Next Article in Journal
Development of Anomaly Detectors for HVAC Systems Using Machine Learning
Next Article in Special Issue
Some Logarithmic Intuitionistic Fuzzy Einstein Aggregation Operators under Confidence Level
Previous Article in Journal
Magneto-Thermal Coupling Simulation of Flowing Liquid Induction Heating through Static Mixer-Type Susceptors
Previous Article in Special Issue
Improving Process Efficiency at Pediatric Hospital Emergency Department Using an Integrated Six-Sigma Simulation Methodology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient Bi-Objective Optimization Based on the Moth–Flame Algorithm for Cluster Head Selection in a Wireless Sensor Network

by
Mahmoud Z. Mistarihi
1,2,*,
Haythem A. Bany Salameh
1,3,
Mohammad Adnan Alsaadi
1,
Omer F. Beyca
4,
Laila Heilat
1 and
Raya Al-Shobaki
1
1
Hijjawi Faculty for Engineering Technology, Yarmouk University, Irbid 21163, Jordan
2
Department of Mechanical and Industrial Engineering, Faculty of Engineering, Liwa College of Technology, Abu Dhabi P.O. Box 41009, United Arab Emirates
3
College of Engineering, Al Ain University, Al Ain P.O. Box 64141, United Arab Emirates
4
Industrial Engineering Department, Faculty of Engineering, Istanbul Technical University, Istanbul 34469, Turkey
*
Author to whom correspondence should be addressed.
Processes 2023, 11(2), 534; https://doi.org/10.3390/pr11020534
Submission received: 3 January 2023 / Revised: 4 February 2023 / Accepted: 8 February 2023 / Published: 9 February 2023

Abstract

:
Designing an efficient wireless sensor network (WSN) system is considered a challenging problem due to the limited energy supply per sensor node. In this paper, the performance of several bi-objective optimization algorithms in providing energy-efficient clustering solutions that can extend the lifetime of sensor nodes were investigated. Specifically, we considered the use of the Moth–Flame Optimization (MFO) algorithm and the Salp Swarm Algorithm (SSA), as well as the Whale Optimization Algorithm (WOA), in providing efficient cluster-head selection decisions. Compared to a reference scheme using the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, the simulation results showed that integrating the MFO, SSA or WOA algorithms into WSN clustering protocols could significantly extend the WSN lifetime, which improved the nodes’ residual energy, the number of alive nodes, the fitness function and the network throughput. The results also revealed that the MFO algorithm outperformed the other algorithms in terms of energy efficiency.

1. Introduction

A wireless sensor network (WSN) is defined as a network with many embedded wireless sensors with various sensing devices [1,2]. It is an infrastructure-based network composed of communication, computing and sensing elements, which makes a sink node capable of reacting to events within a certain context [3,4]. Typically, it is a governmental, civil, industrial or commercial entity, where the environment could be an IT framework, a biological system or the physical world [5]. Usually, a WSN includes thousands of randomly deployed sensors. Theses sensors are battery-powered, and it is difficult to recharge them after deployment [6,7]. Hence, energy efficiency is a significant challenge in WSNs, and different mechanisms have been proposed to deal with this energy efficiency issue [8]. To establish which relaying mode is more energy-efficient and to solve the issue of energy efficiency optimization, a complete analysis of the energy efficiency of full-duplex and half-duplex amplify-and-forward relay-assisted 60 GHz dual-hop indoor wireless systems is presented in [9]. The cluster network topology concept is considered a promising strategy to enhance the energy performance of WSNs. The basic concept of the Low-Energy Adaptive Clustering Hierarchy, which is known as LEACH, is choosing the cluster node within an unsystematic cycle and handing over the entire energy of the network to every node of the sensor, as well as, on average, prolonging the network survival lifetime in addition to reducing energy consumption [10,11,12,13]. For instance, reducing the transmission task of sensor nodes in a WSN can result in extending the service life of the sensor nodes [14]. However, the random technique of choosing the cluster node means that every single node may turn into the cluster node, and there is a chance that a small energy node will turn out to be the cluster node. An additional technique that uses a weighted-objective optimization algorithm is the Moth–Flame Algorithm, which is known as the MFO algorithm and was proposed in [15]. The MFO algorithm has several advantages [16]. The MFO algorithm is popular due to its simple parameters and structure. Furthermore, since the MFO algorithm is efficient, robust and easy to implement within different computer languages, it has been widely used in many optimization applications [17]. The MFO algorithm combines a population-based algorithm and a local search strategy to yield an algorithm capable of global exploration and local exploitation [18]. Like other metaheuristics, the MFO algorithm is simple, flexible and easily implemented; as a result, it can be utilized to solve a wide range of problems [19]. Because of these merits, the MFO algorithm has been successfully applied to various optimization problems, including scheduling [20], the inverse problem and parameter estimation [21,22], classification [23], economics [24], medicine [25], power energy [26] and image processing [27].
Several studies have investigated energy-efficient bi-objective optimization for cluster head selection in wireless sensor networks. For instance, Latiff et al. proposed a novel clustering algorithm based on Particle Swarm Optimization (PSO) called Centralized-PSO (PSO-C); the cluster head (CH) selection process was formulated as a bi-objective optimization problem to find the optimal cluster head set to form one-hop clusters to balance energy consumption. The study considered each sensor node’s residual energy and each cluster head’s closeness to its sensor nodes. The proposed algorithm minimized the objective function to ensure that the sensor nodes with sufficient energy, as well as a minimum distance from their neighbors, were selected as cluster heads [28,29]. Jadhav and Shankar hybridized an energy-efficient CH algorithm based on the Whale Optimization Algorithm (WOA). The proposed WOA-C algorithm contributes to the selection of energy-aware CHs according to a fitness function that considers the node’s residual energy and the sum of the adjacent nodes’ energy. The proposed algorithm was evaluated in terms of energy efficiency, network lifetime, overall stability and throughput. Moreover, the WOA-C algorithm’s performance was evaluated and compared with other standard routing protocols, including the Low-Energy Adaptive Clustering Hierarchy (LEACH) [30]. Honey Bee Optimization (HBO) was proposed by Selvi et al. to minimize energy consumption through finding the optimal path, which is associated with a lower cost. The proposed algorithm showed improvements in the network lifetime and throughput. HBO also showed enhanced performance in terms of scalability and link quality [31]. Syed and Syed developed the Weighted Salp Swarm Algorithm (WSSA) based on the weighted distance position update for improving the convergence rate and performance of the SSA algorithm. The WSSA was validated by many benchmark functions, where it was compared with seven state-of-the-art algorithms. The results showed that the WSSA has an improved convergence rate and performance. In addition, the proposed algorithm was applied to the problem of optimal sensor deployment. The algorithm was applied on a probabilistic sensor model to maximize the coverage, while it was applied on a radio energy model to minimize the energy consumption [32]. Mann and Singh proposed an Improved Artificial Bee Colony (IABC) algorithm for optimal sensor deployment. The proposed algorithm was used for obtaining CHs and improved the energy efficiency. The results showed that the optimal base station position could be obtained by changing the distance to the sensor node number [33].
Hussain and Raziuddin proposed the Completely Informed Artificial Bee Colony (CABC) for optimal CH positions and used a probability sensor model for coverage for a wireless sensor network. The results showed improvements in the coverage rate in a WSN using the proposed algorithm [34]. Li et al. proposed Ant Colony Optimization (ACO) for an energy-efficient wireless sensor network. The algorithm saved on residual energy and the distance of neighbor nodes. According to the pheromone value, the subsequent hop was updated as the distance between nodes was compared. The proposed algorithm showed that a low energy node was not selected as the subsequent hop, which resulted in the efficient load balancing of the network energy [35,36]. Jia et al. studied the maintaining sensing problem coverage by optimizing energy consumption in a WSN. As opposed to the existing consistent sensing model, the authors considered an excess of sensors with a variable sensing radius to be randomly deployed in the monitoring area. A new coverage control format founded on a selective non-dominated sorting genetic algorithm, which is known as (NSGA-II), was implemented within a heterogeneous WSN. The algorithm was applied in a distributed manner by developing a cluster-based architecture [37,38]. Vijayalakshmi and Anandan investigated the choice of the best path within routing that develops a network’s energy efficiency and network lifespan. Different meta-heuristic methods, mainly PSO, have been efficiently utilized that have reduced the problem of local optima. The projected technique was included in the foundation of the algorithms of Tabu as well as PSO search. The results showed the effectiveness of the Tabu PSO that was proposed through the ornamental cluster-shaped number and the percentage of nodes alive, and the decrease in the average continuous delay and the average of the packet loss speed was illustrated [39,40]. Jameii, Faez and Dehghan projected a new algorithm for optimizing the lifetime, connectivity and coverage of a network within wireless sensor networks. NSGA-II was applied to make the best use of the exposure area for presenting the consumption of the balanced energy as well as for reducing the conduction variety of the nodes [41]. Jameii, Faez and Dehghan used NSGA-II to optimize the rate of the coverage of the observing area, the consumption of the balanced energy, and number of active sensor nodes while adaptively mutating the rates and assigning crossover to advance the performance of the algorithm of optimization through learning automata [42]. Bara’a, Khalil and Cosar used NSGA-II to choose mobile sensor locations, offering a long network lifetime as well as a high coverage. The planned system included mobile sensors and a number of targets. The most important idea of the algorithm was making the most of the detected targets number and the network lifetime together [43].
Following an investigation on the best bi-objective optimization algorithm technique for increasing the WSN life span, we found few research that had been conducted on the use of the moth–flame algorithm for cluster head selection in a wireless sensor network. Therefore, this research proposes a bi-objective optimization algorithm based on MFO as a WSN clustering technique by making use of a weighted-sum approach. This study also compared the proposed algorithm with SSA, WOA and LEACH, some of the most well-known hierarchical routing protocols for wireless sensor networks. The adopted algorithm (MFO) demonstrated superior performance regarding efficiency (the speed at which an algorithm finds accurate answers, converges and computes) and effectiveness (an algorithm’s capacity for generating high-quality solutions) in solving wireless sensor optimization problems. This paper is organized as follows. The introduction is presented in Section 1. Related works and background are provided in Section 2. Section 3 is devoted to the WSN energy consumption model as well as the complexity analysis. The simulation results and discussion are addressed in Section 4. Conclusions and further work are covered in Section 5.

2. Related Works and Background

2.1. Selection of the Bi-Objective Optimization Algorithms

It is worth noting that the adopted algorithms (MFO, SSA and WOA) have demonstrated superior performance regarding efficiency (the speed at which an algorithm finds accurate answers, converges and computes) and effectiveness (an algorithm’s capacity for generating high-quality solutions) in solving optimization problems. These metaheuristic optimization algorithms were chosen based mainly on their searching scope and simplicity as well as other critical factors such as time complexity, problem functionality, the number of objectives, output optimality and the number of starting solutions.
From a searching scope point of view, these algorithms look at the entire problem space as a single entity when trying to find the global optimum solutions via a good balance between exploitation and exploration in order to improve the rate of algorithm convergence [44,45]. Exploration entails generating numerous solutions to thoroughly examine the search space on a global basis, whereas exploitation entails focusing the search on a limited region in the knowledge that a currently viable solution exists there. The best solutions are chosen to ensure that they converge to the optimal solution, whereas randomization allows the search to avoid local optima while increasing the diversity of solutions. A successful combination of these two fundamental components almost results in global optimality [46]. In addition, a searching method has a stochastic nature when a set of random variables is employed in extracting a possible solution [47]. Additionally, the progress of the searching process continues iteratively with the same searching procedure until the best potential candidate solution is obtained [48,49]. With respect to simplicity, meta-heuristic algorithms require fewer control parameters to fit the problems under consideration, and they are more appealing and easier to execute since they are based on the use of simpler concepts and the use of establishing parameters that can be altered and tailored to match the problem’s nature [50]. Considering time–growth complexity, it is an important metric in evaluating an algorithm’s run time that is defined according to the algorithm’s implementation and structure. When the quicksort algorithm is used, the computational complexity of the sort is O(n2) and O(nlog(n)) in the worst and best cases, respectively [51]. In terms of functionality and the number of the objective functions, it ensures that the algorithm as well as the corresponding generic implementation code is applicable to a wide variety of issues. Additionally, the emphasis is mostly on the use of algorithms without regard for problem-specific expertise [52]. In addition, the problem in hand has goals with bi-objective functions, which requires incorporation with a weighted average in order to reflect the nature of the existence of the two objectives. As a result, their fitness functions are represented by a multi-parameter vector [53]. Regarding output optimality and the number of starting solutions, the problem of cluster head selection allows for several possible outcomes, all of which are recognized as valid by the solution space, and any of them could be the optimal solution or close to the optimal one [54,55]. Additionally, these meta-heuristic algorithms are population-based approaches, which means that numerous viable solutions work together to overcome local optima traps.

2.2. Moth–Flame Optimization (MFO) Algorithm

The MFO algorithm is a novel meta-heuristic method of optimization. It is a method for travelling an extended distance within a directed path and is inspired by the fact that the moon is distant for a moth [56]. This method ensures that a moth takes off in a directed line during the night. On the other hand, it is also generally found that moths will fly in a spiral pattern around lights. Moths are also deceived by fake lights. To a moth, a man-made light is very similar to the moon; therefore, preserving a similar angle into the source of the light is the reason that moths fly in a spiral pathway [57]. Within the moth–flame algorithm, moths are the confirmer of the answer, where the changeable argument is the position of the moth in the search area. Therefore, moths will take wing in 1-D, 2-D or 3-D spaces; the vector of a moth’s position will vary within the dimensions of the area being searched. The MFO algorithm measures a population as stranded wherever the moths are detected in a matrix form.
The moth simulation is carried out by a spiral function logarithm. The flame points to the moth’s subsequent position around it; this can be observed in the logarithm of a spiral function. The term ‘t’ defines the restriction that chooses the space of every moth throughout the spiral motion; t = −1 represents the immediate or direct space, while t = 1 represents the farthest distance. Moths incessantly change their situations regarding the light up the next spiral pathway. The exploitation as well as exploration of a whole search gap can be definite, as a logarithmic spiral function permits a moth to move around a flame [58,59]. Algorithm 1 demonstrates the pseudocode of the moth–flame algorithm.
Algorithm 1 (MFO) The pseudocode of the moth–flame algorithm
1: Begin
2: initialize the moths position.
3: While(iteration<=Max_iteration)
4: Update the number of flame
5: OM = Fitness Function(M)
6: if iteration equal to 1
7: F = short(M)
8: OF = sort(OM)
9: else
10: F = sort(Mt−1,Mt)
11: OF = sort(Mt−1,Mt)
12: End
13: for i = 1: n
14: for j = 1: d
15: Update t as well as r
16: compute D with regard to the equivalent moth
17: Update M(i,j) with regard to the equivalent
18: End
19: End

2.3. Whale Optimization Algorithm (WOA)

The WOA is a novel nature-inspired meta-heuristic optimization algorithm developed by Mirjalili as well as Lewis (2016) that imitates humpback whales’ social behavior [60]. Whales are known for being extremely clever animals through their movement. The whale optimization algorithm is inspired by specifically humpback whales’ hunting behavior. Generally, humpback whales favor fish or hunt krill that are near the surface of the sea. Humpback whales utilize a particular exclusive hunting technique called bubble net feeding. During bubble net feeding, they swim in the prey area and generate a unique bubble, all along a nine-shaped or circular pathway. Humpback whales can distinguish their prey’s location in addition to surrounding them. For the unknown position of the optimal design in the search area, the existing best-agent-possible solution is the target prey or is near to the optimal solution in the whale optimization algorithm. Once the most excellent search candidate is defined, the next search candidates will thus try to update their positions towards the finest search candidate [61].

2.4. Salp Swarm Algorithm (SSA)

The inspiration for the SSA is the swarming performance of salps when they are foraging, as well as when they are navigating within the ocean. The algorithm contains several mathematical optimization functions to confirm as well as observe efficient behaviors while finding the best possible solutions to optimization problems [62].

2.5. Low-Energy Adaptive Clustering Hierarchy (LEACH)

The LEACH algorithm is a TDMA (Time-Division Multiple Access) fundamental MAC (Medium Access Control) algorithm that was proposed by Heinzelman, Chandrakasan and Balakrishnan (2000). The important goal of this algorithm is to extend the lifetime of WSNs through decreasing the consumption of the energy necessary for maintaining and creating the cluster heads. The process of the LEACH algorithm contains several rounds, with two stages within every round: a steady phase in addition to a setup phase. The steady phase is comparatively longer. The setup mostly relates to the transmission of aggregated information to the base station as well as the aggregation of information at the cluster heads. In the setup phase, the most important aim is to build clusters, as well as choosing cluster heads through choosing a sensor node with the highest remaining energy [63]. Knowing that the dissipation of the energy of the sensors relies on the data size in addition to the transmission distance, LEACH attempts to reduce the number of receptions and transmissions. The main features of LEACH involve the arbitrary rotation of the CH [64]. This study took a different approach by comparing well-known nature-inspired algorithms to the low-energy adaptive clustering hierarchy algorithm, which is a common contemporary routing protocol. Furthermore, the LEACH method is used as a starting point for most cluster head protocols since it is a reliable wireless communication protocol that is both energy efficient and has a low latency.
The MFO algorithm was used in this study because of the following advantages: it guarantees exploration and exploitation. The success of such an algorithm depends on a suitable tradeoff between exploration and exploitation [65] since this impacts the algorithm’s convergence rate. The MFO algorithm tries to optimize the optimization problem and guarantees both exploitation and exploration of the search space by using the logarithmic spiral function, which allows the movement of the moth around the flame and not essentially in the space between the flame and the moth. Moreover, the flame count is gradually lessened during iterations to maintain the balance between exploration and exploitation. In the MFO algorithm, each moth updates its position according to one particular flame. Due to the significance of the WSN-based border protection domain, this study attempted to identify an optimization algorithm that could provide better performance in order to expand the WSN lifetime, increase the number of alive nodes and enhance the throughput and remaining energy.
The MFO algorithm provides a very quick convergence at a very early stage by switching from exploration to exploitation, which increases the MFO algorithm’s efficiency for applications such as classification when a quick solution is required or when energy-efficient cluster head selection is needed in a WSN. However, the MFO algorithm was only considered to be employed for such problems after enhancement was performed in order to solve different kinds of optimization problems. Therefore, this study performed experiments with this algorithm and compared its performance with that of other algorithms. The contributions of this study can be summarized in the following way: it was the first work that compared the MFO algorithm with well-known, nature-inspired algorithms. Moreover, it demonstrated the MFO algorithm’s capability to achieve a very rapid convergence at an early point of the exploration process by moving from exploration to exploitation.

3. Materials and Methods

3.1. The Wireless Network Energy Consumption Model

We investigated a network configuration with the following characteristics: the base station remained intact and was positioned within the sensor network region. Each sensor node was fixed and was capable of sensing. Sensor nodes executed their work and transmitted data to the base station (BS). Each node could operate in cluster head (CH) mode or detecting mode depending on the residual energy level. The wireless energy model states that the transmitted power attenuation decays exponentially as the transmission distance increases.
Firstly, Equation (1) was used to determine the expected number of cluster heads, k.
k = n / 2
where the ceil-up operator (⌈⌉) was used, and (n) is the number of sensor nodes in the networks, from which k nodes were selected for the initialization of the cluster centers. The wireless energy model for the sensors utilized as a part of the protocol depends on the first-order wireless model that was used as a part of [66,67]. The wireless energy model relies on the consumption of the energy transmission. The energy consumption formula for the transmission from node a to node b, with distance d and packet size K, is given as:
E T a b K , d = K E e l e c t + K ε f s d a b 2 ,   d < d o K E e l e c t + K ε m p d a b 4 ,   d d o
where “ ε f s     is the free space fading energy, and “ ε m p   ” is the multi-path fading energy. E e l e c t refers to the energy consumed in an electronic circuit to transmit or receive a signal. d a b   is the Euclidean distance between nodes a and b. d o is the constant-threshold estimation of the transmission distance, which is given as:
d o = ε f s     ε m p    
The appropriate energy consumption model is determined by the threshold distance as a function of the distance (d) between any communication nodes. Since the cluster head’s location determines the distance (d), then (d) changes along with the cluster head. The first part of the mathematical formula (2) represents the free-space path-loss consumed energy, while the second part quantifies the multi-path fading model.
The energy consumption of receiving the data packet, which only depends on the circuit loss, was calculated as
  E R K = K * E e l e c t
The energy consumption at the cluster head was calculated as
  E c = n E R + E T C B S    
where n is related to the number of packets to be sent, and   E TCBS is related to the energy consumption while transmitting from the cluster head to the base station. The energy consumption of transmission from the node to the cluster head within a given cluster was calculated as [68]
  E n = n E T n c        
The parameters listed in Table 1 are used to determine how much energy is consumed by a wireless sensor network.

3.2. Weighted-Sum-Based Bi-Objective Optimization

Communication between the CH and the node selected should be modest in terms of both distance and energy consumption. The network must have a massive amount of energy, which means that it must use just a small amount of energy when transmitting data. Thus, one optimized solution will have trade-offs among diverse objectives, and a group of solutions is necessary for characterizing the most efficient solution for every objective [67,68].
The bi-objective function in this study was designed to select the cluster head within every cluster while optimizing two objectives (distance and energy), which are given as
f o b j = α × f 1 + 1 α × f 2 ,                     α = 0.5
f 1 = m i n n o d e   i     C k d n o d e   i ,     C H k C k  
f 2 = i = 1 N E n o d e i j = 1 k E C H j  
where f1 defines the majority great of the Euclidean distance between nodes, nodei cluster Ck, for the cluster heads CHk, C k is the number of nodes that are managed by cluster Ck within f2 and N is the number of nodes that are selected as cluster-heads. This ensures the selection of the nodes’ average energy supplies and the best average distance to the nodes from the selected cluster heads. The constant α demonstrates the weight of f1 and f2 within the objective f(x). The target function aims to decrease the intra-cluster average distances and improve the energy consumption in the network.
Note that f1 represents the distance, namely, the distance from every node to the cluster head and the distance from the cluster head to the base station. f2 represents the ratio of the starting energy of all living nodes in the network (a sensor node is alive when its energy is greater than zero) to the cluster head’s total current energy in the current round. This ensures the selection of a cluster head with high remaining energy. The optimization function reflects a tradeoff between the two objectives. The factor α is a scaling factor that determines the importance of f1 and f2, where the factor is selected as 0 ≤ α ≤ 1. The constant factor α is utilized to evaluate the weight of every sub-objective. The fitness function in Equation (7) has the purpose of concurrently reducing the distance between the cluster head and the nodes, while the network energy efficiency optimization is quantified via f2. This results in weighted-sum-based bi-objective optimization. When α = 0,   f o b j = f 2 , and the fitness function only optimizes the network energy efficiency. When α = 1,   f o b j = f 1 . This only optimizes the distance between the nodes and the cluster heads. When α is equal to 0.5 in Equation (7), both sub-objectives are optimized equally.

3.3. Complexity Analysis

The complexity analysis is an important metric in evaluating an algorithm’s run time that is defined according to the algorithm implementation and structure. The MFO algorithm’s computational complexity depends on the number of moths, the number of variables, the number of maximum iterations and a flame-sorting mechanism in each iteration. As the quicksort algorithm was used, the computational complexity of the sort was in the order of O(n2) and O(nlogn) in the worst- and best-case scenarios, respectively. With the P function, the overall computational complexity can be defined as follows:
  O M F O = O t O Q u i c k   s o r t + O p o s i t i o n   u p d a t e
  O M F O = O t n 2 + n × d = O t n 2 + t n d
where n is the number of moths, t is the number of maximum iterations and d is the number of variables. In order to understand how the MFO algorithm can be effective for solving optimization problems theoretically, some observations include:
  • The procedure of updating positions allows finding neighboring solutions around the flames, which is a mechanism for typically promoting exploitation.
  • As the MFO algorithm uses a population of moths, the local optima avoidance will be high.
  • The search space exploration is increased and the local optima stagnation probability is decreased by assigning each moth a flame and then updating the flames sequence within each iteration.
  • Taking into consideration current best-obtained solutions up to the present as the number of flames saves promising solutions as moth guides.
  • The adaptive flames number balances exploration and exploitation.
  • The adaptive convergence constant (r) results in accelerated convergence around the flames on the iterations course.
Such observations make the MFO algorithm able to enhance the initial random solutions as well as the convergence into an enhanced point within the search space.

4. Simulation Results and Discussion

This paper presents a performance evaluation and comparison between three main bi-objective optimization algorithms, namely the whale optimization algorithm (WOA), the salp swarm algorithm (SSA) and the moth–flame optimization (MFO) algorithm in terms of their ability to provide efficient clustering decisions. Some critical metrics for the evaluation process were used, such as the fitness function, the number of alive nodes, the throughput and the residual energy. Then, the algorithm with the best performance was compared with the low-energy adaptive clustering hierarchy (LEACH) protocol.
The proposed algorithms were tested using Matlab R2022. Simulations were carried out on a network with 30 sensor nodes that were deployed in a 100 m × 100 m field, as shown in Figure 1. A mobile working sensor with a fixed trajectory was used that could be placed at different locations within the deployment area. This could significantly improve the data delivery rate and reduce the energy dissipation of the sensor nodes. The selection of cluster heads was carried out whenever a re-clustering was needed (e.g., when the energy level of the current cluster head fell below a certain threshold). Hence, the selection was not a one-time optimization. The MFO algorithm started creating moths randomly within the solution space, and a random population of sensor nodes were produced through iterations. The nodes were generated after the system reached its statistical foundation, i.e., a steady state status, using the residual analysis. The numbers of generations and search agents were set to 10,000 and 5, respectively. The parameters used in the simulation are shown in Table 2.

4.1. First Stage of Analysis

The simulations began by comparing the performance of the WOA, SSA and MFO algorithms in terms of exploration and exploitation, as well as four different metrics (number of alive nodes, network throughput, residual energy and fitness function).

4.1.1. Exploration and Exploitation Process

An effective method for analyzing the exploration and exploitation process is to compare new individuals to the existing population. If a new individual’s similarity to the population is poor, the algorithm will prioritize exploration. The degree of similarity between a new individual and the old population is high during the exploitation process. The following formula was used to determine the similarity of two individuals using the Euclidean distance:
x . y = i = 1 n x i y i 2
The new individual’s similarity (S) to the population is determined by the distance between the new individual and its closest neighbor as follows:
S i n d n e w . P = min i n d   P i n d n e w .   i n d
If the similarity value exceeds a threshold value that determines the neighborhood boundary, the procedure is termed exploration; otherwise, it is called exploitation [69]. We defined the threshold value in this study as 1% of the search space. The percentage of individuals exploring the search space for each iteration throughout the optimization process is depicted in Figure 2.
As illustrated in Figure 2, the number of exploring individuals decreased faster in the WOA and SSA algorithms than in the MFO method. Thus, as compared to the other two algorithms, the MFO method assigned more balanced weights to exploration and exploitation, ensuring sufficient diversity and thus increase the likelihood of converging on the global optima.

4.1.2. Number of Alive Nodes

The number of alive nodes is used to calculate the network lifetime. It is an instantaneous count of all the nodes that have not yet used up all of their energy. Alive nodes are sensor nodes that contain non-zero energy. Figure 3a illustrates a comparison of the performance evaluation between the MFO, SSA and WOA algorithms in terms of the number of alive nodes relative to the number of rounds. A higher number of alive nodes within a network extends the network lifetime. Based on this, the MFO algorithm outperformed the WOA and SSA algorithms. Figure 3b shows the progression of how nodes died using the MFO, WOA and SSA algorithms for 30 sensor nodes over the period (0, 550). The lifetime of the network was increased by using the MFO algorithm, as shown in Figure 3c. For the WOA, MFO, and SSA algorithms, the performance comparison of the number of living nodes vs. the number of rounds was improved. Figure 3 illustrates that there were differences in the performance evaluation between the three algorithms. Considering the timing of the death of the first node for the different protocols, the MFO algorithm had a better performance compared with the SSA and WOA methods. Moreover, the nodes in the MFO and WOA algorithms started to die after 550 rounds. However, the network lifetime of the MFO algorithm was the highest, as the last node died after 2190 rounds, compared to 2130 and 2020 rounds for the SSA and WOA methods, respectively.

4.1.3. Network Throughput

The network throughput is a significant metric that reflects the performance of a protocol. It represents the number of packets delivered to the base station. Cluster member nodes send the sensed information to the CH in the form of packets. Then, the CH combines the received packets and sends them to the BS. Throughout this phase, if the CH energy is insufficient to transmit, receive or combine the information, the information will be lost, which significantly reduces the network throughput. The throughput performance of the WOA, MFO and SSA algorithms is presented in Figure 4. The MFO algorithm provided the best performance, as shown in Figure 4a, followed by the WOA and SSA methods in the initial interval (0, 700). The MFO algorithm outperformed both the SSA and WOA methods in terms of network throughput during the interval (1850, 2140). However, the MFO algorithm outperformed the SSA and WOA in terms of network throughput during the timeframe (2140, 2200) as shown in Figure 4b.

4.1.4. Residual Energy

To ensure the network’s long-term viability, limited resources must be used wisely. When it comes to wireless networks, energy conservation is the most important factor in their design and execution. Having information about the present distribution of residual energy in a network may assist the user in deciding what kind of measures to take. Figure 5 shows the number of rounds versus the residual energy in the MFO, SSA and WOA algorithms. This figure reveals that the MFO algorithm achieved the best energy performance. The number of rounds for the MFO algorithm exceeded that of the SSA and WOA algorithms.

4.1.5. Fitness Function

The bi-objective function in this study was designed to select the cluster head within every cluster while optimizing two objectives; the first one minimized the distance from every node to the cluster head and the distance from the cluster head to the base station, while the second one ensured the selection of a cluster head with high remaining energy. Figure 6 displays the quantity of the bi-objective function optimization for all the algorithms, with the MFO protocol outperforming the others because it produced the smallest objective function.
In summary, the simulation results revealed that the moth–flame algorithm performed better than the other two algorithms in terms of exploration and exploitation, along with four additional criteria (number of alive nodes, network throughput, residual energy and fitness function).

4.2. Second Stage of Analysis

This stage of the analysis compared the performance of the MFO algorithm with the LEACH algorithm over the wireless network energy consumption model in terms of the number of alive nodes, the network throughput, the residual energy, and the fitness function. The LEACH protocol shares critical characteristics with the MFO algorithm such as purpose and concept, operational structure and process and routing category [70,71,72]. They both aim to rotate sensor nodes as cluster heads so that the high energy dissipation in communicating with the BS is distributed to all the sensor nodes in the network. That is, they maintain a balanced energy usage, responsibility for the CH is rotated and a new cluster is established in each round [73,74]. As an added benefit, the LEACH and MFO methods conduct local data compression, lowering the quantity of data transmitted between clusters and the BS and, as a result, extending the system lifespan and reducing power consumption [75]. Considering their operational structure and process, the MFO and LEACH methods operate in rounds. Each round is divided into two phases: setup and steady state. Clusters are organized during the setup phase, and data transmission occurs during the steady-state phase. Furthermore, both use a simple radio model to describe how energy is dissipated through electronic equipment, such as the transmitter, power amplifier and receiver [76,77,78]. In terms of the routing category, both the MFO and LEACH methods fall in the same category of proactive routing protocols (centralized, source-driven). They both use a link-state routing protocol, where each node determines the channel condition and network topology and forwards it to a centralized location that computes the routing table for all the nodes in the network [79]. In addition, the network can execute dependable operations by adopting hierarchical protocols for data communication, which can save energy for network nodes [80].
In summary, the proposed optimization algorithm’s performance was compared to that of the LEACH method due to the following primary advantages [81,82,83,84,85,86]: (1) The LEACH protocol’s clustering minimizes the amount of energy required for communication between sensor nodes and the BS, allowing the network to last longer. (2) By lowering the linked data locally, the CH’s data aggregation saves a substantial amount of energy. (3) The nodes in the network are placed into sleep mode. As a result, cluster collisions are avoided, and the sensor node’s battery life is increased. (4) In the LEACH protocol, every sensor node has an equal chance of becoming the CH at least once. The network’s longevity is increased by this randomized rotation of the CH. Figure 7 illustrates the performance of the LEACH and MFO algorithms in terms of the number of alive nodes with respect to the number of rounds. The MFO algorithm outperformed LEACH. Figure 7b shows the network’s lifetime for the period (0, 815). Figure 7c illustrates that the nodes survived for approximately 2380 rounds for the MFO algorithm. The performance comparison showed that the MFO algorithm significantly outperformed LEACH. Considering the timing of the death of the first node in the different protocols, the MFO algorithm showed a better performance compared to the LEACH method. Moreover, the last node in the LEACH method died earlier than the last node in the MFO algorithm, as shown in Figure 7b. Moreover, the lifetime of the MFO algorithm was much longer than that of the LEACH method (Figure 7c).
Figure 8 plots the network throughput for the two protocols in terms of the number of rounds. The clustering within the moth–flame algorithm extended the network’s lifetime by preserving the residual energy of the nodes. The MFO algorithm’s throughput was higher than that of the LEACH method, as shown in Figure 8b.
As demonstrated in Figure 9a, the MFO algorithm outperformed the LEACH approach in terms of residual energy. The number of rounds in the MFO algorithm case exceeded 2000 rounds, whereas in the LEACH method case there were about 1800 rounds. Furthermore, Figure 9b shows that the MFO algorithm’s fitness function was significantly lower than that of the LEACH method.

5. Conclusions and Future Work

In this paper, an MFO-based clustering algorithm for enhancing the network lifetime was proposed and evaluated. The performance of the proposed algorithm was compared with existing clustering protocols (SSA, WOA and LEACH) in terms of four different metrics (fitness function, network lifetime evaluation, energy evaluation and throughput). The MFO algorithm achieved a significant performance improvement with an enhanced energy consumption compared to the SSA and WOA algorithms as well as the LEACH protocol. The proposed algorithm extended the sensor network’s lifetime, preserved the nodes’ energy, extended the network’s lifetime and improved the network throughput. For a future work direction, it is recommended to use specified operators to solve multi-objective algorithms utilizing the MFO algorithm.

Author Contributions

Conceptualization, M.Z.M., M.A.A., L.H. and R.A.-S.; data curation, M.A.A.; formal analysis, M.Z.M., H.A.B.S., L.H. and R.A.-S.; investigation, M.Z.M., M.A.A. and O.F.B.; methodology, M.Z.M., H.A.B.S., M.A.A., O.F.B., L.H. and R.A.-S.; project administration, M.Z.M.; software, M.A.A., O.F.B., L.H. and R.A.-S.; supervision, M.Z.M. and H.A.B.S.; validation, M.Z.M., H.A.B.S., M.A.A., O.F.B., L.H. and R.A.-S.; writing—original draft, M.Z.M.; writing—review and editing, M.Z.M. and H.A.B.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aguirre, E.; Lopez-Iturri, P.; Azpilicueta, L.; Astrain, J.J.; Villadangos, J.; Santesteban, D.; Falcone, F. Implementation and Analysis of a Wireless Sensor Network-Based Pet Location Monitoring System for Domestic Scenarios. Sensors 2016, 16, 1384. [Google Scholar] [CrossRef] [PubMed]
  2. Sarammal, K.; Roseline, R.A. A Review: Wireless Sensor Networks and Its Application, Platforms, Standards and Tools. Int. J. Comput. Trends Technol. 2013, 4, 7. [Google Scholar]
  3. Sohraby, K.; Minoli, D.; Znati, T. Wireless Sensor Networks: Technology, Protocols, and Applications; John Wiley & Sons: Hoboken, NJ, USA, 2007. [Google Scholar]
  4. Raj, P.; Deka, G.C. Handbook of Research on Cloud Infrastructures for Big Data Analytics. IGI Global, 1AD. Available online: https://www.igi-global.com/book/handbook-research-cloud-infrastructures-big/www.igi-global.com/book/handbook-research-cloud-infrastructures-big/95028 (accessed on 10 December 2021).
  5. Kharazian, A. Adaptive Clustering in Wireless Sensor Network: Considering Nodes with Lowest Energy. Int. J. Ad Hoc Sens. Ubiquitous Comput. 2012, 3, 1–12. [Google Scholar] [CrossRef]
  6. Djedouboum, A.C.; Ari, A.A.A.; Gueroui, A.M.; Mohamadou, A.; Aliouat, Z. Big Data Collection in Large-Scale Wireless Sensor Networks. Sensors 2018, 18, 4474. [Google Scholar] [CrossRef]
  7. Konstantinidis, A.; Yang, K. Multi-objective energy-efficient dense deployment in Wireless Sensor Networks using a hybrid problem-specific MOEA/D. Appl. Soft Comput. 2011, 11, 4117–4134. [Google Scholar] [CrossRef]
  8. Elshrkawey, M.; Elsherif, S.M.; Wahed, M.E. An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks. J. King Saud Univ. -Comput. Inf. Sci. 2018, 30, 259–267. [Google Scholar] [CrossRef]
  9. Wei, Z.; Zhu, X.; Sun, S.; Huang, Y.; Dong, L.; Jiang, Y. Full-duplex versus half-duplex amplify-and-forward relaying: Which is more energy efficient in 60-GHz dual-hop indoor wireless systems? IEEE J. Sel. Areas Commun. 2015, 33, 2936. [Google Scholar] [CrossRef]
  10. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2002; Volume 2, p. 10. [Google Scholar] [CrossRef]
  11. Salah-ddine, K. Recent Advances of Hierarchical Routing Protocols for AdHoc and Wireless Sensor Networks: A Literature Survey. Int. J. Inform. Technol. 2016, 9, 71–79. [Google Scholar]
  12. Liaqat, M.; Gani, A.; Anisi, M.H.; Ab Hamid, S.H.; Akhunzada, A.; Khan, M.K.; Ali, R.L. Distance-Based and Low Energy Adaptive Clustering Protocol for Wireless Sensor Networks. PLoS ONE 2016, 11, e0161340. [Google Scholar] [CrossRef]
  13. Tong, M.; Tang, M. LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Caen, France, 28 June–2 July 2010; pp. 1–4. [Google Scholar] [CrossRef]
  14. Wang, R.; Wu, N.; Yu, X. Design of Digital Aerial Photography System for Unmanned Aerial Vehicle Based on Wireless Sensor Network. J. Appl. Sci. Eng. Technol. Educ. 2020, 14, 12. [Google Scholar]
  15. Mirjalili, S. Moth-Flame Optimization Algorithm: A Novel Nature-inspired Heuristic Paradigm. Knowl. -Based Syst. 2015, 89, 228–249. [Google Scholar] [CrossRef]
  16. Anbarasan, P.; Jayabarathi, T. Optimal reactive power dispatch using moth-flame optimization algorithm. Int. J. Appl. Eng. Res. 2017, 12, 3690–3701. [Google Scholar]
  17. Xu, Y.; Chen, H.; Luo, J.; Zhang, Q.; Jiao, S.; Zhang, X. Enhanced Moth-flame optimizer with mutation strategy for global optimization. Inf. Sci. 2019, 492, 181–203. [Google Scholar] [CrossRef]
  18. Shehab, M.; Abualigah, L.; AlHamad, H.; Alabool, H.; Al Shinwan, M.; Khasawneh, A. Moth–flame optimization algorithm: Variants and applications. Neural Comput. Appl. 2020, 32, 9859–9884. [Google Scholar] [CrossRef]
  19. Jangir, N.; Pandya, M.H.; Trivedi, I.N.; Bhesdadiya, R.H.; Jangir, P.; Kumar, A. Moth-Flame optimization Algorithm for solving real challenging constrained engineering optimization problems. In Proceedings of the 2016 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 5–6 March 2016; pp. 1–5. [Google Scholar] [CrossRef]
  20. Elsakaan, A.A.; El-Sehiemy, R.A.; Kaddah, S.S.; Elsaid, M.I. An enhanced moth-flame optimizer for solving non-smooth economic dispatch problems with emissions. Energy 2018, 157, 1063–1078. [Google Scholar] [CrossRef]
  21. Allam, D.; Yousri, D.A.; Eteiba, M.B. Parameters extraction of the three diode model for the multi-crystalline solar cell/module using Moth-Flame Optimization Algorithm. Energy Convers. Manag. 2016, 123, 535–548. [Google Scholar] [CrossRef]
  22. Hazir, E.; Erdinler, E.S.; Koc, K.H. Optimization of CNC cutting parameters using design of experiment (DOE) and desirability function. J. For. Res. 2017, 29, 1423–1434. [Google Scholar] [CrossRef]
  23. Zawbaa, H.M.; Emary, E.; Parv, B.; Sharawi, M. Feature selection approach based on moth-flame optimization algorithm. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 4612–4617. [Google Scholar] [CrossRef]
  24. Trivedi, I.N.; Kumar, A.; Ranpariya, A.H.; Jangir, P. Economic Load Dispatch problem with ramp rate limits and prohibited operating zones solve using Levy flight Moth-Flame optimizer. In Proceedings of the 2016 International Conference on Energy Efficient Technologies for Sustainability (ICEETS), Nagercoil, India, 7–8 April 2016; pp. 442–447. [Google Scholar] [CrossRef]
  25. Wang, M. Toward an optimal kernel extreme learning machine using a chaotic moth-flame optimization strategy with applications in medical diagnoses. Neurocomputing 2017, 267, 69–84. [Google Scholar] [CrossRef]
  26. Yousri, D.A.; AbdelAty, A.M.; Said, L.A.; AboBakr, A.; Radwan, A.G. Biological inspired optimization algorithms for cole-impedance parameters identification. AEU -Int. J. Electron. Commun. 2017, 78, 79–89. [Google Scholar] [CrossRef]
  27. Aziz, M.A.E.; Ewees, A.A.; Hassanien, A.E. Whale Optimization Algorithm and Moth-Flame Optimization for multilevel thresholding image segmentation. Expert Syst. Appl. 2017, 83, 242–256. [Google Scholar] [CrossRef]
  28. Latiff, N.M.A.; Tsimenidis, C.C.; Sharif, B.S. Energy-Aware Clustering for Wireless Sensor Networks using Particle Swarm Optimization. In Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Montreal, QC, Canada, 3–7 September 2007. [Google Scholar]
  29. Lavanya, N.; Shankar, T. Energy Efficient Cluster Head Selection using Hybrid Squirrel Harmony Search Algorithm in WSN. Int. J. Adv. Comput. Sci. Appl. 2019, 10, 477–487. [Google Scholar] [CrossRef]
  30. Jadhav, A.R.; Shankar, T. Whale Optimization Based Energy-Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks. arXiv 2017, arXiv:1711.09389. [Google Scholar]
  31. Selvi, M.; Nandhini, C.; Thangaramya, K.; Kulothungan, K.; Kannan, A. HBO based clustering and energy optimized routing algorithm for WSN. In Proceedings of the 2016 Eighth International Conference on Advanced Computing (ICoAC), Chennai, India, 19–21 January 2017; pp. 89–92. [Google Scholar] [CrossRef]
  32. Syed, M.A.; Syed, R. Weighted Salp Swarm Algorithm and its applications towards optimal sensor deployment. J. King Saud Univ. -Comput. Inf. Sci. Jul. 2022, 34, 1285–1295. [Google Scholar] [CrossRef]
  33. Mann, P.; Singh, S. Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks. J. Netw. Comput. Appl. 2017, 83, 40–52. [Google Scholar] [CrossRef]
  34. Hussain, Z.; Raziuddin, S. Completely Informed Artificial Bee Colony for Dynamic Problems and Optimal Sensor Placement. Int. J. Pure Appl. Mathe 2017, 114, 12. [Google Scholar]
  35. Li, P.; Nie, H.; Qiu, L.; Wang, R. Energy optimization of ant colony algorithm in wireless sensor network. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717704831. [Google Scholar] [CrossRef]
  36. Narasegouda, S.; Salma, M.U.; Patil, A.N. Nature Inspired Algorithm Approach for the Development of an Energy Aware Model for Sensor Network. In Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2019; pp. 55–77. [Google Scholar] [CrossRef]
  37. Jia, J.; Chen, J.; Chang, G.; Wen, Y.; Song, J. Multi-objective optimization for coverage control in wireless sensor network with adjustable sensing radius. Comput. Math. Appl. 2009, 57, 1767–1775. [Google Scholar] [CrossRef]
  38. Peiravi, A.; Mashhadi, H.; Javadi, S.H. An optimal energy-efficient clustering method in wireless sensor networks using multi-objective genetic algorithm. Int. J. Commun. Syst. 2013, 26, 114–126. [Google Scholar] [CrossRef]
  39. Kumaravel, V.; Panneerselvam, A. A multi objective Tabu particle swarm optimization for effective cluster head selection in WSN. Clust. Comput. 2019, 22, 12275–12282. [Google Scholar] [CrossRef]
  40. Attea, B.A.; Okay, F.Y.; Özdemi, S.; Akcayol, M.A. Multi-objective evolutionary algorithm based on decomposition for efficient coverage control in mobile sensor networks. In Proceedings of the 2012 6th International Conference on Application of Information and Communication Technologies (AICT), Tbilisi, Georgia, 17–19 October 2012; pp. 1–6. [Google Scholar] [CrossRef]
  41. Jameii, S.M.; Faez, K.; Dehghan, M. Multiobjective Optimization for Topology and Coverage Control in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 363815. [Google Scholar] [CrossRef]
  42. Jameii, S.M.; Faez, K.; Dehghan, M. AMOF: Adaptive multi-objective optimization framework for coverage and topology control in heterogeneous wireless sensor networks. Telecommun. Syst. 2016, 61, 515–530. [Google Scholar] [CrossRef]
  43. Attea, B.; Khalil, E.; Cosar, A. Multi-objective evolutionary routing protocol for efficient coverage in mobile sensor networks. Soft Comput. 2014, 61, 515–530. [Google Scholar] [CrossRef]
  44. Chávez-Bosquez, O.; Pozos-Parra, P.; Hernández-Ocaña, B. On Combining Numerical Optimization Techniques with a Belief Merging Approach. In Proceedings of the Eleventh Latin American Workshop on New Methods of Reasoning (LANMR), Puebla, Mexico, 15-16 November 2018; 2018; pp. 51–62. [Google Scholar]
  45. Blum, C.; Roli, A. Metaheuristics in combinatorial optimization: Overview and conceptual comparison. ACM Comput. Surv. 2003, 35, 268–308. [Google Scholar] [CrossRef]
  46. Voss, S. Meta-heuristics: The state of the art. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2001; Volume 2148, pp. 1–23. [Google Scholar]
  47. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey Wolf Optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  48. Consoli, S. The development and application of metaheuristics for problems in graph theory: A computational study. Ph.D. Thesis, Brunel University, London, UK, 2008. [Google Scholar]
  49. Brownlee, J. Clever Algorithms: Nature-inspired Programming Recipes; Lulu Press: Morrisville, CA, USA, 2011. [Google Scholar]
  50. El-Omari, D.N.K.T. Sea Lion Optimization Algorithm for Solving the Maximum Flow Problem. Int. J. Comput. Sci. Netw. Secur. 2020, 20, 30–68. [Google Scholar] [CrossRef]
  51. Hussain, K.; Salleh, M.N.M.; Cheng, S.; Shi, Y. Metaheuristic research: A comprehensive survey. Artif. Intell. Rev. 2019, 52, 2191–2233. [Google Scholar] [CrossRef]
  52. Prakasam, A.; Savarimuthu, N. Metaheuristic Algorithms and Polynomial Turing Reductions: A Case Study Based on Ant Colony Optimization. Procedia Comput. Sci. 2015, 46, 388–395. [Google Scholar] [CrossRef]
  53. AL-Shammari, M.Q.; Muniyandi, R.C. Optimised Tail-based Routing for VANETs using Multi-Objective Particle Swarm Optimisation with Angle Searching. Int. J. Adv. Comput. Sci. Appl. IJACSA 2020, 11, 224–232. [Google Scholar] [CrossRef]
  54. Ryser-Welch, P.; Miller, J. A Review of Hyper-Heuristic Frameworks. In Proceedings of the 50th Annual Convention of the Society for the Study of Artificial Intelligence and the Simulation of Behaviour, AISB 2014, London, UK, 1–4 April 2014. [Google Scholar]
  55. Lam, A.Y.S.; Li, V.O.K. Chemical-Reaction-Inspired Metaheuristic for Optimization. IEEE Trans. EComput. 2010, 14, 381–399. [Google Scholar] [CrossRef]
  56. Khan, M.F.; Aadil, F.; Maqsood, M.; Bukhari, S.H.R.; Hussain, M.; Nam, Y. Moth Flame Clustering Algorithm for Internet of Vehicle (MFCA-IoV). IEEE Access 2019, 7, 11613–11629. [Google Scholar] [CrossRef]
  57. Hu, H.; Bai, Y.; Xu, T. A whale optimization algorithm with inertia weight. WSEAS Trans. Comput. 2016, 15, 8. [Google Scholar]
  58. Li, Z.; Zhang, S.; Song, J. Lévy-Flight Moth-Flame Algorithm for Function Optimization and Engineering Design Problems. Math. Probl. Eng. 2016, 2016, 1423930. [Google Scholar] [CrossRef]
  59. Liu, Z.-F.; Ge, S.-Y.; Yu, Y. Optimal reactive power dispatch using chaotic particle swarm optimization algorithm. IEEE Access 2005, 29, 53–57. [Google Scholar]
  60. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  61. Nasiri, J.; Khiyabani, F.M. A whale optimization algorithm (WOA) approach for clustering. Cogent Math. Stat. 2018, 5, 1483565. [Google Scholar] [CrossRef]
  62. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  63. Jain, R.; Kshirsagar, M.; Malik, L. Analysis of Setup Energy of LEACH Protocol for Wireless Sensor Networks. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar]
  64. Kohli, S.; Bhattacharya, P.; Jha, M. Implementation of Homogeneous LEACH Protocol in Three-Dimensional Wireless Sensor Networks. Int. J. Sens. Wirel. Commun. Control 2015, 6, 4–11. [Google Scholar] [CrossRef]
  65. Salleh, M.N.M.; Hussain, K.; Cheng, S.; Shi, Y.; Muhammad, A.; Ullah, G.; Naseem, R. Exploration and Exploitation Measurement in Swarm-Based Metaheuristic Algorithms: An Empirical Analysis; Springer: Berlin/Heidelberg, Germany, 2018; pp. 24–32. [Google Scholar] [CrossRef]
  66. Amiri, E.; Keshavarz, H.; Alizadeh, M.; Zamani, M.; Khodadadi, T. Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization. Int. J. Distrib. Sens. Netw. Jul. 2014, 10, 768936. [Google Scholar] [CrossRef]
  67. Dey, A.; Sarkar, T.; Ullah, M.; Nahar, N. Implementation of Improved Harmony Search Based Clustering Algorithm in Wireless Sensor Networks. In Proceedings of the 1st International Conference on Advanced Information and Communication Technology 2016; Chittagong Independent University: Chattogram, Bangladesh, 2016. [Google Scholar]
  68. Amouzgar, K. Multi-Objective Optimization Using Genetic Algorithms. Available online: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-19851 (accessed on 10 December 2021).
  69. Hayajneh, T.; Doomun, R.; Al-Mashaqbeh, G.; Mohd, B. An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Netw. 2014, 7, 2015–2038. [Google Scholar] [CrossRef]
  70. Miah, M.S. Performance Analysis of ILEACH and LEACH Protocols for Wireless Sensor Networks. J. Inf. Commun. Converg. Eng. 2012, 10, 384–389. [Google Scholar] [CrossRef]
  71. Braman, A. A Comparative Study on Advances in LEACH Routing Protocol for Wireless Sensor Networks: A survey. Int. J. Adv. Res. Comput. Commun. Eng. 2014, 3, 8. [Google Scholar]
  72. Liu, Z.; Liu, Z. A Dynamic Clustering Protocol for Wireless Sensor Networks. In Proceedings of the 2011 International Conference on Computational and Information Sciences, Chengdu, China, 23 October 2011; pp. 777–779. [Google Scholar] [CrossRef]
  73. Nazir, B.; Hasbullah, H. Energy Efficient Multi Hierarchy Clustering Protocol for Wireless Sensor Network (EMHC). In Proceedings of the International Conference on Intelligent and Information Technology 2010, Lahore, Pakistan, 28–30 October 2010; p. 6. [Google Scholar]
  74. Tarng, W.; Huang, K.-J.; Deng, L.-Z.; Hsie, K.-R.; Chen, M. A Study of Dynamic Clustering Method to Extend the Lifetime of Wireless Sensor Network. Int. J. Electron. Commun. Eng. 2010, 4, 61. [Google Scholar]
  75. Muthusamy, M.; Nallasamy, S. Enhancements of LEACH Algorithm for Wireless Networks: A Review. ICTACT J. Commun. Technol. 2013, 4, 821–827. [Google Scholar] [CrossRef]
  76. Gupta, A.; Malik, S.; Goyal, M.; Gupta, P. Clustering Approach for Enhancing Network Energy using LEACH Protocol in WSN. Int. J. Wired Wirel. Commun. 2012, 2, 20–25. [Google Scholar]
  77. Farooq, M.O.; Dogar, A.B.; Shah, G.A. MR-LEACH: Multi-hop Routing with Low Energy Adaptive Clustering Hierarchy. In Proceedings of the 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, Italy, 18–25 July 2010; pp. 262–268. [Google Scholar] [CrossRef]
  78. Bani-Hani, R.; Ijjeh, A. A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks. J. Commun. Eng. Technol. Publ. 2013, 8, 192. [Google Scholar] [CrossRef]
  79. Ahmedy, I.; Ngadi, M.A.; Omar, S.N.; Chaudhry, J. A review on wireless sensor networks routing protocol: Challenge in energy perspective. Sci. Res. Essays 2011, 6, 5628–5649. [Google Scholar] [CrossRef]
  80. Kumar, D.; Aseri, T.C.; Patel, R.B. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Comput. Commun. 2009, 32, 662–667. [Google Scholar] [CrossRef]
  81. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 16. [Google Scholar] [CrossRef]
  82. Kaur, M.; Munjal, A. Data Aggregation Algorithms for Wireless Sensor Network: A Review. Ad Hoc Netw. 2020, 100, 102083. [Google Scholar] [CrossRef]
  83. Liu, Y.; Wu, Q.; Zhao, T.; Tie, Y.; Bai, F.; Jin, M. An Improved Energy-Efficient Routing Protocol for Wireless Sensor Networks. Sensors 2019, 19, 4579. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  84. Wu, X.; Lu, K.; Zhu, G. A Survey on Software-Defined Wide Area Networks. J. Commun. 2018, 13, 253–258. [Google Scholar] [CrossRef]
  85. Alotaibi, Y. A New Database Intrusion Detection Approach Based on Hybrid Meta-heuristics. Comput. Mater. Contin. 2021, 66, 1879–1895. [Google Scholar] [CrossRef]
  86. Salem, A.O.A.; Shudifat, N. Enhanced LEACH protocol for increasing a lifetime of WSNs. Pers. Ubiquitous Comput. 2019, 23, 901–907. [Google Scholar] [CrossRef]
Figure 1. Cluster head selection in WSN via WOA, MFO and SSA.
Figure 1. Cluster head selection in WSN via WOA, MFO and SSA.
Processes 11 00534 g001
Figure 2. Ratio of individuals exploring the search space.
Figure 2. Ratio of individuals exploring the search space.
Processes 11 00534 g002
Figure 3. The number of rounds versus the number of alive nodes in MFO, SSA and WOA.
Figure 3. The number of rounds versus the number of alive nodes in MFO, SSA and WOA.
Processes 11 00534 g003
Figure 4. Variation in throughput in MFO, SSA and WOA.
Figure 4. Variation in throughput in MFO, SSA and WOA.
Processes 11 00534 g004
Figure 5. The number of rounds versus residual energy within WOA, MFO and SSA.
Figure 5. The number of rounds versus residual energy within WOA, MFO and SSA.
Processes 11 00534 g005
Figure 6. The number of rounds versus fitness function within WOA, MFO and SSA.
Figure 6. The number of rounds versus fitness function within WOA, MFO and SSA.
Processes 11 00534 g006
Figure 7. The number of rounds versus the number of alive nodes in MFO and LEACH.
Figure 7. The number of rounds versus the number of alive nodes in MFO and LEACH.
Processes 11 00534 g007
Figure 8. Variation in throughput in MFO and LEACH.
Figure 8. Variation in throughput in MFO and LEACH.
Processes 11 00534 g008
Figure 9. (a) The number of rounds versus the residual energy within MFO and LEACH. (b) The number of rounds versus fitness function for MFO and LEACH.
Figure 9. (a) The number of rounds versus the residual energy within MFO and LEACH. (b) The number of rounds versus fitness function for MFO and LEACH.
Processes 11 00534 g009
Table 1. Energy consumption radio parameters in WSN.
Table 1. Energy consumption radio parameters in WSN.
SymbolDescription
E e l e c Energy consumed in an electronic circuit to transmit or receive a signal
ε M P Energy consumed by an amplifier to transmit at a shorter distance (multi-path)
ε F S Energy consumed by an amplifier to transmit at a shorter distance (free space)
ε D A Data aggregation energy
d 0 The threshold estimation of the transmission distance
E R The energy consumption of receiving the data packet
E c The energy consumption at the cluster head
E n The energy consumption at the node
E T C B S The energy consumption of transmission from the cluster head to the base station
E T n c The energy consumption of transmission from the node to the cluster head
Table 2. Simulation parameters of the network.
Table 2. Simulation parameters of the network.
ParametersValue
Population size30 sensor nodes
Deployment area100 × 100 m2
The location of the sink(50, 50)
Initial energy for each node0.5 J
The energy transmission50 nJ/bit
The energy receiver50 nJ/bit
ε M P 0.0013 pJ/bit/m4
ε F S 10 pJ/bit/m2
ε D A 5 nj/bit/packet
E e l e c 50 nJ/bit
Search agents5
The number of generations10,000
Size of packet (K)4096 bits
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mistarihi, M.Z.; Bany Salameh, H.A.; Alsaadi, M.A.; Beyca, O.F.; Heilat, L.; Al-Shobaki, R. Energy-Efficient Bi-Objective Optimization Based on the Moth–Flame Algorithm for Cluster Head Selection in a Wireless Sensor Network. Processes 2023, 11, 534. https://doi.org/10.3390/pr11020534

AMA Style

Mistarihi MZ, Bany Salameh HA, Alsaadi MA, Beyca OF, Heilat L, Al-Shobaki R. Energy-Efficient Bi-Objective Optimization Based on the Moth–Flame Algorithm for Cluster Head Selection in a Wireless Sensor Network. Processes. 2023; 11(2):534. https://doi.org/10.3390/pr11020534

Chicago/Turabian Style

Mistarihi, Mahmoud Z., Haythem A. Bany Salameh, Mohammad Adnan Alsaadi, Omer F. Beyca, Laila Heilat, and Raya Al-Shobaki. 2023. "Energy-Efficient Bi-Objective Optimization Based on the Moth–Flame Algorithm for Cluster Head Selection in a Wireless Sensor Network" Processes 11, no. 2: 534. https://doi.org/10.3390/pr11020534

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop