A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN
Abstract
:1. Introduction
- To propose a novel fuzzy criminal search Ebola optimization (FCSEO) algorithm for the optimal selection of cluster heads.
- To mitigate data redundancy, thereby enhancing the network lifetime and minimizing the energy consumption.
- To conduct extensive experimentation between various approaches to determine the effectiveness of the proposed system.
2. Related Works
3. System Design
3.1. Network Model
3.2. Energy Model
3.3. Threat Model
4. Proposed Methodology
4.1. Cluster Head Selection
4.1.1. Criminal Search Optimization Algorithm (CSOA)
4.1.2. Ebola Optimization Search Algorithm (EOSA)
4.1.3. Formulation of Fuzzy Criminal Search Ebola Optimization (FCSEO)
- ➢
- The Criminal search and Ebola optimization are novel algorithms which apply unique patterns for both exploration and exploitation. Both algorithms have their own advantages in solving the non-constrained statistical functions, but in the case of complex engineering problems, their performance often drops.
- ➢
- The main reason is the exploration–exploitation tradeoff achieved via a constant ratio (neighborhood parameter or best information of the prime suspect). Often the best individual in both the algorithm populations is the individual with the maximum fitness which often becomes trapped in the local minimum.
- ➢
- This is the major reason for premature convergence. These are the problems that affect the algorithm’s convergence rate and accuracy, and it is overcome in this work using the FCSEO algorithm. The exploration and exploitation behaviors are controlled here using the fuzzy decision-making strategy.
- ➢
- A new support agent called a virtual individual is defined and included in the navigation process. The search behavior of the algorithm is constantly modeled using the fuzzy strategy based on a threshold value.
- ➢
- The search procedure (optimal cluster head selection and energy minimization) is improved by applying a nine-rule fuzzy policy and speeding up the convergence.
- ➢
- A virtual agent is introduced in the Ebola population to share every individual’s experience and also provide a different search direction for the population in each iteration.
- ➢
- In this way, the individual in the population escapes the local minima and identifies some significant region in the search space [31]. The FCSEO algorithm gives equal chances to the individuals in the population to perform both exploration and exploitation in every iteration. Hence the CSO algorithm is used for local search and the Ebola algorithm is used for global search.
- ➢
- The virtual agent (BV) is mainly induced inside the population instead of using the random interaction between the individuals in the population. According to the fitness function value, the direction of the individual in the population connected with the virtual agent is determined.
- ➢
- The new self-adaptive method formulated is known as the FCSEO algorithm where the search behavior is controlled using a fuzzy decision module.
- ➢
- The working of the FCSEO algorithm is shown in Figure 2 and the algorithm is formulated as shown below:
4.1.4. FCSEO Algorithm for CH Selection
4.2. Data Redundancy Process
Algorithm 1: Data redundancy model |
WMSN node-1→a1, WMSN node-2→a2, Remaining energy of a1→z1, Remaining energy of a2→z2 Initialize τ confirm whether the Euclidean distance (EC) between a1 and a2 is EC > 2 M If (EC > 2 M) No overlap found in the FOV End If If (EC <= 2 M) If the shape is a polygon, then Redundancy is present End If If shape is either quadrilateral or triangle Compute the area of either the quadrilateral or triangle End If If (Area > τ) Redundancy present Else Redundancy absent End If End If If (z1 > z2) Then a1 is responsible for the items FoV and the CH transmits the data Else Then a2 is responsible for the items FoV and the CH transmits the data End If |
5. Experimental Results and Discussions
5.1. Parameter Description
5.2. Evaluation Measures
5.2.1. Network Lifetime analysis ()
5.2.2. Packet Delivery Ratio ()
5.2.3. Throughput
5.2.4. End-to-End Delay
5.2.5. Residual Energy
5.2.6. Energy Consumption
5.2.7. Structural Similarity Index Measure (SSIM)
5.2.8. Routing Overhead
5.3. Performance Evaluation
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Barth, S.; de Jong, M.D.; Junger, M.; Hartel, P.H.; Roppelt, J.C. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telemat. Inform. 2019, 41, 55–69. [Google Scholar] [CrossRef]
- Yang, Z.; Wang, R.; Luo, D.; Xiong, Y. Rapid re-identification risk assessment for anonymous data set in mobile multimedia scene. IEEE Access 2020, 8, 41557–41565. [Google Scholar] [CrossRef]
- Selvi, V.; Karthiga, K. Different Types of Applications in Wireless Sensor Network: An Overview. Ed. Spec. Issue J. 2018, 5, 36–41. [Google Scholar]
- Kucukkececi, C.; Yazici, A. Multilevel object tracking in wireless multimedia sensor networks for surveillance applications using graph-based big data. IEEE Access 2019, 7, 67818–67832. [Google Scholar] [CrossRef]
- Borawake-Satao, R.; Prasad, R. Mobility aware multi-objective routing in wireless multimedia sensor network. Multimed. Tools Appl. 2019, 78, 32659–32677. [Google Scholar] [CrossRef]
- Li, S.; Kim, J.G.; Han, D.H.; Lee, K.S. A survey of energy-efficient communication protocols with qos guarantees in wireless multimedia sensor networks. Sensors 2019, 19, 199. [Google Scholar] [CrossRef] [Green Version]
- Sah, D.K.; Amgoth, T. Parametric survey on cross-layer designs for wireless sensor networks. Comput. Sci. Rev. 2018, 27, 112–134. [Google Scholar] [CrossRef]
- Yue, Y.-G.; He, P. A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions. Inf. Fusion 2018, 44, 188–204. [Google Scholar] [CrossRef]
- Arora, V.K.; Sharma, V. A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks. Peer-to-Peer Netw. Appl. 2021, 14, 807–820. [Google Scholar] [CrossRef]
- Sajwan, M.; Gosain, D.; Sharma, A.K. Hybrid energy-efficient multi-path routing for wireless sensor networks. Comput. Electr. Eng. 2018, 67, 96–113. [Google Scholar] [CrossRef]
- Din, M.S.U.; Rehman, M.A.U.; Ullah, R.; Park, C.-W.; Kim, D.H.; Kim, B.-S. Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things. Digit. Commun. Netw. 2021, 8, 778–790. [Google Scholar]
- Aswale, S.; Ghorpade, V.R. Geographic multipath routing based on triangle link quality metric with minimum inter-path interference for wireless multimedia sensor networks. J. King Saud Univ.—Comput. Inf. Sci. 2021, 33, 33–44. [Google Scholar] [CrossRef]
- Genta, A.; Lobiyal, D.K.; Abawajy, J.H. Energy efficient multipath routing algorithm for wireless multimedia sensor network. Sensors 2019, 19, 3642. [Google Scholar] [CrossRef] [Green Version]
- Raja, G.P.; Mangai, S. Firefly load balancing based energy optimized routing for multimedia data delivery in wireless mesh network. Clust. Comput. 2019, 22, 12077–12090. [Google Scholar] [CrossRef]
- Awad, F.H. Optimization of relay node deployment for multisource multipath routing in Wireless Multimedia Sensor Networks using Gaussian distribution. Comput. Netw. 2018, 145, 96–106. [Google Scholar] [CrossRef]
- Habib, M.A.; Moh, S. Robust evolutionary-game-based routing for wireless multimedia sensor networks. Sensors 2019, 19, 3544. [Google Scholar] [CrossRef] [Green Version]
- Tripathi, Y.; Prakash, A.; Tripathi, R. Load aware multipath data forwarding for enhanced lifetime of WSN. Int. J. Inf. Technol. 2021, 13, 807–815. [Google Scholar] [CrossRef]
- Xu, C.; Xiong, Z.; Zhao, G.; Yu, S. An energy-efficient region source routing protocol for lifetime maximization in WSN. IEEE Access 2019, 7, 135277–135289. [Google Scholar] [CrossRef]
- Govindaraj, S.; Deepa, S.N. Network energy optimization of iots in wireless sensor networks using capsule neural network learning model. Wirel. Pers. Commun. 2020, 115, 2415–2436. [Google Scholar] [CrossRef]
- Ambareesh, S.; Madheswari, A.N. Hrdss-wmsn: A multi-objective function for optimal routing protocol in wireless multimedia sensor networks using hybrid red deer salp swarm algorithm. Wirel. Pers. Commun. 2021, 119, 117–146. [Google Scholar] [CrossRef]
- Gutub, A. Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans. Intell. Technol. 2022. [Google Scholar] [CrossRef]
- Chen, Z. Research on Internet Security Situation Awareness Prediction Technology based on Improved RBF Neural Network Algorithm. J. Comput. Cogn. Eng. 2022, 1, 103–108. [Google Scholar]
- Gope, P.; Amin, R.; Islam, S.H.; Kumar, N.; Bhalla, V.K. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Futur. Gener. Comput. Syst. 2018, 83, 629–637. [Google Scholar] [CrossRef]
- Wani, A.; Khaliq, R. SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans. Intell. Technol. 2021, 6, 281–290. [Google Scholar] [CrossRef]
- Das, S.; Namasudra, S. A Lightweight and Anonymous Mutual Authentication Scheme for Medical Big Data in Distributed Smart Healthcare Systems. IEEE/ACM Trans. Comput. Biol. Bioinform. 2022, 1–12. [Google Scholar] [CrossRef]
- Verma, R.; Kumari, A.; Anand, A.; Yadavalli, V.S.S. Revisiting Shift Cipher Technique for Amplified Data Security. J. Comput. Cogn. Eng. 2022. [Google Scholar] [CrossRef]
- Sarkar, S.; Saha, K.; Namasudra, S.; Roy, P. An efficient and time saving web service based android application. SSRG Int. J. Comput. Sci. Eng. (SSRG-IJCSE) 2015, 2, 18–21. [Google Scholar]
- Sharma, A.S.; Kim, D.S. Energy efficient multipath ant colony based routing algorithm for mobile ad hoc networks. Ad Hoc Netw. 2021, 113, 102396. [Google Scholar] [CrossRef]
- Srivastava, A.; Das, D.K. Criminal Search Optimization Algorithm: A Population-Based Meta-Heuristic Optimization Technique to Solve Real-World Optimization Problems. Arab. J. Sci. Eng. 2022, 47, 3551–3571. [Google Scholar] [CrossRef]
- Oyelade, O.N.; Ezugwu, A.E.-S.; Mohamed, T.I.A.; Abualigah, L. Ebola Optimization Search Algorithm: A New Nature-Inspired Metaheuristic Optimization Algorithm. IEEE Access 2022, 10, 16150–16177. [Google Scholar] [CrossRef]
- Mortazavi, A.; Moloodpoor, M. Enhanced butterfly optimization algorithm with a new fuzzy regulator strategy and virtual butterfly concept. Knowl.-Based Syst. 2021, 228, 107291. [Google Scholar] [CrossRef]
- Matheen, M.A.; Sundar, S. Histogram and entropy oriented image coding for clustered wireless multimedia sensor networks (WMSNS). Multimed. Tools Appl. 2022, 81, 38253–38276. [Google Scholar] [CrossRef]
- Peng, H.; Tian, Z.; Li, X.; Wang, W.; Nauryzbayev, G.; Rabie, K.; Gadekallu, T.R. Covert communication for cooperative NOMA with two phases detection. Alex. Eng. J. 2023, 67, 39–49. [Google Scholar] [CrossRef]
Author and Year | Technique | Objective | Pros | Cons |
---|---|---|---|---|
Rehman et al. (2021) [11] | Sub-cluster head (SCH) | Improving resource constraints in IoT devices | Increased throughput and energy consumption | Low-speed applications |
Aswale et al. (2021) [12] | Geographic multipath routing | Eliminate hidden node problem | Improved performance and network lifetime | Cost rate was high |
Genta et al. (2019) [13] | Energy-effective multipath routing (EMR) | Decrease energy consumption while communicating | High performance, minimum energy consumption | Not suited for mobile sensor nodes |
Raja et al. (2019) [14] | Firefly load balancing based energy optimized routing (FLB-EOR) | Minimum weightage for multimedia data transmission | Enhanced LBE and throughput | Energy consumption was higher |
Awad et al. (2018) [15] | Gaussian distribution framework | Multipath routing for delay node optimization | Improve packet delay, data distribution, power consumption, and network life | Transmission delay was higher |
Habib et al. (2019) [16] | Evolutionary game-based routing (EGR) | Reduce data redundancy | Enhanced network performance and energy efficiency | Failed to apply in real time |
Tripathi et al. (2021) [17] | Efficient multipath routing method | Enhance network lifetime | Improve network performance | Ineffective due to burst data |
Xu et al. (2019) [18] | Efficient region source routing protocol (ER-SR) | Maximize the lifetime of WSN | High efficiency and enhanced the performance | High network overload |
Govindaraj et al. (2020) [19] | Capsule neural network (CNN) | Enhancing the network performance of the sensor | Achieved higher performance | High Computation time |
Ambareesh et al. (2021) [20] | Hybrid red deer salp swarm (HRDSS) | To tackle the complications such as high packet loss and network congestion | Reduce packet loss, Expected Transmission (ETX) cost, and transmission delay | Not implemented in engineering-related applications |
Gutub et al. (2022) [21] | Image authentication model | Improve the image authentication process to secure the hidden data of watermarking | Improve performance | Not able to adjust the location |
Chen et al. (2022) [22] | Simulated annealing algorithm and hybrid hierarchy genetic algorithm (SA-HHGA) | To secure private data | Attained stable condition | Security was not guaranteed |
Gope et al. (2018) [23] | Radio frequency identification (RFID) | Secure the lightweight and privacy data obtained in a smart city | Improved security | Attacker could be easily hacked without authorization |
Wani et al. (2021) [24] | SDN-based intrusion detection | To protect lightweight protocols from anomalies | Improved performance | Processing was further performed after modifying |
Das et al. (2022) [25] | Lightweight and anonymous mutual authentication scheme | To secure the unauthenticated usage of data from illegal access | High performances | Improve effectiveness and strength of security |
Verma et al. (2022) [26] | Shift cipher technique | Securing sensitive data | Improve security performance | decrypted data was easily hacked |
Sarkar et al. (2015) [27] | Web service-based android application | Reduce the consumption of time while using the android application | Improved the bandwidth | Hacked information easily |
Sl.No. | |||
---|---|---|---|
Rule 1 | H | H | VH |
Rule 2 | H | M | H |
Rule 3 | H | L | M |
Rule 4 | M | H | M |
Rule 5 | M | M | L |
Rule 6 | M | L | L |
Rule 7 | L | H | L |
Rule 8 | L | M | VL |
Rule 9 | L | L | VL |
Parameters | Values |
---|---|
Total area | 100 × 100 m |
Offset angle | 60 degrees |
Total number of sensor nodes | 100 |
Data and frame rates | 2 Mbps, 30 fps |
Initial energy | 2 joules |
Size of an image | 175 × 145 |
Techniques | Parameters | Ranges |
---|---|---|
Ebola Optimization Search Algorithm | Population size | 100 |
Total number of iterations | 50 | |
Contact rate of infectious individuals | 0.1 | |
Hospitalization rate | [0, 1] | |
Recovery rate of human individuals | ||
Criminal Search Optimization Algorithm | Population size | 50 |
Maximum number of sub investigators | 25 | |
No. of informers | 15 | |
Total no. of iteration | 100 | |
Maximum limit of random number | 2 |
Total Number of Nodes | Methods | ||||
---|---|---|---|---|---|
Proposed | FLB-EOR ( ) | EGR ( ) | HRDSS ( ) | ER-SR ( ) | |
0 | 0.17 | 0.16 | 0.16 | 0.16 | 0.16 |
40 | 0.75 | 0.6 | 0.4 | 0.15 | 0.23 |
80 | 1 | 0.8 | 0.48 | 0.49 | 0.34 |
120 | 1.1 | 0.9 | 0.57 | 0.51 | 0.4 |
160 | 1.3 | 1.1 | 0.63 | 0.68 | 0.45 |
200 | 1.9 | 1.7 | 0.9 | 0.7 | 0.47 |
Total Number of Rounds | Methods | ||||
---|---|---|---|---|---|
Proposed | FLB-EOR | EGR | HRDSS | ER-SR | |
500 | 13 | 12.3 | 11.6 | 11.3 | 10.5 |
1000 | 12.7 | 12.1 | 9.4 | 9 | 8.9 |
1500 | 11.8 | 11 | 8.9 | 7 | 6.1 |
2000 | 9 | 8.5 | 5.7 | 4 | 3 |
2500 | 7 | 5.5. | 4 | 2.8 | 1 |
3000 | 5.9 | 4 | 1 | 0.9 | 0.4 |
Total Number of Nodes | Methods | ||||
---|---|---|---|---|---|
Proposed | FLB-EOR | EGR | HRDSS | ER-SR | |
0 | 5000 | 5000 | 5000 | 5000 | 5000 |
50 | 5500 | 18,000 | 18,000 | 17,000 | 8000 |
100 | 5700 | 21,000 | 20,000 | 18,000 | 8200 |
150 | 5900 | 35,000 | 31,000 | 29,000 | 10,100 |
200 | 10,150 | 58,000 | 56,000 | 54,000 | 22,000 |
Total Number of Nodes | Methods | ||||
---|---|---|---|---|---|
Proposed | FLB-EOR | EGR | HRDSS | ER-SR | |
0 | 0.9 | 0.89 | 0.89 | 0.88 | 0.87 |
50 | 0.85 | 0.78 | 0.76 | 0.75 | 0.72 |
100 | 0.82 | 0.77 | 0.67 | 0.63 | 0.59 |
150 | 0.69 | 0.49 | 0.48 | 0.44 | 0.38 |
200 | 0.5 | 0.38 | 0.36 | 0.33 | 0.29 |
Total Number of Nodes | Methods | ||||
---|---|---|---|---|---|
Proposed | FLB-EOR | EGR | HRDSS | ER-SR | |
0 | 0.87 | 0.92 | 1.3 | 2.33 | 1.54 |
50 | 0.88 | 0.97 | 1.45 | 3.49 | 2.63 |
100 | 1.2 | 1.7 | 1.97 | 4.03 | 4.27 |
150 | 1.4 | 1.9 | 2.23 | 6.37 | 6.68 |
200 | 1.7 | 2.1 | 2.4 | 8.49 | 8.67 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Matheen, M.A.; Sundar, S. A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors 2023, 23, 2218. https://doi.org/10.3390/s23042218
Matheen MA, Sundar S. A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors. 2023; 23(4):2218. https://doi.org/10.3390/s23042218
Chicago/Turabian StyleMatheen, M. A., and S. Sundar. 2023. "A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN" Sensors 23, no. 4: 2218. https://doi.org/10.3390/s23042218
APA StyleMatheen, M. A., & Sundar, S. (2023). A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors, 23(4), 2218. https://doi.org/10.3390/s23042218