Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

CUCKOO-ANN Based Novel Energy-Efficient Optimization Technique for IoT Sensor Node Modelling

Published: 01 January 2022 Publication History

Abstract

Wireless sensor networks (WSNs) based on the Internet of Things (IoT) are now one of the most prominent wireless sensor communication technologies. WSNs are often developed for particular applications such as monitoring or tracking in either indoor or outdoor environments, where battery power is a critical consideration. To overcome this issue, several routing approaches have been presented in recent years. Nonetheless, the extension of the network lifetime in light of the sensor capabilities remains an open subject. In this research, a CUCKOO-ANN based optimization technique is applied to obtain a more efficient and dependable energy efficient solution in IoT-WSN. The proposed method uses time constraints to minimize the distance between sources and sink with the objective of a low-cost path. Using the property of CUCKOO method for solving nonlinear problem and utilizing the ANN parallel handling capability, this method is formulated. The resented model holds significant promise since it reduces average execution time, has a high potential for enhancing data centre energy efficiency, and can effectively meet customer service level agreements. By considering the mobility of the nodes, the technique outperformed with an efficiency of 98% compared with other methods. The MATLAB software is used to simulate the proposed model.

References

[1]
R. N. Jadoon, A. A. Awan, M. A. Khan, W. Zhou, and A. N. Malik, “PACR: position-aware protocol for connectivity restoration in mobile sensor networks,” Wireless Communications and Mobile Computing, vol. 2020, 15 pages, 2020.
[2]
N. K. Singh and V. Mahajan, “Detection of cyber cascade failure in smart grid substation using advance grey wolf optimization,” Journal of Interdisciplinary Mathematics, vol. 23, no. 1, pp. 69–79, 2020.
[3]
G. Rastogi and R. Sushil, “Cloud computing implementation: key issues and solutions,” in 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2015.
[4]
R. K. Garg, J. Bhola, and S. K. Soni, “Healthcare monitoring of mountaineers by low power wireless sensor networks,” Informatics in Medicine Unlocked, vol. 27, article 100775, 2021.
[5]
N. K. Pour, Energy Efficiency in Wireless Sensor Networks. [Ph.D. thesis], Department of Engineering and Information Technology at The University of Technology Sydney, 2015.
[6]
L. U. Khan, “Visible light communication: applications, architecture, standardization and research challenges,” Digital Communications and Networks, vol. 3, no. 2, pp. 78–88, 2017.
[7]
N. K. Singh and V. Mahajan, “End-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure,” International Journal of Critical Infrastructure Protection, vol. 34, article 100410, 2021.
[8]
J. Bhola, S. Soni, and G. K. Cheema, “Recent trends for security applications in wireless sensor networks – a technical review,” in 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2019.
[9]
V. Bhatia, S. Kaur, K. Sharma, P. Rattan, V. Jagota, and M. A. Kemal, “Design and simulation of capacitive MEMS switch for Ka band application,” Wireless Communications and Mobile Computing, vol. 2021, 8 pages, 2021.
[10]
A. Kumar, V. Jagota, R. Q. Shawl, V. Sharma, K. Sargam, M. Shabaz, M. T. Khan, B. Rabani, and S. Gandhi, “Wire EDM process parameter optimization for D2 steel,” Materials Today: Proceedings, vol. 37, no. 2, pp. 2478–2482, 2021.
[11]
S. F. Suhel, V. K. Shukla, S. Vyas, and V. P. Mishra, “Conversation to automation in banking through Chatbot using artificial machine intelligence language,” in 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2020.
[12]
M. Carlos-Mancilla, E. López-Mellado, and M. Siller, “Wireless sensor networks formation: approaches and techniques,” Journal of Sensors, vol. 2016, 2016.
[13]
S. Deshmukh, K. Thirupathi Rao, and M. Shabaz, “Collaborative learning based straggler prevention in large-scale distributed computing framework,” Security and Communication Networks, vol. 2021, 9 pages, 2021.
[14]
J. H. Ryu, M. Irfan, and A. Reyaz, “A review on sensor network issues and robotics,” Journal of Sensors, vol. 2015, 14 pages, 2015.
[15]
T. Nandy, M. Y. I. B. Idris, R. Md Noor, L. Mat Kiah, L. S. Lun, N. B. Annuar Juma'at, I. Ahmedy, N. Abdul Ghani, and S. Bhattacharyya, “Review on security of Internet of Things authentication mechanism,” IEEE Access, vol. 7, pp. 151054–151089, 2019.
[16]
K. Singh and A. Awasthi, Quality, Reliability, Security and Robustness in Heterogeneous Networks, Springer, Berlin, Germany, 2013.
[17]
D. B. Hoang and N. Kamyabpour, “An energy driven architecture for wireless sensor networks,” in 2012 13th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 10–15, Beijing, China, 2012.
[18]
S. Gupta, S. Vyas, and K. P. Sharma, “A survey on security for IoT via machine learning,” in 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), pp. 1–5, Gunupur, India, 2020.
[19]
K. Rajakumari, M. V. Kumar, G. Verma, S. Balu, D. Kumar Sharma, and S. Sengan, “Fuzzy based ant colony optimization scheduling in cloud computing,” Computer Systems Science and Engineering, vol. 40, no. 2, pp. 581–592, 2022.
[20]
F. Mazunga and A. Nechibvute, “Ultra-low power techniques in energy harvesting wireless sensor networks: recent advances and issues,” Scientific African, vol. 11, article e00720, 2021.
[21]
K. G. Knightson, T. Knowles, and J. Larmouth, Standards for Open Systems Interconnection, McGraw-Hill, Inc., 1987.
[22]
L. Chen, V. Jagota, and A. Kumar, “Research on optimization of scientific research performance management based on BP neural network,” International Journal of System Assurance Engineering and Management, 2021.
[23]
S. M. Absi, A. H. Jabbar, S. O. Mezan, B. A. Al-Rawi, and S. T. Al_Attabi, “An experimental test of the performance enhancement of a Savonius turbine by modifying the inner surface of a blade,” Materials Today: Proceedings, vol. 42, pp. 2233–2240, 2021.
[24]
Q. Wang, M. Hempstead, and W. Yang, “A realistic power consumption model for wireless sensor network devices,” in 2006 3rd annual IEEE communications society on sensor and ad hoc communications and networks, pp. 286–295, Reston, VA, USA, 2006.
[25]
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd annual Hawaii international conference on system sciences, Maui, HI, USA, 2000.
[26]
W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002.
[27]
G. Verma and R. Chakraborty, “A hybrid privacy preserving scheme using finger print detection in cloud environment,” Ingénierie des Systèmes d Information, vol. 24, no. 3, pp. 343–351, 2019.
[28]
K. Langendoen and G. Halkes, “Energy-efficient medium access control,” Embedded Systems Handbook, vol. 6000, 2005.
[29]
V. Raghunathan, C. Schurgers, Sung Park, and M. B. Srivastava, “Energy-aware wireless microsensor networks,” IEEE Signal Processing Magazine, vol. 19, no. 2, pp. 40–50, 2002.
[30]
I. Daanoune, B. Abdennaceur, and A. Ballouk, “A comprehensive survey on LEACH-based clustering routing protocols in wireless sensor networks,” Ad Hoc Networks, vol. 114, article 102409, 2021.
[31]
G. Kirubasri, “A contemporary survey on clustering techniques for wireless sensor networks,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 11, pp. 5917–5927, 2021.
[32]
A. Srivastava and P. K. Mishra, “A survey on WSN issues with its heuristics and meta-heuristics solutions,” Wireless Personal Communications, vol. 121, no. 1, pp. 745–814, 2021.
[33]
P. Kevin and D. Viely, “Critical evaluation on WSNs positioning methods,” International Journal of Innovative Research in Computer Science & Technology (IJIRCST), 2021.
[34]
A. A. Kazerooni, H. Jelodar, and J. Aramideh, “Leach and heed clustering algorithms in wireless sensor networks: a qualitative study,” Advances in Science and Technology. Research Journal, vol. 9, no. 25, pp. 7–11, 2015.
[35]
J. Bhola, M. Shabaz, G. Dhiman, S. Vimal, P. Subbulakshmi, and S. K. Soni, “Performance evaluation of multilayer clustering network using distributed energy efficient clustering with enhanced threshold protocol,” Wireless Personal Communications, 2021.
[36]
S. Ji, S. F. Yuan, and M. M. Cui, “Using self-organizing map in backbone formation for wireless sensor networks,” in 2009 Fifth International Conference on Natural Computation, pp. 468–472, Tianjian, China, 2009.
[37]
G. Künzel, L. S. Indrusiak, and C. E. Pereira, “Latency and lifetime enhancements in industrial wireless sensor networks: a q-learning approach for graph routing,” IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5617–5625, 2020.
[38]
R. Huang, L. Ma, G. Zhai, J. He, X. Chu, and H. Yan, “Resilient routing mechanism for wireless sensor networks with deep learning link reliability prediction,” IEEE Access, vol. 8, pp. 64857–64872, 2020.
[39]
J. Bhola and S. Soni, “A study on research issues and challenges in WSAN,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 1667–1671, Chennai, India, 2016.
[40]
V. S. Desai and R. Mohanty, “ANN-Cuckoo optimization technique to predict software cost estimation,” in 2018 Conference on Information and Communication Technology (CICT), pp. 1–6, Jabalpur, India, 2018.

Cited By

View all
  • (2022)HGKMSecurity and Communication Networks10.1155/2022/60003752022Online publication date: 1-Jan-2022
  • (2022)Secure Wireless Networks Based on Fuzzy Logic for Smart HVAC Systems in Small-Scale IndustriesSecurity and Communication Networks10.1155/2022/36599612022Online publication date: 1-Jan-2022
  • (2022)Research on Network Security Situational Awareness Based on Crawler AlgorithmSecurity and Communication Networks10.1155/2022/36391742022Online publication date: 1-Jan-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Wireless Communications & Mobile Computing
Wireless Communications & Mobile Computing  Volume 2022, Issue
2022
25330 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 01 January 2022

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)HGKMSecurity and Communication Networks10.1155/2022/60003752022Online publication date: 1-Jan-2022
  • (2022)Secure Wireless Networks Based on Fuzzy Logic for Smart HVAC Systems in Small-Scale IndustriesSecurity and Communication Networks10.1155/2022/36599612022Online publication date: 1-Jan-2022
  • (2022)Research on Network Security Situational Awareness Based on Crawler AlgorithmSecurity and Communication Networks10.1155/2022/36391742022Online publication date: 1-Jan-2022

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media