Next Article in Journal
Interactive Impacts of Overconfidence and Competitive Preference on Closed-Loop Supply Chain Performance
Previous Article in Journal
Computing Sharp Bounds of Metric Based Fractional Dimensions for the Sierpinski Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Hybrid Delay Aware Clustered Routing Approach Using Aquila Optimizer and Firefly Algorithm in Internet of Things

by
Mehdi Hosseinzadeh
1,2,3,
Liliana Ionescu-Feleaga
4,
Bogdan-Ștefan Ionescu
5,
Mahyar Sadrishojaei
6,
Faeze Kazemian
7,
Amir Masoud Rahmani
8,* and
Faheem Khan
9,*
1
Institute of Research and Development, Duy Tan University, Da Nang 550000, Vietnam
2
School of Medicine and Pharmacy, Duy Tan University, Da Nang 550000, Vietnam
3
Computer Science, University of Human Development, Sulaymaniyah 0778-6, Iraq
4
Department of Accounting and Audit, Bucharest University of Economic Studies, 010374 Bucharest, Romania
5
Department of Management Information System, Bucharest University of Economic Studies, 010374 Bucharest, Romania
6
Faculty of Industry, University of Applied Science and Technology (UAST), Tehran 11369, Iran
7
Department of Computer Science, University of Applied Science and Technology (UAST), Tehran 11369, Iran
8
Future Technology Research Center, National Yunlin University of Science and Technology, 123 University Road, Section 3, Douliou, Yunlin 64002, Taiwan
9
Department of Computer Engineering, Gachon University, Seongnam 13120, Republic of Korea
*
Authors to whom correspondence should be addressed.
Mathematics 2022, 10(22), 4331; https://doi.org/10.3390/math10224331
Submission received: 23 October 2022 / Revised: 13 November 2022 / Accepted: 13 November 2022 / Published: 18 November 2022
(This article belongs to the Section Dynamical Systems)

Abstract

:
Protocols for clustering and routing in the Internet of Things ecosystem should consider minimizing power consumption. Existing approaches to cluster-based routing issues in the Internet of Things environment often face the challenge of uneven power consumption. This study created a clustering method utilising swarm intelligence to obtain a more even distribution of cluster heads. In this work, a firefly optimization method and an aquila optimizer algorithm are devised to select the intermediate and cluster head nodes required for routing in accordance with the NP-Hard nature of clustered routing. The effectiveness of this hybrid clustering and routing approach has been evaluated concerning the following metrics: remaining energy, mean distances, number of hops, and node balance. For assessing Internet of things platforms, metrics like network throughput and the number of the living node are crucial, as these systems rely on battery-operated equipment to regularly capture environment data and transmit specimens to a base station. Proving effective, the suggested technique has been found to improve system energy usage by at least 18% and increase the packet delivery ratio by at least 25%.

1. Introduction

It’s possible to think of the Internet of Things (IoT) as a decentralized, autonomous ecosystem made up of a vast collection of disparate, unconnected devices [1]. The monitoring system, medicine, the military, and e-learning are just some fields that have benefited from recent technological developments in the realm of actual wireless infrastructure applications [2,3]. Low energy levels in the platform’s nodes are a significant problem that needs fixing [4]. Network performance can be enhanced by more evenly distributing electricity among nodes [5].
Some IoT service-providing nodes are fixed in the site and can’t be updated or recharged, yet they still need to operate on a restricted energy budget [6]. Receiving and transmitting data causes the most tremendous drain on a network’s power sources and is proportional to the distance among nodes [7]. Therefore, developing a dependable and low-power routing method is a primary goal in order to extend the lifespan of the network, which is one of the most critical routing concerns in the IoT [8]. The primary idea behind the clustered routing algorithm is to break the system into more manageable components or clusters. There has been a lot of study into the best ways to optimize clustered routing to lessen the energy needs of IoT devices and lengthen the lifespan of networks. Cluster Member (CM) nodes may report data to the Cluster Head (CH) node [9]. Single-hop or multi-hop connection is used to provide the aggregated and cleansed information to the Base Station (BS) [10].
One of the Non-deterministic Polynomial-time hard (NP-hard) challenges is the clustering of IoT devices to maximize system longevity [11]. Since it cannot be handled using deterministic methods in polynomial time, this problem class is impractical. Swarm Intelligence (SI) methods, however, such as Artificial Bee Colony (ABC) [12], Whale Optimization (WO) [13], Genetic Algorithm (GA) [14], Gray Wolf Optimizer (GWO) [15], and Harmony Search (HS) [16], could get close to the result in an acceptable amount of time. Aquila Optimizer (AO) is the most recent strategy for SI, announced in 2021. This method mimics distinct aquila hunt strategies for various prey types. The hunting techniques for fast-moving prey indicate the algorithm’s capacity towards global exploration, while the hunting tactics for slow-moving prey highlight its capacity at local exploitation [17]. The AO algorithm has powerful global exploration ability, excellent searching efficiency, and rapid convergence speed [18]. Considering to the limited amount of time after the algorithm’s proposal, little study has been conducted on AO.
Through simulating a population of fireflies, simulation their actions, and assigning values based on the fitness of every firefly’s position to represent the amount of firefly pigments, the Firefly Algorithm (FA) can find the best possible answer to a problem by repeatedly running the method and upgrading the worms’ positions [19]. In reality, in each repetition of the strategy, the pigment-refreshing stage and the motion stage are the two most important stages. The fireflies in the area go to the fireflies that have more pigments [20]. As a result, the group improves over time as a whole [21]. This paper proposes a Hybrid Aquila Optimizer and Firefly Algorithm (HAOFA) routing model, wherein the AO approach is used to select the best CH node to achieve energy-efficient inter-cluster interactions, and the FA method is liable for finding the best intermediate node for efficient intra-cluster interactions. In a nutshell, these are the various contributions:
  • Recreating and emphasizing the AO algorithm’s distinctive features;
  • Using the AO approach, we provide a solution to the IoT’s cluster-based routing problem;
  • Highlighting the salient features of the FA algorithm and discussing them in detail;
  • Multi-hop routing using the FA algorithm for improved power usage and throughput;
  • Investigating how efficient clustered routing is.
Following is the remainder of the article’s information. In Section 2, a look at some of the prior art in the field of clustering protocols is given. In Section 3, the procedure of HAOFA is deeply discussed. The effectiveness of the HAOFA methodology is evaluated in Section 4. Section 5 presents the last thoughts and plans for further development.

2. Literature Review

Over the past few years, a plethora of routing algorithms have emerged, each with its own unique power requirements [22]. These strategies concentrate on shortening the distance between communicating nodes to cut down on power consumption and avoid energy hole issues [23]. An important benefit that has been identified is that the nodes in this approach do not all carry out the same task [24]. They employ a hierarchical layout, segmenting the system into many groups.
Hriez, Almajali [25] have developed a clustering algorithm employing a trust model that recognizes untrusted nodes operating power and data trust. In addition, the Fitness Function (FF) is utilized to pick the CH nodes from a list of reliable nodes. Inside this work, the FF is derived using the residual energy of the nodes, the length across each node and the BS, the densities, and power. During the designing of clusters, the population of CH nodes was considered to guarantee that the burden on all CH nodes was evenly distributed. In order to prolong the platform’s lifespan, this clustering method incorporated the beneficial properties of stochastic fractal search optimization. This method also became unsuccessful for heterogeneous networks.
Also, Amutha, Kannan [26] have developed a cluster manager-based CH node mechanism to solve power usage and workload balancing. This method utilized two ideas, cluster manager and CH node, with the cluster manager observing the activities of other nodes. The message was transferred across IoT nodes by the CH node. Whenever the amount of power in the CH node became depleted, the cluster management chose the fresh CH node with the highest level of power and saved the new and old CH node operations. In addition to conserving energy and bandwidth, such an approach ensured reliable throughput. Unfortunately, some of this system’s flaws were insufficient scalability and a disregard for data protection.
Saxena and Mehta [27] have proposed a method for building a hierarchy architecture and energy savings for the IoT wherein clusters were constructed using a fuzzy multi-criteria decision strategy; subsequently, the CH nodes were ideally chosen based on the hierarchy analysis procedure. During intra-cluster and inter-cluster connections, the penguin search method is applied. This method enhances production while concurrently reducing power use. The strategy’s primary shortcoming would be its disdain towards Quality of Service (QoS).
Moreover, Ahmad, Ikram [28] have developed a clustering-aware optimization method using the features of the GA and the honey bee approach. Under this method, bees display a fundamental clustering structure whose resilience and load distribution dictate their fitness. This facilitates the population’s management of topological adjustments and high-quality harvest options. This approach performs the options in terms of clustering time, and the number of clusters extends the network’s life span and produces a lower overhead than the competitors. Even though CH nodes are dispersed irregularly, this leads to significant energy usage and overload differences.
Xiuwu, Ying [29] have created an IoT clustered routing algorithm implementing mixed genetic taboo search. Inside the initial stage, the CH node of the clusters was selected by considering the residual power of every node and its distance from the BS in order to optimize the threshold function in the cluster. To preserve the total energy balancing of the system, additional nodes are joined to the cluster at the lowest possible cost based on the Cost Function (CF) in the subsequent phase. The findings show that this method improves the lifespan of the network and spends fewer power in a better-balanced way. This approach has numerous disadvantages, such as a lengthy network latency and inadequate data security.
In addition, Poluru and Kumar R [30] have published an optimization technique for finding CH nodes based on the remaining power, the length of the BS, and the node-to-node communication channel. The suggested model conserves energy, prolongs the platform’s lifetime, and selects the proper channel. This technique has weak convergence, which is a negative.
Jayalakshmi, Sridevi [31] have introduced a hybrid HS methodology with an ABC in order to achieve effective CH node allocation. This action was taken to maintain steady energy consumption while extending the platform’s lifetime. The above technique combines the global optimization capability of the HS algorithm with the local exploitation potential of the conventional ABC algorithm in order to gather a considerable number of CH nodes for the sake of conserving energy and extending the lifespan of the network. Thus, it incorporated the benefits of the harmony-adjusting function for triggering the mechanism for generating dynamic findability during the process of CH node selection to prevent the worst contenders from being selected as CH nodes. This was done to guarantee that the most qualified people were chosen as CH nodes. The proposed approach prolongs the average network’s lifespan and keeps power consumption balanced. Consequently, the cost is a critical component that must be paid specific care inside the clustering model.
Finally, Agrawal and Pandey [32] have proposed a hybrid HS and fuzzy logic technique to extend the IoT network’s lifetime. The stated method results in unequal clusters. Utilizing an HS-based approach, the efficiency of the proposed method was demonstrated. The presented method achieves higher efficiency in a variety of contexts. It boosts the system’s durability. This approach essentially performs poorly in the presence of network dynamics.
Table 1 shows a side-by-side comparison of the significant advantages and disadvantages of the analyzed strategies. Power consumption and low throughput are the main problems with the aforementioned methods, although they are essential to the IoT architecture. The suggested solution makes an effort to solve these problems. This method not only addresses crucial and sensitive routing difficulties but also analyzes the energy consumption, Packet Delivery Ratio (PDR), End-to-End (E2E) delay and throughput.

3. The Proposed Mechanism

Following is a more in-depth explanation of the strategy that will be employed. First, the network model is built, then the problem statement is explained, and then the AO and FA are described in detail.

3.1. System Model

It is assumed that BS and N IoT devices exist in the ecosystem. Each IoT node has its own CH node through which it communicates with the BS. Below are certain commonly held assumptions about logic:
  • The IoT devices are scattered around in a random pattern.
  • Starting power is the same for all IoT nodes.
  • BS is installed constantly in the core of the system.
  • Endless battery life and storage space are two of the BS’s many perks.
  • Each and every cluster has exactly one node in the CH.
  • All connections have plenty of available bandwidth.

3.2. Problem Declaration

In order for data to be sent from the CH nodes to the BS, a multi-hop communication must be established. It is the job of CM nodes to relay information to CH nodes in a cluster. The meta-heuristic approaches are more efficient computationally because they explore broadly for the best solution. Because of these traits and AO skills, it is capable of picking the best alternatives. Additionally, FA is adaptable to problems involving both continuous and discrete parameters. System reliability is enhanced, and assets are used to their full potential when the AO method is used to pinpoint the CH nodes. By utilizing FA, the best intermediate node can be selected to increase the stability and durability of the platform.

3.3. AO Algorithm

The most newly invented SI method is known as the AO. Aquila employs four distinct hunting techniques to capture a variety of animals. In addition, Aquila may rapidly transition among multiple prey-specific hunt techniques before launching an assault, including its velocity, claws, and strong feet.
Stage 1: Expanded exploration (high soar with a vertical descent).
In this approach, whenever the Aquila establishes the position of its prey, it dives vertically after soaring high above the surface and thoroughly surveying the searching space. These Equations (1) and (2) illustration demonstrates the behaviour [33].
Y ( c i + 1 ) = Y B e s t ( c i ) × ( 1 c i c I ) + ( Y N ( c i ) Y B e s t ( c i ) × P )
Y N ( c i ) = 1 M j = 1 M Y j ( c i )
In the current repetition, the mean location of the Aquila is indicated by Y N ( c i ) , while the ideal position is denoted by Y B e s t ( c i ) . c i   represents the current repetition, whereas c I   represents the max number of repetitions. P and M represent the random value between [0, 1] and the size of the population, respectively.
Stage 2: Narrowed exploration (flying along a contour with a rapid glide assault).
Narrowed exploring is the predominant common hunting method employed by Aquila. Upon circling the target and falling within the designated place, the predator assaults the victim with quick glides. The location updating appears as Equation (3).
Y ( c i + 1 ) = Y B e s t ( c i ) × L F F ( D i m ) + Y R P ( c i ) ( x y ) × P
The arbitrary location of Hawk is indicated by Y R P ( c i ) . Equation (4) Dim and LFF indicate the dimensional size and Levy flight function, respectively.
L F F   ( D i m ) = s × v × ω | u | 1 α
ω = [ Γ ( 1 + α ) × sin ( π α 2 ) Γ ( 1 + α 2 ) × α × 2 ( α 1 2 ) ]
α and s have constant values of 1.5 and 0.01. v and u are between 0 and 1 random numbers. The spiral pattern in the search using x and y is displayed by Equation (6).
{ y = r × s i n ( θ ) x = r × c o s ( θ ) r = r 1 + 0.00565 × D i m 1 θ = σ × D i m 1 + 3 × π 2  
r 1 represents the searching loop number between 1 and 20. D i m 1   consists of whole numbers from 1 to the size of the dimension (Dim), and 0.005 is equivalent to σ.
Stage 3: Expansion of exploitation (short flight and a slow assault fall).
Upon accurately identifying the position of the prey, the Aquila flies vertically to perform a preliminary assault in the third strategy. Here, AO exploits the selected position in order to reach and assault the target. The following activities are highlighted in Equation (7):
Y ( c i + 1 ) = ( Y B e s t ( c i ) Y N ( c i ) ) × β P + ( ( U p p e r b o u n d L o w e r b o u n d ) × p + L o w e r b o u n d ) × μ  
The exploitation modification settings for β and μ are tuned to 0.1. The lower bound and upper bound of the issue are defined by L o w e r b o u n d   and U p p e r b o u n d , respectively.
Stage 4: Narrowed exploitation (walking and capturing prey).
Using a method called “narrowed exploitation”, the Aquila chases its target while maintaining an eye all over its escape path before launching an assault from the ground [34]. The given Equation (8) represents these actions:
{ Y ( c i + 1 ) = Q F × Y B e s t ( c i ) ( M P 1 × Y ( c i ) ) × P ) M P 2 × L F F ( D i m ) + P × M P 1 Q F ( c i ) = c i 2 × P 1 ( 1 c I ) 2 M P 1 = 2 × P 1 M P 2 = 2 × ( 1 c i c I )  
To balance the search method, the current position is indicated by Y ( c i )     and the quality function result is indicated by Q F ( c i ) . M P 1   denotes the monitoring prey motion variable for the Aquila, that is a random number in the range [−1, 1]. M P 2   represents the flight angle while hunting prey.

3.4. Clustering STEP

The following criteria proved critical for the computation of the CF:
CH node balance element: This is essential for maintaining a stable cluster. Clusters of any size are possible as a result of the nodes’ unpredictable placement. Hence, this feature is taken into account to strike a reasonable balance in energy consumption. Equation (9) describes the balance component at each node.
F 1 =   j = 1 k n k l j  
Mean BS distance: The average BS distance is calculated by dividing the distance from the BS to the CH by the absolute number of nodes in the concerned CH node. Because of the correlation between distance and energy use, this statistic is taken into account. Thus, in order to conserve energy, it is essential to shorten this length. The separation between the two points is given in Equation (10), and the average lengths to BS were displayed in Equation (11).
E D (   p   , q ) =   r = 1 d ( p r q r ) 2
F 2 = j = 1 k ( 1 l j E D ( C H j ,   B S )
Remaining energy: Since the platform’s lifespan is directly tied to power consumption, finding ways to reduce that statistic is crucial. Consequently, this factor should be considered with special attention. It’s calculated by adding up the energy of the active CH nodes that were specifically chosen. In order to strike a proper balance between all objective functions, the inversion of the maximization of total power is considered as well. In Equation (12), a form for the remaining energy function can be seen.
F 3 = 1 j = 1 k ( E C H j )
Mean intra-cluster distance: Total length between each node and its associated node in the CH graph is the intra-cluster length. Lessening the average distance between nodes within a cluster can help save energy. The connection between a node and its corresponding CH node uses a lot of energy; thus, this is described as Equation (13).
F 4 = j = 1 k ( 1 l j s = 1 l j E D ( C M s ,   C H j ) )
It is preferred to reduce the CF mixture represented in Equation (14), as opposed to separately minimizing each function.
C F = w 1 F 1 + w 2 F 2 + w 3 F 3 + w 4 F 4
k = 1 4 w k = 1  
The importance of each CF component is represented by its strength. The coefficients represent the perceived importance of the components w 1 , w 2 , w 3 and w 4 ; as shown in Equation (15), the sum is 1.

3.5. FA Algorithm

The FA was initially released at the end of 2007 [35]. FA is built on several rules informed by the lighting patterns and actions of fireflies:
Fireflies are unisexual. This indicates that fireflies are interested in one another regardless of their sex [36].
Their luminosity determines the appeal of fireflies. It indicates that fewer brilliant fireflies are drawn to more brilliant fireflies. As the space among fireflies grows, so does their desirability. In the absence of a more brilliant firefly, the motion of fireflies is arbitrary.
A function for measuring the luminosity of fireflies is created.
FA discusses 2 criteria: light intensity fluctuation and attraction. Brightness contributes to an individual’s allure. Furthermore, brightness is represented through an objective function [37].
I ( x )   f ( x )   denotes the brightness of a firefly (I) at a particular location (x). But, depending on the length r i j   among f i r e f l y i   and f i r e f l y j , their attractiveness varies. In addition, when a firefly is distant from the source of light, the light intensity decreases. Additionally, the medium absorbs light. Depending on the level of absorption, several attractivenesses exist. Typically, the intensity of light I(r) varies in accordance with the inverse-square rule, as shown in Equation (16):
I ( r ) = I s r 2
Wherein I s   represents the source’s power.
Assuming a given medium with a fixed coefficient of light absorption γ, Equation (17) calculates I based on the distance r:
I ( r ) = I 0 e γ r
Here I 0   represents the initial intensity of light at r = 0 to avoid singularity at r = 0 in the expression I s r 2 , Equations (1) and (2) are calculated as Equation (18) [38].
I ( r ) = I 0 e γ r 2
Equation (19) easily calculates β for a firefly:
β = β 0 e γ r 2
As β 0   represents the attraction when r = 0 Equation (19) is approximated as Equation (20) since 1 1 + r 2   may be calculated more quickly than an exponential function.
β = β 0 1 + γ r 2
The spacing among f i r e f l y i   and f i r e f l y j   is denoted by z i   and z j , accordingly, in Equation (21) [39].
r i j = z i z j = k = 1 d ( z i , k z j , k ) 2
here z i , k   is the kth element of the ith firefly’s location coordinate z i .
Per Equation (22), f i r e f l y i   is fascinated to f i r e f l y j   that is more appealing:
z i t + 1 = z i t + β 0 e γ r i j 2 ( z j t z i t ) + α ε i t
Whereas the second statement expresses the concept of attraction. Using the third phrase, randomization is indeed produced. It is accomplished via the randomization variable. Moreover, I represent an array of random numbers. Remember that ε i   could be changed with r a n d   1 2   to create a random number in the range [0, 1]. In general, it is considered that β0 = 1 and α falls between [0, 1].
FA is used to identify intermediate CH nodes in the network since this technique explores optimal global reply sufficiently. In addition, FA has a good convergence rate and adequate precision. In addition, this could achieve a balance among the global and local searches. Additionally, FA is simple to apply.

3.6. Communication Step

As the transmission of data in the proposed IoT algorithm is accomplished via multi-hop data forwarding mechanisms, the primary objective of the route discovery step is to identify a collection of intermediate CH nodes that must be chosen to build multiple paths from the source nodes to the BS. To pick the CH node, the intended multipath routing strategies utilize numerous criteria. The intermediary CH node subsequently transmits the message collected to the BS. Therefore, every intermediate CH node is assigned a group of next neighbour CH nodes depending on the number of hops and distance.
The FF ranks the solutions based on how well they optimize the plan. The most recent alpha, beta, and delta data should be used for each iteration. The novel FF given here is set up to generate a route that all CH nodes could travel to access the BS quickly and reliably. The total distance travelled via CH nodes could be determined by employing Equation (23).
F 1 = j = 1 m E D ( C H j ,   N e x t C H ( C H j ) )
Following is an expression for the overall quantity of hops between CH nodes in the system, as shown by Equation (24):
F 2 = j = 1 m N e x t C H c o u n t ( C H j )
The entire length to go and the overall quantity of hops must be considered while arranging a route. Reducing both the overall distance travelled and the number of hops enhances a plan’s fitness value. Therefore, the route fitness drops when both the length and the number of hops increase. A population’s preference tends to favour whatever choice has the maximum fitness level. As demonstrated in Equation (25).
F F = k 1 w 1 F 1 + w 2 F 2
k = 1 2 w k = 1
So, k 1   is the proportionality constant, and each of w 1 and w 2   are real numbers. Path FF is the optimal option to find a fine balance between the number of network hops and the total network length.

4. Performance Review

A number of alternative approaches to IoT clustering, such as GA [13], WOA [40], GWO [41] and Hybrid Artificial Bee Colony and Harmony Search (HABCHS) [31], are compared and contrasted with the HAOFA method below. The criteria used to select a suitable simulation program are discussed in Section 4.1. The parameters of the model are described in Section 4.2. The simulator findings are thoroughly discussed in Section 4.3.

4.1. Simulator

The efficiency of the IoT platform is assessed with NS-3 version 3.25. It could be seen in [42] NS-3 is used in numerous distinct categories of IoT scenarios due to its various advantages versus alternative simulators and software products.
Its designs are more adaptable than those of rival software.
Making use of an extensive range of resources in a unified way.
As a result of its compatibility with other programming languages, it is simple to debug.
The ability to scale as well as flexibility for multiple layers is intrinsic [43].

4.2. Model Parameters

A well-described modelling parameter is essential for obtaining reliable simulation results. The most fundamental and important considerations are listed in Table 2.
To further augment the efforts, the evaluation in this study is conducted on a standardized IoT platform. A total of one 2000 repetitions of the test are allowed. Specifically, the system is a 500-meter-diameter circle with the BS in its epicentre. Initially, 400 IoT nodes within the network, each receiving an initial power supply of E0 = 0.5 J. The increasing data transfer speed of IoT nodes necessitates a larger data packet size; therefore, 1024 bytes it is.

4.3. Evaluation Metrics

Towards what comes after, it would look at how to measure metrics such as energy consumption, PDR, E2E delay and throughput to assess whether effectively various ways are functioning.

4.3.1. Energy Consumption

As can be seen in Figure 1, the HAOFA algorithm extends the lifetime of the network by decreasing power consumption. The figure makes it easy to comprehend how the nodes’ initial energy gradually dissipates. This is because of the use of multi-hop routing in FA-based connectivity between clusters. Power consumption in the network is decreased when using this method instead of GA, WOA, GWO and HABCHS. This happens as a result of the reality that the HAOFA employs an Aquila search-based optimization approach to make the most intelligent choice regarding CH nodes and their distribution across the surveillance region. When using this planned approach, the CH nodes are distributed evenly across the surveillance area, which in turn extends the lifespan of the network. In other words, the lifespan of the IoT network is extended due to the more efficient use of energy at each node. That’s because the planned routing method improves network dependability.

4.3.2. PDR

Node energy reduction extends the network’s life span through keeping more nodes operational for longer. Having this improvement spread out over the lifespan of the network boosts data gathering and transmission speeds. PDR reveals the ratio of data packets that were successfully transmitted and received. Whenever this proportion grows, productivity rises. The suggested scheme integrates meta-heuristic AO and FA optimization to minimize complexity and boost PDR values while lowering the number of failed nodes and the packet loss rate. Two components of the CF take into account the node’s energy consumption as a function of distance, and the amount of energy the network’s nodes still have is also a major consideration in keeping the nodes from going dying and inactive. Finally, a higher PDR index is strongly influenced by the degree of balance at the CH node. The PDR diagram of the four approaches is depicted in Figure 2. The increased strength and durability of routes are a direct result of this. The poor link quality or great distance between the two nodes might also shorten the lifetime of the communication. Thus, the provided method reduces risky connections in the system and boosts the likelihood of finding the best routes between CH nodes. The least amount of PDR is raised by 25% as opposed to the GA, WOA, GWO and HABCHS strategies.

4.3.3. E2E Delay

The system transmission latency would be another crucial metric for gauging the efficiency of an infrastructure. The latency from selecting a CH node to actually receiving the data is known as the E2E delay. The impact of this delay on the total duration of the test is graphically represented in Figure 3. This algorithm incorporates the benefits of the AO protocol for improving energy efficiency with the FA for decreasing communication delay. The HAOFA mechanism picks the best CH nodes to collect information from CM nodes. When compared to the GA, WOA, GWO, and HABCHS approaches, this one decreases delay. The following factors, among others, contribute to this shortened delay:
(1) Clustering conserves time due to the proximity among CM and CH nodes.
(2) The uniform dispersion of clusters in HAOFA equalizes the time usage.

4.3.4. Throughput

In this method, by using meta-heuristic methods, CH nodes are spread evenly, and the total number of nodes in each cluster is closer, but otherwise, energy consumption would not be evenly distributed and nodes would die faster, ultimately reducing throughput. Data transmission energy loss is decreased since the leftover energy of the node is used as a criterion for selecting CH nodes. Thereby, more packets make it to the BS than with other algorithms. As can be shown in Figure 4, the proposed approach greatly improves throughput in comparison to GA, WOA, GWO and HABCHS. The suggested approach generates paths that are ideal for node-to-node connectivity on this architecture, and it also reduces route loss. Since low-energy CH nodes won’t be helpful during route construction and will have a meagre chance of being selected as intermediate nodes; as a result, routes can already handle more traffic and have a longer shelf life. It’s also possible that the low link quality or the considerable physical separation between the nodes contributed to their short connection lifetime. Thus, the proposed method reduces risky connections in the system and boosts the likelihood of finding the best routes among CH nodes.

5. Conclusions and Future Works

This research examines the most significant issue facing the IoT infrastructure today: a deficiency of available energy in nodes. A clustering approach was proposed for maximum efficiency in terms of both power consumption and network longevity. Here, the HAOFA approach for IoT clustering and routing operations is introduced. In the described method, CH nodes are picked and clustered by employing the AO algorithm. Next, FA determines which route choices are best. Two new functions support routing and clustering. These calculations accounted for aspects like available energy, distance, node balance, and the number of hops. This population-optimal value is then used for routing and clustering purposes. The proposed HAOFA is compared with GA, WOA, GWO and HABCHS methodologies to show that the presented strategy is practical. The results show that implementing the plan helps the system function more quickly and lasts longer.
In the future, researchers may choose to systematically relocate a system’s BS, CH node, and CM node, all in an effort to better understand how such changes affect the network’s operation. It is also possible that using a more comprehensive range of parameters will help boost FF and CF’s efficiency.

Author Contributions

Conceptualization, M.H., L.I.-F., B.-Ș.I., M.S., F.K. (Faeze Kazemian), A.M.R. and F.K. (Faheem Khan); Data curation, M.H., B.-Ș.I., M.S., F.K. (Faeze Kazemian) and A.M.R.; Formal analysis, L.I.-F., M.S., A.M.R. and F.K. (Faheem Khan); Investigation, M.H., L.I.-F. and B.-Ș.I.; Methodology, F.K. (Faeze Kazemian), A.M.R. and F.K. (Faheem Khan); Project administration, B.-Ș.I. and M.S. Validation, F.K. (Faheem Khan) and A.M.R.; Visualization, and Writing—original draft, M.H., M.S., A.M.R. and F.K. (Faheem Khan); Writing—review & editing, M.H. and F.K. (Faeze Kazemian). All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

We declare that this manuscript is original, has not been published before and is not currently being considered for publication elsewhere.

References

  1. Lansky, J.; Sadrishojaei, M.; Rahmani, A.M.; Malik, M.H.; Kazemian, F.; Hosseinzadeh, M. Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics 2022, 10, 4166. [Google Scholar] [CrossRef]
  2. Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. An Energy-Aware IoT Routing Approach Based on a Swarm Optimization Algorithm and a Clustering Technique. Wirel. Pers. Commun. 2022, 1–17. [Google Scholar] [CrossRef]
  3. Rahmani, A.M.; Naqvi, R.A.; Malik, M.H.; Malik, T.S.; Sadrishojaei, M.; Hosseinzadeh, M.; Al-Musawi, A. E-Learning Development Based on Internet of Things and Blockchain Technology during COVID-19 Pandemic. Mathematics 2021, 9, 3151. [Google Scholar] [CrossRef]
  4. Tamizhselvan, C.; Vijayalakshmi, V. SDN-MCHO: Software Define network based Multi-criterion Hysteresis Optimization based for reliable device routing in Internet of Things for the smart surveillance application. Comput. Commun. 2020, 153, 632–640. [Google Scholar]
  5. Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. A new preventive routing method based on clustering and location prediction in the mobile internet of things. IEEE Internet Things J. 2021, 8, 10652–10664. [Google Scholar] [CrossRef]
  6. Shang, X.; Che, X. Optimization of fitness data monitoring system based on Internet of Things and cloud computing. Comput. Commun. 2021, 177, 125–132. [Google Scholar] [CrossRef]
  7. Ghosh, A.; Chakraborty, N. Cascaded cuckoo search optimization of router placement in signal attenuation minimization for a wireless sensor network in an indoor environment. Eng. Optim. 2019, 51, 2127–2146. [Google Scholar] [CrossRef]
  8. Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. Clust. Comput. 2022, 25, 351–361. [Google Scholar] [CrossRef]
  9. Chen, Z.; Long, X.; Chen, L.; Wu, Y.; Wu, J.; Liu, S. Intra-cluster aggregation aware routing for distributed training in wireless sensor networks. Concurr. Comput. Pract. Exp. 2021, e6795. [Google Scholar] [CrossRef]
  10. Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M. Clustered Routing Method in the Internet of Things Using a Moth-Flame Optimization Algorithm. Int. J. Commun. Syst. 2021, 34, e4964. [Google Scholar] [CrossRef]
  11. Devassy, D.; Johnraja, J.I.; Paulraj, G.J.L. NBA: Novel bio-inspired algorithm for energy optimization in WSN for IoT applications. J. Supercomput. 2022 Apr 30, 1–18. [CrossRef]
  12. Rana, N.; Latiff, M.S.A.; Abdulhamid, S.M.; Misra, S. A hybrid whale optimization algorithm with differential evolution optimization for multi-objective virtual machine scheduling in cloud computing. Eng. Optim. 2021, 54, 1999–2016. [Google Scholar] [CrossRef]
  13. Rani, S.; Ahmed, S.H.; Rastogi, R. Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications. Wirel. Netw. 2020, 26, 2307–2316. [Google Scholar] [CrossRef]
  14. Dwivedi, B.; Patro, B.D.K.; Srivastava, V.; Jadon, S.S. LBR-GWO: Layered based routing approach using grey wolf optimization algorithm in wireless sensor networks. Concurr. Comput. Pract. Exp. 2022, 34, e6603. [Google Scholar] [CrossRef]
  15. Yousefi, S.; Derakhshan, F.; Aghdasi, H.S.; Karimipour, H. An energy-efficient artificial bee colony-based clustering in the internet of things. Comput. Electr. Eng. 2020, 86, 106733. [Google Scholar] [CrossRef]
  16. Singh, S.; Kumar, P. MH-CACA: Multi-objective harmony search-based coverage aware clustering algorithm in WSNs. Enterp. Inf. Syst. 2020, 14, 1325–1353. [Google Scholar] [CrossRef]
  17. Abualigah, L.; Yousri, D.; Elaziz, M.A.; Ewees, A.A.; Al-Qaness, M.A.; Gandomi, A.H. Aquila optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
  18. Natesan, G.; Konda, S.; de Prado, R.P.; Wozniak, M. A Hybrid Mayfly-Aquila Optimization Algorithm Based Energy-Efficient Clustering Routing Protocol for Wireless Sensor Networks. Sensors 2022, 22, 6405. [Google Scholar] [CrossRef]
  19. Pakdel, H.; Fotohi, R. A firefly algorithm for power management in wireless sensor networks (WSNs). J. Supercomput. 2021, 77, 9411–9432. [Google Scholar] [CrossRef]
  20. Xia, B.; Zhang, L. Firefly Optimization-Based Cooperative Localization Algorithm for Intelligent IoT. Discret. Dyn. Nat. Soc. 2022, 2022, 3398071. [Google Scholar]
  21. Sennan, S.; Somula, R.; Luhach, A.K.; Deverajan, G.G.; Alnumay, W.; Jhanjhi, N.Z. Energy efficient optimal parent selection based routing protocol for Internet of Things using firefly optimization algorithm. Trans. Emerg. Telecommun. Technol. 2021, 32, e4171. [Google Scholar] [CrossRef]
  22. Ilyas, M.; Ullah, Z.; Alam Khan, F.; Chaudary, M.H.; Malik, M.S.A.; Zaheer, Z.; Durrani, H.U.R. Trust-based energy-efficient routing protocol for Internet of things–based sensor networks. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720964358. [Google Scholar] [CrossRef]
  23. Behera, T.M.; Mohapatra, S.K. A novel scheme for mitigation of energy hole problem in wireless sensor network for military application. Int. J. Commun. Syst. 2021, 34, e4886. [Google Scholar] [CrossRef]
  24. Sadrishojaei, M.; Navimipour, N.J.; Reshadi, M.; Hosseinzadeh, M.; Unal, M. An energy-aware clustering method in the IoT using a swarm-based algorithm. Wirel. Netw. 2022, 28, 125–136. [Google Scholar] [CrossRef]
  25. Hriez, S.; Almajali, S.; Elgala, H.; Ayyash, M.; Salameh, H.B. A Novel Trust-Aware and Energy-Aware Clustering Method That Uses Stochastic Fractal Search in IoT-Enabled Wireless Sensor Networks. IEEE Syst. J. 2021, 16, 2693–2704. [Google Scholar] [CrossRef]
  26. Amutha, S.; Kannan, B.; Kanagaraj, M. Energy-efficient cluster manager-based cluster head selection technique for communication networks. Int. J. Commun. Syst. 2020, 34, e4741. [Google Scholar] [CrossRef]
  27. Saxena, S.; Mehta, D. An Adaptive Fuzzy-Based Clustering and Bio-Inspired Energy Efficient Hierarchical Routing Protocol for Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 120, 2887–2906. [Google Scholar] [CrossRef]
  28. Ahmad, M.; Ikram, A.A.; Wahid, I.; Ullah, F.; Ahmad, A.; Alam Khan, F. Optimized clustering in vehicular ad hoc networks based on honey bee and genetic algorithm for internet of things. Peer Peer Netw. Appl. 2020, 13, 532–547. [Google Scholar] [CrossRef]
  29. Xiuwu, Y.; Ying, L.; Yong, L.; Hao, Y. WSN Clustering Routing Algorithm Based on Hybrid Genetic Tabu Search. Wirel. Pers. Commun. 2022, 124, 3485–3506. [Google Scholar] [CrossRef]
  30. Poluru, R.K.; R, L.K. An improved fruit fly optimization (IFFOA) based cluster head selection algorithm for internet of things. Int. J. Comput. Appl. 2021, 43, 623–631. [Google Scholar] [CrossRef]
  31. Jayalakshmi, P.; Sridevi, S.; Janakiraman, S. A hybrid artificial bee colony and harmony search algorithm-based metahueristic approach for efficient routing in WSNs. Wirel. Pers. Commun. 2021, 121, 3263–3279. [Google Scholar] [CrossRef]
  32. Agrawal, D.; Pandey, S. Optimization of the selection of cluster-head using fuzzy logic and harmony search in wireless sensor networks. Int. J. Commun. Syst. 2021, 34, e4391. [Google Scholar] [CrossRef]
  33. Abualigah, L.; Elaziz, M.A.; Khodadadi, N.; Forestiero, A.; Jia, H.; Gandomi, A.H. Aquila Optimizer Based PSO Swarm Intelligence for IoT Task Scheduling Application in Cloud Computing. In Integrating Meta-Heuristics and Machine Learning for Real-World Optimization Problems; Springer: Berlin/Heidelberg, Germany, 2022; pp. 481–497. [Google Scholar]
  34. Perumalla, S.; Chatterjee, S.; Kumar, A.S. Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment. Theor. Comput. Sci. 2022. [Google Scholar] [CrossRef]
  35. Faheem, M.; Butt, R.A.; Raza, B.; Alquhayz, H.; Ashraf, M.W.; Raza, S.; Bin Ngadi, A. FFRP: Dynamic firefly mating optimization inspired energy efficient routing protocol for internet of underwater wireless sensor networks. IEEE Access 2020, 8, 39587–39604. [Google Scholar] [CrossRef]
  36. Zier, A.; Abouaissa, A.; Lorenz, P. FIRP: Firefly Inspired Routing Protocol for Future Internet of Things. In Proceedings of the ICC 2022-IEEE International Conference on Communications, Seoul, Republic of Korea, 16–20 May 2022; pp. 2948–2953. [Google Scholar]
  37. Meena, N.; Singh, B. Firefly optimization based hierarchical clustering algorithm in wireless sensor network. J. Discret. Math. Sci. Cryptogr. 2021, 24, 1717–1725. [Google Scholar] [CrossRef]
  38. Idrees, A.K.; Couturier, R. Energy-saving distributed monitoring-based firefly algorithm in wireless sensors networks. J. Supercomput. 2022, 78, 2072–2097. [Google Scholar] [CrossRef]
  39. Ali, S.; Kumar, R. Hybrid energy efficient network using firefly algorithm, PR-PEGASIS and ADC-ANN in WSN. Sens. Int. 2022, 3, 100154. [Google Scholar] [CrossRef]
  40. Reddy, M.P.K.; Babu, M.R. Implementing self adaptiveness in whale optimization for cluster head section in Internet of Things. Clust. Comput. 2019, 22, 1361–1372. [Google Scholar] [CrossRef]
  41. Jaiswal, K.; Anand, V. A grey-wolf based optimized clustering approach to improve qos in wireless sensor networks for iot applications. Peer Peer Netw. Appl. 2021, 14, 1943–1962. [Google Scholar] [CrossRef]
  42. Riley, G.F.; Henderson, T.R. The ns-3 network simulator. In Modeling and Tools for Network Simulation; Springer: Berlin/Heidelberg, Germany, 2010; pp. 15–34. [Google Scholar]
  43. Carneiro, G. NS-3: Network Simulator 3. UTM Lab Meeting April. 2010, Volume 20, pp. 4–5. Available online: https://www.researchgate.net/file.PostFileLoader.html?id=57847c9ccbd5c2b8361a0599&assetKey=AS%3A382893969952770%401468300444552 (accessed on 15 August 2022).
Figure 1. Total energy consumption.
Figure 1. Total energy consumption.
Mathematics 10 04331 g001
Figure 2. PDR contrast.
Figure 2. PDR contrast.
Mathematics 10 04331 g002
Figure 3. Communication cost. E2E delay.
Figure 3. Communication cost. E2E delay.
Mathematics 10 04331 g003
Figure 4. Throughput contrast.
Figure 4. Throughput contrast.
Mathematics 10 04331 g004
Table 1. Comparison of the different methods highlighted.
Table 1. Comparison of the different methods highlighted.
Mechanism ApproachAdvantageWeakness
Hriez, Almajali [25]Trust-based technique for clustering that can identify compromised nodes.
Extending the lifespan of the network
  • Failing to account for heterogeneous network topologies
Amutha, Kannan [26]Electing the CH node depending on the cluster manager
Low energy consumption
Low bandwidth usage
High overall throughput
  • Scalability constraints
  • Failing to account for heterogeneous network topologies
Saxena and Mehta [27]Multi-criteria decision-making with fuzzy logic
High conserving energy
Improving throughput
  • Poor QoS
Ahmad, Ikram [28]Hybrid optimization method using GA and honey bee approach
Minimal overhead
Boosting network lifespan
Minimal clustering time
  • Disparity in energy usage
  • Extra overload
Xiuwu, Ying [29]Clustering mechanism using a hybrid form of genetic tabu search
Reducing power consumption
Extending network lifespan
  • Long delay
  • Poor data security
Poluru and Kumar R [30]Fruit fly optimization method for picking CH nodes
Extending system longevity
Conserving energy
  • Weak convergence
Jayalakshmi, Sridevi [31]Combining the HS technique with the ABC strategy for clustering
Increasing network longevity
Balancing energy consumption
  • Steep cost
Agrawal and Pandey [32]Algorithm for clustering based on fuzzy logic and HS
Boosting system lifespan
  • Unfit for topological alterations
Table 2. Test parameters.
Table 2. Test parameters.
Parameter TitleValue
Radius500 m
Count of all Nodes400
Placement of BS(250, 250)
Size of Data packet1024 byte
Primary Nodes Power0.5 J
E e l e c 50 nJ/bit
ε f s 10 pJ/bit/m2
ε m p 0.0013 pJ/bit/m4
Threshold   of   Distance   ( d 0 ) ε f s ε m p   m
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hosseinzadeh, M.; Ionescu-Feleaga, L.; Ionescu, B.-Ș.; Sadrishojaei, M.; Kazemian, F.; Rahmani, A.M.; Khan, F. A Hybrid Delay Aware Clustered Routing Approach Using Aquila Optimizer and Firefly Algorithm in Internet of Things. Mathematics 2022, 10, 4331. https://doi.org/10.3390/math10224331

AMA Style

Hosseinzadeh M, Ionescu-Feleaga L, Ionescu B-Ș, Sadrishojaei M, Kazemian F, Rahmani AM, Khan F. A Hybrid Delay Aware Clustered Routing Approach Using Aquila Optimizer and Firefly Algorithm in Internet of Things. Mathematics. 2022; 10(22):4331. https://doi.org/10.3390/math10224331

Chicago/Turabian Style

Hosseinzadeh, Mehdi, Liliana Ionescu-Feleaga, Bogdan-Ștefan Ionescu, Mahyar Sadrishojaei, Faeze Kazemian, Amir Masoud Rahmani, and Faheem Khan. 2022. "A Hybrid Delay Aware Clustered Routing Approach Using Aquila Optimizer and Firefly Algorithm in Internet of Things" Mathematics 10, no. 22: 4331. https://doi.org/10.3390/math10224331

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop