4.3.1. Comparative Analysis of Proposed MA with Existing Algorithms
The simulation results for the WSN’s performance, taking into account dead nodes, are shown in
Figure 5a, with existing techniques like EECHS-ARO [
33], HSWO [
34] and SWARAM. When a node’s energy ran out throughout the simulation, that node counted as a dead node. The network lifetime, which was defined as the amount of time until the network’s final node died, was intended to be measured by the simulation. The quantity of alive nodes in the network indicates how many nodes are there. A large number of active nodes in the network improves network performance. The suggested methodology’s alive node performance is evaluated using various node counts and existing algorithms.
Figure 5b shows the comparison of alive nodes. The performance evaluation of packets transmitted by the proposed methodology with existing algorithms is presented in
Figure 5c.
Figure 5d illustrates how the total number of packets received by the base station (BS) is increased by reducing the energy consumption of the nodes during data packet transmission.
The simulation results for communication overhead are graphically shown in
Figure 6a for those proposed with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, and
Table 2 provides evidence that the suggested method performs better than the existing methods. The existing method has attained a value of 0 for 50 nodes and 5, 14, 11.5, 10.5 and 7.5 for 300 nodes during simulation. For nodes 50, 100, 150, 200, 250, and 300 the proposed method attained 0, 0, 0, 1, 3, and 5, respectively. The proposed value is lower compared with the existing one. Thus, the proposed was better in communication overhead.
EC is shown graphically in
Figure 6b and the tabular form is viewed in
Table 3; it was found to be lower compared to existing approaches for EECHS-ARO, HSWO, EECHIGWO, and SWARAM with 0.17, 0.15, 0.13, 0.1 for 500 nodes, while 0.8, 0.1, 0.12, 0.15, 0.18, 0.2, 0.22 and 0.25 are the values of rounds 500,1000,1500, 2000, 2500, 3000, 3500, 4000 proposed, which is lower compared with existing approaches. Thus, the proposed approach was better for EC.
The network lifetime of the suggested strategy and the use of the previous models are shown in
Figure 6c, where the x-axis presents the no. of nodes and the y-axis represents the network lifetime. This is viewed in
Table 4: 4900, 3147, 4048, and 4512 are the values of EECHS-ARO, HSWO, EECHIGWO, and SWARAM, where the proposed approach attained 5107 for 100 nodes. The proposed approach attained 5024, 5542, 5261 and 5217 for 200, 300, 400 and 500 nodes, respectively. The proposed approach attained a higher network lifetime than the existing approaches.
The end-to-end delays of the proposed- and existing-scheme comparison are displayed in
Figure 6d and in
Table 5. The optimality factor is satisfied by the suggested scheme’s constant attempt to deliver the packet to the best intermediate node. Conversely, existing methods require a significant amount of time to locate the destination node. Additionally, the destination node takes a while to respond, so the average end-to-end delay in the associated scheme is longer than that in the suggested model. The values 2.3, 6.85, 5.8, and 4.48 are those of EECHS-ARO, HSWO, EECHIGWO, and SWARAM and the proposed approach obtained 2.35ms for 100 nodes.
The PDR of the proposed approach is greater, with a value of 98.05. It is compared with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, which obtained 98.72, 90.81,93.74, and 97.45 for 100nodes. The proposed approach obtained 97,96, 95.25, 99 for 200, 300, 400, and 500 nodes, respectively. The PDRs are graphically shown in
Figure 6e and the values are displayed in tabular form in
Table 6.
The scalability vs. network size of the proposed approach is lower, with a value of 24. It is compared with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, which obtained 43, 50, 68, and 85 for 500 nodes. The values 24, 20, 19, and 15 are the proposed values for 1000, 2000, 3000, and 5000 nodes, respectively. The scalability vs. network size is graphically shown in
Figure 6f and the values are displayed in
Table 7.
The scalability vs. network load of the proposed approach is higher, with a value of 171. It is compared with existing techniques like EECHS-ARO, HSWO, EECHIGWO, and SWARAM, which obtained 170, 166, 160, and 158 for 5000 nodes. The scalability vs. network size is graphically shown in
Figure 6g and the respective values are shown in
Table 8.
Figure 6h shows the comparison of the cluster head count produced by the existing approach and suggested in each iteration. The throughput graph is displayed in
Figure 6i for the proposed and existing approaches.
Table 9 shows the description of the packets delivered to the sink. For 100 nodes, the existing methods delivered 10,000, 16,000, 20,000 and 25,000 packets with EECHS-ARO, HSWO, EECHIGWO, and SWARAM, respectively, and the proposed method received 28,000 packets.
Table 10 shows the description of the scalability of density. For node 500, existing methods attained 60, 60, 55 and 50 for EECHS-ARO, HSWO, EECHIGWO, and SWARAM, and the proposed method obtained 63.
Figure 7 shows average energy effect of the proposed and existing algorithms. Average energy effect is measured to show the superiority of the proposed model in energy consumption. Those proposed, CHOCR [
35], IMD-EACBR [
36], IDR-DRL-DC [
37] and DTC-BR [
38], obtained average energy effect of 90, 92, 95, 95 and 90 (%), respectively, thus proving that the proposed model obtained a better average energy effect.
Figure 8 shows the packet loss ratio compared to recent existing works. From the figure, it is clear that the proposed model attained better packet loss, which was due to security measures taken against cyber security attacks. Those proposed, CHOCR [
35], IMD-EACBR [
36], IDR-DRL-DC [
37] and DTC-BR [
38], obtained a loss ratio of 12, 15, 17, 21 and 22%, respectively. Thus, overall, the proposed model excels more than previous ones.
Figure 9 shows the robustness of the proposed EECM model. From the figure, the various attacks in the dataset are identified within the minimum time, which has been clearly mentioned. Attacks such as OS Scan, Active Wiretap, ARP MitM, Video Injection, Fuzzing, SSDP Flood, SYN DoS, SSL Renegotiation and Mirai have been focused on in this work. The proposed model obtained 98.05, 98.01, 98.06, 98, 98.01, 98.05, 98.05, 98.05 and 98.01 (%), respectively, where exiting models attained a very low percentage.
Figure 10 shows the computational complexity of the model in terms of time
. From this, it has been proven that the proposed model attained a minimum time complexity of 18.9%, while others such as CHOCR [
35], IMD-EACBR [
36], IDR-DRL-DC [
37] and DTC-BR [
38] attained 22, 24, 22 and 23 (%), respectively. Thus, the proposed model was proven to be effective.