis of RSS Using Bluetooth Mesh Network for Localization Applications
Previous Article in Journal
An Empirical Study of Deep Learning Models for LED Signal Demodulation in Optical Camera Communication
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Energy Efficiency for Green Internet of Things (IoT) Networks: A Survey †

1
Faculty of Science and Engineering, Manchester Metropolitan University, Manchester M15 6BH, UK
2
College of Engineering, University of Diyala, Baqubah 32001, Iraq
3
Department of Computer Science, College of Education for Pure Science, University of Diyala, Baqubah 32001, Iraq
4
Department of Computer Science, College of Science, University of Diyala, Baqubah 32001, Iraq
5
Faculty of Science & Engineering, Queensland University of Technology, Brisbane, QLD 4000, Australia
6
College of Computer Science & Information Technology, University of Sumer, Thi Qar 64005, Iraq
7
Faculty of Electrical Engineering & Computer Science, University of Missouri, Columbia, MO 65211, USA
*
Author to whom correspondence should be addressed.
This paper an extended version of our thesis published in Laith Kadhim Farhan (2020) Energy Efficiency in Green Internet of Things (IoT) Networks at Manchester Metropolitan University.
Network 2021, 1(3), 279-314; https://doi.org/10.3390/network1030017
Submission received: 19 August 2021 / Revised: 24 November 2021 / Accepted: 25 November 2021 / Published: 29 November 2021

Abstract

:
The last decade has witnessed the rise of the proliferation of Internet-enabled devices. The Internet of Things (IoT) is becoming ever more pervasive in everyday life, connecting an ever-greater array of diverse physical objects. The key vision of the IoT is to bring a massive number of smart devices together in integrated and interconnected heterogeneous networks, making the Internet even more useful. Therefore, this paper introduces a brief introduction to the history and evolution of the Internet. Then, it presents the IoT, which is followed by a list of application domains and enabling technologies. The wireless sensor network (WSN) is revealed as one of the important elements in IoT applications, and the paper describes the relationship between WSNs and the IoT. This research is concerned with developing energy-efficiency techniques for WSNs that enable the IoT. After having identified sources of energy wastage, this paper reviews the literature that discusses the most relevant methods to minimizing the energy exhaustion of IoT and WSNs. We also identify the gaps in the existing literature in terms of energy preservation measures that could be researched and it can be considered in future works. The survey gives a near-complete and up-to-date view of the IoT in the energy field. It provides a summary and recommendations of a large range of energy-efficiency methods proposed in the literature that will help and support future researchers. Please note that the manuscript is an extended version and based on the summary of the Ph.D. thesis. This paper will give to the researchers an introduction to what they need to know and understand about the networks, WSNs, and IoT applications from scratch. Thus, the fundamental purpose of this paper is to introduce research trends and recent work on the use of IoT technology and the conclusion that has been reached as a result of undertaking the Ph.D. study.

1. Introduction

The Internet is generally defined as a global system of connected computer networks that use the transmission control protocol and Internet protocol (TCP/IP) to send and receive the data via various types of media [1]. Numerous technologies have contributed to development of the Internet in its current form [2]. This has enabled more and more devices to link together and give the opportunity for these devices/things to communicate within a local network, across different networking types, and to create a much more connected world. These devices and smart objects are becoming more and more ubiquitous in our everyday life, and have given rise to a new concept of networking which is called the Internet of Things (IoT). The history of the Internet development over the last half century [2]. It started with connecting two computers together (small network) and it is moving fast to connecting millions or even billions of physical smart devices to the internet [3].
The IoT is the inter-networking of smart objects/devices used in our daily lives that use standard communication architectures to provide new services to the end-users [4]. The IoT brings together various emerging and enabling technologies and is changing drastically what can be achieved from the Internet. The phrase “Internet of Things” was first coined by Kevin Ashton in 1999 when he used radio frequency identification (RFID) in supply chain management [5]. Since then, the IoT has been used to define a paradigm of any and all possible devices or things that can be connected and communicated to the Internet for data transfer and collection, knowledge formation and automation [4]. According to a forecast from the U.S. National Intelligence Council (NIC) in 2008 “by 2020 internet sensors may be implemented in everything such as food packets, animals, cars, plants, forests, furniture, etc.”. There were 25 billion devices connected to the Internet (i.e., 3.47 connected devices per person), in the world population of 7.3 billion in 2015 [6,7]. In addition, an estimated of 50 billion connected devices around the world are deployed by 2020, which means 6.41 connected devices per person and a world population of 7.8 billion in 2020 [8,9]. Another study [10] reported the number of smart objects will reach to 80 billion in 2025 with 9.8 connected devices per person. Based on these studies.
Wireless sensor networks (WSNs) is an essential part of the IoT technology as it helps in combining heterogeneous systems, data and applications. In such systems, sensor nodes capable of detecting the required information, performing some processing and communicating with other connected nodes are the main component of these networks. However, the life of these nodes is often restricted by being powered by a battery with a limited life, constraining processing ability, memory, and radio communications [11,12]. Energy efficiency is one of the most crucial issues for WSNs. Most of the energy is consumed in data processing and transmissions [13]. This means it is not rational to waste energy on protocol overheads, the transmission of unneeded data or non-optimized transmission of data packets, especially retransmissions, due to inefficient scheduling and routing algorithms. Thus, it would be prudent to design and implement efficient load balancing schemes of energy gauge nodes to maximize the lifespan of constraint-oriented networks [14].
The paper is arranged as follows: Section 2 highlights the research motivation of the paper. Section 3 introduces an overview of IoT enabling technologies introduces in Section 3.1. A brief description of the WSNs technology that enabled the IoT revolution is provided in Section 3.2. Various sources of energy wastage and different solutions have been mentioned in the literature and are presented in Section 3.5. Section 5 identifies the gaps in the existing literature in terms of energy conservation measures that could be considered in future works. Finally, Section 6 is summarized the paper.

2. Motivation of the Research

The framework of the IoT is based on several enabling technologies including WSNs, cloud computing, machine learning, and peer-to-peer systems [15]. WSN is the most crucial part of the communication process of the IoT networks. In WSNs, sensor nodes capable of detecting the required information, performing some processing and communicating with other connected nodes are the main component of these networks. However, the life of these nodes is often restricted by being powered by a battery with a limited life, constraining processing ability, memory, and radio communications [16]. Energy efficiency is one of the most crucial issues for WSNs. Most of the energy is consumed in data processing and transmissions [17]. Therefore, this paper provides a brief description of the IoT, and WSNs technology that enabled the IoT revolution. The paper also focuses on energy conservation as one of the major challenges facing IoT and WSNs, and identifies factors that affect energy consumption in such networks.

3. Literature Review

IoT brings an enormous number of different devices and infrastructures under the same umbrella and the consequent massive growth in connectivity of 80 billion smart devices on the Internet in 2025. Figure 1 reveals the growth of the IoT devices compared to the growth of world population [6,7,8,9,18,19]. These networks generate a large amount of data collected via these smart devices. Every two years, data doubles in size and is expected to arrive 163 Zettabytes in 2025 [20]. The volume of the IoT data will increase from 2% in 2013 up to 10% in 2021 [21]. Figure 2 reveals the growth of data from 2010 to 2025. It observes that by 2025, the volume of data will increase ten times compared to the data generated in 2016 [20,22,23].
The concept of IoT has attracted considerable attention by governments, businesses, military, healthcare, industries and researchers [24]. It can be expanded to almost everything from refrigerators to televisions (TV), smartphones to wristwatches, home security and alarm systems, etc. [25]. For instance, smart refrigerators can tell us the end of the validity of food using RFID or which items to buy during our next shopping trip to the market. Another example, users can use their smartphones or tablets with just a single touch to control items in a house such as turning lights ON/OFF, or setting the desired temperature before arriving home, this latter is now so well developed as to be advertised by APPLE, SAMSUNG, etc. as apps for their latest phones [26].
IoT with Cloud computing both serve to increase efficiency for business and industry. The IoT generates a massive amount of data, with cloud computing providing storage and pathways for those data to travel to their destination [27]. For instance, Amazon web services are one of several IoT cloud platforms that helps people to interact with their items to be purchased through its website [28]. Additionally, the integration of IoT with medical technologies enables real-time monitoring system and data collects to improve patient health [17,29]. For example, IoT devices can be applied to track the real-time location of medical equipment such as blood pressure, heart rate, smart inhaler, oxygen pumps, wheelchairs, and other monitoring equipment. Additionally, IoT based on WSNs technology is used to monitor a wide range of sensors in the field that can detect and measure various physical phenomena such as volcanic activity, flooding, and wildfires [30]. These examples are just a few examples out of millions being implemented in IoT. Figure 3 shows some of the IoT applications in different fields.
The literature review reveals that communications and IoT applications normally take the form of one of the following connections, see Figure 4:
  • People to People (P2P) connection: is the data transfer/share from a user to other. For example, telephone calls, video calls and social communications. It is usually named a collaboration connection [4].
  • Machine to People (M2P) connection: is the data transfer from devices such as sensor nodes, smart devices, computing devices or others to the users for analysis. For instance, weather forecasting uses smart sensors to collect the information from the sensing field and dispatches it to the remote control center for further analysis [31].
  • Machine to Machine (M2M) connection: is the data transfer between devices without human interplay. For example, a car connecting and talking to another car about its lane change, congestion, accident, distance, speed, or braking intentions, etc. [32].
There is several studies that cover different aspects of IoT communication. For example, the survey by Atzori, et al. [33] reported the major technologies that enable the IoT evolution, both wired and wireless and the components of the wireless sensor networks (WSNs). Another study [34] presented a centralized cloud vision to enable application of IoT technology to services provision. According to [35], Internet Protocol version 6 (IPv6) is the next-generation of IP, and because it will allow for more unique TCP/IP address identifiers to be generated, it is an important innovation for future Internet communications. Thus, IPv6 will play a significant role in IoT networks.
Thus, we conclude that the main components comprising IoT technology are the human element, enabling technologies and the Internet. However, enabling technologies are at the heart of the IoT, which is possible only due to the development of technologies such as communication protocols, cloud computing, WSNs, embedded systems, mobile Internet, big data analytics, and web services [4].

3.1. IoT Enabling Technologies

Enabling technologies play a crucial role in realizing the IoT vision. These technologies provide connectivity, usability, capabilities, etc. that are required to facilitate efficient use of IoT applications [36]. Several studies in the literature have reported the enabling technologies and thus, this section introduces an overview of those technologies which are related to the scope of this paper.
  • Cloud Computing: as the numbers of IoT smart devices increase, the amount of data generated by them also increases [37]. However, IoT devices tend to suffer from limited energy, memory, processing capabilities, etc., and their integration into the cloud is the best available way to overcome most of these issues. Cloud computing is employed to process, store, monitor and visualize the information comes from the IoT devices [38]. This means data processing and storage takes place in the cloud platform rather than on the IoT device [39], this has significant implications for IoT-constrained devices such as low-cost connectivity, scalability, interoperability, etc.
  • Hardware Devices: various hardware platforms have been evolved to perform the IoT networks such as Raspberry Pi, NodeMCU (ESP8266), Arduino, BeagleBoard, FriendlyARM, etc. [24]. These devices vary from low-cost, low-power, processing units (e.g., microprocessors, microcontrollers, etc.), single-boards and software applications that can run IoT applications and communicate over the Internet [40,41].
  • Wireless Communication: most IoT devices rely on low-power physical networking technologies such as RFID, Bluetooth, WiFi and IEEE standard 802.15.4 which are essential to activate the connectivity between smart devices [42]. These technologies must be globally addressable to connect with other smart devices over the Internet, either directly or indirectly, via an IP address [43].
  • Communication Protocol: IoT devices require IPv4 to connect through the Internet; however the near exhaustion of IPv4 addresses prior to the advent of the IoT and the prediction that there will be up to 50 billion Internet-connected devices by 2025 has meant that a replacement is required to permit the continued expansion of the IoT and Internet in general. IPv6 is the standard proposed to replace IPv4, and uses 128-bit addressing, allowing for a total of 3.4 × 10 38 unique addresses, instead of the 32-bit addressing used for IPv4 [44]. IPv6 has been applied to low-power wireless personal area networks via 6LoWPAN [45] which allows sensor nodes with limited resources to forward and share their data wirelessly to the other devices/things or cloud infrastructure.
  • WSNs: are the most crucial part of the communication process of the IoT networks. They contain sensors embedded with a microcontroller to provide intelligence and a means of communicating via the Internet or some other network [46]. The sensors enable interaction with the physical world [47], and without the associated networks, there would be no communication between the virtual and physical worlds. The benefits of connecting the WSN to the IoT is to provide remote access and permit them to connect and disseminate the information with other devices/systems over the Internet [48].

3.2. An Overview of WSNs

At the core of the IoT are WSNs. It is one of the most promising wireless technology systems for enabling IoT networks. WSN contains tens of thousands of nodes connected and communicated with each other using wireless technologies [49]. Such networks involve low cost, low-range, low-power circuits and tiny sensor nodes. The main equipment of each node are a sensing and processing unit, power source, memory and receiver and transmitter unit as illustrated in Figure 5 [50].
These units are [50]:
  • Sensing Unit: is the core component of the WSN and has two functions. First, it senses information from the surrounding physical environment and converts this information into digital data. Second, it forwards the data towards the processing unit.
  • Processing Unit: contains a microprocessor with a limited amount of memory. It is responsible for receiving the information from the sensing unit and forwarding the data to the transceiver after necessary processing.
  • Communication Unit: combines both a radio transmitter and a receiver, and is responsible for exchanging information with other smart objects in the sensing field.
  • Power Unit: is responsible for providing power to all other units. The sensor node would die, stop obtaining and/or transmitting data if the power unit stopped working. Therefore, preserving the working life of the power unit by energy conservation becomes an important and challenging issue in WSNs.
A WSN can have many types of sensors depending on the application, whether terrestrial, underwater, underground, multimedia, or mobile [51]. The main task of the deployed sensors in WSN applications is monitoring and, as stated above can include such diverse fields as meteorology [46], fire prevention [52], flood and earthquake detection and monitoring [48], mapping environmental bio-complexity and studying environmental pollution [53]. WSNs have also been used to observe the activities of animals, birds and insects [54]. Table 1 illustrates an example of WSNs applications [55]. In such applications, the smart objects are positioned over a wide geographical area and non-accessible environments.

3.3. WSN Communication Architecture

A WSN is similar to a wireless ad hoc network, since both are self-organized and multihop networks [16,56]. WSN is used to monitor and record specific phenomena and co-operatively pass data wirelessly through a gateway (base station/sink) to a central location as shown in Figure 6. The more modern WSNs are bi-directional (two-way communication), thus enabling control of the activity of the sensors [57].
In large-scale networks, the sensory network is often partitioned into subgroups, with each group having both sensor nodes and a single cluster-head (CH) node. This clustering approach has several advantages for sensor networks in terms of energy consumption, delay, network communication, etc. [58].
Sensor nodes establish connection with each other wirelessly and individually collect data from the surrounding environment, perform simple computation processes and then forward the information to its associated CH node via a single hop or intermediate nodes [59]. The intermediate node serves as a data sender and path for other sensor nodes towards the CH node. These nodes make forwarding decisions (i.e., routing) based on their knowledge of the network [60]. The CH nodes can be elected randomly or based on one or more criteria such as number of neighboring nodes, transmission distance to the final destination, residual energy, where the BS is the master node which gathers the data from all sensor nodes and processes it, and then disseminates these data to the intended destination [61]. The task of the CH node is to gather the information from its member nodes, compress it and then disseminate it to the base station. Most of the literature on WSNs is related to a search for proper clustering, optimal path, and aggregation methods that can significantly minimize the energy depletion and lengthen the network lifetime. Figure 7 reveals a WSN communication architecture which splits the sensing field into two groups and each group has several nodes that are linked with each other to main CH node and these CH nodes are connected to the BS.
Load balancing technique is an important aspect to maximize the network lifetime of the sensors by minimizing energy consumption. According to an investigation by [62], authors use a new cluster formation scheme in the sensing field to manage the load balancing issue in the deployed area. The CH nodes in the proposed scheme are selected dynamically for a fixed interval. Although the static route is created in the designated clusters by applying the AODV routing algorithm. The scheme balanced the energy consumption of the nodes and thus extended the network lifetime. In another study [63], authors introduce a novel routing protocol called content-based adaptive and dynamic scheduling (CADS). The protocol is used two ways communication model for the WSNs. The CADS is avoided redundant data and thus reduced the forwarding of unnecessary data packets, which as a result, prolongs the network lifetime.

3.4. IoT-Based WSNs

The integration between WSNs and the IoT has a crucial role to play in many applications and facilitates the universal accessibility of data, and close-to-real-time decision-making [64]. The sensor nodes connect to the Internet dynamically to cooperate and achieve their tasks; however, most of the connected sensors are constrained within their ecosystems which have limited memories, processors and power sources [65]. When a WSN is integrated into the Internet as part of the IoT, numerous decisions are required regarding that integration, including; mode of communication, hardware, computational cost, security, big data, and battery power [66,67], see Figure 8. All these issues must be addressed to achieve the full advantages and benefits of such integration, but energy depletion is considered to be one of the more important aspect. This is due to the crucial role that these sensors play in determining the lifetime of the entire network.

3.5. Reasons and Solutions for Energy Consumption

As mentioned above, energy consumption, in general, is one of the most challenges and problems in IoT-based WSNs applications [64]. Sensor nodes are often operated by batteries and thus, these nodes can only run for a limited period of time. There are several reasons that could lead to exhaust the limited battery of the sensor nodes. However, several attempts have been made to minimize the energy usage of the smart objects and thus lengthening the lifetime of the network. Network lifetime is one of the most crucial metrics for the evaluation of sensor nodes but, in the literature, there are different definitions of network lifetime. Generally, it is realized as the length of time that sensor nodes would be fully operational. In other words, network lifetime is the time until the first node dies [68]. Another definition of network lifetime is the time until the first node or group of nodes in the sensing field exhausts runs its energy [69]. A node can only fulfill its mission as long as it is live, so losing a node would damage the network which would lose some of its functionalities. Hence, the main aim of any energy-efficient protocol is to keep the nodes alive for longer and thus prolong the network lifetime.
Various sources of energy wastage and different solutions have been mentioned in the literature and are demonstrated in the following sub-sections.

3.6. Sources of Energy Wastage

Several studies have revealed that the communication unit is relatively greedy for energy [68]. In WSNs, most of the energy is wasted in the processing, receiving, or transmitting of data to fulfill the requirements of the application [70]. It is clear that reducing data transmissions will economize the energy of these smart objects [68]. Regarding communication, several studies have found that a great amount of energy is dissipated in ways that make no useful contribution to the application, such as [71]:
  • Collision: when two or more packets reach the sensor node at the same time and thus a packet collision occurs [72]. Thus, the packets are either discarded or sent back to their originating node, then retransmission of these packets is needed which rises packet latency and energy depletion which adversely affects the network lifetime [73].
  • Overhearing: is a significant waste of energy, especially when node density is high and traffic load is heavy. When a node sends a packet, all sensor nodes in the network located within its transmission range distance receive the packet even if these nodes are not the proposed destination [74,75], see Figure 9. Node A wants to deliver its information to Node B. However, many surrounding nodes are within radio range of Node A. All these nodes will receive the data from Node A. Energy is consumed when a sensor node transmits or obtains the data that are intended for other nodes [75]. Please note that Node A will also receive data from its surrounding nodes when they transmit their data.
  • Control packet overhead: is a combination of excess memory, bandwidth, computation time or other resources to execute a specific job. Thus, it is crucial to process the minimum number of control packets that enable the transmission [71].
  • Idle listening: happens when a sensor node must stay open to an idle channel to receive possible traffic [71], thus a sensor surrounds with many neighbor nodes will be active most of the time. This is due to overhearing transmissions, neighbor nodes discovery [76] or a node may use numerous paths to deliver data to a neighbor nodes [77]. Obviously, a node with less idle listening time has better energy retention than other nodes [71].
  • Interference: each node with two or more nodes within transmission range suffers from interference generated by the surrounding nodes. Interference increases with increase in the number of neighboring nodes [78]. It increases both congestion and conflicting transmissions, and then retransmission may happen. Therefore, avoiding higher node interference could reduce packet loss and thus minimize the overall energy wasted of the network [79].
  • Redundant Data: nodes are generally deployed randomly which can mean that there are some regions monitored by two or more sensors at the same time [80]. However, this type of deployment will increase the reporting of redundant data in the network. As a result, energy is wasted aggregating, processing and transmitting redundant data [13]. Energy consumption could be minimized by avoiding the unnecessary operation of a node.
  • Distance: the transmission distance ( T d ) between nodes is a very important aspect of energy efficiency. The communication between a node and its associated CH node and the intended destination can be either single or multiple hops. Since energy consumption for transmission is proportional to the square of the distance (see Equation (1)) [81], so the power required for transmission increases rapidly with distance, which means single-hop transmission maximizes energy depletion if the size of the network is large.
    E T x = k ( E e l e c + ϵ a m p d 2 )
    where E T x is the energy used to dispatch a chunk of data (k) from the node to the next-hop node. d is the distance between the source node and next-hop node. E e l e c is illustrated the energy dissipated to perform the transmitter/receiver board, and ϵ a m p is the energy spent in transmission process to amplify the signal enough to reach the next target.
    Thus, most of the literature shows that multihop communication is the best way to minimize the transmission distance between nodes. Figure 10 shows single and multihop scenarios between nodes. A lower transmission distance between a node and next-hop target/CH/BS reduces energy depletion of a node and prolongs the network lifetime [68].
  • Non-Clustering: direct transmission distance from a source to the next-hop node can reduce the sensor network lifetime significantly due to the additional energy consumption. As a solution, hierarchical routing protocols are adopted, see Figure 11 which shows chain-based, tree-based and cluster-based protocols, which are the most commonly used protocols [82]. In a chain-based method, sensor nodes are organized chain-like where one of these nodes is elected to serve as the CH node to transmit the information coming from all sensors to the BS [83]. With cluster-based, the sensing field is partitioned into subgroups and each sub-group has some sensor nodes connected to a CH node to forward their information to the BS [84]. In tree-based clusters, the collected data are forwarded from node to their associated CH node based on multihop concept [85]. For sensor networks, clustering is the best solution for reducing communication costs and maximizing network lifetime.

3.7. Taxonomy of Energy Consumption Solutions

There are many methods available in the literature that can effectively minimize energy usage and lengthen the network lifetime of WSNs and IoT networks such as path selection [86], scheduling data [65], an efficient data aggregation [87], etc. These methods can broadly be classified into several categories as summarized in Figure 12 which presents a taxonomy of energy consumption solutions and techniques presented in the literature. These solutions and techniques are explained in the following sub-sections.

3.7.1. Routing Protocols

One of the most significant current discussions of IoT based on WSNs, is the generation of an unprecedented amount of data [37], and how to select optimal paths for transmitting such vast quantities to the final destination. Energy-efficient routing algorithms are implemented to decrease the energy depletion and lengthen the network lifetime for these sensor networks. Several routing algorithms have been investigated by various authors to conserve energy. Most involve investigating the concept of using clustering the sensing field and CH nodes selection, electing the optimal path from the source node to the required destination, or manipulating the location of the BS [88].
(i)
Cluster-Head Node Selection
Various strategies are used in the literature for CH nodes election process to optimize energy usage. The most common three are: low energy adaptive clustering hierarchy (LEACH) [84], hybrid, energy-efficient and distributed protocol (HEED) [89] and power-efficient gathering in sensor information systems (PEGASIS) [90]. We present a brief survey of LEACH, HEED and PEGASIS in which nodes are partitioned in many forms for data collection and communication protocols.
(a)
Low Energy Adaptive Clustering Hierarchy (LEACH)
LEACH is one of the most interesting strategies, in which the CH node is elected based on a probabilistic approach and the amount of energy remained of the CH and the system is rotated at different time intervals [84]. A sensor node that has already been the CH cannot be elected again for some rounds. The selected CH node broadcasts to the network and creates a schedule for each node in its cluster to send its data. Each node connects to the CH with a single hop and chooses a random number between 0 and 1, then compares the number with a threshold value T ( n ) . A node becomes a CH in each round if the random number is less than the following threshold:
T ( n ) =   1 1 P ( r mod 1 / p ) i f n G 0 i f n G
where G is a group of sensor nodes that have not been picked as CH node in the previous 1 / p rounds. r defines the most recent round, P is the required percentage of CH. The CH node collects the information from all sensors connected to it, compresses the information and then forwards it to the ultimate receiver. Every node will be in standby mode except when sending to its CH. Figure 13 shows a cluster organization for the LEACH protocol.
Several studies have been published on modifications of the LEACH protocol, such as LEACH-C and energy-balanced LEACH [91,92].These studies tried to overcome the problems associated with LEACH (i.e., random process selection of CHs) and further minimize the total energy consumption for WSNs.
In the LEACH-C scheme, each node in the sensing field can calculate its energy level and send the information about its location (possibly using GPS) to the intended destination. The intended destination uses a centralized clustering algorithm to select the CH nodes. Once the clusters and related CH nodes are computed, then the BS chooses a node with more energy and broadcasts a packet to all sensor nodes that consist of the ID of each CH node. If the ID matches, then a node is the selected CH node and its intended destination is the BS. Otherwise, a node must gather and forward the information to the CH node.
LEACH-C provided better clustering and longer lifetime than the LEACH protocol. However, energy-balanced LEACH (E-LEACH) enhances the CH node election by considering the remaining energy of each node. Initially, each node has the same residual energy, and the CH nodes are elected randomly. From second round, each sensor node with the highest remaining energy will become the CH node of its cluster. The E-LEACH protocol uses master cluster heads (MCH) to relay packets for those CH nodes that are away from the required destination.
Similarly, Arya, et al. [93] introduced a modification of the LEACH protocol named the energy aware multihop multipath hierarchy protocol (EAMMH). This approach introduced a new routing strategy and clustering formation to transfer the data. The proposed method divides the sensing area into subgroups and each group has number of child nodes and main CH node. The main CH should be an optimum distance from these child-CH nodes. This means the distance between the CH and its member nodes should be balanced to minimize energy consumption and therefore increase the lifetime of network. The EAMMH scheme outperformed LEACH in terms of energy preservation by 23% but the main CH nodes can be overloaded and quickly drained of energy when surrounded by many child-CH nodes.
Cengin et al. [94] proposed the energy aware multihop routing (EAMR) method for WSNs. The EAMR proposes fixed clusters to provide communication between the sensor nodes and the BS. In this protocol, when a sensor node is attached to a cluster, it will be a member for that cluster for the whole network lifetime. The selection of CH nodes is repeated each round, the proposed protocol allows a sensor node to act as a CH node until its energy falls below a threshold value. Sensor nodes located close to the BS forward their data direct to the BS. However, the remaining CH nodes forward their packets to the BS through intermediate nodes. The EAMR extends the network lifetime by achieving steady clusters and reducing the number of CH node changes.
Although the LEACH and its derivative protocols paved the way for implementing energy-efficient routing protocols, they all suffer from one fundamental problem. A node uses single-hop routing within clusters thus, it is not suitable to sensor networks for large geographic area. Additionally, a node that is elected to be CH will die quickly if a larger area is to be supported. Because some CH nodes are positioned far away from the final destination, the resulting large transmission distances lead to large energy consumption.
(b)
Hybrid, Energy-Efficient and Distributed Protocol (HEED)
HEED is the other common method of CH node selection. The proposed protocol overcomes the drawback of LEACH by achieving equal and uniform distribution of CH nodes in the sensing field. In this approach, the CH node selection is based on the residual energy of each node and node proximity to its neighbors or node degree (minimum communication cost) [89]. HEED defined the average of lower energy levels (AMRP) required by all M sensor nodes within the cluster range, to reach the CH node as:
A M R P = i = 1 M M i n P w r i M
where M i n P w r i is the lower energy level desired by node i to communicate with the CH. Each node is assigned to only one cluster, and the node independently makes its decision based on local information to join a CH node via a single hop. Based on Equation (4), in HEED, every sensor hub sets the likelihood C H p r o b of turning into a CH as:
C H p r o b = C p r o b × E r e s i d u a l E m a x
where E m a x is the total energy of the node and E r e s i d u a l is the evaluated remaining energy in the node, which is typically similar for all nodes. C p r o b is only used to limit the initial CH announcements, and has no direct impact on the final clusters.
A CH node is either a temporary CH, if its C H p r o b is < 1, or a last CH, if its C H p r o b has achieved 1. Analysis of the relative performance of HEED and LEACH showed that HEED improved the network lifetime by 10% [95]. Figure 14 introduces an example of a network topology implemented by the HEED protocol.
Several researchers have attempted to overcome the limitations of HEED protocol (such as more CHs are generated, the locations of the CHs, etc.) and improve its performance [96]. One example is the heterogeneous hybrid energy-efficient distributed (H-HEED) algorithm. This algorithm divides the sensing field into clusters and each cluster has some sensor nodes. The H-HEED protocol finds the center of each cluster and then allocates the node nearest the cluster center. The H-HEED protocol re-computes the cluster centers with a new assignment of nodes and allocates a node to clusters until clusters do not change for a given number of iterations. However, in this protocol, several iterations are performed to form the clusters and select a CH, this is an overhead that consumes a significant amount of energy [97]. Nevertheless, the proposed scheme increased the network lifetime of the sensor nodes by 63% [98]. Another study [99] proposed an energy-based rotated HEED (ER-HEED) protocol for WSNs. Here, the clustering formation and CH node selection are implemented based on the HEED protocol. Therefore, the selection of CH node among sensor nodes in each cluster is based on the node with the highest level of energy. ER-HEED improves the HEED protocol by reducing the HEED cluster selection to minimize energy wasted and lengthen network lifetime.
In [100], a new multihop routing strategy was proposed, the cluster heads enhanced hybrid, energy-efficient distributed HEED method (E-HEED) for WSNs. The E-HEED chooses the CH node according to the HEED protocol, and then grades the CH nodes according to the least transmission distance from the BS. It was claimed that the E-HEED protocol lengthened network life by 0.8 % compared to HEED.
(c)
Power-Efficient Gathering in Sensor Information Systems (PEGASIS)
PEGASIS is another CH node selection technique. This approach is to form a chain among the sensor nodes for the transmissions, see Figure 15 for the architecture of the PEGASIS routing protocol [90]. Each node receives the data from one neighbor node and transmits it to another. Two nodes at the end of the chain forming the routing structure will forward the information through the other nodes to the single leader node (CH node) and then the CH sends these data to the intended destination. The CH node is randomly elected to transmit the gathered data to the intended destination. PEGASIS is aimed to minimize the transmission distances between sensor nodes in the sensing field, and thus the energy depletion of each sensor is minimized. However, only one node is picked as a CH node per round. It this may become a bottleneck that causes delay and retransmission of some of packets. It also increases the rate of packet transmission on the node selected as a leader and thus depletes its energy quickly.
Table 2 presents characteristics and comparisons of LEACH, HEED and PEGASIS based on the more important metrics:
More recently, authors [105] investigated, a new routing technique called destination-oriented routing scheme for energy-balanced WSNs (DORA). The DORA aims a new multichain routing method to transmit the data to balance energy for the sensor nodes. In this protocol, the optimal transmission distance between any two nodes in the sensing field is derived by the mathematical analysis model. The proposed protocol reduces energy consumption for the nodes and thus extends the global network lifespan. However, in this protocol, any node in the sensing filed might be connected with two or more multichain based on the transmission range of the node, and thus a node may be sends same data through two or more paths to the final destination.
Recently, ARUN et al. [55] gave a comprehensive review of the IoT and WSN technologies for medium access control (MAC) protocols. The review focuses on the MAC layer protocols and common causes of energy consumptions. Early studies by [106] have investigated a new routing technique LLND protocol which is defined the MAC behavior for IoT networks that run inaccessible environments. Sensor nodes interconnected by wireless links with dynamic and lossy wireless link conditions, resulting from interference, channel fading, or heat/dust/ moisture physical environment, are classified by Low-power and Lossy Network (LLNs). An Adaptive Scheduling MAC (AS-MAC) method was carried out by [107]. The proposed protocol is aimed to make nodes to decide that stays active or sleep depending on traffic load. Therefore, if the traffic load is high, AS-MAC can achieve rapid data dissemination and reduce transmission latency by scheduling more transmission. However, if there is a smaller amount of the traffic load, sensor nodes switch to a sleeping mode in a timely manner, such that idle listening is mitigated, and energy conservation is achieved.
(ii)
Optimal Path Selection
Several studies have considered optimal route selection for energy-saving in WSNs. The shortest route approach is a commonly used methods for constructing routing trees in the many-to-one WSN [108]. The potential advantages of shortest path are lowest energy consumption and minimum time delay. Banerjee, et al. [109] investigated a heuristic algorithm based on multi-hops that perform geographical routing. This protocol selects a route with the fewer hops and distance from the source node to the target. The proposed scheme reduces the end-to-end node delay. In [110], authors introduced a distributed shortest path routing network from a source node to the ultimate receiver. The resulting algorithm provides best link cost and maximum network lifetime.
Cota-Ruiz, et al. [111] demonstrated a new routing technique that can calculate the distance between two non-neighbor nodes in multihop WSNs. This method finds all possible routes between a source node and the ultimate receiver with the fewer hops. This leads to minimizing the energy depletion and delay of the network overall. Another study [112] proposed a new centralized energy-efficient clustering algorithm for WSNs. This is the distance energy evaluated (DEE) protocol which selects the CH nodes according to the ratio between remaining energy of a node and distance. The probability of being CH is determined according to the node’s initial and residual energy. The DEE protocol extends the network lifetime by reducing unnecessary traffic.
Most studies have not considered the shortest path combined with balancing the load traffic in each node along the path to deliver data. A node that is surrounded with many neighbor nodes (within transmission range) has less energy due to overhearing, neighbor nodes discovery, or a node may be used for many paths to deliver neighbor nodes’ data [77].
(iii)
Manipulating the Location of Base Station
Several studies have proposed manipulation of BS/sink location as a means of reducing energy depletion. They found that the network lifetime of the network can be extended by reducing the transmission distances between sensor nodes. In the work of Grossglauser, et al. [113], the idea of a mobile sink (MS) was proposed, where the sink moves in a prescribed path to gather the information in the sensing field. In such a protocol, all nodes regardless of distance will establish a direct connection with the sink. Therefore, the total link length of the network will be very high, especially when a node is located on the border of the network, consuming more energy than other nodes which are close to the sink. The optimal location for a mobile sink (OLMS) for WSNs is suggested by [114]. In this approach, clustering is achieved, and CH nodes are elected at each round. The proposed protocol determines the best location of the MS based on the minimum energy cost for data delivery of CHs and thus reduces energy depletion and lengthens the network lifetime.
In [68], the authors also examined a tree-based mobile sink (TBMS) technique. The proposed study implements a sorting algorithm and the multihop technique to generate the routing structure. The proposed method introduces a MS that gathers the data from the sensing field but in a way that reduces the hop distances and thus elongates the network lifetime of the network. However, authors assume that the MS moves randomly in the sensing area. Therefore, there is no guarantee that the MS will cover all the sensing area, or it might take too long when the sensing field are extended. Of course, if the speed of at which MS moves is too slow or fast, then it can cause more delay and high packets loss.
However, some important factors such as interference effects and dynamic network topology should be considered when designing WSNs routing protocols. This is because of the challenges that may arise as a result of the characteristics of the environment in which these networks are deployed [79,115].
  • Interference Effect
    High node density in the sensing field, can lead to interference effects which can adversely affect energy consumption in sensor networks. According to an investigation by [79], interference occurs during transmission and can cause packet loss. In such a case, lost packets need to be retransmitted and every retransmission is energy wasted [73]. Thus, these authors suggested avoiding paths with higher interference levels [116]. In [117], the authors proposed a new routing strategy that chooses a path with less interference of transmitted data. The proposed method balances the traffic load and significantly reduces congestion in the network. An energy aware interference sensitive geographic routing (EIGR) was investigated by [118]. The EIGR adaptively uses an anchor list to guide data delivery and chooses the less interference route from the energy optimal relay region for data delivery. The EIGR adjusts the transmission power which is only required to disseminate the information to the forwarding node. The proposed protocol focuses on reducing interference and minimizing the total energy depletion of the network.
    Other researchers [119] have addressed the problem of interference in WSNs, and here the proposed scheme detects the shortest path from source node to the ultimate receiver which avoids interference areas based on an ad hoc, on-demand distance vector (AODV) protocol. Liu, et al. [120] introduced a full-duplex BackCom network, where a novel time-hopping spread-spectrum (TH-SS)-based multiple-access scheme was implemented. The proposed protocol enabled simultaneous forward/backward information transfer from one device to another. The interference in such networks is suppressed by the proposed multiple-access scheme based on the TH-SS technique and allows wireless energy harvesting from interference.
    However, these strategies did not consider the interference caused by neighboring nodes of the next-hop node. Increasing the surrounding neighbor nodes adjacent to each node (within transmission range) generates an increase in interference [121]. As a result, increasing the packets loss and decreasing the network lifetime.
  • Dynamic Network Topology
    With multi-hopping, sensor nodes depend on intermediate nodes in the network to disseminate their packets to the final destination. Some of these intermediate nodes may be failed or blocked due to exposure to physical damage, interference, harsh environment or lack of power during transmitting and receiving packets [122]. The probability of node failure rises with the increases in the sensing field and number of sensor nodes. A node is announced as a failure node when a sensor cannot send/transmit packets with its neighbor nodes for more than a specific period of time and thus eliminated from the routing path. Such node failure should not affect the overall sensor network [123]. WSN routing methods should be able to recover from the failure of a sensor node [115]. Therefore, a routing protocol must pick and connect with new sensor nodes (within the range of transmission) dynamically to forward the data gathered by other nodes to the final target. For example, Figure 16 clearly reveals that source1 forwards its data to the final target via some intermediate nodes. Unfortunately, p a t h 1 and 2 failed to pass the source1 data to the ultimate receiver due to failure of some nodes. Hence, a new path is required to disseminate the packets to the final destination (i.e., p a t h 3 ).
    Several studies have been carried out to provide routing protocols that help to recover from a failed node in the network. Most of this research focused on providing a backup node or finding an alternative node to avoid link failure from source to destination. According to an investigation by [124], the low-power wide area network (LPWAN) is one of the best and promising solution for long range communication and low power consumption for IoT and M2M communication applications. In different study [122], authors reported a mobile sensor node acting in cooperation with a static node to fill gaps created by faulty nodes in the sensing field, which resulted in overcoming the failure issue and increasing the network lifetime. Other work [125] proposed a new procedure that could replace the dead CH node with backup cluster heads (BCH) in the case of CH node failure. One study [126,127] has proposed an energy-efficient backup and recovery node selection for IoT networks. The system includes backup nodes which are in sleep mode until required due to a node failing and then are enlivened. This results in energy-efficient solution and maximizes the lifetime of network.
    In another study [128], the authors proposed a new algorithm to create primary and alternative paths in the network. The proposed method reroutes the traffic from nodes connected directly to the failure node, and reroutes the traffic in an alternative path. In addition to [128,129] suggested a novel path redundancy-based algorithm which called for dual separate paths (DSP). The DSP algorithm provides fault-tolerant communication for WSN applications. This protocol implements two separate paths between a node and the intended destination and thus improves the network traffic performance. The cluster-head recovery algorithm (CHRA) [130] uses a check-pointing techniques to create a recovery route for each node and in each cluster. In the case of CH failed, a recovery route is established for sensor nodes connected to the failed CH node. In the wireless ad hoc networks, it is decentralized to route the packets from the source to target. It also does not need any particular infrastructure such as backbone, access points, etc. Ad hoc On-Demand Distance Vector (AODV) routing is being one of the standard protocols in wireless ad hoc networks. It uses when two or more endpoints do not have a valid active route to communicate each other [131]. In another study [132], dynamic source routing (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV protocol where it forms a route on demand when transmitting packets. However, it uses source routing instead of relying on the routing table at each intermediate node.
    Recent study by [133] revealed a new saving routing mechanism, named energy-efficient cooperative Scheme for Heterogeneous WSNs (EERH). The EERH scheme is dynamically established the routing paths according to the transmission directions of event packets and the residual energy of the underlying sensors and their neighbors. According to [134] presented energy and collision aware WSN routing method for IoT networks. The proposed algorithm is based on AODV protocol; however, it replaces the hop count metric with the link quality and collision count. The protocol improves performance in terms of path stability, energy efficiency, network lifetime and delay. Study by [135] proposed a gateway clustering energy-efficient centroid (GCEEC)-based routing protocol. In this protocol, the sensing filed is divided into clusters and each cluster has a gateway node and the CH node in this cluster is chosen from the centroid position. The gateway reduces the data traffic from the CH node and dispatches the data to the final destination and thus extend the network lifetime.

3.7.2. Scheduling Algorithms

Sensor nodes around a CH node naturally create a many-to-one traffic pattern [85,136]. Congestion generally happens when the traffic load on a particular node exceeds the available buffer capacity which leads to successfully delivery for only some of the packets and thus packet retransmission is required [137]. Retransmission of data will, of course, consume additional energy. Most previous research does not consider packet overheads due to the retransmission of packets. For instance, when a connection-oriented protocol such as the transmission control protocol (TCP) [138] is established, for reliability it uses three-way handshakes to establish the connection between the source and destination. This leads to a significant increase in network traffic and thus increases the data transmission rate and volume. Therefore, during the implementation of the scheduling techniques, packet overhead must be considered since retransmission adds a burden on the network and reduces the lifetime of network. To minimize power and memory usage, superior scheduling protocols that consider packet overhead are required.
Several scheduling methods have been investigated for use in sensor networks. A scheduling algorithm for nodes that are positioned between two or more clusters (border nodes) is introduced in [65]. A switching technique between listening and sleeping modes is adopted by the nodes in this scheduling approach. However, a node that is placed between more than two clusters, will often switch to the listening mode and this will cause to the unnecessary of energy wasted which decreases the network’s lifetime. The proposed protocol introduces a unified scheduling method to solve the problem of diversified scheduling of border nodes.
Another study by Gupta and Rao [139] proposed demand-based coverage and a connectivity routing protocol to provide the desired coverage and meet connectivity requirements in WSNs. The idea was to use a probabilistic approach to calculate and reduce the sensing range of the sensors. It also uses a sleep scheduling protocol to switch ON/OFF the communication radio which results in saving energy. Abdullah and Yang [126] proposed clustering IoT networks into sub-clusters and placing within each cluster, a broker (CH node). The broker was deployed to collect data from the nodes around it and send the data to the ultimate receiver. The short process time (SPT) method was performed at the broker level to elect and forward data based on their arrival time. Each message is demonstrated as Mess( T t r a n s , R t i m e ), where R t i m e , T t r a n s are successful transmission time and request time periods, respectively. The SPT algorithm was used when the network was unstable (traffic intensity > 1). The SPT algorithm promoted IoT system efficiency by enhancing service response time and minimizing the overall energy consumption.
The earliest deadline first (EDF) scheduling approach has been investigated to run real-time tasks and to place processes in a priority queue. High priority is assigned for packets closest to their deadline or expiry in the queue [140,141,142]. Houben, et al. [142] have considered minimizing energy depletion in real-time systems by sorting the tasks with enhanced EDF to vary the processor modes determined by supply voltage, frequency and performance requirements. However, several request packets in the queue can have the same deadline, and the EDF algorithm does not consider the time redundancy management of these packets, nor does it give priority to packets that come from longer distances, with more hops which causes higher energy depletion. Gomathi and Mahendran [143] implemented the nearest job next (NJN) scheduling method. The NJN protocol always chooses the nearest sensor node as the first node to gather and deliver its data to the final destination, which helps the system to reduce latency.
An approach suggested by [144] proposed an energy-efficient heterogeneous dual core processor for IoT devices. The proposed scheme included a fast CoreH and an ultra-low-power CoreL processor. This technique assigns the tasks between these two processors and performs multi-tasks at the same time. However, the problem with the multi-core processor system is that requires a large memory to hold the packets during processing. Additionally, overheating due to the use of two processors can cause the damage to the device [145].
Surveys such as that conducted by Ricardo et al. [146] have introduced a good survey paper on some specific category of duty-cycling mechanism in WSNs. The paper also summarized important directions and challenges that duty cycling will face with new emerging WSNs. Another study [147] revealed a new forwarding method for WSNs based on a simple splitting procedure able to enhance the lifetime of the network. The paper investigates a trade-off between energy efficiency and reliability of the proposed forwarding scheme when duty-cycling techniques are considered too. This paper organizes the most important proposals into a taxonomy and provides insights into their strengths and weaknesses in relation to important characteristics of applications, mote’s hardware and network deployments. The authors in [148] proposes a new scheduling algorithm for IEEE 802.15.4e MAC protocol is called time synchronized channel hopping (TSCH). This approach fits for multihop WSNs based on the highway addressable remote transducer. The proposed scheme promotes wireless sensor networks by improving low latency and duty cycle and thus utmost power efficiency.
With the density of nodes increases, scheduling different types of data packets such as low or high priority data at CH nodes is essential for decreasing energy depletion, capacity and end-to-end delay. For example, if the queue is not prioritized over others, then the packets drop might happen and retransmission is required. This problem can be serious for border nodes which access many devices and use several hops to achieve the required target. This means that these nodes consume more energy than other nodes in the network located close to the destination. Therefore, scheduling at CH nodes which gives priority to the data that comes from further nodes is crucial for energy-saving.

3.7.3. Aggregation Methods

The integration of WSNs and IoT elements is all about connecting devices to the Internet, making them more convenient to use and maximizing their efficiency [149]. Such integration can generate a large volume of data by these smart devices. There is considerable data redundancy in such networks due to dense deployment. Redundant data requires a considerable amount of energy to process and transmit [150]. Since each sensor is provided with only limited power eliminating data redundancy would considerably improve energy consumption overall for IoT networks.
Several studies have focused on reducing the number of data volume and data transmissions for sensor networks. A clustering algorithm is introduced in [80,151] to minimize energy depletion and lengthen the network lifetime. The proposed method partitions the sensing field into some cells and each cell elects single node to act as a cell head for all of them. Thus, one node forwards all data collected to the cell head node, which accepts the data from their associated nodes, eliminates redundant data, and then the remaining data are delivered to the final destination.
In [150], an energy-efficient in-network RFID data filtering scheme (EIFS) was proposed. The algorithm divided the sensing field into subgroups and each group has a single CH node. The CH node removes duplicated packets from its associated nodes and forwards the filtered packets to the final destination. In another study [152], the authors suggested a technique that reduced the number of data transmissions, whereby the proposed method controlled the RF-transmit operation. ON/OFF begins only when the data sensed was largely different from the previous state. In other words, the RF did not send data to the ultimate receiver if the current value is approximately same as the last recorded value.
Recent studies have confirmed that cloud computing technology offers several advantages to WSNs and IoT in terms of scalability, storage, computing tasks, etc. over the Internet. It can be used to analyze the data gathered and disseminated by sensors and IoT devices [39]. For example, Vincent, et al. [39] investigated a cloud-based architecture to enable data gathering, processing and monitoring for IoT devices. The proposed system gathers the data from various IoT devices and forwards it to the end-users via cloud infrastructure. This study aimed to provide interoperability and an efficient communication mechanism for IoT devices. The study by [153] implemented a real-time monitoring system for soil nutrient using WSN. In the proposed system, sensors measured the macro-nutrient of soil and transmitted the information to the cloud infrastructure. The user can access this information and monitor the field conditions from anywhere via a website.
Several studies have highlighted the need for real-time monitoring that can gather the data from IoT devices based on the message queuing telemetry transport (MQTT) protocol. MQTT is widely applied in IoT due to its low-overhead protocol that emphasizes the bandwidth and processor limitations of the IoT devices. It uses publish/subscribe pattern and translates messages between sensors, devices, servers and applications [24]. MQTT with IoT has been used in many applications such as military, agriculture, retail, healthcare, environmental monitoring, industry, etc. In [154], the authors proposed a network of IoT monitoring devices for fire detection. The proposed system was able to detect and monitor fires and send the information to the concerned people and authorities so that preventive measures could be taken. In [155], the authors used sensors to measure body temperature, pulse rate, body movement of patients and this measured data were uploaded to the MQTT server. The proposed system aimed to help the doctors to monitor patients from any location and at any time. It also helped patients to view and check their health condition remotely. Another study by [156] proposed a web-based interface for controlling and monitoring an arm robot. The proposed system gives low latency data transmission via using MQTT protocol.

4. Aspects of Energy-Efficiency Optimization Methods

Energy-saving is one of the most essential requirements for WSNs and IoT networks, as batteries are usually the main source of power for these networks. Suitable techniques can reduce energy consumption and extend network lifetime. Thus, different techniques in different aspects of IoT-based WSNs are required to minimize energy consumption. According to an investigation by [157], authors introduced elliptic curve cryptography-based mutual authentication (EMA) and capability-based access control (CBAC) model to enhance mutual authentication and reduce energy consumption against other. The authors [158] also presented energy consumption analysis of lightweight cryptographic algorithms. The proposed method is more effectively for secure IoT devices with low power consumption. In addition, The authors showed that design of efficient power converters can also reduce the energy consumption of IoT devices. For example, authors [159] investigated the designed DC–DC converter adapted for ultra-low-power operating for IoT applications. The proposed method is low-power, small area and high resolution DPWM design that prepares for DC–DC converter to power the ULV operating IoT networks. Energy-efficient machine learning on the edges for IoT devices were carried out by [160]. The proposed algorithm has shown up to 14.46% improvement in energy consumption. In a different study, Adil et al. [161]. reported that the malicious node is also attempted to attack and deny service to other nodes in the sensing field. Thus, it drops some transmission packets from a node to others. As a result, energy is dissipated due to retransmission packets [162].

5. Research Gaps

The literature review demonstrated the existence of many avenues for minimizing energy wasted and lengthening the network lifetime. It presented many possibilities and identified numerous limitations. This paper has scrutinized the literature to obtain an insight into the perspectives addressed by previous researchers and the gaps left by existing solutions.
In the sensing field, sensor nodes depend on other intermediate nodes to forward their data. Some sensor nodes send their data over single or multiple hops to arrive the BS through CH nodes. The CH node can become overloaded due to the number of surrounding nodes that are connected and forwarded their data to it. The probability of retransmitting some of these packets at the CH nodes will increase. Therefore, data delivered by the sensor nodes must be prioritized at CH nodes based on the energy consumed by each packet. However, no report has been presented assigning high priority to packets that come from the furthest distances to the CH nodes. Since these packets more quickly exhaust the network resources because they require more links and nodes to reach their ultimate destination, one of our studies suggests the introduction of a novel scheduling algorithm called the long hop (LH) to optimize energy used in sensor networks [127]. The LH algorithm assigns high priority to the scheduling of packets arriving after a greater number of hops, from longer distances. These packets serve first at the CH nodes to prevent them from being retransmitted, and so conserving energy.
The literature review also introduced the energy consumed due to delivering data from the source node to the required destination. Based on the multihop concept, the transmitted packets access multiple nodes and experience a greater number of hops to reach the intended destination. Each node involved in the transmission process has many forwarding nodes. However, a higher number of forwarding nodes causes higher energy consumption. Thus, another research work introduces a new routing strategy that sends data to the next-hop node within a shorter transmission distance and fewer forwarding nodes to optimize the energy consumption. The proposed protocol evades delivering packets to nodes that have many forwarding nodes, therefore balancing the load traffic and enhancing the network performance and lifetime of the network.
There have been relatively a large and growing studies of literature reports attempts to minimize the energy depletion of sensor networks, this author believes that there are only a few research studies on theoretical energy analysis of sensor nodes based on less transmission distance, interference and the creation of CH nodes. Interference is also one of the main factors that cause data collisions and consequent energy wastage. A node with fewer neighbors has less overhearing and interference. Therefore, one of previous works presents a new routing method that elects the next-hop node to be one with least transmission distance and fewer neighbor nodes and thus less interference [163]. The proposed scheme also introduces a new method that selects CH nodes around a single BS based on lower transmission distances. Both techniques minimize energy depletion and lengthen the lifetime of network.
As shown in the literature, previous research focused on efficient transmission data in the WSNs and IoT applications. However, most of these studies considered either eliminating redundant data or monitoring active devices remotely. Thus, the author believes that investigating both the filtering of redundant data and the remote monitoring of the behavior and condition of the smart objects. These works will decrease the volume of data forwarded which, sequentially, will minimize the process of scheduling and routing data on each device on the network, consequently minimizing the energy consumption and success the IoT technology.
There are many published studies (e.g., [164,165,166]) that introduce a survey of relatively recent techniques and methods proposed for performing data aggregation in WSNs. The survey shows that improve energy consumption by reducing the transmission of redundant data and thus lengthen the network lifetime. In [167], authors have demonstrated a new protocol called Energy-efficient and balanced cluster-based data aggregation algorithm (EEBCDA). The method aims to overcome the energy dissipation issue in the cluster-based aggregation data. In this protocol, the network is classified into rectangular grids of unequal size and the CH node keeps on rotating in each cluster. The CH node in each grid is picked based on the high residual energy. The EEBCDA method balances energy usage in each grid and thus prolong the network lifetime. Researchers reviewed the available literature on the clustering–based aggregation protocol approach in WSN for minimum communications and extend the network lifetime [165]. Researchers have studied and compared some of the state-of-the-art data-gathering techniques considering their trade-off between reliability (i.e., packet loss and reconstruction error) and energy consumptions (i.e., network lifetime) by taking into account both compression and networking aspects [166]. The paper summarizes the results as follows: (i) Distributed source coding (DSC) and transforms and encoding compression (TEC) techniques should be preferred for prolonging the lifetime of the network. (ii) Compressive sensing (CS) should be preferred when high reliability is needed. (iii) Chinese remainder theorem (CRT) should be preferred for its inherent low complexity. However, to the best of the author’s knowledge, there is no best solution for all possible applications and that only the trade-off between reliability, energy consumptions and complexity can drive the choice of the data-gathering technique to be used for a specific application.
Finally, these methods can broadly be classified into several characteristics and summarized in Table 3, thus, the table presents a summary of previous methods surveyed in this paper.

6. Conclusions

IoT is having a major impact on the digital world and how we interact with the Internet. WSNs are a key enabling technology for the IoT. Sensor nodes capable of detecting the required information, performing some processing and communicating with other connected nodes are the main component of these networks. However, the life of these nodes is often restricted by being powered by a battery with a limited life, constraining processing ability, memory, and radio communications. Energy efficiency is one of the most crucial issues for WSN; it is not rational to consume energy on protocol overheads, the transmission of unneeded data or non-optimized transmission of data packets, especially retransmissions, due to inefficient scheduling and routing algorithms. Hence, the main aim of any energy-efficient strategy is to keep the sensor nodes alive for longer and thus lengthen the network lifetime. Therefore, in this survey paper, our goal is to introduce the research trends and recent work on the use of IoT technology, key enabling technologies, various sources of energy wastage and different solutions have been mentioned in the literature. By discussing the motivational factors, we have clarified several challenges that need to be addressed to enable theoretical and practical implementations of WSN-based IoT networks.

Author Contributions

Conceptualization and methodology, L.F.; part supervision, W.G. and L.A.; investigation and original draft preparation, R.S.H., A.S.A., A.H.F., experiment and writing assistance, M.A.F. and M.A.-A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Leiner, B.M.; Cerf, V.G.; Clark, D.D.; Kahn, R.E.; Kleinrock, L.; Lynch, D.C.; Postel, J.; Roberts, L.G.; Wolff, S. A brief history of the Internet. ACM SIGCOMM Comput. Commun. Rev. 2009, 39, 22–31. [Google Scholar] [CrossRef]
  2. Perera, C.; Zaslavsky, A.; Christen, P.; Georgakopoulos, D. Context Aware Computing for the Internet of Things: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 414–454. [Google Scholar] [CrossRef] [Green Version]
  3. Engard, B. An Internet History Timeline: From the 1960s to Now. 2016. Available online: https://online.jefferson.edu/communications/internet-history-timeline (accessed on 28 February 2019).
  4. Stallings, W. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud; Addison-Wesley Professional: Boston, MA, USA, 2015; pp. 1–500. [Google Scholar]
  5. Li, S.; Xu, L.D.; Zhao, S. The Internet of Things: A Survey. Inf. Syst. Front. 2015, 17, 243–259. [Google Scholar] [CrossRef]
  6. Swan, M. Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0. J. Sens. Actuator Netw. 2012, 1, 217–253. [Google Scholar] [CrossRef] [Green Version]
  7. Bansal, M.; Chana, I.; Clarke, S. A Survey on IoT Big Data: Current Status, 13 Vs Challenges, and Future Directions. ACM Comput. Surv. 2020, 53, 1–59. [Google Scholar] [CrossRef]
  8. Moore, S.J.; Nugent, C.; Zhang, S.; Cleland, I. IoT Reliability: A Review Leading to 5 Key Research Directions. CCF Trans. Pervasive Comput. Interact. 2020, 2, 147–163. [Google Scholar] [CrossRef]
  9. Davis, G. 2020: Life with 50 Billion Connected Devices. In Proceedings of the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 12–15 January 2018. [Google Scholar]
  10. Kumar, V.; Mohan, S.; Kumar, R. A Voice Based One Step Solution for Bulk IoT Device Onboarding. In Proceedings of the 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–6. [Google Scholar] [CrossRef]
  11. Adil, M.; Khan, R.; Almaiah, M.A.; Binsawad, M.; Ali, J.; Saaidah, A.A.; Ta, Q.T.H. An Efficient Load Balancing Scheme of Energy Gauge Nodes to Maximize the Lifespan of Constraint Oriented Networks. IEEE Access 2020, 8, 148510–148527. [Google Scholar] [CrossRef]
  12. Dizdareviundefined, J.; Carpio, F.; Jukan, A.; Masip-Bruin, X. A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration. ACM Comput. Surv. 2019, 51, 1–29. [Google Scholar] [CrossRef]
  13. Shabna, V.C.; Jamshid, K.; Manoj Kumar, S. Energy minimization by removing data redundancy in wireless sensor networks. In Proceedings of the 2014 International Conference on Communication and Signal Processing, Bangkok, Thailand, 10–12 October 2014; pp. 1658–1663. [Google Scholar] [CrossRef]
  14. Adil, M.; Khan, R.; Almaiah, M.A.; Al-Zahrani, M.; Zakarya, M.; Amjad, M.S.; Ahmed, R. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access 2020, 8, 44459–44469. [Google Scholar] [CrossRef]
  15. Farhan, L.K. Energy Efficiency in Green Internet of Things (IoT) Networks. Ph.D. Thesis, Manchester Metropolitan University, Manchester, UK, 2020. [Google Scholar]
  16. Al-Amidie, M.; Al-Asadi, A.; Humaidi, A.J.; Al-Dujaili, A.; Alzubaidi, L.; Farhan, L.; Fadhel, M.A.; McGarvey, R.G.; Islam, N.E. Robust Spectrum Sensing Detector Based on MIMO Cognitive Radios with Non-Perfect Channel Gain. Electronics 2021, 10, 529. [Google Scholar] [CrossRef]
  17. Farhan, L.; Kharel, R. Internet of Things Scalability: Communications and Data Management; Springer International Publishing: Cham, Switzerland, 2019; Volume 29, pp. 311–329. [Google Scholar]
  18. Farhan, L.; Alissa, A.E.; Shukur, S.T.; Alrweg, M.; Raza, U.; Kharel, R. A survey on the challenges and opportunities of the Internet of Things (IoT). In Proceedings of the IEEE 11th International Conference on Sensing Technology, Sydney, NSW, Australia, 4–6 December 2017. [Google Scholar]
  19. Hoornweg, D.; Pope, K. Population predictions for the world’s largest cities in the 21st century. Environ. Urban 2017, 29, 195–216. [Google Scholar] [CrossRef] [Green Version]
  20. Beecks, C.; Grass, A.; Devasya, S. Metric Indexing for Efficient Data Access in the Internet of Things. In Proceedings of the 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 10–13 December 2018; pp. 5132–5136. [Google Scholar] [CrossRef]
  21. Ramparany, F.; Cao, Q.H. A semantic approach to IoT data aggregation and interpretation applied to home automation. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 24–26 January 2016; pp. 23–28. [Google Scholar] [CrossRef] [Green Version]
  22. Zhang, Y.; Ren, J.; Liu, J.; Xu, C.; Guo, H.; Liu, Y. A Survey on Emerging Computing Paradigms for Big Data. Chin. J. Electron. 2017, 26, 1–12. [Google Scholar] [CrossRef]
  23. David, R.; John, G.; John, R. Data Age 2025: The Evolution of Data to Life-Critical. Available online: https://www.import.io/wp-content/uploads/2017/04/Seagate-WP-DataAge2025-March-2017.pdf (accessed on 15 July 2021).
  24. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  25. Farhan, L.; Kharel, R. Internet of Things: Vision, Future Directions and Opportunities; Springer International Publishing: Cham, Switzerland, 2019; Volume 29, pp. 331–347. [Google Scholar]
  26. Alam, F.; Mehmood, R.; Katib, I.; Albogami, N.N.; Albeshri, A. Data Fusion and IoT for Smart Ubiquitous Environments: A Survey. IEEE Access 2017, 5, 9533–9554. [Google Scholar] [CrossRef]
  27. Mubeen, S.; Asadollah, S.A.; Papadopoulos, A.V.; Ashjaei, M.; Pei-Breivold, H.; Behnam, M. Management of Service Level Agreements for Cloud Services in IoT: A Systematic Mapping Study. IEEE Access 2018, 6, 30184–30207. [Google Scholar] [CrossRef]
  28. Narula, S.; Jain, A.; Prachi. Cloud Computing Security: Amazon Web Service. In Proceedings of the 2015 Fifth International Conference on Advanced Computing Communication Technologies, Haryana, India, 21–22 February 2015; pp. 501–505. [Google Scholar] [CrossRef]
  29. Alzubaidi, L.; Zhang, J.; Humaidi, A.J.; Al-Dujaili, A.; Duan, Y.; Al-Shamma, O.; Santamaría, J.; Fadhel, M.A.; Al-Amidie, M.; Farhan, L. Review of deep learning: Concepts, CNN architectures, challenges, applications, future directions. J. Big Data 2021, 8, 53. [Google Scholar] [CrossRef]
  30. Amarlingam, M.; Mishra, P.K.; Prasad, K.V.V.D.; Rajalakshmi, P. Compressed sensing for different sensors: A real scenario for WSN and IoT. In Proceedings of the 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 289–294. [Google Scholar] [CrossRef]
  31. Gheth, W.; Adebisi, B.; Ijaz, M.; Farhan, L.; Harris, G. Hybrid Visible-Light/RF Communication System for Mission-Critical IoT Applications. In Proceedings of the 2019 IEEE 2nd British and Irish Conference on Optics and Photonics (BICOP), London, UK, 11–13 December 2019; pp. 1–4. [Google Scholar]
  32. Thota, P.; Kim, Y. Implementation and Comparison of M2M Protocols for Internet of Things. In Proceedings of the 2016 4th Intl Conference on Applied Computing and Information Technology, Las Vegas, NV, USA, 12–14 December 2016. [Google Scholar] [CrossRef]
  33. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  34. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  35. Alshamma, O.; Awad, F.H.; Alzubaidi, L.; Fadhel, M.A.; Arkah, Z.M.; Farhan, L. Employment of Multi-classifier and Multi-domain Features for PCG Recognition. In Proceedings of the 2019 12th International Conference on Developments in eSystems Engineering (DeSE), Kazan, Russia, 7–10 October 2019; pp. 321–325. [Google Scholar]
  36. Ngu, A.H.; Gutierrez, M.; Metsis, V.; Nepal, S.; Sheng, Q.Z. IoT Middleware: A Survey on Issues and Enabling Technologies. IEEE Internet Things J. 2017, 4, 1–20. [Google Scholar] [CrossRef]
  37. Sezer, O.B.; Dogdu, E.; Ozbayoglu, A.M. Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey. IEEE Internet Things J. 2018, 5, 1–27. [Google Scholar] [CrossRef]
  38. Arroyo, P.; Herrero, J.L.; Suárez, J.I.; Lozano, J. Wireless Sensor Network Combined with Cloud Computing for Air Quality Monitoring. Sensors 2019, 19, 691. [Google Scholar] [CrossRef] [Green Version]
  39. Emeakaroha, V.C.; Cafferkey, N.; Healy, P.; Morrison, J.P. A Cloud-Based IoT Data Gathering and Processing Platform. In Proceedings of the 2015 3rd International Conference on Future Internet of Things and Cloud, Rome, Italy, 24–26 August 2015; pp. 50–57. [Google Scholar] [CrossRef]
  40. Ray, P.P. A survey of IoT cloud platforms. Future Comput. Inform. J. 2016, 1, 35–46. [Google Scholar] [CrossRef]
  41. Airehrour, D.; Gutierrez, J.; Ray, S.K. A Lightweight Trust Design for IoT Routing. In Proceedings of the 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computinence and Technology, Auckland, New Zealand, 8–12 August 2016; pp. 552–557. [Google Scholar] [CrossRef]
  42. Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
  43. Bragg, G.M. Standards-Based Internet of Things Sub-GHz Environmental Sensor Networks. Ph.D. Thesis, University of Southampton, Southampton, UK, 2017. [Google Scholar]
  44. Hagen, S. IPV6 Essentials. In Grundlagen—Funktionalität, Integration 2nd Edition Sunny Edition; O’Reilly Media: Sebastopol, CA, USA, 2006; pp. 1–438. [Google Scholar]
  45. Wang, X.; Cheng, H.; Yao, Y. Addressing-Based Routing Optimization for 6LoWPAN WSN in Vehicular Scenario. IEEE Sens. J. 2016, 16, 3939–3947. [Google Scholar] [CrossRef]
  46. Amale, O.; Patil, R. IoT Based Rainfall Monitoring System Using WSN Enabled Architecture. In Proceedings of the 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27–29 March 2019; pp. 789–791. [Google Scholar] [CrossRef]
  47. Farhan, L.; Kharel, R.; Kaiwartya, O.; Quiroz-Castellanos, M.; Alissa, A.; Abdulsalam, M. A Concise Review on Internet of Things (IoT)-Problems, Challenges and Opportunities. In Proceedings of the 2018 11th International Symposium on Communication Systems, Networks Digital Signal Processing (CSNDSP), Budapest, Hungary, 18–20 July 2018; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
  48. Ray, P. A Survey on Internet of Things Architectures. J. King Saud Univ.-Comput. Inf. Sci. 2018, 30, 291–319. [Google Scholar] [CrossRef] [Green Version]
  49. Shen, J.; Wang, A.; Wang, C.; Hung, P.C.K.; Lai, C.F. An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT. IEEE Access 2017, 5, 18469–18479. [Google Scholar] [CrossRef]
  50. Brohi, A.M.; Malkani, Y.A.; Chandio, M.S. Data provenance in Wireless Sensor Networks (WSNs): A review. In Proceedings of the 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 3–4 March 2018; pp. 1–5. [Google Scholar] [CrossRef]
  51. Farhan, L.; Alzubaidi, L.; Abdulsalam, M.; Abboud, A.J.; Hammoudeh, M.; Kharel, R. An Efficient Data Packet Scheduling Scheme for Internet of Things Networks. In Proceedings of the IEEE Diyala Third Scientific Conference of Engineering Sciences and 1st Diyala International Conference of Engineering Sciences, Baqubah, Iraq, 10–11 January 2018. [Google Scholar]
  52. Ding, H.; Zhao, D.; Zhao, Y.; Liu, Z. Application of WSN of Polling System with Vacations and Using Gated Services in Forest Fire Prevention. In Proceedings of the 2010 International Conference on Internet Technology and Applications, Wuhan, China, 20–22 August 2010; pp. 1–4. [Google Scholar] [CrossRef]
  53. Nagaraj, S.; Biradar, R.V. Applications of wireless sensor networks in the real-time ambient air pollution monitoring and air quality in metropolitan cities: A survey. In Proceedings of the 2017 International Conference on Smart Technologies for Smart Nation (SmartTechCon), Bangalore, India, 17–19 August 2017; pp. 1393–1398. [Google Scholar] [CrossRef]
  54. Bhavsar, A.; Arolkar, H. ZigBee based Network Architecture for Animal Health Monitoring. In Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, 4–5 September 2015; pp. 398–402. [Google Scholar] [CrossRef]
  55. Kumar, A.; Zhao, M.; Wong, K.J.; Guan, Y.L.; Chong, P.H.J. A Comprehensive Study of IoT and WSN MAC Protocols: Research Issues, Challenges and Opportunities. IEEE Access 2018, 6, 76228–76262. [Google Scholar] [CrossRef]
  56. Chiara, B.; Andrea, C.; Davide, D.; Roberto, V. An Overview on Wireless Sensor Networks Technology and Evolution. Sensors 2009, 9, 6869–6896. [Google Scholar] [CrossRef] [Green Version]
  57. Herrera, L.; Calveras, A.; Catalan, M. A two-way radio communication across a multi-hop wireless sensor network based on a commercial IEEE 802.15.4 compliant platform. Procedia Eng. 2011, 25, 1045–1048. [Google Scholar] [CrossRef] [Green Version]
  58. Zeb, A.; Islam, A.K.M.M.; Zareei, M.; Mamoon, I.A.; Mansoor, N.; Baharun, S.; Katayama, Y.; Komaki, S. Clustering Analysis in Wireless Sensor Networks: The Ambit of Performance Metrics and Schemes Taxonomy. Int. J. Distrib. Sens. Netw. 2016, 12, 4979142. [Google Scholar] [CrossRef] [Green Version]
  59. Farhan, L.; Alissa, A.E.; Shukur, S.T.; Hammoudeh, M.; Kharel, R. An Energy Efficient Long Hop (LH) First Scheduling Algorithm for Scalable Internet of Things (IoT) Networks. In Proceedings of the IEEE 11th International Conference on Sensing Technology, Sydney, Australia, 4–6 December 2017. [Google Scholar]
  60. Sarwesh, P.; Shet, N.S.V.; Chandrasekaran, K. Energy efficient network architecture for IoT applications. In Proceedings of the 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), Greater Noida, Delhi, India, 8–10 October 2015. [Google Scholar] [CrossRef]
  61. Azad, P.; Sharma, V. Cluster Head Selection in Wireless Sensor Networks under Fuzzy Environment. Int. Sch. Res. Not. 2013, 2013, 909086. [Google Scholar] [CrossRef] [Green Version]
  62. Adil, M.; Khan, R.; Ali, J.; Roh, B.H.; Ta, Q.T.H.; Almaiah, M.A. An Energy Proficient Load Balancing Routing Scheme for Wireless Sensor Networks to Maximize Their Lifespan in an Operational Environment. IEEE Access 2020, 8, 163209–163224. [Google Scholar] [CrossRef]
  63. Khan, M.N.; Rahman, H.U.; Almaiah, M.A.; Khan, M.Z.; Khan, A.; Raza, M.; Al-Zahrani, M.; Almomani, O.; Khan, R. Improving Energy Efficiency With Content-Based Adaptive and Dynamic Scheduling in Wireless Sensor Networks. IEEE Access 2020, 8, 176495–176520. [Google Scholar] [CrossRef]
  64. Laubhan, K.; Talaat, K.; Riehl, S.; Morelli, T.; Abdelgawad, A.; Yelamarthi, K. A four-layer wireless sensor network framework for IoT applications. In Proceedings of the 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), Abu Dhabi, United Arab Emirates, 16–19 October 2016; pp. 1–4. [Google Scholar] [CrossRef]
  65. Saha, D.; Yousuf, M.R.; Matin, M.A. Energy Efficient Scheduling Algorithm For S-MAC Protocol in Wireless Sensor Network. Int. J. Wirel. Mob. Netw. 2011, 3, 129–140. [Google Scholar] [CrossRef]
  66. Behera, T.M.; Mohapatra, S.K.; Samal, U.C.; Khan, M.S.; Daneshmand, M.; Gandomi, A.H. Residual Energy-Based Cluster-Head Selection in WSNs for IoT Application. IEEE Internet Things J. 2019, 6, 5132–5139. [Google Scholar] [CrossRef] [Green Version]
  67. Martinez, I.S.H.; Salcedo, I.P.O.J.; Daza, I.B.S.R. IoT application of WSN on 5G infrastructure. In Proceedings of the 2017 International Symposium on Networks, Computers and Communications (ISNCC), Marrakech, Morocco, 16–18 May 2017; pp. 1–6. [Google Scholar]
  68. Chang, J.Y.; Shen, T.H. An Efficient Tree-Based Power Saving Scheme for Wireless Sensor Networks with Mobile Sink. IEEE Sens. 2016, 16, 7545–7557. [Google Scholar] [CrossRef]
  69. Kleinschmidt, J.H. Genetic Algorithms for Wireless Sensor Networks. In Encyclopedia of Artificial Intelligence; IGI Global: Hershey, PA, USA, 2009; pp. 755–758. [Google Scholar]
  70. Khriji, S.; Cheour, R.; Goetz, M.; El Houssaini, D.; Kammoun, I.; Kanoun, O. Measuring Energy Consumption of a Wireless Sensor Node during Transmission: panStamp. In Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, 16–18 May 2018; pp. 274–280. [Google Scholar] [CrossRef]
  71. Minet, P. Energy Efficient Routing; Bentham Science: Sharjah, United Arab Emirates, 2009; pp. 49–60. [Google Scholar]
  72. Ab Halim, A.H.; Zen, K. MAC protocol to reduce packet collision in wireless sensor network. In Proceedings of the 2008 International Conference on Computer and Communication Engineering, Kuala Lumpur, Malaysia, 13–15 May 2008; pp. 1290–1293. [Google Scholar] [CrossRef]
  73. Chen, Y.; Liu, W.; Wang, T.; Deng, Q.; Liu, A.; Song, H. An adaptive retransmit mechanism for delay differentiated services in industrial WSNs. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 258. [Google Scholar] [CrossRef]
  74. Agarwal, D.; Rout, R.R.; Ravichandra, S. Detection of node-misbehavior using overhearing and autonomous agents in wireless Ad-Hoc networks. In Proceedings of the 2015 Applications and Innovations in Mobile Computing (AIMoC), Kolkata, India, 12–14 February 2015; pp. 152–157. [Google Scholar] [CrossRef]
  75. Pal, A.; Nasipuri, A. Distributed Routing and Channel Selection for Multi-Channel Wireless Sensor Networks. Sens. Actuator Netw. 2017, 6, 10. [Google Scholar] [CrossRef]
  76. Liyana Arachchige, C.J.; Venkatesan, S.; Mittal, N. An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks. In Proceedings of the 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks, Chicago, IL, USA, 14–17 October 2008; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
  77. Margolies, R.; Grebla, G.; Chen, T.; Rubenstein, D.; Zussman, G. Panda: Neighbor Discovery on a Power Harvesting Budget. IEEE J. Sel. Areas Commun. 2016, 34, 3606–3619. [Google Scholar] [CrossRef]
  78. Javaid, N.; Majid, A.; Sher, A.; Khan, W.Z.; Aalsalem, M.Y. Avoiding Void Holes and Collisions with Reliable and Interference-Aware Routing in Underwater WSNs. Sensors 2018, 18, 3038. [Google Scholar] [CrossRef] [Green Version]
  79. Razvan, M.E.; Andreas, T. Minimising the effect of WiFi interference in 802.15.4 wireless sensor networks. Int. J. Sens. Netw. 2008, 3, 43–54. [Google Scholar]
  80. Kaur, R.; Sharma, D.; Kaur, N. Comparative Analysis of Leach And Its Descendant Protocols In Wireless Sensor Network. Int. J. P2P Netw. Trends Technol. (IJPTT) 2013, 3, 22–27. [Google Scholar]
  81. Liu, X.; Wu, J. A Method for Energy Balance and Data Transmission Optimal Routing in Wireless Sensor Networks. Sensors 2019, 19, 3017. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  82. Zhang, J.; Wu, Q.; Ren, F.; He, T.; Lin, C. Effective Data Aggregation Supported by Dynamic Routing in Wireless Sensor Networks. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–6. [Google Scholar] [CrossRef]
  83. Lindsey, S.; Raghavendra, C.S. PEGASIS: Power-efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 9–16 March 2002. [Google Scholar] [CrossRef]
  84. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef] [Green Version]
  85. Liang, J.; Wang, J.; Chen, J. A Delay-Constrained and Maximum Lifetime Data Gathering Algorithm for Wireless Sensor Networks. In Proceedings of the 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, WuYi Mountain, China, 16–18 December 2009; pp. 148–155. [Google Scholar] [CrossRef]
  86. Pantazis, N.A.; Nikolidakis, S.A.; Vergados, D.D. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2013, 15, 551–591. [Google Scholar] [CrossRef]
  87. Zhang, J.; Hu, P.; Xie, F.; Long, J.; He, A. An Energy Efficient and Reliable In-Network Data Aggregation Scheme for WSN. IEEE Access 2018, 6, 71857–71870. [Google Scholar] [CrossRef]
  88. Oyman, E.I.; Ersoy, C. Multiple Sink Network Design Problem in Large Scale Wireless Sensor networks. In Proceedings of the IEEE International Conference on Communications, Paris, France, 20–24 June 2004; pp. 3663–3667. [Google Scholar] [CrossRef]
  89. Younis, O.; Fahmy, S. HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks. IEEE Trans. Mob. Comput. 2004, 3, 366–379. [Google Scholar] [CrossRef] [Green Version]
  90. Lindsey, S.; Raghavendra, C.; Sivalingam, K.M. Data gathering algorithms in sensor networks using energy metrics. IEEE Trans. Parallel Distrib. Syst. 2002, 13, 924–935. [Google Scholar] [CrossRef] [Green Version]
  91. Heinzelman, W.B. Application- Specific Protocol Architectures for Wireless Networks. Ph.D. Thesis, Massachusetts Institute of Technology (MIT), Cambridge, MA, USA, 2000. [Google Scholar]
  92. Singh, K. WSN LEACH based protocols: A structural analysis. In Proceedings of the 2015 International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, Canada, 15–17 October 2015; pp. 1–7. [Google Scholar] [CrossRef]
  93. Arya, P.G.; Chauhan, P.D.; Khanna, R.; Mittal, N.; Amandeep. Energy Aware Multi-Hop Multi-Path Hierarchical (EAMMH) Routing Protocol for Wireless Sensor Networks. Eur. J. Sci. Res. 2012, 88, 520–530. [Google Scholar]
  94. Cengiz, K.; Dag, T. Energy Aware Multi-Hop Routing Protocol for WSNs. IEEE Access 2018, 6, 2622–2633. [Google Scholar] [CrossRef]
  95. Eshaftri, M.; Al-Dubai, A.Y.; Romdhani, I.; Yassien, M.B. A New Energy Efficient Cluster Based Protocol for Wireless Sensor Networks. In Proceedings of the 2015 Federated Conference on Computer Science and Information Systems (FedCSIS), Lodz, Poland, 13–16 September 2015; pp. 1209–1214. [Google Scholar] [CrossRef] [Green Version]
  96. Xuxun, L. A Survey on Clustering Routing Protocols in Wireless Sensor Networks. Sensors 2012, 12, 11113. [Google Scholar] [CrossRef]
  97. Anitha, G.; Vijayakumari, V.; Thangavelu, S. A Comprehensive Study and Analysis of LEACH and HEED Routing Protocols for Wireless Sensor Networks—With Suggestion for Improvements. Indones. J. Electr. Eng. Comput. Sci. 2018, 9, 778–783. [Google Scholar] [CrossRef]
  98. Kour, H.; Sharma, A.K. Performance evaluation of HEED and H-HEED protocol for realistic models in WSN. In Proceedings of the 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 10–12 September 2015; pp. 1–5. [Google Scholar] [CrossRef]
  99. Ullah, Z.; Mostarda, L.; Gagliardi, R.; Cacciagrano, D.; Corradini, F. A Comparison of HEED Based Clustering Algorithms-Introducing ER-HEED. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 339–345. [Google Scholar] [CrossRef]
  100. Huang, J.; Li, Y.; Yu, H. Design and implementation of multi-hops wireless sensor network routing protocol based on HEED. In Proceedings of the 2017 IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, China, 27–30 October 2017; pp. 598–601. [Google Scholar] [CrossRef]
  101. Bansal, P.; Kundu, P.; Kaur, P. Comparison of LEACH and PEGASIS hierarchical routing protocols in wireless sensor networks. Int. J. Recent Trends Eng. Technol. 2014, 11, 139. [Google Scholar]
  102. Anuradha, I.; Singh, G. A Brief Study of Power Efficient Hierarchical Routing Protocols in Wireless Sensor Networks. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 6911–6915. [Google Scholar]
  103. Chang, J.Y.; Ju, P.H. An energy-saving routing architecture with a uniform clustering algorithm for wireless body sensor networks. Future Gener. Comput. Syst. 2014, 35, 128–140. [Google Scholar] [CrossRef]
  104. Haque, M.; Ahmad, T.; Imran, M. Review of Hierarchical Routing Protocols for Wireless Sensor Networks. In Intelligent Communication and Computational Technologies; Hu, Y.C., Tiwari, S., Mishra, K.K., Trivedi, M.C., Eds.; Springer: Singapore, 2018; pp. 237–246. [Google Scholar]
  105. Wang, K.; Yu, C.M.; Wang, L.C. DORA: A Destination-Oriented Routing Algorithm for Energy-Balanced Wireless Sensor Networks. IEEE Internet Things J. 2021, 8, 2080–2081. [Google Scholar] [CrossRef]
  106. Zhao, M.; Chong, P.H.J.; Chan, H.C. An energy-efficient and cluster-parent based RPL with power-level refinement for low-power and lossy networks. Comput. Commun. 2017, 104, 17–33. [Google Scholar] [CrossRef]
  107. Zhao, Y.Z.; Ma, M.; Miao, C.Y.; Nguyen, T.N. An Energy-Efficient and Low-Latency MAC Protocol with Adaptive Scheduling for Multi-Hop Wireless Sensor Networks. Comput. Commun. 2010, 33, 1452–1461. [Google Scholar] [CrossRef]
  108. Bechkit, W.; Koudil, M.; Challal, Y.; Bouabdallah, A.; Souici, B.; Benatchba, K. A new weighted shortest path tree for convergecast traffic routing in WSN. In Proceedings of the 2012 IEEE Symposium on Computers and Communications (ISCC), Cappadocia, Turkey, 1–4 July 2012; pp. 187–192. [Google Scholar] [CrossRef] [Green Version]
  109. Banerjee, I.; Roy, I.; Choudhury, A.R.; Sharma, B.D.; Samanta, T. Shortest path based geographical routing algorithm in wireless sensor network. In Proceedings of the 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS), Kolkata, India, 28–29 December 2012; pp. 262–265. [Google Scholar] [CrossRef]
  110. Tejas, R.; Devi, T.H.M. Design and implementation of an efficient routing schemes to increase distribute lifetime efficiency in WSN. In Proceedings of the 2016 IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), Bangalore, India, 20–21 May 2016; pp. 637–640. [Google Scholar] [CrossRef]
  111. Cota-Ruiz, J.; Rivas-Perea, P.; Sifuentes, E.; Gonzalez-Landaeta, R. A Recursive Shortest Path Routing Algorithm with Application for Wireless Sensor Network Localization. IEEE Sens. J. 2016, 16, 4631–4637. [Google Scholar] [CrossRef]
  112. Khediri, S.E.; Thaljaoui, A.; Dallali, A.; Kachouri, A. Clustering algorithm in wireless sensor networks based on shortest path. In Proceedings of the 2018 30th International Conference on Microelectronics (ICM), Sousse, Tunisia, 16–19 December 2018; pp. 335–338. [Google Scholar] [CrossRef]
  113. Grossglauser, M.; Tse, D.N.C. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. Netw. 2002, 10, 477–486. [Google Scholar] [CrossRef]
  114. Khodashahi, M.H.; Tashtarian, F.; Yaghmaee Moghaddam, M.H.; Honary, M.T. Optimal Location for Mobile Sink in Wireless Sensor Networks. In Proceedings of the 2010 IEEE Wireless Communication and Networking Conference, Sydney, Australia, 18 April 2010; pp. 1–6. [Google Scholar] [CrossRef]
  115. Bendigeri, K.Y.; Mallapur, J.D.; Kumbalavati, S.B. Recovery based fault tolerance in wireless sensor networks. In Proceedings of the 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Mysuru, India, 15–16 December 2017; pp. 122–128. [Google Scholar] [CrossRef]
  116. Bulhoes, R.P.; Passos, D.; Albuquerque, C.V.N. Collision probability estimation in wireless networks. In Proceedings of the 2016 8th IEEE Latin-American Conference on Communications (LATINCOM), Medellin, Colombia, 16–18 November 2016; pp. 1–6. [Google Scholar] [CrossRef]
  117. Chen, Q.; Zhou, B.; Zhao, Z. A minimum route-interference routing metric for multi-radio wireless mesh networks. In Proceedings of the 2009 Fourth International Conference on Communications and Networking in China, Xi’an, China, 26–28 August 2009; pp. 1–4. [Google Scholar] [CrossRef]
  118. Huang, H.; Hu, G.; Yu, F.; Zhang, Z. Energy-aware interference-sensitive geographic routing in wireless sensor networks. IET Commun. 2011, 5, 2692–2702. [Google Scholar] [CrossRef]
  119. Salvatore, D.; Yang, S.H. Routing algorithm of WSN under interference environment. In Proceedings of the IET Conference on Wireless Sensor Systems (WSS 2012), London, UK, 18–19 June 2012; pp. 1–5. [Google Scholar] [CrossRef]
  120. Liu, W.; Huang, K.; Zhou, X.; Durrani, S. Full-Duplex Backscatter Interference Networks Based on Time-Hopping Spread Spectrum. IEEE Trans. Wirel. Commun. 2017, 16, 4361–4377. [Google Scholar] [CrossRef]
  121. Marchang, J.; Douglas, R.; Ghita, B.; Lancaster, D.; Sanders, B. Dynamic Neighbour Aware Power-controlled MAC for Multi-hop Ad-hoc networks. Ad Hoc Netw. 2018, 75-76, 119–134. [Google Scholar] [CrossRef]
  122. Pignaton de Freitas, E.; Heimfarth, T.; Netto, I.F.; Pereira, C.E.; Ferreira, A.M.; Wagner, F.R.; Larsson, T. Handling Failures of Static Sensor Nodes in Wireless Sensor Network by Use of Mobile Sensors. In Proceedings of the 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, Biopolis, Singapore, 22–25 March 2011; pp. 127–134. [Google Scholar] [CrossRef]
  123. Farhan, L.; Kharel, R.; Kaiwartya, O.; Quiroz-Castellanos, M.; Raza, U.; Teay, S.H. LQOR: Link Quality-Oriented Route Selection on Internet of Things Networks for Green Computing. In Proceedings of the 2018 11th International Symposium on Communication Systems, Networks Digital Signal Processing (CSNDSP), Budapest, Hungary, 18–20 July 2018; pp. 1–6. [Google Scholar] [CrossRef]
  124. Chaudhari, B.S.; Zennaro, M.; Borkar, S. LPWAN Technologies: Emerging Application Characteristics, Requirements, and Design Considerations. Future Internet 2020, 12, 46. [Google Scholar] [CrossRef] [Green Version]
  125. Omondi, F.A.; Ever, E.; Shah, P.; Gemikonakli, O. Modelling Wireless Sensor Networks for Performability Evaluation. In Ad-Hoc, Mobile, and Wireless Network; Springer: Berlin/Heidelberg, Germany, 2013; pp. 172–184. [Google Scholar]
  126. Abdullah, S.; Yang, K. An Energy Efficient Message Scheduling Algorithm Considering Node Failure in IoT Environment. Wirel. Pers. Commun. 2014, 79, 1815–1835. [Google Scholar] [CrossRef]
  127. Farhan, L.; Kharel, R.; Kaiwartya, O.; Hammoudeh, M.; Adebisi, B. Towards Green Computing for Internet of Things: Energy Oriented Path and Message Scheduling Approach. Sustain. Cities Soc. 2018, 38, 195–204. [Google Scholar] [CrossRef] [Green Version]
  128. Sasikumar, S.; Sudha, S.; Uma Maheswari, R. Recover link failure using ARTCP mechanism. In Proceedings of the IEEE-International Conference on Advances in Engineering, Science And Management (ICAESM -2012), Nagapattinam, India, 30–31 March 2012; pp. 848–853. [Google Scholar]
  129. Xuan, T.N.; Semog, K.; Myung, R.J.; Yoon, P.S. A Novel Dual Separate Paths (DSP) Algorithm Providing Fault-Tolerant Communication for Wireless Sensor Network. Sensors 2017, 17, 1699. [Google Scholar] [CrossRef]
  130. Titouna, C.; Moumen, H.; Abba Ari, A.A. Cluster Head Recovery Algorithm for Wireless Sensor Networks. In Proceedings of the 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), Paris, France, 23–26 April 2019; pp. 1905–1910. [Google Scholar] [CrossRef]
  131. Vadavi, J.V.; Sugavi, A.G. Detection of black hole attack in enhanced AODV protocol. In Proceedings of the 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), Gurgaon, India, 12–14 October 2017. [Google Scholar] [CrossRef]
  132. Meraihi, Y.; Acheli, D.; Ramdane-Cherif, A. QoS performance evaluation of AODV and DSR routing protocols in city VANET scenarios. In Proceedings of the 2017 5th International Conference on Electrical Engineering—Boumerdes (ICEE-B), Boumerdes, Algeria, 29–31 October 2017. [Google Scholar] [CrossRef]
  133. Hung, L.L.; Leu, F.Y.; Tsai, K.L.; Ko, C.Y. Energy-Efficient Cooperative Routing Scheme for Heterogeneous Wireless Sensor Networks. IEEE Access 2020, 8, 56321–56332. [Google Scholar] [CrossRef]
  134. Patel, N.R.; Kumar, S.; Singh, S.K. Energy and Collision Aware WSN Routing Protocol for Sustainable and Intelligent IoT Applications. IEEE Sens. J. 2021, 1. [Google Scholar] [CrossRef]
  135. Qureshi, K.N.; Bashir, M.U.; Lloret, J.; Leon, A. Optimized Cluster-Based Dynamic Energy-Aware Routing Protocol for Wireless Sensor Networks in Agriculture Precision. J. Sens. 2020, 2020, 3302–3312. [Google Scholar] [CrossRef] [Green Version]
  136. Wang, F.; Wang, D.; Liu, J. Traffic-Aware Relay Node Deployment for Data Collection in Wireless Sensor Networks. In Proceedings of the 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Rome, Italy, 22–26 June 2009; pp. 1–9. [Google Scholar] [CrossRef] [Green Version]
  137. Kim, J.W.; Barrado, J.R.R.; Jeon, D.K. Time and Energy Efficient Relay Transmission for Multi-Hop Wireless Sensor Networks. Sensors 2016, 16, 985. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  138. Abusaimeh, H.; Shkoukani, M. Modified TCP Protocol for Wireless Sensor Networks. Int. J. Comput. Sci. Issues (IJCSI) 2013, 10, 279–285. [Google Scholar]
  139. Gupta, H.P.; Rao, S.V. Demand-Based Coverage and Connectivity-Preserving Routing in Wireless Sensor Networks. IEEE Syst. J. 2016, 10, 1380–1389. [Google Scholar] [CrossRef]
  140. Wang, H.; Jin, J.; Wang, Z.; Shu, L. On a Novel Property of the Earliest Deadline First Algorithm. In Proceedings of the 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Shanghai, China, 26–28 July 2011; pp. 197–201. [Google Scholar] [CrossRef]
  141. Gamini Abhaya, V.; Tari, Z.; Zeephongsekul, P.; Zomaya, A.Y. Performance Analysis of EDF Scheduling in a Multi-Priority Preemptive M/G/1 Queue. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2149–2158. [Google Scholar] [CrossRef]
  142. Houben, C.K.; Halang, W.A. An Energy-aware Dynamic Scheduling Algorithm for Hard Real-time Systems. In Proceedings of the 2014 3rd Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro, 15–19 June 2014; pp. 14–17. [Google Scholar] [CrossRef]
  143. Gomathi, R.; Mahendran, N. An Efficient Data packet Scheduling Schemes in Wireless Sensor Networks. In Proceedings of the 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Cairo, Egypt, 6–9 December 2015; pp. 542–547. [Google Scholar] [CrossRef]
  144. Wang, Z.; Liu, Y.; Sun, Y.; Li, Y.; Zhang, D.; Yang, H. An Energy-Efficient Heterogeneous Dual-Core Processor for Internet of Things. In Proceedings of the 2015 IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, Portugal, 24–27 May 2015; pp. 2301–2304. [Google Scholar] [CrossRef]
  145. Jayanthi, A.; Bagavathi, A. A Low Power Multi-Bit Flip-Flop Design for WSN Nodes. In Proceedings of the 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Lisbon, Portugal, 24–27 May 2015; pp. 1418–1421. [Google Scholar] [CrossRef]
  146. Carrano, R.C.; Passos, D.; Magalhaes, L.C.S.; Albuquerque, C.V.N. Survey and Taxonomy of Duty Cycling Mechanisms in Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2014, 16, 181–194. [Google Scholar] [CrossRef]
  147. Campobello, G.; Serrano, S.; Leonardi, A.; Palazzo, S. Trade-Offs between Energy Saving and Reliability in Low Duty Cycle Wireless Sensor Networks Using a Packet Splitting Forwarding Technique. EURASIP J. Wirel. Commun. Netw. 2010, 2010. [Google Scholar] [CrossRef] [Green Version]
  148. Palattella, M.R.; Accettura, N.; Grieco, L.A.; Boggia, G.; Dohler, M.; Engel, T. On Optimal Scheduling in Duty-Cycled Industrial IoT Applications Using IEEE802.15.4e TSCH. IEEE Sens. J. 2013, 13, 3655–3666. [Google Scholar] [CrossRef]
  149. Salleh, A.; Mamat, K.; Darus, M.Y. Integration of wireless sensor network and Web of Things: Security perspective. In Proceedings of the 2017 IEEE 8th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia, 4–5 August 2017; pp. 138–143. [Google Scholar] [CrossRef]
  150. Bashir, A.K.; Lim, S.J.; Chauhdary, S.H.; Park, M.S. Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks. Sensors 2011, 11, 7004. [Google Scholar] [CrossRef] [Green Version]
  151. Yektaparast, A.; Nabavi, F.; Sarmast, A. An improvement on LEACH protocol (Cell-LEACH). In Proceedings of the 2012 14th International Conference on Advanced Communication Technology (ICACT), Phoenix Park, PyeongChang, Korea, 19–22 February 2012; pp. 992–996. [Google Scholar]
  152. Alduais, N.A.M.; Abdullah, J.; Jamil, A.; Audah, L. An efficient data collection and dissemination for IoT based WSN. In Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 13–15 October 2016. [Google Scholar] [CrossRef]
  153. Shylaja, S.N.; Veena, M.B. Real-time monitoring of soil nutrient analysis using WSN. In Proceedings of the 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), Chennai, India, 1–2 August 2017; pp. 3059–3062. [Google Scholar] [CrossRef]
  154. Kodali, R.K.; Valdas, A. MQTT Implementation of IoT based Fire Alarm Network. In Proceedings of the 2018 International Conference on Communication, Computing and Internet of Things (IC3IoT), Chennai, India, 15–17 February 2018; pp. 143–146. [Google Scholar]
  155. Sarierao, B.S.; Prakasarao, A. Smart Healthcare Monitoring System Using MQTT Protocol. In Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–7 April 2018; pp. 1–5. [Google Scholar] [CrossRef]
  156. Rachmad, A.A.; Daoguo, Y. Online Monitoring & Controlling Industrial Arm Robot Using MQTT Protocol. In Proceedings of the 2018 IEEE International Conference on Robotics, Biomimetics, and Intelligent Computational Systems (Robionetics), Bandung, Indonesia, 8–10 August 2018; pp. 12–16. [Google Scholar]
  157. Patel, S.; Patel, D.R.; Navik, A.P. Energy efficient integrated authentication and access control mechanisms for Internet of Things. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 304–309. [Google Scholar] [CrossRef]
  158. Aslan, F.Y.; Sakallı, M.T. Energy Consumption Analysis of Lightweight Cryptographic Algorithms That Can Be Used in the Security of Internet of Things Applications. Secur. Commun. Netw. 2020, 2020, 15. [Google Scholar] [CrossRef]
  159. Hwang, W.; Yoo, K.; Thai, D.V.; Lee, W.; Baek, K.H. Design of a DCDC Converter Customized for Ultra-Low Voltage Operating IoT Platforms. Energies 2020, 13, 461. [Google Scholar] [CrossRef] [Green Version]
  160. Kumar, M.; Zhang, X.; Liu, L.; Wang, Y.; Shi, W. Energy-Efficient Machine Learning on the Edges. In Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), New Orleans, LA, USA, 18–22 May 2020; pp. 912–921. [Google Scholar] [CrossRef]
  161. Adil, M.; Almaiah, M.A.; Omar Alsayed, A.; Almomani, O. An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks. Sensors 2020, 20, 2311. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  162. Almaiah, M.A. A New Scheme for Detecting Malicious Attacks in Wireless Sensor Networks Based on Blockchain Technology; Springer International Publishing: Cham, Switzerland, 2021; Volume 90, pp. 217–234. [Google Scholar]
  163. Farhan, L.; Kaiwartya, O.; Alzubaidi, L.; Gheth, W.; Dimla, E.; Kharel, R. Toward Interference Aware IoT Framework: Energy and Geo-Location-Based-Modeling. IEEE Access 2019, 7, 56617–56630. [Google Scholar] [CrossRef]
  164. Siddiqui, S.; Khan, A.A.; Ghani, S. A survey on data aggregation mechanisms in wireless sensor networks. In Proceedings of the 2015 International Conference on Information and Communication Technologies (ICICT), Dubai, United Arab Emirates, 12–13 November 2015; pp. 1–7. [Google Scholar] [CrossRef]
  165. Dhand, G.; Tyagi, S. Data Aggregation Techniques in WSN: Survey. Procedia Comput. Sci. 2016, 92, 378–384. [Google Scholar] [CrossRef] [Green Version]
  166. Campobello, G.; Segreto, A.; Serrano, S. Data Gathering Techniques for Wireless Sensor Networks: A Comparison. Int. J. Distrib. Sens. Netw. 2016, 12, 4156358. [Google Scholar] [CrossRef] [Green Version]
  167. Yuea, J.; Zhang, W.; Xiao, W.; Tang, D.; Tang, J. Energy Efficient and Balanced Cluster-Based Data Aggregation Algorithm for Wireless Sensor Networks. Procedia Eng. 2012, 29, 2009–2015. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Estimated number of connected devices vs world population.
Figure 1. Estimated number of connected devices vs world population.
Network 01 00017 g001
Figure 2. The growth of data over the years.
Figure 2. The growth of data over the years.
Network 01 00017 g002
Figure 3. Some applications that benefit from IoT technology.
Figure 3. Some applications that benefit from IoT technology.
Network 01 00017 g003
Figure 4. Interactions between IoT networks.
Figure 4. Interactions between IoT networks.
Network 01 00017 g004
Figure 5. Basic components of WSN.
Figure 5. Basic components of WSN.
Network 01 00017 g005
Figure 6. WSN communication architecture.
Figure 6. WSN communication architecture.
Network 01 00017 g006
Figure 7. A typical clustered WSN.
Figure 7. A typical clustered WSN.
Network 01 00017 g007
Figure 8. Necessary considerations for IoT-based WSNs.
Figure 8. Necessary considerations for IoT-based WSNs.
Network 01 00017 g008
Figure 9. A source node transmits to its destination and neighboring nodes overhearing the communication.
Figure 9. A source node transmits to its destination and neighboring nodes overhearing the communication.
Network 01 00017 g009
Figure 10. Single-hop and multihop scenarios.
Figure 10. Single-hop and multihop scenarios.
Network 01 00017 g010
Figure 11. Hierarchical clustering in WSN.
Figure 11. Hierarchical clustering in WSN.
Network 01 00017 g011
Figure 12. Taxonomy of energy consumption solutions.
Figure 12. Taxonomy of energy consumption solutions.
Network 01 00017 g012
Figure 13. Example of LEACH protocol architecture.
Figure 13. Example of LEACH protocol architecture.
Network 01 00017 g013
Figure 14. HEED protocol architecture.
Figure 14. HEED protocol architecture.
Network 01 00017 g014
Figure 15. PEGASIS protocol architecture.
Figure 15. PEGASIS protocol architecture.
Network 01 00017 g015
Figure 16. Recovery from node failure. P a t h s 1 and 2 failed to carry the data from source1 to the ultimate receiver. Therefore, source1 establishes another path ( p a t h 3 ) to deliver its packets.
Figure 16. Recovery from node failure. P a t h s 1 and 2 failed to carry the data from source1 to the ultimate receiver. Therefore, source1 establishes another path ( p a t h 3 ) to deliver its packets.
Network 01 00017 g016
Table 1. Examples of WSNs Applications.
Table 1. Examples of WSNs Applications.
Type of ApplicationMilitaryHabitatBusinessPublic/IndustrialHealthEnvironment
TrackingEnemy
Tracking
Animal
Tracking
Human
Tracking
Traffic
Tracking
Patient
Tracking
Tornado
Tracking
MonitoringSecurity
Detection
Animal
Monitoring
Inventory
Monitoring
Machine
Monitoring
Patient
Monitoring
Weather
Monitoring
Table 2. Comparison and classification of some of routing methods in WSN.
Table 2. Comparison and classification of some of routing methods in WSN.
ParametersLEACHHEEDPEGASISReferences
Type of protocolHierarchicalHierarchicalHierarchical[89,101]
Data delivery modelCluster-basedCluster-basedChain-based[102]
Nodes distributedRandomRandomRandom[103]
Node mobilityFixedFixedFixed[102]
MultihopNoYesNo[102]
Clustering MethodDistributedDistributedCentralized[103]
CH selectionThresholdResidual EnergyThreshold[83,84,89]
Relay nodeCHCH and nodesnodes[83,84,89]
Data aggregationYesYesNo[102]
ScalabilityLowModerateLow[104]
Table 3. A summary of previous methods surveyed in this paper.
Table 3. A summary of previous methods surveyed in this paper.
ProtocolsMobilityHop LimitUse of Location Info.Type of ProtocolNetwork ImprovementSelected CH NodeRef.
LEACHFixedSingle hopNoRoutingEnergy-efficiencyRandomly[77]
LEACH-CFixedSingle hopYesRoutingEnergy-efficiencyA node with more
energy in a cluster
[84]
E-LEACHFixedMulti-hopsYesRoutingEnergy-efficiencyA node with the
highest remaining
energy
[85]
EAMMHFixedMulti-hopsYesRoutingEnergy-efficiencyThe main CH should
be an optimum
distance from these
child-CH nodes.
[86]
EAMRFixedMulti-hopsYesRoutingEnergy-efficiencyA node is selected
a CH node until its energy
falls below a threshold
value.
[87]
HEEDFixedSingle hop
& Multi-hops
YesRoutingEnergy-efficiencyThe selected CH node
based on the high
residual energy
[82]
H-HEEDFixedSingle hop
& Multi-hops
YesRoutingEnergy-efficiencyThe H-HEED finds
the center of each
cluster and then allocates
the node nearest the cluster
center as a CH.
[90,91]
ER-HEEDFixedSingle hop
& Multi-hops
YesRoutingEnergy-efficiencyA node with the
highest level of energy is a CH.
[92]
E-HEEDFixedMulti-hopsYesRoutingEnergy-efficiencyThe CH nodes according
to the least transmission
distance from the BS.
[93]
PEGASISFixedMulti-hopsNoRoutingEnergy-efficiencyRandomly[83]
DORAFixedMulti-hopsNoRoutingEnergy-efficiencyRandomly[98]
LLNDFixedMulti-hopsNoRoutingInterference and
channel fading
Fixed[100]
AS-MACFixedSingle hopsNoSchedulingEnergy-efficiencyFixed[101]
Centralized
range-based
localization
FixedMulti-hopsNoRoutingEnergy-efficiency
and network delay
[105]
DEEFixedMulti-hopsNoRoutingEnergy-efficiency
and reducing
unnecessary traffic
The CH nodes is
selected according to the
ratio between remaining
energy of a node and
distance
[106]
OLMSMovedMulti-hopsYesRoutingEnergy-efficiencyThe best location of
the MS based on the
minimum energy cost for
data delivery of CHs
[108]
TBMSMovedMulti-hopsYesRoutingEnergy-efficiencyThe CH is closed
node to the BSs
[61]
EIGRFixedMulti-hopsNoRoutingReducing energy
consumption and interference
[112]
TH-SSMulti-hopsNoRoutingEnergy harvesting
from interference
[114]
LPWANMulti-hopsNoRoutinglong range communication
and low power consumption
[118]
Handling Failures
of Static Sensor
Nodes
Fixed
and Moved
Multi-hopsNoRoutingEnergy-efficiency[116]
BCHFixedMulti-hopsNoRoutingEnergy-efficiencyCreate backup CH node
for the original one
[119]
DSPMulti-hopsNoRoutingThe network
traffic performance
[122,123]
CHRAFixedMulti-hopsNoRoutingEnergy-efficiency
and network traffic performance
Randomly[124]
EERHFixedMulti-hopsNoRoutingEnergy-efficiency[127]
GCEECFixedMulti-hopsNoRoutingReduced data traffic
and Energy-efficiency
The CH node is selected
from the centroid position
[129]
AODVMulti-hopsNoRoutingEnergy-efficiency[125]
DSRMulti-hopsNoRoutingEnergy-efficiency[126]
SPTFixedNoSchedulingEnhancing service
response time and minimizing
the overall energy consumption.
Randomly[120]
EDFFixedNoSchedulingEnergy-efficiency[134,135,136]
NJNSingle hopNoSchedulingReduce latency[137]
Dual core
processor
Single hopNoSchedulingReduce latency and
Energy-efficiency
[138]
TSCHFixedMulti-hopsNoRoutingImproving low latency
and duty cycle and thus
utmost power efficiency.
[142]
Clustering
algorithm
FixedMulti-hopsNoRoutingEnergy-efficiencyRandomly[145]
EIFSFixedMulti-hopsNoRoutingEnergy-efficiencyRandomly[144]
LHFixedMulti-hopsNoSchedulingEnergy-efficiencyThe CH is closed
node to the BS.
[121]
SPLLFixedMulti-hopsNoRoutingEnergy-efficiencyThe CH is closed
node to the BS.
[46]
EEBCDAFixedMulti-hopsNoRoutingEnergy-efficiencyThe CH node keeps
on rotating in each
cluster.
[155]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Farhan, L.; Hameed, R.S.; Ahmed, A.S.; Fadel, A.H.; Gheth, W.; Alzubaidi, L.; Fadhel, M.A.; Al-Amidie, M. Energy Efficiency for Green Internet of Things (IoT) Networks: A Survey. Network 2021, 1, 279-314. https://doi.org/10.3390/network1030017

AMA Style

Farhan L, Hameed RS, Ahmed AS, Fadel AH, Gheth W, Alzubaidi L, Fadhel MA, Al-Amidie M. Energy Efficiency for Green Internet of Things (IoT) Networks: A Survey. Network. 2021; 1(3):279-314. https://doi.org/10.3390/network1030017

Chicago/Turabian Style

Farhan, Laith, Rasha Subhi Hameed, Asraa Safaa Ahmed, Ali Hussein Fadel, Waled Gheth, Laith Alzubaidi, Mohammed A. Fadhel, and Muthana Al-Amidie. 2021. "Energy Efficiency for Green Internet of Things (IoT) Networks: A Survey" Network 1, no. 3: 279-314. https://doi.org/10.3390/network1030017

APA Style

Farhan, L., Hameed, R. S., Ahmed, A. S., Fadel, A. H., Gheth, W., Alzubaidi, L., Fadhel, M. A., & Al-Amidie, M. (2021). Energy Efficiency for Green Internet of Things (IoT) Networks: A Survey. Network, 1(3), 279-314. https://doi.org/10.3390/network1030017

Article Metrics

Back to TopTop