Next Article in Journal
Quasi-Double Diagonally Dominant H-Tensors and the Estimation Inequalities for the Spectral Radius of Nonnegative Tensors
Previous Article in Journal
Genuine q-Stancu-Bernstein–Durrmeyer Operators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks

by
Xingsi Xue
1,*,
Ramalingam Shanmugam
2,
SatheeshKumar Palanisamy
3,*,
Osamah Ibrahim Khalaf
4,*,
Dhanasekaran Selvaraj
2 and
Ghaida Muttashar Abdulsahib
5
1
Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou 350011, China
2
Department of ECE, Sri Eshwar College of Engineering, Coimbatore 641202, India
3
Department of ECE, Coimbatore Institute of Technology, Coimbatore 641014, India
4
Al-Nahrain Renewable Energy Research Center, Al-Nahrain University, Baghdad 64074, Iraq
5
Department of Computer Engineering, University of Technology, Baghdad 64074, Iraq
*
Authors to whom correspondence should be addressed.
Symmetry 2023, 15(2), 438; https://doi.org/10.3390/sym15020438
Submission received: 7 January 2023 / Revised: 28 January 2023 / Accepted: 2 February 2023 / Published: 7 February 2023

Abstract

:
Efficient clustering and routing is a main challenge in a wireless sensor network (WSN). To achieve better quality-of-service (QoS) performance, this work introduces k-medoids with improved artificial-bee-colony (K-IABC)-based energy-efficient clustering and the cross-layer-based Harris-hawks-optimization-algorithm (CL-HHO) routing protocol for WSN. To overcome the power-asymmetry problem in wireless sensor networks, a cross-layer-based optimal-routing solution is proposed. The goal of cross-layer routing algorithms is to decrease network-transmission delay and power consumption. This algorithm which was used to evaluate and select the effective path route and data transfer was implemented using MATLAB, and the results were compared to some existing techniques. The proposed CL-HHO performs well in packet-loss ratio (PLR), throughput, end-to-end delay (E2E), jitter, network lifetime (NLT) and buffer occupancy. These results are then validated by comparing them to traditional routing strategies such as hierarchical energy-efficient data gathering (HEED), energy-efficient-clustering routing protocol (EECRP), Grey wolf optimization (GWO), and cross-layer-based Ant-Lion optimization (CL-ALO). Compared to the HEED, EECRP, GWO, and CL-ALO algorithms, the proposed CL-HHO outperforms them.

1. Introduction

A wireless sensor network (WSN) is a collection of specialized sensor nodes uniformly distributed in space to monitor and record physical environmental factors and organize the collected information in a centralized site. WSN detects and records ecological conditions such as sound, temperature, pollution, waves, wind, etc. The WSN are mostly used in some real-time applications such as agriculture, weather monitoring, PV-plant monitoring and industrial applications. WSN are appropriate for harsh environments where wired networks cannot be installed. They are helpful when manual data collection is difficult or hazardous for sensors and an AI-based node position can be calculated [1,2]. A WSN comprises a base station and many randomly distributed SNs in the area of interest. These BSs aggregate information from many nodes for meaningful analysis in the deployed environment. Routing is critical in WSN, because if a sensor node fails during data transmission, the wireless link becomes uncertain, and routing protocols must meet the SN’s power demands [3,4]. However, some additional challenges of the WSN are limited memory, security, connectivity and localization, and time delay. The security of WSNs has been addressed in several ways. However, a few of these security protocols could be more effective because wireless sensor networks have limited sensor resources. Because the network’s respective sensors need more resources, WSNs are challenging to secure. A dependence on network technology also leaves a wide range of security threats and assaults open. Two contentious limitations on sensor networks will vanish as processing technology develops: restricted processor bandwidth and small memory. In order to make the proper observations and decisions, sensor data must frequently be delivered within strict deadlines. Results have yet to be found so far that satisfy the real-time demands of WSNs.
Various kinds of research work have been carried out to improve the above problem in WSN. But the primary concern of WSN is the power consumption of SN and QoS performance. To resolve the above problem, efficient clustering and routing has been proposed in this work. The primary goal of WSN is to collect data from the environment, but, due to resource constraints, data collected by sensor nodes for BS will necessitate another efficient solution. Most network parameters are additive, since the optimization will also be NP-hard. Local optima exist in metaheuristic algorithms, which can be solved using hybrid techniques related to CH selection [5,6].
The sensor nodes must be powered by batteries, which are frequently difficult to replace. Furthermore, latency, energy usage and network coverage are critical in maintaining QoS performance. As a result, the implementation of efficient QoS solutions must consider the challenging factors of energy conservation within the network. However, significant research must be carried out to address the limitations that exist in this region. The most difficult challenge of a WSN operation is energy conservation. Energy consumption is essential in WSNs because extending a WSN’s lifetime increases its productivity. Nodes are outfitted with limited batteries. Because it reports network performance degradation, network lifetime is an important attribute. When a node dies, the next node also dies. As a result, an urgent problem to be solved is how to improve network lifetime and save node power in WSN.
However, energy conservation is a significant challenge for WSNs because the sustained capacity of WSNs is primarily determined by the lifetime of SNs. Because batteries power SNs, their lifespan is entirely dependent on their power source, which cannot be replaced. Over time, the SN’s ability to detect the relevant area and transmit data to the BS depletes. As a result, the only way to achieve long WSN life is to conserve battery power. Obtaining these facts, this study proposes several algorithms to solve these problems [7,8]. The main purpose of the proposed research is to investigate and propose new ways to increase cluster formation to improve energy consumption and the QoS performance of WSN.

Major Contribution

Thus, we proposed k-medoids with an improved-artificial-bee-colony (IABC)-based clustering approach and hybrid cross-layer-based Harris-hawks-optimization algorithm (CL-HHO) for effective routing in WSN. Because k-medoids with the improved artificial bee colony operate and calculate quickly, we used k-medoids with IABC for cluster formation and CH selection. K-medoids provide high efficiency, while defining the behavior of complex nodes and speeding up the procedure with IABC. Therefore, we chose CH using k-medoids and IABC. We used CL-HHO for the routing process because it has the advantage of HHO’s quick search speed, which provides a quick response and convergence. The primary concerns of the introduced research work are:
  • Cluster formation and CH selection are mediated by k-medoids and IABC.
  • A hybrid CL-HHO algorithm is presented for choosing the shortest path.
  • A novel, well-known technique is used to compare the methodology’s performance.
  • The effectiveness of the proposed CL-HHO improves the overall QoS performance.
The remaining article is explained below, and the following section reviews the related research. Section 3 describes the cluster formation, CH selection and routing, in detail. Section 4 describes the proposed work performance using MATLAB. The final section summarizes the research paper’s findings and makes recommendations for future research.

2. Literature Survey

This chapter briefly overviews various works related to WSN, including WSN-based clustering, various optimization techniques, and hybrid optimization in WSN. Local optima, NP-hard problems, and so on can be solved by optimizing CHs using various meta-heuristic optimization algorithms. The need for hybrid optimization arises from improving performance, evolving quality algorithm solutions, and integrating algorithms as part of larger systems. Satyajit Pattnaik et al. (2021) proposed a hybrid moth-flame-cuttlefish-optimization (MFO-CFO) technique for routing. Initially the clusters are formed by ant lion optimization (ALO) based on fuzzy-clustering means (FCM). A particle-swarm-optimization (PSO) algorithm based on an adaptive neuro-fuzzy inference system (ANFIS) is proposed for optimal CH selection. The results are compared to conventional methods such as the fuzzy, PSO and genetic algorithm (GA) [9].
Sina Einavi Pour et al. (2021) presented a CH-selection algorithm that chooses CHs based on the remaining energy, location, and centrality of the node. The simulation outcomes show that the suggested method outperforms existing methods such as LEACH, multi-hop LEACH networks based on reliability, network lifetime and energy consumption [10]. Satyajit Pattnaik et al. (2020) revealed the possibility of combining the fuzzy-clustering approach and the elephant-herding-optimization (EHO)-Greedy algorithm for WSN. This method considers individual sink nodes for fixed and mobile sinks to reduce power consumption. Finally, the EHO-Greedy hybrid-algorithm routing protocol has been proposed for data transmission. The simulation outcomes demonstrate that the suggested technique outperforms other existing energy utilization methods and system lifetimes [11].
Koyuncu et al. (2020) revealed a routing method based on multi-objective energy-efficiency-criterion optimization and clustering. A multitier-deterministic routing protocol is employed to determine the optimal path for data transmission to the base station, thereby improving the WSN network’s performance [12]. Jagadeesh et al. (2021) proposed a multi-objective particle swarm optimization with the Levy-distribution (MOPSO-L)-based dynamic-clustering algorithm. The experimental outcomes show that the suggested model outperforms its competitors regarding network lifetime and energy efficiency [13]. Soleymani et al. (2020) proposed a clustering method with self-diagnosis data fault detection and prediction for WSNs. The proposed approach nearly doubles the lifetime improvement compared with LEACH [14].
Aditya Tandon et al. (2021) proposed a bio-inspired cross-layer routing (BiHCLR) algorithm for efficient routing. A fuzzy logic method is used to choose a CH for each node. The routing paths are then chosen using a hybrid bionic algorithm. The hybrid algorithm combines salp-swarm-optimization and moth-search techniques. The proposed BiHCLR’s result is assessed using a quality-of-service (QoS) analysis [15]. Ramalingam et al. (2021) propose an efficient CORP protocol for grouping and routing in WSNs. In this paper, the k-medoid algorithm with HHO was used for the election of CH, and the CORP algorithm was used for routing. The suggested work’s results were compared to the existing FRLDG and HEED algorithms [16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38]. Various communication and IoT routing protocols are also discussed in [39,40,41,42,43,44,45].
Azharuddin et al. (2015) revealed distributed fault-tolerant clustering and routing (DFCR). The algorithm is fault-tolerant and uses little energy. When CH fails unexpectedly, DFCR employs SN’s distributed runtime recovery. SNS that do not have CH within their communication range are responsible for this. Various network scenarios are considered, and extensive experiments are carried out. The algorithm’s robustness has been demonstrated in terms of various performance metrics after comparing empirical results with those of existing algorithms [17]. Amer et al. (2018) presented a balanced-energy-efficient-grid-based clustering protocol (BEEG). LEACH, k-medoids-LEACH (K-LEACH), distributed cluster head scheduling (DCHS), modified-LEACH and energy-LEACH (a clustering protocol based on a balanced network of (BEEG)) have been shown to improve network performance and longevity when compared to other protocols [18]. Bouyer et al. (2015) developed an intra-sensor hybrid cluster protocol based on the distance between the base station, node, and residual energy, using a combination of FCM and LEACH. As a result, the NLT is extended. It has been demonstrated that hybrid protocols are more efficient [19]. Fei et al. (2017) proposed a multi-objective-optimization (MOO) technique and survey of recent R&D efforts. Several popular MOO techniques have been discussed, including heuristic/metaheuristic optimization algorithms and various other advanced optimization techniques [20].
Vimalarani et al. (2016) have proposed an improved PSO-based clustering-energy-optimization (EPSO-CEO) algorithm for WSNs. In this case, the PSO algorithm is used for cluster-head selection and clustering to reduce the amount of power consumed by WSN [21]. Lawal Samira et al. (2015) have suggested a deployment strategy for WSNs which uses the artificial fish swarm algorithm (AFSA). To achieve an adequate QoS in WSNs, the sensor nodes must be deployed as optimally as possible [22]. Banka et al. (2016) suggested the multiple-sink placement algorithm based on PSO, called PSO-MSPA. The algorithm is extensively tested in different WSN scenarios by changing the total number of gateways and SNs; and the algorithm’s efficiency is demonstrated by analyzing the results [23].
Djedouboum et al. (2020) proposed that the optimal path in routing be used to enhance network lifetime and energy efficiency. Although several metaheuristics, especially PSO, have been widely used, they lead to poor-local-optimum problems [24]. Kaur et al. (2016) evaluated the effectiveness of various optimization techniques, including the hybrid GA-PSO approach, bacterial foraging optimization (BFO), GA, and PSO. First, optimization methods such as BFO, PSO, and GA are individually applied to WSN, and then GA and PSO are combined. Existing research integrates load balancing and GA optimization. However, other methods apert from mixing GA and PSO are considered here. This will also help to extend the network’s life [25].
Huadong Wang et al. (2017) described the swarm-intelligence method in a clustering approach with a consistent-clustering approach dependent on the artificial bee colony (ABC). The nodes’ remaining energy, location, and density are all factors that reduce energy utilization. Greater network-topology flexibility is achieved through proper cluster-head selection, and node-power utilization is reduced by extending the network lifetime. The swarm-intelligence approach does not address the load-balancing issue [26]. Chuan zhu et al. (2015) presented a tree-cluster that is based on a data-gathering algorithm (TCBDGA). A weight-dependent tree-building method was developed. As the network ages, TCBDGA maintains load balancing and reduces power consumption. Using TCBDGA lengthens the classification process [27].
Ramnik Singh et al. (2017) proposed a hybrid routing algorithm for heterogeneous networks. Weighted probabilities are used to assign cluster heads to network clusters. They consider combining active and passive networks to achieve well-organized data transfer and increase network lifespan. The energy optimization could have been carried out more efficiently [28]. Amir et al. (2016) created battery-operated energy-harvesting WSN. The overhead issues were not addressed in BPSNs and EHSNs [29].
Ying Song et al. (2015) proposed the genetic algorithm (GA), which provides a low-energy method for multipath routing. For scheduling, data were collected from multiple nodes. As a result, the optimum solution was discovered. Routing stability was not considered for efficient data transfer [30]. Hui Li et al. (2016) proposed the double-level-LEACH (DL-LEACH). The DL-LEACH algorithm predicts the node’s remaining energy, the distance from the BS, and the adjacent nodes, to select the group leader. The DL-LEACH algorithm extends the NLT and solves the problems of other LEACH methods. The use of DL-LEACH does not affect the network lifetime [31]. Difference machine learning and soft computing and the deep-learning algorithm are proposed in [32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56]. An effective, reliable data transmission and prediction-based data transfer has been processed using soft computing and a regression algorithm [57,58,59,60,61,62,63,64,65]. Using network partitioning and an evolutionary protocol to select the best CH, location information, and residual power decomposed by WSN can improve power consumption. CH optimization is a complex non-deterministic polynomial (NP) problem in QoS. Such problems will be solved using polynomial-time general-approximation algorithms. Local optima are a problem for metaheuristic problems, and this study used a hybrid technique to address the local optima for CH selection. Efficient WSN protocols that use cross-layer techniques are required to enhance system stability and performance. However, the aforementioned methods strongly emphasize node clustering, routing, and low-power cluster-head selection. As a result, it is essential to create a CL protocol that can use a novel hybrid algorithm for CH selection, eliminate hotspots by using different clusters and apply a suitable optimization algorithm to perform routing.
Due to density, farm area, long-distance communication, high latency/latency, and packet loss, these approaches are challenging for IoT-driven WSNs. WSN applications require low data-transfer latency, low latency, and energy efficiency. This work encourages us to suggest an IMSF solution to deal with energy asymmetry in WSN applications by considering different layers’ requirements when choosing CHs and forming stable clusters. Energy efficiency and the solution to the energy-asymmetry issue can both be attained by choosing the best CH node. Table 1 Comparative analysis of existing algorithm and its limitations.
The main contribution proposed is to improve the overall QoS performance of WSNs using an optimization-based hybrid routing and clustering algorithm.

3. Materials and Methods

The k-medoids with improved-artificial-bee-colony (K-IABC)-based energy-efficient clustering and the cross-layer Harris-hawks-optimization-algorithm (CL-HHO) routing protocol for WSN were introduced in this work. A cross-layer-based optimal-routing solution is put forth to address the power-asymmetry issue in wireless sensor networks. Cross-layer routing algorithms aim at reducing power consumption and network-transmission delay.

3.1. System Model

This system model assumes that a particular combination of sensor nodes (SN) is distributed randomly in a rectangular area. This system model is based on sensor-network characteristics:
Figure 1 depicts the architecture of clustering in WSN.
  • Each SN is unaware of its position.
  • A set of SNs distributed throughout the network has homogeneous characteristics.
  • The CH and BS distance is considered non-uniform, because it directly impacts SN’s power consumption.
  • Sensor nodes are not observed after deployment, because they are considered naturally organized.

3.2. Network Model

Wireless channels are interchangeable, and both sending and receiving sides are multidirectional. The transmitter’s energy consumption is calculated by Equation (1):
E t x ( j , d ) = { E t x e l e c × j + ε f s × j × d 2 ,   d < d 0 E t x e l e c × j + ε a m p × j × d 4 ,   d d 0
The energy consumed by the transmission circuit when transmitting l bit of data is denoted by E t x e l e c . The energy amplification parameters ε f s and ε a m p are linked to the chosen transmission-energy- consumption approach. ε f s represents free-space transmission, whereas ε a m p multipath loss represents attenuated transmission.
The boundary condition that distinguishes the two models is d 0 , d 0 = ε f s / . When the transmission distance, d, is more significant than d_0, as transmission distance increases, so does the transmitter’s energy consumption. The energy consumed by the receiving side when receiving l bit data at the receiving end is as follows in Equation (2):
E r x ( j , d ) = E t x e l e c × j

3.3. K-Medoids Clustering Algorithm

The proposed clustering algorithm is based on k-medoids (KCA) to obtain a general clustering method to improve the overall QoS performance. First, we collect the nodes’ coordinates and remaining energy information, and then compute the group number k. We optimized the k-medoids algorithm by computing the central circle’s midpoint and residual energy to reduce iteration time [32,33].

Set-Up Phase

All nodes are divided into appropriate groups during the setup phase, and CH nodes are identified. Let k be the number of groups defined by Equation (3).
k = N 2
where N represents the number of nodes. Let L be the node’s central position. Equation (4) can be used to calculate L.
L = i = 1 N X n N
where X n is the sensor I coordinate and d represents the average distance between the node’s central position, L, and all SNs. Equation (5) can be used to calculate d.
d = i = 1 N X n L | N
A central circle can be computed using L and d. We randomly choose k points on the central circle as the initial mean point l_i, which can be calculated using Equation (6).
{ I i x = d × cos ( 360 k × ( i 1 ) × π 180 ) + L x I i y = d × sin ( 360 k × ( i 1 ) × π 180 ) + L x
where I i x and I i y denote the mean point coordinates of cluster I. Since the k-medoids algorithm’s initial midpoints are chosen at random, when two or more midpoints are very near, we often obtain incorrect results, resulting in a huge amount of iteration time. Equation (7) accurately represents the absolute-error criterion, E.
E = i = 1 k x C i d i s t   ( x , r i
where x is a common node in cluster C i and C i represents cluster i. E is the sum of the distances between all represent nodes and common nodes. The replace method is illustrated in Equation (8).
I ( t + 1 ) = { I * ,   E * E ( t ) < 0 I ( t ) ,   o t h e r w i s e
Equation (7) and new clusters can be used to calculate the new absolute-error criterion, E * . If E * is less than E ( t ) ,   I ( t + 1 ) will be replaced by I * .

3.4. Artificial-Bee-Colony (ABC) Algorithm

The ABC algorithm is a tolerably improved method that mimics the interlinking behavior of honeybees. Figure 2 depicts the flow chart that corresponds to the presented ABC. The ABC algorithm consists of three strides: onlooker-bee stride, employed-bee stride, and scout-bee stride. The following describes the functionality of each stride: (1) The employed bees’ function is to exploit food resources while disseminating data about food-resource abundance and direction via onlooker bees in a wave movement. (2) The function of the onlooker bee is to select the food-resource probability measure. (3) Scout bees repeatedly examine currently produced food resources randomly assigned to the bee’s region, and, once identified, it becomes an employed bee [34,35,36].
ABC employs three distinct bee entities. While scout bees emphasize the attributes of negative feedback and variance, employed bees and onlooker bees favor positive feedback and numerous interactions. By introducing diversity into the population, fluctuation effectively prevents trapping in less-than-ideal locations. Scout bees carry out this task by bringing solutions from remote, completely random locations while searching. By improving the onlooker-bee component’s global-search efficiency, it is possible to enhance ABC’s results for challenging optimization. Measurements of exploration–exploitation during iterations also reveal that repeated scout-bee introductions cause abrupt changes in the exploration–utilization ratio during searches for the ABC algorithm. Determining promising areas for the entire group requires a smooth transition from exploration to exploitation. A scout bee being introduced unexpectedly during a search is similar to introducing a stranger to a group about to reach a decision.
ABC begins by dispatching bees to a variety of random locations. Bees that discover the best food source among all bees are most likely to follow other bees and converge to the best location, and each bee represents a D-dimensional solution. This accelerates convergence. It is noteworthy that the two components of metaheuristic performance are exploration and exploitation. Exploration is the process of finding new neighbors in the search space, and exploitation is the process of looking harder for already-found potential neighbors. In contrast to power-rich algorithms, which lack the diversity of solutions and frequently fall short of the local optimum, powerful meta-heuristic algorithms may avoid potential solutions by jumping far into the search space. Maintaining trade-offs between exploration and development can be significantly aided by measuring these two properties.
At first, one kind of hired bee will make up half the colony, and another, the spectator bees, will make up the other half. Employed bees scour the area for food sources and inform other bees nearby of new ones. Scouting bees are bees that search at random. The hired bees will switch to a different feed ingredient if it has more nectar than the current one. After exhausting all possible food sources, the bystander bees choose the most likely one and change the location of the food source. The optimum is saved until the enormous loops are reached as the new cost function competes with the old cost function.

3.5. Hybrid K-Medoids with IABC-Based CH-Selection Algorithm

The proposed K-IABC method employs the ABC algorithm with k-medoids to improve exploitation and exploration rates during CH selection. Algorithm 1 shows algorithm for clustering using k-medoid with IABC. The k-medoid-based usage parameter in the suggested K-IABC method avoids the ABC algorithm’s traditional drawback of rapidly falling into the local optimum for CH selection, and is depicted in Figure 3.
Algorithm 1: Algorithm for clustering using k-medoid with IABC
Initialization of network:
Step 1: Initialize the sensor network.
Step 2: Locate BS at coordinate.
Step 3: Place all the SNs randomly.
Cluster formation using k-medoid and selection of CH using IABC:
Step 4: Number of nodes, N, is divided into number of clusters, C.
Step 5: Every cluster has N number of nodes and each node is related to its nearest CH.
Step 6: Randomly select the first CH by selecting a random first medoid from N in C cluster.
Step 7: A three-dimensional coordinate (x, y, z) is generated by every normal node for CH.
Step 8: K-means distance calculation is performed by CH.
Step 9: Improved-ABC-optimization algorithm is used to select the new CH.
Step 10: Repeat steps 7 to 9 until the node in the real center is found.
End
The proposed IABC scheme plays an essential role in optimizing the election of the CH process by leveraging properties derived from intelligent-bee-hunting behavior. To identify the viable CH, the employee, onlooker, and scout-bee stages were integrated into the suggested K-IABC protocol.
We used search-space partitioning to generate the initial population, and used new search equations in the employed-bee and onlooker-bee stages to increase the chances of the onlooker bee finding a better solution, and some worst-case positions. With a new position based on the best non-updated position, Scoutbee has been improved. For initialization, the population is generated based on the search space partitioning (SSD) proposed by He et al. [24]. In the employed-bee stage, we enhance the ABC search formula and gradually use the information of the optimal solution to speed up the search. In the observation-bee phase, 25% of recruited bees were selected with equal probability to perform additional search actions. When many optimal solutions are found to be multidisciplinary, the current optima- solution information and the number of optimal solutions are used to provide a long-distance move, replacing the 10 worst positions with 5% new positions to build the function.

3.6. CORP

The cross-layer based opportunistic-routing-protocol (CORP) algorithm increases the stability of communication networks and reduces delays. Conventional cross-layer routing protocols have some flaws. These are as follows: (i) because WSNs have limited computing power, the computational complexity of data transmission increases with the number of limitations; (ii) they are challenging to integrate, and (iii) they consume a lot of power. The proposed CORP technique addresses several existing cross-layer routing-protocol shortcomings in communication delay, energy consumption, throughput, and packet-loss rate. Initialization, deployment, CH selection, and transmission of data to the receiver are the steps required in this work to coordinate the proposed protocol’s algorithm [16].
Because CH nodes are based on residual-power data, the network layer chooses nodes with higher energy. In routing, the network system uses the physical layer’s remaining power data and the link layer’s link-quality instructions to generate routing options and select the best path. The network layer uses routing to identify the next hop node to the physical layer before forwarding data. To ensure network connectivity, the physical layer calculates the effective transmission energy and transfers this data with a lower transmit power. The link layer employs error-control techniques to confirm data transmission based on the channel status and link quality.

3.7. Harris Hawk’s Optimization Algorithm (HHO)

HHO is a new nature-inspired algorithm. The HHO was inspired by the hunting behavior of Harris’s hawk. These birds perch in the air, spot prey from afar, and then pounce on it in a coordinated attack. The perching behavior of hawks is modeled as the scouting phase in HHO, while their foraging behavior is modeled as the exploiting phase. The mathematical model of the HHO algorithm is presented in this section. In HHO, a candidate solution is referred to as a hawk, (x), while the best solution is referred to as the prey ( x p r e y ) [37].
A.
EXPLORATION PHASE
Optimization methods require a thorough search of the problem landscape to find the best widely available solution. The metaheuristic algorithm begins the search in the exploration phase to find the best position between hills and valleys in the search space. At this point, an exhaustive search is conducted in the most remote locations. HHO begins by randomly placing N search agents (hawks) at a random location, x_n^0, i = {1, 2, …, N}, across the search space, using Equation (9):
x n 0 = l b n + r 1 × ( u b n l b n ) , r 1 = r a n d ( ) ,
After the population is initialized, the exploration phase continues until the escaping energy of prey |E| ≥ 1, is reached, at which point the value of E is calculated as (10):
E = 2 E 0 ( 1 t N ) ,   t = { 1 , 2 , , N } ,
E0 and N are the prey’s initial energy and the maximum number of iterations, respectively. This phenomenon is governed by a random variable, q, which is calculated as follows (11)–(13):
x n e w = { x r a n d r 2   | x r a n d 2 r 2 x n |   q 0.5 ( x p r e y x m ) r 3 [ l b n + r 4 ( u b n l b n ) ]   q < 0.5
r 2 = r a n d ( ) ,   r 3 = r a n d ( ) ,   r 4 = r a n d ( ) ,   r 5 = r a n d ( ) ,
x m = 1 N n = 1 N x n
where x m ,   x n e w and x r a n d are the dimension-wise average of the population, the new position, and a randomly selection position, respectively.
B.
EXPLOITATION PHASE
The convergence of many candidate solutions to previously identified promising locations in the search space is called exploitation. This phase is activated after a few iterations to explore the problem landscape. Once a potential neighborhood has been identified through the collective experience of the search agents, strategies are developed to make candidate solutions gradually adopt information from the best unique global solution. It is important to note, however, that approaching local regions too early can result in premature convergence, which leads to suboptimal solutions. To address this issue, HHO employs various exploitation strategies aimed at various eagle-hunting situations.
A system that chooses precise and effective data-transmission routes using an algorithm inspired by nature and a new probabilistic decision-rule function is proposed. A CL-IoT protocol is suggested (QoS) to balance CH energy usage and latency. By considering the exploitation and exploration phases, the suggested optimization algorithm chooses CHs. The remaining energy, distance, and SN link quality are just a few variables in choosing a CH. We should create energy-consumption graphs for the different clusters in the performance-analysis section.

4. Results and Discussion

4.1. Simulation-Parameter Setup

The MATLAB 2018 platform was used to implement the CL-HHO algorithm. Nodes in a WSN are organized based on system-domain standard transmissions. The simulation parameter setup is shown in Table 2. The proposed method’s outcomes are compared with existing algorithms, including HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO strategy [38].

4.2. Evaluation of Clustering and Routing

CH receives data from SNs in the surrounding environment. Figure 4 and Figure 5 depict data transmission from the source node to CH.
This routing protocol optimizes the transmission power of different sensor nodes and provides higher reliability for network or other transmissions by utilizing the network’s remaining power. The communication time between the source node and the destination node is reduced as data-transmission performance is improved. The K-IABC and CL-HHO algorithms form clusters and paths more efficiently than existing methods. The traditional method has a high packet-loss rate, transmission delay, and unstable power when sending data. The following section evaluates QoS metrics.

4.3. Performance Analysis

4.3.1. Energy Consumption

The K-IABC must find the best energy-based cluster head during CH selection. As a result, the CL-HHO method is used to evaluate the optimum routing path, and achieves better performance. This proposed CL-HHO is better suited than the existing algorithm. Table 3 compares existing technologies and shows the energy consumption of the proposed working network. Figure 6 compares the energy consumption of the suggested technique to that of conventional methods. The suggested CL-HHO uses less energy, 0.1 mJ for 100 nodes, whereas HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO consume 0.75 mJ, 0.61 mJ, 0.21 mJ, 0.15 mJ, and 0.1 mJ, respectively. As a result, the suggested CL-HHO method is extremely efficient in terms of energy consumption.

4.3.2. Network Lifetime (NLT)

NLT predicts the time between sensor-node locations and a dead network in this process. Figure 7 compares the network life spans of the presented CL-HHO technology and the existing technology. Table 4 compares current technologies and displays the NLT of the proposed working network. In a WSN, data packets must travel longer distances and consume more power. The efficiency of data transmission improves as the network time increases. The CL-HHO has a network life cycle of 5600 (rounds) at 100 nodes, whereas the latest generation of HEED, EECRP, GWO, CL-ALO, and CL-HHO have life cycles of 4100, 4400, 4700, 5100, and 5600 rounds, respectively.

4.3.3. Throughput

The rate at which data is fully transferred across the network is referred to as throughput. Throughput is a measure of the total amount of information that a system can process in a given amount of time.
Throughput = Amount   of   packet   send time   taken   to   transmit   the   packet
Figure 8 and Table 4 compare the suggested CL-HHO method to existing methods in terms of throughput. Table 4 shows that, compared to CL-HHO and other methods, the proposed method achieves high throughput (0.98 Mbps) at 100 nodes. HHOs proposed by HEED, EECRP, GWO, CL-ALO, and CL- represent 0.71 Mbps, 0.75 Mbps, 0.85 Mbps, 0.93 Mbps, and 0.98, respectively. The number of packets received is heavily influenced by the WSN’s lifetime and remaining power. As the number of nodes grows, performance will decrease. Table 5 demonstrates that the implementation strategy is significantly more efficient than other strategies.

4.3.4. End-To-End Delay (E2E)

Figure 9 and Table 6 show the E2E delay of the suggested CL-HHO and its comparison with the conventional method. The proposed CL-HHO method achieves lower end-to-end latency (1.8 s) within 100 s node than other conventional methods shown in Figure 9. In 100 nodes, the end-to-end delays of conventional methods such as HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO are 5.8 s, 4.6 s, 4.2 s, 2.9 s, and 1.8 s, respectively.

4.3.5. PDR

Table 7 and Figure 10 show the performance of the PDR. Compared to other conventional algorithms, the CL-HHO achieves high PDR (99.4%) energy efficiency at 100 nodes. The proposed method outperforms previous methods. At 100 nodes, the packet-delivery rates of the old methods HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO are 95.1%, 95.8%, 96.8%, 98.5%, and 99.4%, respectively. To transmit data efficiently, PDR must be high. As a result, the suggested model outperforms existing methods in terms of performance and efficiency.

4.3.6. PLR

Table 8 and Figure 11 show the PLR of the CL-HHO and the traditional algorithms. Compared to previous solutions, the proposed CL-HHO achieves a lower PLR (0.5%) among 100 nodes. The PLR rises as the number of nodes increases. Existing algorithms, such as HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO, have packet-loss rates of 6%, 3%, 2.5%, 1%, and 0.5%, respectively.

4.3.7. Jitter

This calculates the time difference between the first packet sent and when it is received. Figure 12 and Table 9 depicts the proposed algorithm’s jitter comparison. On 100 nodes, the suggested algorithm has a lower jitter value (0.45) than existing methods such as HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO, which have values of 0.73 ms, 0.68 ms, 0.60 ms, 0.53 ms, and 0.45 ms, respectively. The CL-HHO has a jitter value of 0.41 ms for 200 nodes; however, existing strategies such as HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO have values of 0.69 ms, 0.64 ms, 0.58 ms, 0.48 ms, and 0.41 ms, respectively.

4.3.8. Buffer Occupancy

Figure 13 and Table 10 depicts the buffer-occupancy performance of the CL-HHO and conventional methods. In comparison to existing methods, the CL-HHO-method simulation results achieve lower buffer occupancy (4%) at 100 nodes. As a result, the proposed CL-HHO protocol performs better than conventional methods. The buffer-occupancy rates of the proposed HEED, EECRP, GWO, CL-ALO, and CL-HHO methods are 14%, 12%, 9%, 5%, and 4%, respectively.

4.3.9. Communication Cost

Figure 14 and Table 11 depict the communication-cost performance of the proposed (CL-HHO) and existing methods. In comparison to existing methods, the CL-HHO-method simulation results achieve lower communication cost (0.04%) at 100 nodes. The communication cost increases as the number of nodes grow. As a result, the proposed CL-HHO protocol outperforms other existing methods. The communication cost rates of the proposed HEED, EECRP, GWO, CL-ALO, and CL-HHO methods are 0.12%, 0.10%, 0.09%, 0.07%, and 0.044%, respectively.

4.3.10. CH-Selection-Time Analysis

Figure 15 depicts the time performance of the CH-selection method. Compared to existing methods, the proposed CH selection results in a shorter execution time. The time will be extended if the number of CHs increases. Compared to the conventional algorithm, the introduced method achieves a faster execution time (37 s) in the first cluster head.

4.3.11. Energy Consumption vs. Cluster

Figure 16 depicts energy- consumption comparison for different clusters. The energy usages of CL-HHO provide minimum value compared to other conventional algorithms in different clusters. It achieves the minimum energy usage for different CH when compared to other algorithms.

4.3.12. Hop Count

The average number of hops as the network grows is depicted in Figure 17. The quantity of intermediate nodes involved in the packet-relay process affects the number of hops. The results offer a more precise relationship between node count and average hop count. CL HHO exploits the SN that can send packets over great distances. In other words, a node with a more excellent transmission range can travel fewer hops to reach its destination. On the other hand, the number of hops required to relay transmitted packets increases for an existing algorithm. Implementing the HHO method when energy-hole situations arise enhances network restructuring.

5. Conclusions

The k-medoid with IABC and CL-HHO has been proposed for clustering and routing in WSN. The CL-HHO hybrid technique determines the RP with the lowest energy consumption. MATLAB is used to implement all of the work, and the results are compared to some existing techniques. Multiple nodes are used to calculate QoS-performance metrics. When comparing HEED, EECRP, GWO, CL-ALO, and the proposed CL-HHO, the latter works well. Finally, the proposed k-medoids-IABC technique combined with the CL-HHO algorithm will be a better alternative to power-based routing in WSNs. As a result, more iteration may be required to select the most appropriate path. As a result, in the future, a better strategy should be proposed instead of distance estimation to improve the execution speed of the route search. In the future, a new CL routing protocol based on optimization could extend network lifetime and improve WSN performance. Compared to the HEED, EECRP, GWO, and CL-ALO, the introduced CL-HHO, increased network lifetime by 36.58%, 27.27%, 19.14%, and 9.80%, respectively. According to the experimental data, it outperforms HEED, EECRP, GWO, and CL-ALO in terms of QoS performance. Furthermore, adaptive hybrid optimization and deep learning will be proposed to investigate application-specific routing-data schemes to maximize overall routing network performance.

Author Contributions

Conceptualization, R.S.; data curation, R.S. and G.M.A.; formal analysis, S.P. and G.M.A.; funding acquisition, G.M.A.; investigation, X.X.; project administration, S.P. and D.S.; resources, X.X., O.I.K. and D.S.; software, X.X. and D.S.; validation, R.S., O.I.K. and S.P.; visualization, S.P.; writing—review and editing, O.I.K. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (No. 62172095), the Natural Science Foundation of Fujian Province (Nos. 2020J01875 and 2022J01644).

Data Availability Statement

Not applicable.

Acknowledgments

The authors thank the Natural Science Foundation of Fujian Province China.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kim, J.; Lee, D.; Hwang, J.; Hong, S.; Shin, D.; Shin, D. Wireless Sensor Network (WSN) Configuration Method to Increase Node Energy Efficiency through Clustering and Location Information. Symmetry 2021, 13, 390. [Google Scholar] [CrossRef]
  2. Lee, W.-C.; Jeon, Y.-B.; Han, S.-S.; Jeong, C.-S. Position Prediction in Space System for Vehicles Using Artificial Intelligence. Symmetry 2022, 14, 1151. [Google Scholar] [CrossRef]
  3. Premakumari, S.B.N.; Mohan, P.; Subramanian, K. An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm. Symmetry 2022, 14, 2515. [Google Scholar] [CrossRef]
  4. Lu, Y.; Wu, X.; Yao, L.; Zhang, T.; Zhou, X. Multi-Channel Data Aggregation Scheduling Based on the Chaotic Firework Algorithm for the Battery-Free Wireless Sensor Network. Symmetry 2022, 14, 1571. [Google Scholar] [CrossRef]
  5. Lin, I.-C.; Chang, C.-C.; Chang, Y.-S. Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA. Symmetry 2022, 14, 237. [Google Scholar] [CrossRef]
  6. Zhu, L.; Xiang, H.; Zhang, K. A Light and Anonymous Three-Factor Authentication Protocol for Wireless Sensor Networks. Symmetry 2022, 14, 46. [Google Scholar] [CrossRef]
  7. Elhoseny, M.; Shankar, K. Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans. Reliab. 2019, 69, 1077–1086. [Google Scholar] [CrossRef]
  8. Rani, P.L.; Kumar, G.S. Detecting Anonymous Target and Predicting Target Trajectories in Wireless Sensor Networks. Symmetry 2021, 13, 719. [Google Scholar] [CrossRef]
  9. Pattnaik, S.; Sahu, P.K. Adaptive Neuro-Fuzzy Inference System-Particle swarm optimization-based clustering approach and hybrid Moth-flame cuttlefish optimization algorithm for efficient routing in wireless sensor network. Int. J. Commun. Syst. 2021, 34, e4783. [Google Scholar] [CrossRef]
  10. Pour, S.E.; Javidan, R. A new energy aware cluster head selection for LEACH in wireless sensor networks. IET Wirel. Sens. Syst. 2021, 11, 45–53. [Google Scholar] [CrossRef]
  11. Pattnaik, S.; Sahu, P.K. Assimilation of fuzzy clustering approach and EHO-Greedy algorithm for efficient routing in WSN. Int. J. Commun. Syst. Int. J. Commun. Syst. 2020, 33, e4354. [Google Scholar] [CrossRef]
  12. Koyuncu, H.; Tomar, G.S.; Sharma, D. A New Energy Efficient Multitier Deterministic Energy-Efficient Clustering Routing Protocol for Wireless Sensor Networks. Symmetry 2020, 12, 837. [Google Scholar] [CrossRef]
  13. Jagadeesh, S.; Muthulakshmi, I. Dynamic clustering and routing using multi-objective particle swarm optimization with Levy distribution for wireless sensor networks. Int. J. Commun. Syst. 2021, 34, e4902. [Google Scholar] [CrossRef]
  14. Soleymani, S.A.; Goudarzi, S.; Kama, N.; Ismail, S.A.; Ali, M.; Zainal, Z.; Zareei, M. A Hybrid Prediction Model for Energy-Efficient Data Collection in Wireless Sensor Networks. Symmetry 2020, 12, 2024. [Google Scholar] [CrossRef]
  15. Tandon, A.; Kumar, P.; Rishiwal, V.; Yadav, M.; Yadav, P. A Bio-inspired Hybrid Cross-Layer Routing Protocol for Energy Preservation in WSN-Assisted IoT. KSII Trans. Internet Inf. Syst. 2021, 15, 1317–1341. [Google Scholar]
  16. Shanmugam, R.; Kaliaperumal, B. An energy-efficient clustering and cross-layer-based opportunistic routing protocol (CORP) for wireless sensor network. Int. J. Commun. Syst. 2021, 34, e4752. [Google Scholar] [CrossRef]
  17. Azharuddin, M.; Kuila, P.; Jana, P.K. Energy efficient fault tolerant clustering and routing algorithms for wireless sensor networks. Comput. Electr. Eng. 2015, 41, 177–190. [Google Scholar] [CrossRef]
  18. Amer, A.; Fawzy, A.E.; Shokair, M.; Saad, W.; El-Halafawy, S.; Elkorany, A. Balanced Energy Efficient Grid Based Clustering Protocol for Wireless Sensor Networks. J. Comput. Digit. Syst. 2017, 6, 1–12. [Google Scholar]
  19. Bouyer, A.; Hatamlou, A.; Masdari, M. A new approach for decreasing energy in wireless sensor networks with hybrid LEACH protocol and fuzzy C-means algorithm. Int. J. Commun. Netw. Distrib. Syst. 2015, 14, 400–412. [Google Scholar] [CrossRef]
  20. Fei, Z.; Li, B.; Yang, S.; Xing, C.; Chen, H.; Hanzo, L. A survey of multi-objective optimization in wireless sensor networks: Metrics, algorithms, and open problems. IEEE Commun. Surv. Tutor. 2017, 19, 550–586. [Google Scholar] [CrossRef]
  21. Vimalarani, C.; Subramanian, R.; Sivanandam, S.N. An enhanced PSO-based clustering energy optimization algorithm for wireless sensor network. Sci. World J. 2016, 2016, 8658760. [Google Scholar] [CrossRef]
  22. Lawal Samira, A.; Suleiman, G.; Usman, A.D.; Mu’azu, M.B.; Salawudeen, A.T. Optimal Deployment of Wireless Sensor Networks (WSN) Based on Artificial Fish Swarm Optimization Algorithm. Int. J. Sci. Eng. Investig. (IJSEI) 2015, 4, 45–51. [Google Scholar]
  23. Banka, H.; Jana, P.K. PSO-based multiple-sink placement algorithm for protracting the lifetime of wireless sensor networks. In Second International Conference on Computer and Communication Technologies; Springer: Berlin/Heidelberg, Germany, 2016; pp. 605–616. [Google Scholar]
  24. Djedouboum, A.C.; Ari, A.A.A.; Mohamadou, A.M.G.A.; Aliouat, O.T.A.Z.; Gueroui, A.M.; Thiare, O. A Framework of Modeling Large-Scale Wireless Sensor Networks for Big Data Collection. Symmetry 2020, 12, 1113. [Google Scholar] [CrossRef]
  25. Agawam, R.; Mittal, A.; Kaur, R. Various Optimization techniques used in Wireless Sensor Networks. Int. Res. J. Eng. Technol. (IRJET) 2016, 3, 2085–2090. [Google Scholar]
  26. Wang, H.; Chen, Y.; Dong, S. Research on efficientefficient routing protocol for WSNs based on improved artificial bee colony algorithm. IET Wirel. Sens. Syst. 2016, 7, 15–20. [Google Scholar] [CrossRef]
  27. Zhu, C.; Wu, S.; Han, G.; Shu, L.; Wu, H. A Tree-Cluster-Based Data-Gathering Algorithm for Industrial WSNs With a Mobile Sink. IEEE Access 2015, 3, 381–396. [Google Scholar] [CrossRef]
  28. Singh, R.; Verma, A.K. Energy Efficient Cross Layer based Adaptive Threshold Routing Protocol for WSN. AEU-Int. J. Electron. Commun. 2017, 72, 166–173. [Google Scholar] [CrossRef]
  29. Kumar, P.S.; Manikandan, J. Diagnosing COVID-19 Virus in the Cardiovascular System Using ANN. In Artificial Intelligence for COVID-19. Studies in Systems, Decision and Control; Oliva, D., Hassan, S.A., Mohamed, A., Eds.; Springer: Cham, Switzerland, 2021; Volume 358. [Google Scholar] [CrossRef]
  30. Song, Y.; Gui, C.; Lu, X.; Chen, H.; Sun, B. A Genetic Algorithm for Energy-Efficient Based Multipath Routing in Wireless Sensor Networks. Wirel. Pers. Commun. 2015, 85, 2055–2066. [Google Scholar] [CrossRef]
  31. Li, H.; Liu, J. Double Cluster Based Energy Efficient Routing Protocol for Wireless Sensor Network. Int. J. Wirel. Inf. Netw. 2016, 23, 40–48. [Google Scholar] [CrossRef]
  32. Kumar, P.S.; Chitra, P.; Sneha, S. Design of Improved Quadruple-Mode Bandpass Filter Using Cavity Resonator for 5G Mid-Band Applications. In Future Trends in 5G and 6G: Challenges, Architecture, and Applications; CRC Press: Boca Raton, FL, USA, 2021; pp. 219–234. [Google Scholar]
  33. Wang, J.; Wang, K.; Niu, J.; Liu, W. A K-medoids based clustering algorithm for wireless sensor networks. In Proceedings of the 2018 International Workshop on Advanced Image Technology (IWAIT), Chiang Mai, Thailand, 7–9 January 2018; pp. 1–4. [Google Scholar] [CrossRef]
  34. Kalaikumar, K.; Baburaj, E. FABC-MACRD: Fuzzy and Artificial Bee Colony Based Implementation of MAC, Clustering, Routing and Data Delivery by Cross-Layer Approach in WSN. Wirel. Pers. Commun. 2018, 103, 1633–1655. [Google Scholar] [CrossRef]
  35. Famila, S.; Jawahar, A.; Sariga, A.; Shankar, K. Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments. Peer-to-Peer Netw. Appl. 2020, 13, 1071–1079. [Google Scholar] [CrossRef]
  36. Kandasamy, A.; Rengarasu, S.; Burri, P.K.; Palanisamy, S.; Kumar, K.K.; Baladhandapani, A.D.; Mamo, S.A. Defected Circular-Cross Stub Copper Metal Printed Pentaband Antenna. Adv. Mater. Sci. Eng. 2022, 2022, 6009092. [Google Scholar] [CrossRef]
  37. Houssein, E.H.; Saad, M.R.; Hussain, K.; Zhu, W.; Shaban, H.; Hassaballah, M. Optimal Sink Node Placement in Large Scale Wireless Sensor Networks Based on Harris’ Hawk Optimization Algorithm. IEEE Access 2020, 8, 19381–19397. [Google Scholar] [CrossRef]
  38. Sam, P.J.C.; Surendar, U.; Ekpe, U.M.; Saravanan, M.; Kumar, P.S. A Low-Profile Compact EBG Integrated Circular Monopole Antenna for Wearable Medical Application. In Smart Antennas EAI/Springer Innovations in Communication and Computing; Malik, P.K., Lu, J., Madhav, B.T.P., Kalkhambkar, G., Amit, S., Eds.; Springer: Cham, Switzerland, 2022. [Google Scholar] [CrossRef]
  39. Dhanasekaran, S.; Ramesh, J. Channel estimation using spatial partitioning with coalitional game theory (SPCGT) in wireless communication. Wireless Netw. 2021, 27, 1887–1899. [Google Scholar] [CrossRef]
  40. Suganyadevi, K.; Nandhalal, V.; Palanisamy, S.; Dhanasekaran, S. Data Security and Safety Services using Modified Timed Efficient Stream Loss-Tolerant Authentication in Diverse Models of VANET. In Proceedings of the 2022 International Conference on Edge Computing and Applications (ICECAA), Coimbatore, India, 21–23 September 2022; pp. 417–422. [Google Scholar] [CrossRef]
  41. S, D.; Palanisamy, S.; Hajjej, F.; Khalaf, O.I.; Abdulsahib, G.M.; S, R. Discrete Fourier Transform with Denoise Model Based Least Square Wiener Channel Estimator for Channel Estimation in MIMO-OFDM. Entropy 2022, 24, 1601. [Google Scholar] [CrossRef] [PubMed]
  42. Murugesan, S.; Ramalingam, S.; Kanimozhi, P. Theoretical modelling and fabrication of smart waste man-agement system for clean environment using WSN and IOT. Mater. Today Proc. 2021, 45, 1908–1913. [Google Scholar] [CrossRef]
  43. Ramalingam, S.; Baskaran, K.; Kalaiarasan, D. IoT Enabled Smart Industrial Pollution Monitoring and Control System Using Raspberry Pi with BLYNK Server. In Proceedings of the 2019 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 17–19 July 2019; pp. 2030–2034. [Google Scholar] [CrossRef]
  44. Venkataramanan, C.; Ramalingam, S.; Manikandan, A. LWBA: Lévy-walk Bat Algorithm Based Data Prediction for Precision Agriculture in Wireless Sensor Networks. J. Intell. Fuzzy Syst. 2021, 41, 2891–2904. [Google Scholar] [CrossRef]
  45. Ramalingam, S.; Baskaran, K. An Efficient Data Prediction Model Using Hybrid Harris Hawk Optimization with Random Forest Algorithm in Wireless Sensor Network. J. Intell. Fuzzy Syst. 2021, 40, 5171–5195. [Google Scholar] [CrossRef]
  46. Subahi, A.F.; Khalaf, O.I.; Alotaibi, Y.; Natarajan, R.; Mahadev, N.; Ramesh, T. Modified Self-Adaptive Bayesian Algorithm for Smart Heart Disease Prediction in IoT System. Sustainability 2022, 14, 14208. [Google Scholar] [CrossRef]
  47. Lilhore, U.K.; Khalaf, O.I.; Simaiya, S.; Romero, C.A.T.; Abdulsahib, G.M.; Kumar, D. A depth-controlled and energy-efficient routing protocol for underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2022, 18, 15501329221117118. [Google Scholar] [CrossRef]
  48. Singhal, S.; Jatana, N.; Subahi, A.F.; Gupta, C.; Khalaf, O.I.; Alotaibi, Y. Fault coverage-based test case prioritization and selection using african buffalo optimization. Comput. Mater. Contin. 2023, 74, 6755–6774. [Google Scholar] [CrossRef]
  49. Rahman, H.; Tariq, J.; Masood, M.A.; Subahi, A.F.; Khalaf, O.I.; Alotaibi, Y. Multi-tier sentiment analysis of social media text using supervised machine learning. Comput. Mater. Contin. 2023, 74, 5527–5543. [Google Scholar] [CrossRef]
  50. Agrawal, R.; Faujdar, N.; Romero, C.A.T.; Sharma, O.; Abdulsahib, G.M.; Khalaf, O.I.; Mansoor, R.F.; Ghoneim, O.A. Classification and comparison of ad hoc networks: A review. Egypt. Inform. J. 2022. [Google Scholar] [CrossRef]
  51. Palanisamy, S.; Thangaraju, B. Design and analysis of clover leaf-shaped fractal antenna integrated with stepped impedance resonator for wireless applications. Int. J. Commun. Syst. 2022, 35, e5184. [Google Scholar] [CrossRef]
  52. Nivethitha, T.; Palanisamy, S.K.; Prakash, K.M.; Jeevitha, K. Comparative study of ANN and fuzzy classifier for forecasting electrical activity of heart to diagnose COVID-19. Mater. Today Proc. 2021, 45, 2293–2305. [Google Scholar] [CrossRef] [PubMed]
  53. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. A Novel Approach of Design and Analysis of a Hexagonal Fractal Antenna Array (HFAA) for Next-Generation Wireless Communication. Energies 2021, 14, 6204. [Google Scholar] [CrossRef]
  54. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S. Design and Synthesis of Multi-Mode Bandpass Filter for Wireless Applications. Electronics 2021, 10, 2853. [Google Scholar] [CrossRef]
  55. Kumar, S.; Balakumaran, T. Modeling and simulation of dual layered U-slot multiband microstrip patch antenna for wireless applications. Nanoscale Rep. 2021, 4, 15–18. [Google Scholar] [CrossRef]
  56. Radhakrishnan, K.; Ramakrishnan, D.; Khalaf, O.I.; Uddin, M.; Chen, C.-L.; Wu, C.-M. A Novel Deep Learning-Based Cooperative Communication Channel Model for Wireless Underground Sensor Networks. Sensors 2022, 22, 4475. [Google Scholar] [CrossRef]
  57. Palanisamy, S. Predictive Analytics with Data Visualization. J. Ubiquitous Comput. Commun. Technol. 2022, 4, 75–96. [Google Scholar] [CrossRef]
  58. Malik, P.K.; Naim, A.; Singh, R. (Eds.) Printed Antennas: Design and Challenges, 1st ed.; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar] [CrossRef]
  59. Haus, B.; Yap, J.S.; Schaefer, L.; Mercorelli, P. Soft Optimal Computing Methods to Identify Surface Roughness in Manufacturing Using a Monotonic Regressor. In Soft Computing: Theories and Applications; Kumar, R., Ahn, C.W., Sharma, T.K., Verma, O.P., Agarwal, A., Eds.; Lecture Notes in Networks and Systems; Springer: Singapore, 2022; p. 425. [Google Scholar] [CrossRef]
  60. Kumar, P.S.; Valarmathy, S. Development of a novel algorithm for SVMBDT fingerprint classifier based on clustering approach. In Proceedings of the IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM-2012), Nagapattinam, India, 30–31 March 2012; pp. 256–261. [Google Scholar]
  61. Haus, B.; Mercorelli, P.; Yap, J.S.; Schäfer, L. Soft Optimal Computing to Identify Surface Roughness in Manufacturing Using a Gaussian and a Trigonometric Regressor. In Soft Computing and Its Engineering Applications icSoftComp 2021. Communications in Computer and Information Science; Patel, K.K., Doctor, G., Patel, A., Lingras, P., Eds.; Springer: Cham, Switzerland, 2022; Volume 1572. [Google Scholar] [CrossRef]
  62. Kulbhushan, S.; Sameer, M. Challenges in Wireless Sensor Network. SSRN Electron. J. 2014, 2, 1165–1168. [Google Scholar]
  63. Alaa, E.; Hazem, E.-B.; Samir, E.; Sajjad, H.; Asaad, H.; Samir, Z. Challenges in Wireless Sensor Networks. Int. J. Adv. Res. Comput. Sci. Technol. 2016, 4, 22–27. [Google Scholar]
  64. Kumar, P.; Boopathy, S.; Dhanasekaran, S.; Anand, K.R.G. Optimization of Multi-Band Antenna for Wireless Communication Systems using Genetic Algorithm. In Proceedings of the 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), Virtual. 8–9 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  65. Ahmad, R.; Wazirali, R.; Abu-Ain, T. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 2022, 22, 4730. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Clustering in WSN.
Figure 1. Clustering in WSN.
Symmetry 15 00438 g001
Figure 2. Flow chart of proposed ABC.
Figure 2. Flow chart of proposed ABC.
Symmetry 15 00438 g002
Figure 3. Overall process of the K-IABC algorithm.
Figure 3. Overall process of the K-IABC algorithm.
Symmetry 15 00438 g003
Figure 4. Sensor node to BS data transmission using a CL-HHO protocol.
Figure 4. Sensor node to BS data transmission using a CL-HHO protocol.
Symmetry 15 00438 g004
Figure 5. Source node to CH data transmission.
Figure 5. Source node to CH data transmission.
Symmetry 15 00438 g005
Figure 6. Energy-Consumption Comparisons.
Figure 6. Energy-Consumption Comparisons.
Symmetry 15 00438 g006
Figure 7. Network-lifetime Comparison.
Figure 7. Network-lifetime Comparison.
Symmetry 15 00438 g007
Figure 8. Throughput comparison.
Figure 8. Throughput comparison.
Symmetry 15 00438 g008
Figure 9. End-to-End-delay comparison.
Figure 9. End-to-End-delay comparison.
Symmetry 15 00438 g009
Figure 10. Comparison of PDR.
Figure 10. Comparison of PDR.
Symmetry 15 00438 g010
Figure 11. Packet-loss ratio.
Figure 11. Packet-loss ratio.
Symmetry 15 00438 g011
Figure 12. Comparison of Jitter.
Figure 12. Comparison of Jitter.
Symmetry 15 00438 g012
Figure 13. Buffer occupancy.
Figure 13. Buffer occupancy.
Symmetry 15 00438 g013
Figure 14. Communication cost.
Figure 14. Communication cost.
Symmetry 15 00438 g014
Figure 15. CH-selection time.
Figure 15. CH-selection time.
Symmetry 15 00438 g015
Figure 16. Energy consumption for Different Clusters.
Figure 16. Energy consumption for Different Clusters.
Symmetry 15 00438 g016
Figure 17. Hop Count.
Figure 17. Hop Count.
Symmetry 15 00438 g017
Table 1. Comparison of existing algorithm and its limitations.
Table 1. Comparison of existing algorithm and its limitations.
ReferencesProposed AlgorithmLimitation
[9]MFO-CFOJitter and buffer occupancy are considered for QoS perfromance
[11](EHO)-Greedy algorithmCH-selection time is high
[13]MOPSO-LPoor energy consumption
[15]BiHCLR algorithmHigh computational complexity
[18]Balanced-energy-efficient-grid-based clustering protocolPoor QoS performance
[21]EPSO-CEOCommunication cost is high
[25]Hybrid GA-PSO approachEnergy consumption cannot be minimized sufficiently
[27]TCBDGAHigh computational complexity
[29]BPSNs and EHSNsThe overhead issues are not addressed
Table 2. Parameter Setup.
Table 2. Parameter Setup.
PARAMETERVALUE
Total Clusters6
Number of nodes500
Initial energy0.1 J
Communication-Tx Energy20.5 mW
Communication-Rx Energy14 mW
Deployment area500 × 500
Packet size512 bytes
Packet-sending rate1 packet/s
Node distributionRandom
Table 3. Comparison table for Energy consumption.
Table 3. Comparison table for Energy consumption.
MethodsEnergy Consumption
No. of nodes100200300400500
CL-HHO0.10.250.330.470.55
CL-ALO0.150.290.480.60.72
GWO0.210.420.550.710.88
EECRP0.610.80.951.21.4
HEED0.750.951.21.41.6
Table 4. Comparison table for network lifetime.
Table 4. Comparison table for network lifetime.
MethodsNLT
No. of nodes100200300400500
CL-HHO56005300490046004100
CL-ALO51004800460041003800
GWO47004500430038003300
EECRP44004100370034002900
HEED41003800330032002800
Table 5. Comparison table for Throughput.
Table 5. Comparison table for Throughput.
MethodsThroughput
No. of nodes100200300400500
CL-HHO0.980.920.890.850.79
CL-ALO0.930.850.770.720.69
GWO0.850.780.710.650.60
EECRP0.750.700.680.600.55
HEED0.710.650.610.540.49
Table 6. Comparison table for E2E delay.
Table 6. Comparison table for E2E delay.
MethodsE2E Delay
No. of nodes100200300400500
CL-HHO1.82.43.33.84.0
CL-ALO2.93.84.34.75.2
GWO4.24.85.46.35.5
EECRP4.65.26.17.08.2
HEED5.86.57.08.29.0
Table 7. Comparison table for PDR.
Table 7. Comparison table for PDR.
MethodsPDR
No. of Nodes100200300400500
CL-HHO99.498.497.896.595.5
CL-ALO98.597.096.595.494.6
GWO96.896.595.695.093.8
EECRP95.895.394.894.193.2
HEED95.194.293.292.791.8
Table 8. Comparison table for PLR.
Table 8. Comparison table for PLR.
MethodsPLR
No. of Nodes100200300400500
CL-HHO0.5122.53.0
CL-ALO1344.55.0
GWO2.54567.5
EECRP34.56.58.09
HEED67.58.51011
Table 9. Comparison table for Jitter.
Table 9. Comparison table for Jitter.
MethodsJitter
No. of Nodes100200300400500
CL-HHO0.450.410.390.360.35
CL-ALO0.530.480.450.410.39
GWO0.600.580.560.530.50
EECRP0.680.640.610.560.52
HEED0.730.690.660.610.57
Table 10. Comparison table for buffer occupancy.
Table 10. Comparison table for buffer occupancy.
MethodsBuffer Occupancy
No. of Nodes100200300400500
CL-HHO4581013
CL-ALO57101114
GWO911131617
EECRP1214161819
HEED1415172023
Table 11. Comparison table for communication cost.
Table 11. Comparison table for communication cost.
MethodsCommunication Cost
No. of nodes100200300400500
CL-HHO0.040.050.080.120.14
CL-ALO0.070.100.120.150.19
GWO0.090.120.150.180.22
EECRP0.100.130.160.180.24
HEED0.120.160.210.230.30
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xue, X.; Shanmugam, R.; Palanisamy, S.; Khalaf, O.I.; Selvaraj, D.; Abdulsahib, G.M. A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks. Symmetry 2023, 15, 438. https://doi.org/10.3390/sym15020438

AMA Style

Xue X, Shanmugam R, Palanisamy S, Khalaf OI, Selvaraj D, Abdulsahib GM. A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks. Symmetry. 2023; 15(2):438. https://doi.org/10.3390/sym15020438

Chicago/Turabian Style

Xue, Xingsi, Ramalingam Shanmugam, SatheeshKumar Palanisamy, Osamah Ibrahim Khalaf, Dhanasekaran Selvaraj, and Ghaida Muttashar Abdulsahib. 2023. "A Hybrid Cross Layer with Harris-Hawk-Optimization-Based Efficient Routing for Wireless Sensor Networks" Symmetry 15, no. 2: 438. https://doi.org/10.3390/sym15020438

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop