Next Article in Journal
The Transformer Bridge Principle Circuit Using RF Admittance Technology
Next Article in Special Issue
A Deep Anomaly Detection System for IoT-Based Smart Buildings
Previous Article in Journal
Growth Monitoring and Yield Estimation of Maize Plant Using Unmanned Aerial Vehicle (UAV) in a Hilly Region
Previous Article in Special Issue
Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs

1
Computer Science Department, Faculty of Computers and Artificial Intelligence, Benha University, Benha 13513, Egypt
2
Unit of Scientific Research, Applied College, Qassim University, Buraydah 52571, Saudi Arabia
3
Computer Science Department, University of Sharjah, Sharjah 27272, United Arab Emirates
4
Mathematics Department, Zagazig University, Zagazig 44523, Egypt
5
Department of Computer Science, College of Science and Arts, Qassim University, P.O. Box 931, Buridah 51931, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(12), 5433; https://doi.org/10.3390/s23125433
Submission received: 12 April 2023 / Revised: 24 May 2023 / Accepted: 4 June 2023 / Published: 8 June 2023
(This article belongs to the Special Issue Ambient Intelligence Based on the Internet of Things)

Abstract

:
Wireless Sensor Networks (WSNs) have been successfully utilized for developing various collaborative and intelligent applications that can provide comfortable and smart-economic life. This is because the majority of applications that employ WSNs for data sensing and monitoring purposes are in open practical environments, where security is often the first priority. In particular, the security and efficacy of WSNs are universal and inevitable issues. One of the most effective methods for increasing the lifetime of WSNs is clustering. In cluster-based WSNs, Cluster Heads (CHs) play a critical role; however, if the CHs are compromised, the gathered data loses its trustworthiness. Hence, trust-aware clustering techniques are crucial in a WSN to improve node-to-node communication as well as to enhance network security. In this work, a trust-enabled data-gathering technique based on the Sparrow Search Algorithm (SSA) for WSN-based applications, called DGTTSSA, is introduced. In DGTTSSA, the swarm-based SSA optimization algorithm is modified and adapted to develop a trust-aware CH selection method. A fitness function is created based on the nodes’ remaining energy and trust values in order to choose more efficient and trustworthy CHs. Moreover, predefined energy and trust threshold values are taken into account and are dynamically adjusted to accommodate the changes in the network. The proposed DGTTSSA and the state-of-the-art algorithms are evaluated in terms of the Stability and Instability Period, Reliability, CHs Average Trust Value, Average Residual Energy, and Network Lifetime. The simulation results indicate that DGTTSSA selects the most trustworthy nodes as CHs and offers a significantly longer network lifetime than previous efforts in the literature. Moreover, DGTTSSA improves the instability period compared to LEACH-TM, ETCHS, eeTMFGA, and E-LEACH up to 90%, 80%, 79%, 92%, respectively, when BS is located at the center, up to 84%, 71%, 47%, 73%, respectively, when BS is located at the corner, and up to 81%, 58%, 39%, 25%, respectively, when BS is located outside the network.

1. Introduction

In recent years, IoT has emerged as one of the most prominent areas of research where researchers hope to take control of daily activities through the Internet and improve the quality of life [1,2,3,4,5,6]. Various technological objects from the environment (e.g., cars and smartphones) are included in IoT [7,8]. With the integration of computational capabilities, it has become capable of achieving a huge leap in a variety of applications including home, military, healthcare, entertainment, and many other disciplines [9,10,11]. The Wireless Sensor Network (WSN) is the base technology underpinning the IoT, which has recently sped up advancements in several applications [12,13,14,15,16,17,18]. WSN can be comprehended as a contemporary information technology that integrates a variety of components, such as sensors, wireless communication, distributed data processing, and low-power embedded components, into a single system. In a WSN, there are many low-cost Sensor Nodes (SNs) that can detect, monitor, and gather environmental data in real time. These SNs can be static or dynamic. The self-organization and collaboration of WSNs have opened up a variety of real-time application possibilities including military, disaster relief, and emergency services that demand real-time information for effective planning and coordination [19]. Many applications, such as disaster recovery, video conferencing, and emergency treatment, have witnessed the considerable use of WSNs. The primary benefits of the WSN are its low price and distributed intelligence. It saves costs on installation and maintenance since it uses inexpensive wireless devices [20]. The IoT combines a number of technologies, including big data, WSN, and cloud computing [21,22]. Sensing, collecting, storing, and transmitting data to the Base Station (BS) are the main tasks of the IoT elements [23,24]. Data collection from large WSNs is a major obstacle for the development of IoT technology [25,26]. Therefore, it is required to find creative ways that extend the lifetime of the networks [27,28].
Clustering is a logical way of arranging SNs into different groups called clusters based on various pre-defined criteria that may include network load balancing, optimizing resource consumption, Quality of Service (QoS), etc., for optimal energy usage and an enhanced WSN lifetime. By electing an energy-aware CH, the network lifetime can be extended. Many research papers have investigated how the energy parameter affects CH selection, cluster construction, and data routing. Given the fact that the data is transferred over CHs, the level of security of the CHs must also be considered because of the possibility of malicious nodes which have a tendency to drop and reroute data, lowering data delivery rates and network accuracy. In addition to serving a crucial function, CHs are often the key targets of attackers, and once they are compromised, the cluster and its data become untrustworthy. A number of studies have worked on WSN security and malicious node identification by utilizing trust-based approaches due to the fact that the trust-based methods are found to be successful in ensuring WSN security [29]. A trust management strategy is an appropriate approach to identify faulty or malicious nodes in WSNs since it provides robustness to the network and ensures secure data delivery and resource sharing [30,31,32].
The significance of trust management in WSN can be illustrated by considering the scenario of electing a malicious node as a CH. All cluster members (CMs) that depend on that CH for packet delivery will indeed be negatively impacted. Malicious nodes will compromise the integrity of the data. In addition, the network’s overall performance depends heavily on determining the suitable CHs with enough remaining energy. Therefore, it is demanded that a clustering technique should consider the trustworthiness of nodes as well as energy consumption in order to achieve improved data security, efficiency, and reliability.
The goal of this study is to create a trust-based clustering approach for WSN-based applications. This work proposes an energy-efficient and safe CH selection mechanism based on SSA for providing trust-enabled data gathering in WSNs. We develop a clustering technique with trust management that takes into account the energy usage and the trustworthiness of nodes in order to achieve improved data security since the overall performance of the network depends on selecting trustworthy CHs with sufficient residual energy. A general architecture of DGTTSSA is shown in Figure 1.
The main contributions of this work can be enumerated as follows:
  • We employ a new procedure that dynamically changes the trust and energy threshold values in order to be aware of the changes in the WSN during round operations.
  • We propose a new fitness function for CH election that takes into account remaining energy and trust values, weighted by the number of sensor nodes and adhering to threshold conditions.
  • For the efficient election of CH, the SSA, as one of the Swarm Intelligence optimization approaches, is modified and employed.
  • A comprehensive comparison between our proposed DGTTSSA approach with existing state-of-the-art clustering algorithms is provided.
The remainder of the paper is organized as follows: Section 2 provides the literature review of related algorithms, Section 3 gives the necessary preliminaries, and Section 4 details the proposed DGTTSSA. Section 5 presents the experimental results of DGTTSSA. Finally, Section 6 concludes the paper.

2. Related Work

Much research attention has been paid to the development of effective methods that improve the data-gathering efficiency of WSNs [33,34,35,36,37]. The routing method must satisfy diverse needs including QoS, minimal delay, security, and energy efficiency. In recent years, the use of trust-enabled data collection techniques has been recognized as a successful strategy for enhancing the security and data collection capabilities of WSNs.
For identifying the trustworthy nodes, the authors of [38] employed a random repeat method. The authors of [39] suggested a trust-based method (ETOR) with a hybrid objective function to assess the accuracy of nodes in distinguishing hostile nodes from normal nodes. The two primary parts of this algorithm are to choose reliable nodes with the help of a tolerance constant, and then to designate opportunistic nodes among the reliable nodes to perform routing. The authors of [40] provided a realistic trust-based routing approach to combat malicious nodes. The suggested method (TASRP) is a multi-factor routing approach that uses path length, residual energy, and node trust scores to generate energy-efficient routing paths between trustworthy nodes. The use of trustable nodes for data forwarding and reduced energy usage are both facilitated by this multi-factor technique. Another trust-based approach for WSNs using an adaptive GA, known as TAGA, is proposed in [41]. The method has been demonstrated to be effective in defending against special trust attacks and typical routing attacks. Furthermore, it minimizes energy consumption during data transmission in WSN.
Enhanced network lifetime requires both security and energy efficiency to be taken into account in WSN-based IoT designs. Energy limitations can be addressed by clustering the sensor nodes. It has become increasingly important to have trust in sensor data used for mission-critical IoT applications. A fuzzy-based trust aware method (TEEFCA) is proposed in [42] as an energy-efficient and secure clustering-based routing strategy for addressing these problems. To extend the WSN lifetime, which is an NP-hard issue, numerous meta-heuristic clustering techniques have been developed. An energy- and data-trust model is proposed in [43] for detecting untrusted nodes in clusters. Moreover, stochastic fractal search optimization is incorporated into the clustering protocol to optimize the WSN lifetime. Because the removal of the aggressor nodes has a striking effect on the network performance, an efficient routing through the node stability trust evaluation is proposed in [44]. The trust-based routing approach (TBSEER) in [45] addresses the issues of conventional trust management systems, which are only built to take into account one sort of assault and lack the capacity to swiftly detect untrusted nodes. The TBSEER creates a comprehensive trust value that is resistant to black holes, sinkholes, selective forward and hello flooding using adaptive trust (indirect and direct), and energy trust values.
To overcome the drawbacks of clustering techniques, such as a shortened CH lifetime, a WSN solution must consider the optimization of routing protocols, trust management, and CH selection strategies effectively. To this end, a Cuckoo search optimization algorithm is presented in [46] to enhance the confidence level and lifetime of the WSN. This algorithm uses type-2 fuzzy logic and clustering to achieve the optimal results. A unique hybrid approach to optimize the CH selection process is developed in [47] by taking into account the energy, delay, QoS, separating distance, and trust (indirect and direct). In [48], a Reliable CH selection method utilizing energy and trust-integrated semi-markov predictions with the goal of prolonging the lifespan of WSNs is proposed (RCHST-IETSMP). For an efficient CH election, the suggested RCHST-IETSMP integrated two key parameters related to trust and energy. Using deep learning and meta-heuristics, Ref. [49] adopted the trust-aware CH selection protocol in WSNs. This algorithm selects the optimal CH using a multi-objective function in terms of trust, delay, energy, and distance. For routing data packets in a secure path, a Particle-Water Wave Optimization (P-WWO) method is proposed in [50], which is an integration of PSO and WWO. To address the security issues in routing, Ref. [51] introduced a trust-enabled secure method enhancing LEACH (STELR). Emperor Penguin Optimization (EPO) is utilized to determine the CH for data aggregation. The LEACH, ACO, and ECC algorithms are integrated in [52] to determine the CHs and reduce cluster energy usage. TE-MHOA is proposed in [53] to improve the WSN lifetime by utilizing an energy and trust-aware multi-objective hybrid optimization algorithm.
Reputation and trust are heavily influenced by probability distribution functions. A trust model is developed in [54] for clustered routing in WSN. The calculation of trust values has been done using probability distribution functions and metaheuristic algorithms. By employing an efficacious clustering and CH decision process, Ref. [55] enhanced the energy efficiency as well as the network lifetime. In this process, CHs are chosen by examining the node residual energy and the distance to the BS. The protocol LEACH-TM proposed in [56] is a clustering protocol based on LEACH and relies on trust management. By taking into account the CH nodes count, remaining energy, and density of neighbor nodes, LEACH-TM enables a better energy load balance and transmission reliability among the nodes. The work in [57] minimized the possibility of a malicious node becoming the CH by creating an efficient and reliable trust mechanism. The overhead associated with calculating trust is also reduced. The study in [34] examined how battery power consumption was affected and lowered when normal nodes choose appropriate CHs with close proximity to the BS, and developed a method by improving LEACH for effective clustering. The results reveal an improved performance in extending the network’s lifetime. The work in [58] presented a trust-based security method based on Elephant Herd Optimization (EHO), which is a metaheuristic method that solves optimization problems based on elephant herding behaviors in clans. The suggested routing strategy chooses the best secure paths for data transmission based on trust values. In order to perform safe and energy-aware clustering, a hybrid Moth Flame Optimization (MFO) and GA-based strategy termed eeTMFOGA is introduced in [37]. eeTMFOGA uses the advantages of MFO to choose CHs among SNs. An objective function that considers average cluster distance, node density, remaining energy, and trust characteristics is used to select the CHs. In [59], the optimum CH selection and the secure path formation between the target nodes are achieved using a trust-aware method based on Multi-objective Black Widow Optimization (TC-MBWO). The CH selection and generation of a secure data transmission path are achieved using a number of factors, including the degree of nodes, distance, remaining energy, and trust. Moreover, the TC-MBWO takes trust into account to lessen hostile attempts during data transfer.
In contrast to the existing methods, the proposed DGTTSSA modifies and adapts the swarm-based SSA optimization algorithm to develop a trust-aware CH selection method. We employ a procedure that dynamically changes the trust and energy threshold values in order to be aware of the changes in the WSN during round operations. Based on the node’s trust value and residual energy, this work proposes a new energy-efficient and secure CH election mechanism for WSN-based applications.
A comparison of previous literature studies and the proposed DGTTSSA is given in Table 1.

3. Preliminaries

This section discusses the problem formulation, followed by the system model, energy model, and trust model used in the proposed work.

3.1. Problem Formulation

The clustering concept works by electing CHs among the SNs. These CHs then gather information from the CMs of their cluster, perform data aggregation, and then report the resultant data to the sink. However, being a CH could consume a considerable amount of energy. As a result, rotating the CH role could provide significant energy savings. The ability to control the energy distribution in a network in order to guarantee a long lifetime for the network is among the most crucial aspects for determining the efficacy of a clustering protocol for distributed WSNs. Designing a protocol capable of uniformly distributing energy within a network is not an easy task. On the other side, in cluster-based WSNs, security is an important and challenging topic. A WSN may have both malicious and normal nodes. The malicious (or compromised) nodes can act as CHs, thereby compromising the network performance. As a result, determining which SN is the most trusted by all CMs is, therefore, one of the most challenging aspects while selecting a CH.
This research aims to provide a trust-based CH selection approach for WSN that not only increases the WSN’s lifetime but also assures that the resources in the WSN are used effectively and efficiently by devising a protocol that can distribute energy consumption evenly across all nodes.

3.2. System Model

The development of the proposed framework is guided by the following considerations. We assume that n SNs are distributed uniformly in an area R of dimension A × A and a fixed BS. Assumptions used to build the network are as follows:
  • The SNs are capable of self-localization [60,61,62].
  • All SNs are static, and each SN has a unique ID.
  • SNs are assumed to have the ability to communicate and listen to their neighbors within their communication range for the purpose of trust evaluation.
  • An individual CH is responsible for each cluster management, which is awake during each round of operation.
  • CHs receive data from SNs about the environment (such as humidity or temperature).

3.3. Energy Model

SNs in a cluster are required to use energy for transmitting data, and each CH is required to use energy for data transmission, processing, and reception. In addition, the amount of energy required for data communication varies with distance. The energy model we used is similar to the one employed in a number of research works [33,34,35,36,63]. The expended radio power details for transmitting and receiving a message are given in the Equations (1) and (2), where the message size is l b i t s and distance is d.
E T x ( l , d ) = l E e l e c + l ϵ f s d 2 d < d 0 l E e l e c + l ϵ m p d 4 d d 0
E R x ( l ) = l E e l e c
The parameters used for the simulated model are: E e l e c = 50 nJ/bit, ϵ f s = 10 pJ/bit/m 2 , ϵ m p = 13 1000 pJ/bit/m 4 , d 0 = ϵ f s ϵ m p .

3.4. Trust Model

This section explains how the trust value of each SN in the network is determined. It is based on the work in [36]. The different steps executed in the trust model during the first round and the subsequent rounds are shown in Figure 2. As evident from Figure 2, the setup process for trust value calculations starts in the first round (Round 1). In this process, each node monitors its neighbor nodes’ behavior and calculates its neighbors’ trust values based on specific metrics that are determined and adjusted according to the required application. Then, each node sends the calculated trust values to the BS. Following that, the BS divides the nodes into clusters. For the process in the subsequent rounds (Round i), the nodes have been divided into CHs and CMs. Each CM computes the trust value about its neighbors in the same cluster and sends the computed value to its CH. Additionally, the CH computes the trust value of each CM. Then, each CH collects the trust values from its CMs and computes the final trust value of its CMs.
Each SN’s trust value is computed in two tiers on the basis of the trust model. The node tier is the first tier where nodes receive SN and CH trust values. Then, the trust value is determined as the second layer (i.e., the BS tier).
  • Trust computation at node tier: The SNs monitor their neighbors’ behavior using a variety of trust metrics. The priority of each metric is determined by the weights allocated to each trust metric (the sum of the weights being equal to 1). According to Equation (3), SN j determines the first-hand trust for SN i.
    F H ( j , i ) = k = 1 ł w k t k ( j , i )
    where l represents the total number of trust metrics or parameters, w k denotes the weight associated with metric k, t k ( j , i ) denotes the trust value set on metric k by SN j for SN i, and
    k = 1 ł w k = 1
    The respective CH receives the calculated first-hand trust from each SN. The CH aggregates the trust results and determines the aggregated value of trust for each CM in its cluster based on the formula below:
    C T ( i ) = 1 b r = 1 b F H ( r , i )
    where b refers to the count of SN i’s neighbors, and F H ( r , i ) represents the direct trust value computed by SN r for SN i.
    Additionally, CH computes the first-hand trust value of each CM using Equation (3). Finally, the overall trust value ( O T ) of a CM is determined using the equation below, where w a and w b are the weights, and w a + w b = 1 .
    O T ( i ) = w a F H ( C H , i ) + w b C T ( i )
  • Trust computation at BS tier: The trust values computed by SNs are sent to the BS, which aggregates them using Equation (5). Finally, the BS determines whether an SN is trustworthy based on a user-defined threshold. Additionally, users will assess the accuracy of the received data from each CH at the BS. If the data is accurate, the respective trust values for CH and CMs are increased.

4. Data Gathering Technique Based on Trust and Sparrow Search Algorithm

This section provides our proposed DGTTSSA for trust-aware data gathering in WSN. DGTTSSA uses and modifies the SSA for the efficient clustering of WSN.

4.1. Proposed DGTTSSA

Clustering can be regarded as an optimization problem because it seeks to identify a solution among all potential solutions. In an optimization problem, the objective function is maximized or minimized to discover the optimum solution for a complex problem.
Meta-heuristic algorithms are one of the promising methods for resolving such optimization issues. SSA is a meta-heuristic method that can be employed to solve the clustering problems in a WSN. SSA [63] was designed in 2020 to simulate the social behavior of sparrows. In real-world applications, SSA can be used to solve various problems [64]. The SSA population is split into producer and scrounger groups with respect to the foraging behavior of sparrows. Food sources are identified by the producer group, whereas the scrounger group is involved in collecting the food from the producer group. When the sparrow identifies a predator, it generates an alarm, and whenever the alarm value surpasses the threshold for safety, the producers must guide all scroungers toward a safe zone. In the event of danger, the sparrows at the edge of the group fly quickly toward the safe area, whereas those in the center of the group move randomly to be close to one another. The details about the SSA framework can be found in [63,64].
The DGTTSSA clustering is based on SSA and the trust model provided in Section 3.4.
DGTTSSA includes two processes: CH election and Cluster creation. The clustering process is restarted after a period of time if one or more CHs exhaust their energy and the energy level falls below a user-defined threshold.
The DGTTSSA clustering process can be summarized as follows:
  • The BS starts the CH selection operation by broadcasting a request message to each node asking it to send its ID and neighbor list along with its estimated trust value and energy level.
  • The BS determines the final trust value based on the trust values that are gathered from each node.
  • The required number of CHs (k) is determined by the BS and is updated during network operations by considering the current count of alive nodes l and the required percentage p of CHs, where k = l × p .
  • The candidate’s information list is generated by the BS, which includes the node ID, remaining energy, final trust value, and neighbors count.
  • The BS calculates the threshold of residual energy E t h using the Equation (8), and calculates the trust threshold T t h using the Equation (9).
  • Using the DGTTSSA clustering algorithm, the BS selects the set of trusted nodes to work as CHs in the network.
  • After the selection operation of the CHs, the nearest nodes from each of the elected CHs (that are not CHs) are chosen by the BS to be the CMs for that CH.
  • Nodes designated as CHs receive a message informing them of their selection, while the non-CH nodes receive a message informing them of their CHs.
  • The data collection operation is started by CMs, where CMs deliver the sensed data to their respective CH regularly. Each CH aggregates and transmits the aggregated data to the BS. For the data accuracy review process, the CH includes its ID and each CM’s ID along with the sensed data during the data collection operation.
  • The clustering process is restarted by the BS after a period of time if one or more CHs exhaust their energy and the energy level falls below the threshold. Following steps two to seven, each CH submits relevant information about its cluster to the BS so that the BS can conduct the election process and select the new CHs based on that information.
The subsequent sections provide the different procedures that are employed in DGTTSSA. First, we present the formulation of the fitness function for the DGTTSSA clustering process. Following that, the threshold calculations, initialization procedure, and fix sparrow procedure are explained. Finally, we discuss the working of the proposed DGTTSSA clustering algorithm in detail.

4.1.1. DGTTSSA Fitness Function

CHs in DGTTSSA are chosen based on two factors: (i) trust value and (ii) residual energy. The lowest fitness value is regarded to be the best solution, meaning that we are optimizing in order to minimize the fitness function values. The proposed fitness function is given below.
F = ( e x p ( i = 1 k R E i ) 1 C R + 1 + e x p ( i = 1 k T R i ) 1 C T + 1 ) 1 C R T + 1 .
where CR is defined as the count of CHs that have an energy equal to or higher than the residual energy (RE) threshold. CT is defined as the count of alive CHs that have a trust value equal to or higher than the trust threshold. CRT is defined as the count of CHs that satisfy both of the thresholds. TR represents the trust value, R E i represents the RE of node i, and k is the CH count.
The fitness function is designed to evaluate the SSA solutions during the CH election process by considering the remaining energy and trust value factors. One of the following four cases could represent the solution:
  • CHs have energies below the energy threshold and the trust values are below the trust threshold.
  • CHs have energies that satisfy the energy threshold and the trust values are below the trust threshold.
  • CHs have energies below the energy threshold and the trust values satisfy the trust threshold.
  • CHs have energies that satisfy the energy threshold and the trust values satisfy the trust threshold.
To correctly evaluate these cases, the energies and trust values of the CHs in a solution are weighted by the number of sensor nodes that satisfy each threshold and satisfy both of the thresholds. Since the lowest fitness value is regarded to be the best solution, case 1 will have the largest fitness value and case 4 will have the lowest value.

4.1.2. Threshold Calculation

Equations (8) and (9) provide a tiny decrease in the trust threshold over time compared to the decrease in the energy threshold. The goal of these equations is to form dynamic thresholds that are used in each iteration in order to adapt to the changes in the network during round operations.
The trust and energy thresholds are given by the following formula:
E T H = E T H m a x E T H m a x t m a x × ( t + 1 )
where E T H is the energy threshold, E T H m a x is the maximum threshold value (we use E T H m a x = 0.05 ), the maximum iterations count is t m a x , and the current iteration is t.
T T H = T T H m a x a × T T H m a x t m a x × t
where T T H is the trust threshold, a [ 0 , 1 ] is a small constant (we use a = 1 ( E c u r r e n t / E T o t a l ) ), T T H m a x is the maximum threshold value (we use T T H m a x = 0.50 ), and E c u r r e n t and E T o t a l are the current and initial total energy values, respectively.

4.2. Initialization Procedure

SSA uses a random initializer that is not aware of trust and energy. Therefore, instead of relying solely on SSA’s random initializer that is ignorant of trust and energy, we use an Initialization Procedure (IP) that is aware of trust and energy, and generates a range of solutions for initializing the population. In our procedure, a random value r n [ 0 , 1 ] is assigned to each SN in WSN. If the assigned value r n T , that node is considered a non-CH node, where T is defined by the Equation (10). Otherwise, the node has the chance to be elected as a CH. Algorithm 1 describes the Initialization Procedure. Using this procedure, the population size (Ps) can be adjusted to initialize a part of the population; we set 40% of the population as using the initialization procedure and the remaining as using the random initializer of SSA.
T ( n ) = p × T R i ( 1 p × ( r m o d ( p 1 ) ) ) × ( E r a t i o )
where p denotes the desired percentage of CHs, r represents the sparrow number, [ E r a t i o = E i E i n i t ] is the energy ratio, E i and E i n i t denote the current and initial energy of node, respectively, and T R i is the final trust value.
Algorithm 1 Initialization Procedure.
1:
Input: Size of the population P s , p denotes the desired percentage of CHs, Number of sensor nodes n, List of candidate’s information (e.g., Node ID, Energy, and Trust)
2:
Output: Initialized population
3:
for  r = 1 : P s  do
4:
   Initialize x r as zeros {Initialize position of sparrows as zeros}
5:
   tleft = mod(r,1/p);
6:
   for  i = 1 : n  do
7:
     if S(i).rleft > 0 then
8:
        S(i).rleft = S(i).rleft-1;
9:
     end if
10:
     if  S ( i ) . E > 0 and S(i).rleft == 0 then
11:
        Generate a random number r n .
12:
        Compute the value of threshold T(n) based on Equation (10)
13:
        if  T ( n ) r n  then
14:
           x ( r , i ) = 1 likely to be CH
15:
          S(i).rleft = 1/p-tleft;
16:
        else
17:
           x ( r , i ) = ( 0.5 ) × r a n d ( 1 , 1 )
18:
        end if
19:
     end if
20:
   end for
21:
end for
22:
Return x(Population)

4.3. Fix Sparrow Procedure

This procedure is to fix each sparrow S to satisfy the boundary conditions such that for each v S , v [ l b , u b ] , and to have the correct number of required CHs k, where u b is the upper boundary and l b is the lower boundary, respectively. The fix sparrow procedure is described in Algorithm 2. In Steps 3–5, correcting the sparrow values that go beyond the boundary is done by assigning the values r a n d ( 0 , 1 ) × ( u b l b ) + l b to each value that goes beyond the boundary. In Steps 7–12, reset the CHs count in a sparrow to preserve only the required k CHs.
Algorithm 2 Fix sparrow procedure.
1:
Input: sparrow X, required k CHs
2:
Output: sparrow X containing k number of 1’s
3:
if value v in X goes beyond the boundary lb, ub then
4:
   rest v to r a n d ( 0 , 1 ) × ( u b l b ) + l b
5:
end if
6:
c = the number of values that greater than 0.5 in X.
7:
if c > k then
8:
   Randomly reset c k values that are greater than 0.5 in X to a random value [ 0 , 0.5 ]
9:
end if
10:
if c < k then
11:
   Randomly reset k c values that are less than or equal 0.5 in X to 1.
12:
end if
13:
Return X

4.4. DGTTSSA Clustering Algorithm

This section discusses the proposed DGTTSSA clustering algorithm. In addition to maximizing the WSN lifetime, the algorithm seeks to choose the most trustworthy nodes to serve as CHs. For SSA, a real-valued representation of each sparrow is considered, where the upper boundary equals one and the lower bound is zero, i.e., each value in a sparrow [ 0 , 1 ] . The index denotes node ID and the CH is denoted by a value that is greater than 0.5. On the other hand, non-CH nodes are represented by a value that is less than or equal to 0.5. SSA is adapted in the DGTTSSA clustering algorithm for CH selection, and the fitness function given by Equation (7) is employed to evaluate each generated solution. The lowest fitness value of a solution indicates that this solution is the best one. The flowchart of the DGTTSSA clustering is shown in Figure 3.
The DGTTSSA clustering algorithm is provided in Algorithm 3. The steps involved are given as follows:
  • Initially, the required parameters are set: the percentage of CHs (p), the SNs count (n), the remaining energy threshold ( E t h , given by Equation (8)), the trust threshold ( T t h given by Equation (9)), and the maximum iterations (T). Set the SSA parameters that include the maximum iterations’ count, number of sparrows (n), producers’ count, danger sparrows’ count, alarm value, and threshold for safety.
  • Initialize the sparrow positions to create a search space randomly and by calling the initialization procedure (Algorithm 1).
  • Check the generated solutions for infeasibility and fix accordingly by calling the fix sparrow procedure (Algorithm 2).
  • Using Equation (7), compute the fitness values for each solution.
  • Obtain the best sparrow solution ( b e s t _ s o l u t i o n ) and the corresponding fitness value ( b e s t _ f i t n e s s ).
  • Repeat the following steps until T is reached. (Algorithm 3, steps 8–34)
  • Organize the population into producers and scroungers based on each sparrow’s fitness value.
  • Update the position of sparrows using Equations (11)–(13) as follows:
    (a)
    Updating producer’s position ( x i , j t + 1 ) as follows:
    x i , j t + 1 = x i , j t × e x p ( i α × T m a x ) , if R 2 < ST x i , j t + Q × L , otherwise
    where x i , j t denotes the i t h sparrow position in the jth dimension, t is the current iteration, and the maximum iteration is T m a x . α ( 0 , 1 ] is a random number, R 2 [ 0 , 1 ] is the alert value, S T [ 0.5 , 1 ] is the threshold for safety, and Q is a normal-distributed number.
    (b)
    Updating position of the scroungers ( x i , j t + 1 ): The rest of the population are scroungers, and their positions are updated as follows:
    x i , j t + 1 = Q × e x p ( x w o r s t t x i , j t i 2 ) , if i > n / 2 x P t + 1 + | x i , j t x P t + 1 | × A + × L , otherwise
    where x p refers to the producer’s best position, and the worst position is x w o r s t . A + = A T ( A A T ) 1 is a 1 × d matrix.
    (c)
    Following the position update of the population, several sparrows are chosen to serve as scouts who identify and alert the rest of the population. They usually constitute 10–20% of the entire sparrow population. Accordingly, the position update equation is given as follows:
    x i , j t + 1 = { x b e s t t + β · | x i , j t x b e s t t | , if   f i > f g x i , j t + K · ( | x i , j t x w o r s t t | ( f i f w ) + ϵ ) , if   f i = f g
    where x b e s t gives the current global optimal position, and the random number β follows a normal distribution with the mean = 0 and variance = 1. f g , f w , and f i are the global best, worst, and current fitness, respectively; the random number K [ 0 , 1 ] and ϵ > 0 is a constant. When f i > f g , sparrows located at the border of the population are more vulnerable to attacks, whereas the sparrows located at the middle of the population are more likely to avoid predators by staying close to their neighbors when f i = f g .
  • Check the generated solutions for infeasibility and do fixes by calling the fix sparrow procedure (Algorithm 2).
  • Using Equation (7), compute the fitness values for each solution.
  • Obtain the best solution for the current iteration (Algorithm 3, steps 27–32).
  • Update the best solution b e s t _ s o l u t i o n and its fitness value b e s t _ f i t n e s s if the current solution is better.
  • Go to step 6.
  • Finally, the best-selected CHs are returned ( b e s t _ s o l u t i o n and b e s t _ f i t n e s s ).
Algorithm 3 DGTTSSA clustering algorithm.
1:
Input: SSA parameters, network parameters.
2:
Output: b e s t _ f i t n e s s and b e s t _ s o l u t i o n .
3:
Initialize the sparrow population position randomly and using initialization procedure (IP) {Each sparrow represents a solution} (Algorithm 1)
4:
Fix infeasible solutions using the fix sparrow procedure (Algorithm 2).
5:
Evaluate population using fitness function Equation (7).
6:
Set b e s t S o l u t i o n = individual’s best position
7:
Set b e s t F i t n e s s = individual’s best fitness
8:
while  t T  do
9:
   Arrange the sparrows into producers and scroungers according to their fitness value.
10:
   {Update sparrows position}
11:
   Set r2 to a random number.
12:
   for i = 1 : pd do
13:
     Position update for producers using Equation (11).
14:
   end for
15:
   Fix infeasible solutions using the fix sparrow procedure (Algorithm 2).
16:
   Evaluate population using fitness function Equation (7).
17:
   for i = (pd + 1) : n do
18:
     Position update for scroungers using Equation (12).
19:
   end for
20:
   Fix infeasible solutions using the fix sparrow procedure (Algorithm 2).
21:
   Evaluate population using fitness function Equation (7).
22:
   for l = 1 : sd do
23:
     Position update for the sparrows in danger using Equation (13).
24:
   end for
25:
   Fix infeasible solutions using the fix sparrow procedure (Algorithm 2).
26:
   Evaluate population using fitness function Equation (7).
27:
  {Get and Update the best solution}
28:
   Get the best sparrow ( C u r r e c n t B e s t S o l u t i o n ) and the best sparrow’s fitness ( C u r r e n t B e s t F i t n e s s )
29:
   if  C u r r e n t B e s t F i t n e s s is better than b e s t F i t n e s s  then
30:
       Set b e s t S o l u t i o n = C u r r e c n t B e s t S o l u t i o n
31:
       Set b e s t F i t n e s s = C u r r e n t B e s t F i t n e s s
32:
   end if
33:
   t = t + 1
34:
end while
35:
Return b e s t _ s o l u t i o n and b e s t _ f i t n e s s .

4.5. Complexity Analysis

In this section, we provide the complexity analysis of DGTTSSA in terms of communication complexity and time complexity using the following Lemmas.
Lemma 1.
O ( n × t × p ) is the overall time complexity of DGTTSSA.
Proof. 
In order to determine the running cost and performance of the algorithm, time complexity is evaluated. SSA is utilized in DGTTSSA for CH selection. If we assume the SSA population size p, the dimension n, and maximum iterations t, then O ( p × t × n ) is the time complexity of the SSA [65,66]. In addition to SSA, DGTTSSA includes a feasibility check and fix step for the generated sparrows. As a result, the DGTTSSA algorithm has O ( t × ( p × n + p × n ) ) = O ( p × t × n ) as the overall time complexity. In the data collection process, nodes transmit data to their respective CHs and the CHs send data to the BS. The time complexity is O ( k × ( n k ) ) for the data collection process, where ( n k ) is the CM count and k < n is the CH count. Therefore, O ( n × t × p ) is the overall time complexity of the proposed DGTTSSA. □
Lemma 2.
O ( n ) is the total communication complexity of DGTTSSA.
Proof. 
  • First, n nodes send their information to the BS, which means the total communication complexity is n.
  • Nodes did not transmit any messages in steps 2–8.
  • As a result of step 9, k CHs are elected and n k nodes operate as CMs without sending messages.
  • Therefore, n + k + ( n k ) is the total messages for steps 1–7.
  • When time t has passed or if one or more CHs have energy levels lower than the defined threshold, the BS initiates steps 2–8 to elect new CHs.
  • In the best case scenario, steps 2–8 are executed only once and the total number of messages will be 2 n .
  • In the worst case scenario, steps 2–8 are executed per round and the total number of messages will be 2 n × r , where r is the number of rounds.
  • Therefore, O ( n ) is the total communication complexity of DGTTSSA.

5. Simulation Results

MATLAB R2016a is utilized as the simulation platform to evaluate the performance of the DGTTSSA approach. The trust value of each node is calculated in the range [ 0 , 1 ] , and the malicious nodes percentage is set to 10%. Node energy values are defined in heterogeneous settings, where 10% of the nodes are advanced nodes with initial energy 1 J and the remaining nodes are set as normal nodes with an initial energy of 0.5 J. The system model is previously presented in Section 3, and different network topologies are created randomly for evaluation. An amount of 100 nodes are scattered randomly in the area of size 100 × 100 m 2 with the BS at the center (50, 50), corner (100, 100), and outside (150, 150). We consider 10% as the initial percent of CHs. Table 2 contains the simulation settings. With the aforementioned settings, we compare the performance of the proposed DGTTSSA approach with that of the existing algorithms: ETCHS [57], eeTMFOGA [37], LEACH-TM [56], and E-LEACH [34], with the trust threshold set to 0.5 and energy threshold set to 0.05, respectively.
The following are the performance metrics used for evaluation:
  • Stability Period (SP): it is defined as the time required for the first node to die [67]; i.e., S P = T 0 T F N D , where T 0 is the time at which the network starts operation and T F N D is the time at which the first node dies.
  • Instability Period (InP): it is defined as I n P = T F N D T L N D , where T F N D is the time at which the first node dies and T L N D is the time at which the last node dies.
  • Network Lifetime: number of nodes that have enough energy to continue their operations.
  • Average residual energy ( E R a v g ) per round: the average remaining energy of nodes per round.
  • Reliability (R): this metric is defined by: R = S P / I n P [67]. A larger value for R indicates good reliability.
  • CHs’ Average Trust Value (ATV): this metric is defined by A T V = 1 r l a s t i = 1 r l a s t T a v g ( r ) , where r is the round number, T a v g = 1 k i = 1 k T ( i ) , T ( i ) is the trust value of CH i, k is the CHs count, and r l a s t is the round number at which network operations end.

5.1. Performance Results of Stability Period and Network Lifetime

Here, we analyze the stability period of each algorithm with the BS at the corner, center, and outside. Figure 4 shows that DGTTSSA’s stability period is significantly longer than ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH in the case when the BS is at the corner and outside. When the BS is at the center, the DGTTSSA’s stability period is shorter than ETCHS by 5%. It can also be noticed that as the BS position changed from inside to outside the network, ETCHS gives the worst stability period. On the other hand, DGTTSSA’s stability period is slightly decreased. Additionally, the results show that the stability period is longer for all algorithms when the BS is at the center when compared to that when the BS is outside the network. This is because of the increased distance from the nodes to the BS.
One of the main goals of clustering is to increase the WSN lifetime. According to the application requirements, the WSN lifetime can be considered in terms of first node dies (FND), half node dies (HND), or the last node dies (LND). Figure 4 shows the FND, HND, and LND of DGTTSSA, ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH for different BS location scenarios. Figure 5 shows the alive nodes count per round of operation. It is clear that DGTTSSA has a good performance in terms of FND and HND for different BS location scenarios. E-LEACH has the worst performance in terms of FND, HND, and LND when the BS location is outside because E-LEACH doesn’t consider energy as a selection factor for the CHs.

5.2. Performance Results of Energy Consumption

In this section, the energy consumption of the network is evaluated for different BS locations. The RE can be used to estimate how network energy is efficiently used. The average remaining energy in WSN is given by E R a v g = 1 n i = 1 n R E i , where n is the total nodes count and R E i is the remaining energy of a node i. Figure 6 shows the E R a v g over rounds when the location of the BS is at the center, corner, and outside. When the BS is positioned at the corner and outside, E R a v g consumption is better in DGTTSSA while ETCHS and E-LEACH are better when the BS is at the center and worse when the BS is at the corner and outside.

5.3. Performance Results of Reliability and Instability

A comparison of the reliability of different algorithms is given in this section with reference to different BS locations. Figure 4 shows the reliability of DGTTSSA, ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH. It is clear that DGTTSSA has an excellent reliability performance for the different BS location scenarios, whereas the least reliability results are for E-LEACH and LEACH-TM. It is also clear that when the BS is at the center, the reliability is higher when compared to the corner and outside BS locations. Minimizing the instability period is always preferable. DGTTSSA improved the instability period when the BS is at the center compared to LEACH-TM, ETCHS, eeTMFGA, and E-LEACH up to 90%, 80%, 79%, and 92%, respectively. When BS is at the corner, up to 84%, 71%,47%, 73% improvement can be noticed. When BS is located outside, the improvement is up to 81%, 58%, 39%, and 25%, respectively.

5.4. Performance Results of CHs Average Trust Value (ATV)

The target of DGTTSSA is to ensure CHs are trustworthy, and this is gained by designing and using a fitness function that selects CHs whose trust values exceed or equals the trust threshold. Figure 4 shows the average trust value for DGTTSSA, ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH. From this figure, it is clear that the ATV of LEACH-TM, ETCHS, and E-LEACH is below the trust threshold value. DGTTSSA gives the best ATV and this is because the fitness function in DGTTSSA assigns more weight to the solutions with CHs that have trust values larger than the threshold value. ETCHS has the worst ATV for the BS at the outside and corner settings, while for the BS at the center scenario, LEACH-TM has the worst ATV.

5.5. Performance Results When Varying the Number of Nodes in WSN

Here, we analyze the impact of increasing the number of nodes in the network on the performance of each algorithm. In this test, the trust value of each node is calculated in the range [ 0 , 1 ] , and the malicious nodes percentage is set to 10%. Node energy values are defined in heterogeneous settings, where 10% of the nodes are advanced nodes with initial energy 1 J and the remaining nodes are set as normal nodes with an initial energy of 0.5 J. The BS is placed at the corner and the number of nodes varied from 100, 200, and 300. Figure 7 shows the stability period influence with a varying number of nodes. From this figure, it is noticed that DGTTSSA has a stability period in all cases of varying numbers of nodes. Moreover, DGTTSSA still has good stability, ATV, and reliability compared with ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH as the number of nodes increased. It is noticed that the stability period of LEACH-TM and E-LEACH has a significant decrease as the number of nodes increased which is due to both of them employing a probability-based function for CHs selection.

5.6. Performance Results When Varying Percentage of Malicious Nodes

Here, we discuss the effect of increasing the percentage of malicious nodes ( P o M N s ) on DGTTSSA, ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH. The P o M N s is varied up to 10%, 20%, and 30% (with BS at the corner) using the same settings presented in Table 2. Figure 8 shows the stability period influence with varying P o M N s values. From this figure, it is noticed that DGTTSSA’s stability period decreases as the P o M N s increases. Moreover, DGTTSSA has better stability than ETCHS, eeTMFOGA, LEACH-TM, and E-LEACH. We can also notice from Figure 8 that the instability period for DGTTSSA and ETCHS increased as the P o M N s increased. Moreover, it is clear that LEACH-TM has the highest instability period followed by ETCHS, E-LEACH, eeTMFOGA, and then DGTTSSA. The relationship between alive nodes’ count over time and the P o M N s is shown in Figure 9. It can be noticed from this figure that when P o M N s is 30%, the nodes die earlier. The effect of the P o M N s on reliability, as given by Figure 8, shows that the reliability is dropped in DGTTSSA as P o M N s is increased. In all P o M N s values, the DGTTSSA has the best performance compared to the others. Moreover, ETCHS and E-LEACH have the least reliability for all P o M N s values. The effect of P o M N s on the ATV illustrated in Figure 8 shows that the ATV value decreases as P o M N s increases. This is because the choices available for electing nodes with a high energy and trust value are decreased; despite this, DGTTSSA picks the CHs whose ATV values are greater than the trust threshold value for all P o M N s values. This is due to the fact that the DGTTSSA’s design considers both energy and trust when evaluating and choosing nodes. Additionally, it can be noticed from Figure 8 that ETCHS and LEACH-TM provide the least ATV for all P o M N s values. From Figure 10, it can be observed that the average residual energy decreases as the P o M N s increases and follows the same pattern.
In summary, Table 3 shows a comparison of the proposed DGTTSSA and other algorithms in terms of FND, HND, LND, ATV, stability, instability, and reliability for different BS locations. Table 4 shows a comparison of the proposed DGTTSSA with others in terms of FND, HND, LND, ATV, stability, instability, and reliability for 10%, 20%, and 30% of malicious nodes. Hard thresholds for trust and energy employed in ETCHS for CH selection have a negative effect on the network lifetime, reliability, and ATV. While LEACH-TM and E-LEACH algorithms adopt a random CH selection mechanism which may increase the probability of electing nodes with low trust values, LEACH-TM employs the trust aware random mechanism and E-LEACH employs a random mechanism that is not trust-aware. Generally, random mechanisms may increase instability periods and reduce reliability and the ATV. Since eeTMFOGA has no threshold for trust values, CHs with lower trust values may be selected. In addition, when the P o M N s increases, it is obvious that nodes with lower trust values are selected. On the other hand, DGTTSSA adapts SSA and is modified by initializing its population with a partially generated population based on a trust-aware random mechanism and with a fitness function designed to be weighted by nodes’ counts that satisfy both energy and trust thresholds. Moreover, DGTTSSA employs dynamic energy and trust thresholds to overcome hard threshold drawbacks that do not reflect the current network state. The benefit of this is an improvement in network lifetime, stability, reliability, and ATV.

6. Conclusions

In this paper, a data gathering technique that employs trust and the Sparrow Search Algorithm for WSN (DGTTSSA) is introduced. In DGTTSSA, the SSA is utilized and modified for secure CH selection. Our fitness function takes two parameters into account: residual energy and trust value, to yield trustworthy and energy-efficient CHs. The modified SSA is used for determining a set of nodes that have better residual energy and trust values to serve as CHs. We employ dynamic threshold values for energy and trust which are adjusted according to the network state. The simulation results show that the DGTTSSA is reliable, more stable, and provides a longer lifetime for the WSN than other methods. In addition, under varying percentages of malicious nodes, DGTTSSA selects the most trustworthy nodes as CHs. As a result, for applications based on WSNs that require safe and efficient clustering, DGTTSSA can be used as a secure and efficacious clustering solution to enable efficient data gathering.

Author Contributions

Conceptualization, W.O., B.A. and A.S.; Methodology, W.O., A.M.K. and A.S.; Software, W.O., B.A. and A.S.; Validation, W.O., A.M.K. and B.A.; Formal analysis, W.O., A.M.K. and A.S.; Investigation, W.O. and A.S.; Resources, B.A.; Data curation, B.A. and A.S.; Writing—original draft, W.O. and A.S.; Writing—review & editing, W.O. and A.M.K.; Visualization, A.S.; Supervision, A.M.K. and B.A.; Project administration, A.M.K. and B.A.; Funding acquisition, B.A. and A.S. All authors have read and agreed to the published version of the manuscript.

Funding

The APC was funded by the Deanship of Scientific Research, Qassim University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Researchers would like to thank the Deanship of Scientific Research, Qassim University for funding the publication of this project.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Oberländer, A.M.; Röglinger, M.; Rosemann, M.; Kees, A.A. Conceptualizing business-to-thing interactions—A sociomaterial perspective on the Internet of Things. Eur. J. Inf. Syst. 2017, 27, 486–502. [Google Scholar] [CrossRef] [Green Version]
  2. Krishnamurthi, R.; Kumar, A.; Gopinathan, D.; Nayyar, A.; Qureshi, B. An Overview of IoT Sensor Data Processing, Fusion, and Analysis Techniques. Sensors 2020, 20, 6076. [Google Scholar] [CrossRef] [PubMed]
  3. Yu, Y.; Tang, K.; Liu, Y. A Fine-Tuning Based Approach for Daily Activity Recognition between Smart Homes. Appl. Sci. 2023, 13, 5706. [Google Scholar] [CrossRef]
  4. Kaur, P.; Kaur, K.; Singh, K.; Kim, S. Early Forest Fire Detection Using a Protocol for Energy-Efficient Clustering with Weighted-Based Optimization in Wireless Sensor Networks. Appl. Sci. 2023, 13, 3048. [Google Scholar] [CrossRef]
  5. Sodhro, A.H.; Sennersten, C.; Ahmad, A. Towards Cognitive Authentication for Smart Healthcare Applications. Sensors 2022, 22, 2101. [Google Scholar] [CrossRef]
  6. Zahid, N.; Sodhro, A.H.; Kamboh, U.R.; Alkhayyat, A.; Wang, L. AI-driven adaptive reliable and sustainable approach for internet of things enabled healthcare system. Math. Biosci. Eng. 2022, 19, 3953–3971. [Google Scholar] [CrossRef]
  7. Khedr, A.M.; Aghbari, Z.A.; Raj, P.P. MSSPP: Modified sparrow search algorithm based mobile sink path planning for WSNS. Neural Comput. Appl. 2022, 35, 1363–1378. [Google Scholar] [CrossRef]
  8. Ejaz, A.; Yaqoob, I.; Gani, A.; Imran, M.; Guizani, M.; Rabbat, M.; Nowak, R. Internet-of-things-based smart environments: State of the art, taxonomy, and open research challenges. IEEE Wirel. Commun. 2016, 23, 10–16. [Google Scholar]
  9. Zheng, J.; Simplot-Ryl, D.; Bisdikian, C.; Mouftah, H.T. The internet of things. IEEE Commun. Mag. 2011, 49, 3031. [Google Scholar] [CrossRef]
  10. Raj, P.V.P.; Aghbari, Z.A.; Khedr, A.M. ETP-CED: Efficient trajectory planning method for coverage enhanced data collection in WSN. Wirel. Netw. 2023. [Google Scholar] [CrossRef]
  11. Balaji, B.S.; Raja, P.V.; Nayyar, A.; Sanjeevikumar, P.; Pandiyan, S. Enhancement of security and handling the inconspicuousness in IoT using a simple size extensible blockchain. Energies 2020, 13, 1795. [Google Scholar] [CrossRef] [Green Version]
  12. Aziz, A.; Osamy, W.; Khedr, A.M.; Singh, K. Energy Efficient Scheme for Data Gathering in Internet of Things based Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 2020, 114, 1905–1925. [Google Scholar] [CrossRef]
  13. Osamy, W.; El-Sawy, A.A.; Khedr, A.M. SATC: A simulated annealing based tree construction and scheduling algorithm for minimizing aggregation time in wireless sensor networks. Wirel. Pers. Commun. 2019, 108, 921–938. [Google Scholar] [CrossRef]
  14. Osamy, W.; Khedr, M.A.; Salim, A.; Al Ali, A.I.; El-Sawy, A.A. A review on recent studies utilizing artificial intelligence methods for solving routing challenges in wireless sensor networks. PeerJ Comput. Sci. 2022, 8, e1089. [Google Scholar] [CrossRef]
  15. Aziz, A.; Osamy, W.; Khedr, A.M. Effective Algorithm for Optimizing Compressive Sensing in IoT and Periodic Monitoring Applications. J. Netw. Comput. 2019, 126, 12–28. [Google Scholar] [CrossRef]
  16. Osamy, W.; El-Sawy, A.A.; Khedr, A.M. Effective TDMA Scheduling for Data Collection in Tree Based Wireless Sensor Networks. Peer-to-Peer Netw. Appl. 2020, 13, 796–815. [Google Scholar] [CrossRef]
  17. Osamy, W.; Salim, A.; Khedr, A.M.; El-Sawy, A.A. IDCT: Intelligent Data Collection Technique for IoT-Enabled Heterogeneous Wireless Sensor Networks in Smart Environments. IEEE Sens. J. 2021, 21, 21099–21112. [Google Scholar] [CrossRef]
  18. Osamy, W.; Khedr, A.M.; Salim, A.; Al Ali, A.I.; El-Sawy, A.A. Recent Studies Utilizing Artificial Intelligence Techniques for Solving Data Collection, Aggregation and Dissemination Challenges in Wireless Sensor Networks: A Review. Electronics 2022, 21, 313. [Google Scholar] [CrossRef]
  19. Huanan, Z.; Suping, X.; Jiannan, W. Research on Technology of Wireless Sensor Network. In Advances in Wireless Communications and Applications. Smart Innovation, Systems and Technologies; Kountchev, R., Mahanti, A., Chong, S., Patnaik, S., Favorskaya, M., Eds.; Springer: Singapore, 2021; Volume 190. [Google Scholar]
  20. Losilla, F.; Garcia-Sanchez, A.-J.; Garcia-Sanchez, F.; Garcia-Haro, J.; Haas, Z.J. A Comprehensive Approach to WSN-Based ITS Applications: A Survey. Sensors 2011, 11, 10220–10265. [Google Scholar] [CrossRef]
  21. Raj, P.V.P.; Khedr, A.M.; Aghbari, Z.A. EDGO: UAV-based effective data gathering scheme for wireless sensor networks with obstacles. Wirel. Netw. 2022, 28, 2499–2518. [Google Scholar]
  22. Ulusoy, A.; Gurbuz, O.; Onat, A. Wireless model-based predictive networked control system over cooperative wireless network. IEEE Trans. Ind. Inf. 2011, 7, 4151. [Google Scholar] [CrossRef] [Green Version]
  23. Al-Kashoash, H.A.; Kharrufa, H.; Al-Nidawi, Y.; Kemp, A.H. Congestion control in wireless sensor and 6LoWPAN networks: Toward the Internet of Things. Wirel. Netw. 2019, 25, 4493–4522. [Google Scholar] [CrossRef]
  24. Dhumane, A.V.; Prasad, R.S. Multi-objective fractional gravitational search algorithm for energy efficient routing in IoT. Wirel. Netw. 2019, 25, 399–413. [Google Scholar] [CrossRef]
  25. Palopoli, L.; Passerone, R.; Rizano, T. Scalable offline optimization of industrial wireless sensor networks. IEEE Trans. Ind. Inf. 2011, 7, 328329. [Google Scholar] [CrossRef] [Green Version]
  26. Li, S.; Xu, L.; Wang, X. Compressed sensing signal and data acquisition in wireless sensor networks and Internet of things. IEEE Trans. Ind. Inform. 2013, 9, 2177–2186. [Google Scholar] [CrossRef] [Green Version]
  27. Rahmani, A.M.; Gia, T.N.; Negash, B.; Anzanpour, A.; Azimi, I.; Jiang, M.; Liljeberg, P. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Future Gener. Comput. Syst. 2018, 78, 641–658. [Google Scholar] [CrossRef]
  28. Kavitha, M.; Geetha, B.G. An efficient city energy management system with secure routing communication using WSN. Clust. Comput. 2017, 22, 13131–13142. [Google Scholar] [CrossRef]
  29. Khan, T.; Karan, S.; Le, H.S.; Mohamed, A.; Hoang, V.L.; Manisha, S.S.P.M. A Novel and Comprehensive Trust Estimation Clustering Based Approach for Large Scale Wireless Sensor Networks. IEEE Access 2019, 7, 58221–58240. [Google Scholar] [CrossRef]
  30. Dhulipala, V.R.S.; Karthik, N. Trust management technique in wireless sensor networks: Challenges and issues for reliable communication: A review. CSI Trans. ICT 2017, 5, 281–294. [Google Scholar] [CrossRef]
  31. Fang, W.; Zhang, W.; Chen, W.; Pan, T.; Ni, Y.; Yang, Y. Trust-based attack and defense in wireless sensor networks: A survey. Wirel. Commun. Mob. Comput. 2020, 2020, 2643546. [Google Scholar] [CrossRef]
  32. Yan, Z.; Zhang, P.; Vasilakos, A.V. A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 2014, 42, 120–134. [Google Scholar] [CrossRef]
  33. Hicham, O.; Hajar, L.; Ahmed, M.; Mostafa, C.; Tabyaoui, A. MG-leach: An enhanced leach protocol for wireless sensor network. Int. J. Electr. Comput. Eng. 2019, 9, 3139. [Google Scholar] [CrossRef]
  34. Amer, A.S.; Noor, S. Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquitous Comput. 2019, 23, 901–907. [Google Scholar] [CrossRef]
  35. Akhilesh, P.; Laksman, S.; Rajat, S. RCH-LEACH: Residual Energy based Cluster Head Selection in LEACH for Wireless Sensor Networks. In Proceedings of the 2020 International Conference on Electrical and Electronics Engineering (ICE3), Gorakhpur, India, 14–15 February 2020. [Google Scholar] [CrossRef]
  36. Tarek, G.; Sarah, G.; Mohamed, E.; Ella, H.A. Trust-based Secure Clustering in WSN-based Intelligent Transportation Systems. Comput. Netw. 2018, 146, 151–158. [Google Scholar] [CrossRef]
  37. Richa, S.; Vasudha, V.; Umang, S. eeTMFO/GA: A secure and energy efficient cluster head selection in wireless sensor networks. Telecommun. Syst. 2020, 74, 253–268. [Google Scholar]
  38. Sakthidasan Sankaran, K.; Gao, X.Z.; Devabalaji, K.R.; Mohana Roopa, Y. Energy-based random repeat trust computation approach and Reliable Fuzzy and Heuristic Ant Colony mechanism for improving QoS in WSN. Energy Rep. 2021, 7, 7967–7976. [Google Scholar] [CrossRef]
  39. Hajiee, M.; Fartash, M.; Eraghi, N.O. An Energy-Aware Trust and Opportunity Based Routing Algorithm in Wireless Sensor Networks Using Multipath Routes Technique. Neural Process. Lett. 2021, 53, 2829–2852. [Google Scholar] [CrossRef]
  40. Khan, T.; Singh, K. TASRP: A trust aware secure routing protocol for wireless sensor networks. Int. J. Innov. Comput. Appl. 2021, 13, 108–122. [Google Scholar] [CrossRef]
  41. Han, Y.; Hu, H.; Guo, Y. Energy-Aware and Trust-Based Secure Routing Protocol for Wireless Sensor Networks Using Adaptive Genetic Algorithm. IEEE Access 2022, 10, 11538–11550. [Google Scholar] [CrossRef]
  42. Rajeswari, A.R.; Kulothungan, K.; Ganapathy, S.; Kannan, A. Trusted energy-aware cluster-based routing using fuzzy logic for WSN in IoT. J. Intell. Fuzzy Syst. 2021, 40, 9197–9211. [Google Scholar] [CrossRef]
  43. Hriez, S.; Almajali, S.; Elgala, H.; Ayyash, M.; Salameh, H.B. A novel trust-aware and energy-aware clustering method that uses stochastic fractal search in IoT-enabled wireless sensor networks. IEEE Syst. J. 2021, 16, 2693–2704. [Google Scholar] [CrossRef]
  44. Sasirega, L.; Shanthi, C. Trust Establishment For Detecting Aggressor Nodes and Imp roving Route Stability in Wsn-Iot. Turk. J. Comput. Math. Educ. 2021, 12, 6012–6020. [Google Scholar]
  45. Hu, H.; Han, Y.; Yao, M.; Song, X. Trust Based Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks. IEEE Access 2022, 10, 10585–10596. [Google Scholar] [CrossRef]
  46. Mittal, N.; Singh, S.; Singh, U.; Salgotra, R. Trust-aware energy-efficient stable clustering approach using fuzzy type-2 Cuckoo search optimization algorithm for wireless sensor networks. Wirel. Netw. 2021, 27, 151–174. [Google Scholar] [CrossRef]
  47. Dattatraya, K.N.; Ananthakumaran, S. Energy and Trust Efficient Cluster Head Selection in Wireless Sensor Networks Under Meta-Heuristic Model. Lect. Notes Netw. Syst. 2022, 444, 715–735. [Google Scholar]
  48. Famila, S.; Jawahar, A.; Vimalraj, S.L.S.; Lydia, J. Integrated Energy and Trust-Based Semi-Markov Prediction for Lifetime Maximization in Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 118, 505–522. [Google Scholar] [CrossRef]
  49. Reddy, C.S.; Narsimha, G. Deep neural network with meta-heuristic based trust aware cluster head selection in wsn. Indian J. Comput. Sci. Eng. 2022, 13, 1056–1066. [Google Scholar] [CrossRef]
  50. Khot, P.S.; Naik, U. Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection. Wirel. Pers. Commun. 2021, 119, 2405–2429. [Google Scholar] [CrossRef]
  51. Rajesh, L.; Mohan, H.S. EPO-Based Clustering and Secure Trust-Based Enhanced LEACH Routing in WSN. In Lecture Notes on Data Engineering and Communications Technologies; Springer: Singapore, 2022; Volume 93, pp. 41–54. [Google Scholar]
  52. Adline Jancy, Y.; Gomathy, B.; Benuel Sathish Raj, A. A Secure Ant Colony based Trust Computation Model in Wireless Sensor Networks. J. Phys. Conf. Ser. 2021, 1937, 012018. [Google Scholar] [CrossRef]
  53. Veerabadrappa, K.; Lingareddy, S.C. Trust and Energy Based Multi-Objective Hybrid Optimization Algorithm for Wireless Sensor Network. Int. J. Intell. Eng. Syst. 2022, 15, 71–80. [Google Scholar] [CrossRef]
  54. Panigrahi, L.; Jena, D. Genetic Algorithm and Probability-Based Leach Variant Trust Management Model for WSNs. Smart Innov. Syst. Technol. 2021, 194, 681–690. [Google Scholar]
  55. Narayan, V.; Daniel, A.K. A novel approach for cluster head selection using trust function in wsn. Scalable Comput. 2021, 22, 1–13. [Google Scholar] [CrossRef]
  56. Fang, W.; Zhang, W.; Yang, W.; Li, Z.; Gao, W.; Yang, Y. Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks. Digit. Commun. Netw. 2021, 7, 470–478. [Google Scholar] [CrossRef]
  57. Deena Narayan, B.; Vineetha, P.; Kumar Raju Alluri, B.K.S.P. Enhanced trust-based cluster head selection in wireless sensor networks. In Innovations in Computer Science and Engineering: Proceedings of the Sixth ICICSE 2018; Springer: Singapore, 2019; pp. 263–275. [Google Scholar]
  58. Veerapaulraj, S.; Karthikeyan, M.; Sasipriya, S.; Shanthi, A.S. An Optimized Novel Trust-Based Security Mechanism Using Elephant Herd Optimization. Comput. Syst. Sci. Eng. 2023, 44, 2489–2500. [Google Scholar] [CrossRef]
  59. Chada, S.R.; Gugulothu, N. Secure and Energy Aware Cluster based Routing using Trust Centric–Multiobjective Black Widow Optimization for large scale WSN. Int. J. Electr. Comput. Eng. Syst. 2022, 13, 525–532. [Google Scholar]
  60. Silmi, S.; Doukha, Z.; Moussaoui, S. A self-localization range free protocol for wireless sensor networks. Peer-to-Peer Netw. Appl. 2021, 14, 2061–2071. [Google Scholar] [CrossRef]
  61. Sabale, K.; Mini, S. Localization in Wireless Sensor Networks with Mobile Anchor Node Path Planning Mechanism. Inf. Sci. 2021, 579, 648–666. [Google Scholar] [CrossRef]
  62. Lalama, Z.; Boulfekhar, S.; Semechedine, F. Localization Optimization in WSNs Using Meta-Heuristics Optimization Algorithms: A Survey. Wirel. Pers. Commun. 2022, 122, 1197–1220. [Google Scholar] [CrossRef]
  63. Singh, S.K.; Kumar, P.; Singh, J.P. A Survey on Successors of LEACH Protocol. IEEE Access 2017, 5, 4298–4328. [Google Scholar] [CrossRef]
  64. Gharehchopogh, F.S.; Namazi, M.; Ebrahimi, L.; Abdollahzadeh, B. Advances in Sparrow Search Algorithm: A Comprehensive Survey. Arch. Comput. Methods Eng. 2023, 30, 427–455. [Google Scholar] [CrossRef]
  65. Gao, B.; Shen, W.; Zhao, H.; Zhang, W.; Zheng, L. Reverse Nonlinear Sparrow Search Algorithm Based on the Penalty Mechanism for Multi-Parameter Identification Model Method of an Electro-Hydraulic Servo System. Machines 2022, 10, 561. [Google Scholar] [CrossRef]
  66. Yan, S.; Yang, P.; Zhu, D.; Zheng, W.; Wu, F. Improved sparrow search algorithm based on iterative local search. Comput. Intell. Neurosci. 2021, 2021, 6860503. [Google Scholar] [CrossRef] [PubMed]
  67. Khan, M.K.; Shiraz, M.; Ghafoor, K.Z.; Khan, S.; Sadiq, A.S.; Ahmed, G. EE-MRP: Energy-Efficient Multistage Routing Protocol for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018, 2018, 6839671. [Google Scholar] [CrossRef]
Figure 1. A general architecture of DGTTSSA.
Figure 1. A general architecture of DGTTSSA.
Sensors 23 05433 g001
Figure 2. Trust model execution steps [36].
Figure 2. Trust model execution steps [36].
Sensors 23 05433 g002
Figure 3. DGTTSSA clustering flow diagram.
Figure 3. DGTTSSA clustering flow diagram.
Sensors 23 05433 g003
Figure 4. Performance results with reference to various BS locations.
Figure 4. Performance results with reference to various BS locations.
Sensors 23 05433 g004
Figure 5. Alive nodes comparison over rounds with reference to different BS locations.
Figure 5. Alive nodes comparison over rounds with reference to different BS locations.
Sensors 23 05433 g005
Figure 6. E R a v g with reference to different BS locations.
Figure 6. E R a v g with reference to different BS locations.
Sensors 23 05433 g006
Figure 7. Performance results of varying the number of nodes from 100 to 300 incremented by 100.
Figure 7. Performance results of varying the number of nodes from 100 to 300 incremented by 100.
Sensors 23 05433 g007
Figure 8. Performance results of varying the percentage of malicious nodes.
Figure 8. Performance results of varying the percentage of malicious nodes.
Sensors 23 05433 g008
Figure 9. Alive nodes comparison over rounds results of varying the percentage of malicious nodes.
Figure 9. Alive nodes comparison over rounds results of varying the percentage of malicious nodes.
Sensors 23 05433 g009
Figure 10. E R a v g with reference to varying percentage of malicious nodes.
Figure 10. E R a v g with reference to varying percentage of malicious nodes.
Sensors 23 05433 g010
Table 1. Related works comparison.
Table 1. Related works comparison.
Ref.Trust Aware ClusteringApproachLimitations
MG-LEACH (2019) [33]×Nodes are divided into subgroups and CHs are selected randomly based on the probability function. Data is routed to sink through intermediate CH.CH selection based on the probability function can lead to early depletion of nodes. Trustworthiness of nodes is not considered.
E-LEACH (2019) [34]×CH selection is based on the probability function and the shortest distance is employed for CH identification.Nodes’ residual energy is not considered. CH selection based on probability function can lead to early depletion of nodes. Nodes’ trustworthiness is not considered.
RCH-LEACH (2020) [35]×CH selection is based on nodes’ residual energy along with the energy threshold and best number of clusters.CH selection based on probability function can lead to early depletion of nodes. Hard energy threshold and trustworthiness of nodes are not considered.
eeTMFOGA (2020) [37]Hybrid algorithm based on moth flame optimization and genetic algorithm with a fitness function that considers average cluster distance, energy, trust, and node density.Missing threshold on trust value may lead to the selection of CHs with a lower trust value.
HiTSeC (2018) [36]Bat Optimization Algorithm is employed for CH selection. A hard trust threshold is considered for CH selection. The objective function is designed based on the degree of the node.Hard threshold is employed. Uses a weak fitness function.
LEACH-TM (2021) [56]LEACH and trust based algorithm. Trust value of nodes are considered in a randomized selection function.CH selection based on probability function can lead to early depletion of nodes and leads to the selection of CHs with a lower trust value.
ETOR [39] (2021)Employ intra-cluster and inter-cluster multi-hop communication. Fitness function is based on energy, trust, QoS, and connectivity between route nodes.Complex method. Missing threshold on trust value may lead to the selection of CHs with a lower trust value.
TAGA [41] (2022)CH selection is based on a randomized function that considers comprehensive trust value and remaining energy.CH selection based on randomized function can lead to early depletion of nodes and leads to the selection of CHs with a lower trust value.
[46] (2021)Cuckoo search optimization using a fuzzy type-2 logic is used for clustering.Hard threshold is employed.
[47] (2022)CH selection based on hybrid optimization for optimal result by considering energy, separation distance, delay, distance, Qos, and trust.Missing trust threshold may lead to the selection of CHs with a lower trust value.
[49] (2022)Employs Deep learning and Whale Optimization based method for CH selection, using a multi-objective function considering the distance, energy, delay, and trust of nodes.Complex method and missing threshold on trust value may lead to the selection of CHs with a lower trust value.
[50] (2021)CH selection based on PSO with a fitness function that considers factors such as energy, delay, trust, the consistency factor, and the maintainability factor.Missing threshold on trust value may lead to the selection of CHs with a lower trust value.
STELR [51] (2022)×Emperor penguin optimization (EPO) is employed for CH selection while considering distance and energy.Selection of CHs with a lower trust value.
TE-MHOA [53] (2022)Hybrid algorithm consists of adaptive Particle Swarm Optimization and Monarch Butterfly Optimization with a fitness function considering residual energy, communication cost, trust, and node degree.Missing threshold on trust value may lead to the selection of CHs with a lower trust value.
[54] (2021)×Employs Randomized function and genetic algorithm for CH selection.CH selection based on probability function can lead to early depletion of nodes and nodes’ trustworthiness is not considered.
ETCH [57] (2019)CH is selected by considering the trust value and residual energy.Hard threshold is employed. Uses a weak fitness function.
TC-MBWO [59] (2022)CH selection is achieved using a trust-aware method based on Multi-objective Black Widow Optimization.Missing threshold on trust value may lead to the selection of CHs with a lower trust value.
Proposed DGTTSSAThe energy and Trust aware fitness function is designed along with the soft energy and trust threshold calculation method. SSA is employed for CH selection.QoS parameters not considered.
√ means “considered” and × means “not considered”.
Table 2. Simulation Settings.
Table 2. Simulation Settings.
Used ParametersValue
Area 100 × 100 m
Total nodes (n)100
Initial node energynormal nodes = 0.5 J; advanced nodes = 1 J
E e l e c 50 nJ/bit
Free space ϵ f s 10 pJ/bit/m 2
Multi-path ϵ m p 0.00013 pJ/bit/m 4
d 0 87 m
E D A 5 nJ/bit/signal
Packet size4000 bits
Communication radius40 m
Percentage of CHs (p)0.1
Range of trust value[0, 1]
Parameters used for SSA
Population size 30
Percentage of producers 0.2
Percent of sparrows in danger 0.2
Safety threshold 0.8
Max iterations 100
Table 3. Results when BS is at Center, Corner, and Outside.
Table 3. Results when BS is at Center, Corner, and Outside.
BS Is at Center
Stability/FNDATVInstabilityReliabilityHNDLND
LEACH-TM786.400.292256.400.351264.43042.8
DGTTSSA1264.400.65224.005.641291.61488.4
ETCHS1325.000.071146.401.1619902471.4
eeTMFOGA833.000.531061.000.791228.41894
E-LEACH229.200.442895.200.081270.83124.4
BS Is at Corner
Stability/FNDATVInstabilityReliabilityHNDLND
LEACH-TM739.000.222873.600.261135.63612.6
DGTTSSA1217.200.71465.602.611237.81682.8
ETCHS286.400.111609.600.181161.61896
eeTMFOGA830.800.022871.000.951224.41701.8
E-LEACH231.800.481710.600.141070.61942.4
BS Is at Outside
Stability/FNDATVInstabilityReliabilityHNDLND
LEACH-TM390.600.281708.400.23776.22099
DGTTSSA930.600.74329.402.83948.81260
ETCHS57.800.34777.600.07255.8835.4
eeTMFOGA825.600.65541.201.531193.61366.8
E-LEACH184.600.50442.000.42387.4626.6
Bold indicates the best value for this column.
Table 4. Results with varying percentage of malicious nodes (10%, 20%, and 30%).
Table 4. Results with varying percentage of malicious nodes (10%, 20%, and 30%).
10% Malicious Nodes
Stability/FNDATVInstabilityReliabilityHNDLND
LEACH-TM739.000.222873.600.261135.63612.6
DGTTSSA1217.200.71465.602.611237.81682.8
ETCHS286.400.111609.600.181161.61896
eeTMFOGA830.800.54871.000.951224.41701.8
E-LEACH208.200.491076.300.197291284.5
20% Malicious Nodes
Stability/FNDATVInstabilityReliabilityHNDLND
LEACH-TM778.000.202831.600.271118.83609.6
DGTTSSA1181.600.67545.602.171239.41727.2
ETCHS286.400.091884.400.151159.82170.8
eeTMFOGA865.000.54832.801.041220.61697.8
E-LEACH240.000.411729.600.1410691969.6
30% Malicious Nodes
Stability/FNDATVInstabilityReliabilityHNDLND
LEACH-TM767.600.152817.600.271126.43585.2
DGTTSSA1146.600.55673.601.7012301820.2
ETCHS286.400.051978.600.141144.42265
eeTMFOGA843.000.44862.200.981223.61705.2
E-LEACH238.600.311712.000.141070.41950.6
Bold indicates the best value for this column.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Osamy, W.; Khedr, A.M.; Alwasel, B.; Salim, A. DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs. Sensors 2023, 23, 5433. https://doi.org/10.3390/s23125433

AMA Style

Osamy W, Khedr AM, Alwasel B, Salim A. DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs. Sensors. 2023; 23(12):5433. https://doi.org/10.3390/s23125433

Chicago/Turabian Style

Osamy, Walid, Ahmed M. Khedr, Bader Alwasel, and Ahmed Salim. 2023. "DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs" Sensors 23, no. 12: 5433. https://doi.org/10.3390/s23125433

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop