Next Article in Journal
Hot-Pressing Furnace Current Monitoring and Predictive Maintenance System in Aerospace Applications
Next Article in Special Issue
Big Data Analytics Using Cloud Computing Based Frameworks for Power Management Systems: Status, Constraints, and Future Recommendations
Previous Article in Journal
Companion: A Pilot Randomized Clinical Trial to Test an Integrated Two-Way Communication and Near-Real-Time Sensing System for Detecting and Modifying Daily Inactivity among Adults >60 Years—Design and Protocol
Previous Article in Special Issue
TAKEN: A Traffic Knowledge-Based Navigation System for Connected and Autonomous Vehicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN

School of Electronics Engineering, Vellore Institute of Technology, Vellore 632014, India
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(4), 2218; https://doi.org/10.3390/s23042218
Submission received: 14 December 2022 / Revised: 30 January 2023 / Accepted: 10 February 2023 / Published: 16 February 2023
(This article belongs to the Special Issue Advanced Technologies in Sensor Networks and Internet of Things)

Abstract

:
Wireless Multimedia Sensor Network (WMSN) is a powerful technology that is widely used to gather data and monitor the actual environment for analysis. Furthermore, multimedia applications’ needs and the features, such as constrained latency and high bandwidth consumption, complicate the design of WMSN routing protocols. Despite several methods, the trouble of designing WMSNs routing protocol remains a hurdle. The miniaturization and enhancement of hardware facilitate an extensive range of applications in the military and public sectors. On the contrary, the streaming of multimedia content is captured and generated due to some event-triggered surveillance for a long duration of time. Hence, it is necessary for wireless multimedia sensor network (WMSN) to provide a strong hardware foundation, thereby satisfying Quality of Service (QoS) requirements. Initially, the network is clustered into several clusters and the nodes with rich resources are chosen as cluster heads. The significant intention of this paper is to eliminate data redundancy and to select optimal cluster heads, thereby minimizing the energy consumption. Therefore, this paper proposes a novel Fuzzy Criminal Search Ebola Optimization (FCSEO) algorithm for optimal selection of cluster heads. In addition to this, the data redundancy present in the proposed algorithm is mitigated and thus the network lifetime is enhanced. Finally, extensive experimentation is carried out for various performance measures to determine the efficiency of the proposed approach.

1. Introduction

With the wireless communication advancement technology and smart terminals’ widespread fame, the applications of mobile multimedia are essential tools for work and daily life. Mobile multimedia applications are becoming increasingly popular due to their extensive functionality, good experience, and ubiquitous access. However, mobile multimedia service providers acquire user personal information when providing services to boost user viscosity, enhance user experience, or reserve data resources. Users must accept the privacy disclosure risk while making use of the ease of mobile multimedia services [1]. For example, the online browser history will reveal political learning’s, individuals’ consumption patterns, and other private information [2].
The various application domains that use WMSNs are military, industry, healthcare, and defense [3]. Over the last year, several investigations on object tracking, environment detection, target detection, border surveillance, and enemy intrusion have been carried out [4]. Multimedia applications create significant network traffic volume, overheads, and minimizing energy consumption is a major challenge in WMSNs. This traffic requires processing skills and high transmission rates on the part of the nodes. As both of these functions require a lot of energy, they can cause depletion of premature energy nodes and as a result, the network lifespan is reduced. Hence, in WMSNs, a dependable routing protocol and the creation of an effect that increases the network lifespan while also fulfilling the service quality needs of multimedia applications are crucial [5]. The WMSNs’ intrinsic qualities, such as limited bandwidth, dynamic links, and variable channel capacity, pose significant challenges to the design of WMSN routing protocols. Also, the limited resources, namely processing capability, buffer sizes, memory, bandwidths, and energy, are all factors that add to the difficulty of designing routing algorithms for WMSNs [6,7]. To overcome the issue, creating a routing protocol that detects routes effectively and selects a route among the sink and the detecting nodes. The routing protocol that uses a single path approach is particularly vulnerable to the extremely dynamic nature of wireless networks, and the multi-hop route has a limited capacity, and they are unable to provide high data communication for WMSNs [8]. Furthermore, the sensor nodes’ resources are limited in terms of memory, computational energy, and bandwidth, and congestion can have a significant impact on WMSN performance [9,10]. Numerous research works based on energy efficient wireless multisensor routing protocols have been developed. Meanwhile, those techniques faced the above mentioned limitations, which motivated us to present a novel article. The significant intention of this paper is to eliminate data redundancy and thereby select the optimal cluster head (CH) and minimize the energy consumption as well as enhance the network lifetime.
The major contributions of the article are depicted below:
  • To propose a novel fuzzy criminal search Ebola optimization (FCSEO) algorithm for the optimal selection of cluster heads.
  • To mitigate data redundancy, thereby enhancing the network lifetime and minimizing the energy consumption.
  • To conduct extensive experimentation between various approaches to determine the effectiveness of the proposed system.
The remaining section of the paper is structured as follows. In Section 2, the survey for the cluster head selection process based on energy efficient routing protocols is discussed. Section 3 discusses the network model and energy consumption model. The proposed approach based on data redundancy elimination as well as cluster head selection is presented in Section 4. The results for various parameters are presented in Section 5. At last, the conclusion of the article is presented in Section 6.

2. Related Works

The enhancing of the resource-constrained IoT device lifetime that mitigates redundant transmission was illustrated by Rehman et al. [11]. The nodes were able to recover the videos, audios, and images in a WMSN. When the declaration process of the CH and cluster formation process were completed, then the sub-cluster (SC) formation process was automatically activated. The sub-cluster head (SCH) was used for collecting data from the member node, eliminating all redundancies, and transferring minimum data to its corresponding CH. The PE-WMoT selected the fuzzy approach to choose the perfect SCH among all SC. The simulation result showed the number of redundant packet transmission reductions, increased throughput, and energy consumption. The drawback of this method is that it is only applicable for low-speed applications.
Aswale et al. [12] elaborated the triangle link quality metrics and minimum inter-path interference geographic multipath routing protocol for a WMSN. This protocol was employed for eliminating all hidden node problems (HNP) without considering the handshake mechanism. The result showed the improvement of performance and lifetime of the network.
Genta et al. [13] established wireless multimedia sensor networks using an energy-effective multipath routing (EMR) algorithm for data communication to decrease energy consumption. Multimedia applications create heavy traffic in the network, which leads to the generation of high energy consumption. The result showed high performance and minimum energy consumption. The main drawback of this method was the same application was not suitable for mobile sensor nodes.
Raja et al. [14] proposed a technique called firefly load balancing based energy optimized routing (FLB-EOR) in WMN. This FLB-EOR approach determines the node networks with minimum weightage for multimedia data transmission to improve load balancing efficiency (LBE) and throughput. To transmit the multimedia data from sender to receiver, the gravitational neighbor-node selection technique is utilized to search the shortest neighbor. Hence, this FLB-EOR technique can decrease EC and enhance the LBE of multimedia data delivery.
Awad et al. [15] presented the framework with the use of Gaussian distribution in multisource multipath routing for delay node optimization in a WMSN. Some of the parameters of networks are communication range and total routing paths needed, and source nodes are used to determine the optimal SD (standard deviation) and the theoretical bare minimum of relay nodes that are required. An analysis is conducted to determine the mathematical design and estimate the performance of the mathematical design. A statistical study found that routing efficiency was at least doubled when using an optimal Gaussian distribution rather than the uniform distribution. In addition, the number of packet controls and the average path lengths are significantly reduced to enhance pocket delay, data distribution, power consumption, and network life. Habib et al. [16] proposed a protocol called evolutionary game-based routing (EGR) with multiple sinks for WMSNs. Here, evolutionary game theory (EGT) is also used in selecting cluster heads (CHs). In this EGR, the multimedia sensor nodes are provided with a data redundancy avoidance algorithm to reduce data redundancy based upon overlapping. This algorithm helps to improve network performance and energy efficiency by reducing the number of redundant transmissions. Therefore, this EGR technique provides better outcomes than other techniques.
Tripathi et al. [17] proposed an efficient multipath routing method for enhancing the lifetime of a WSN. An efficient multipath routing technique was focused on the residual energy and hop count to pick the multiple paths. The simplified energy design was utilized for data transmission. The experimental results showed that the routing protocol enhanced the performance of networks based on energy consumption, average end-to-end delay, first dead node, and packet delivery ratio. Due to more burst data, this technique was ineffective. Xu et al. [18] introduced the energy-efficient region source routing protocol (ER-SR) to maximize a WSN for a lifetime. The distributed energy region method was utilized for dynamically picking the nodes by higher residual energy. The effective distance-based ant colony optimization method was used for minimizing the consumption of energy for data transmission. The experimental results demonstrated that the scheme exhibited high efficiency and enhanced the performance on delivery delay. However, the network lifetime was affected because of high network overload.
Govindaraj et al. [19] presented the networks energy optimization for the internet of things (IoT) in a WSN by employing a capsule neural network (CNN) learning design. The neural network architectural design was employed for enhancing the network performance of the sensor and also the network optimization was executed, which was present within the wireless sensor network design and cloud storage space. The CNN design achieved higher performance by reducing the network energy in WSN. The computation time of this technique was high. To tackle the complications such as high packet loss and network congestion, Ambareesh et al. [20] suggested the hybrid red deer salp swarm (HRDSS)-based routing protocol in a WMSN. The experimental setup was examined using the NS2 simulator based on delay, memory, fitness value, and packet loss. The result illustrated that the HRDSS approach determines the optimal route for data transmission and minimizes packet loss, expected transmission (ETX) cost, and transmission delay efficiently; however, it failed to implement in engineering-related applications. Gutub et al. [21] discussed enhancing the image authentication process to secure the hidden data of watermarking in counting-based secret sharing. The newly generated data were shared with the embedded images with varied least significant bits of the pixels. As a result, the average capacity of the watermarking image authentication was achieved by 33–67%. However, the variation occurs in every size of the image and cannot adjust the location for securing the image. The creation of awareness to secure the prediction technology of the network using the simulated annealing algorithm and hybrid hierarchy genetic algorithm (SA-HHGA) based on the radial basis function (RBF) was illustrated by Chen et al. [22]. The experimentation results revealed that the predicted value of the developed method was processed with 15 samples, and it attained a stable condition in a normal situation. Meanwhile, it did not generate a guarantee for security. Gope et al. [23] presented a method for securing the lightweight privacy data obtained in a smart city environment by radio frequency identification (RFID) technology. The developed method was used to transmit the captured data in different geographical locations securely. As a result, various resources-constrained IoT devices were obtained for improving security. However, if the server concedes the RFID tag, an attacker could be able to capture all the authorization without authentication.
Wani et al. [24] elaborated to protect lightweight protocols from anomalies by using the SDN-based intrusion detection method. The developed method did not generate a difficult situation in the security of IoT devices. As a result, it was operated in a real-world environment, which enhanced its performance. However, it required modifying the entire network for further processing. Das et al. [25] reviewed a method to secure the unauthenticated usage of data from illegal access in the healthcare industry. Here the data were protected by generating a security password to restrict the data access without permission. As a result, the developed method enhanced the effectiveness and strength of the security.
Verma et al. [26] discussed securing the sensitive data in Caesar cipher by converting the plaintext data into ciphertext, which boosted the security high by revisiting the shift cipher method. The experimentation results revealed that it improved the security performance in decrypting the data. On the other hand, decrypted data was hacked easily. Sarkar et al. [27] developed a method to reduce the consumption of time while using the android application to access information. The developed android application acquired various details of the users while registering the license number and the required information was shared through the web service. As a result, it improved the bandwidth while sharing the information with the user. Meanwhile, it paved the way to hack information easily. Detailed literature work presented in the Table 1.

3. System Design

This section elaborates the system model of the WMSN in which it consists of network and energy designs. The numerical expression of these models is explained in the following subsections.

3.1. Network Model

Figure 1 depicts the WMSN containing n number of powered battery sensor nodes and base stations. WMSN is represented by a weighted undirected graph g = ( v s , l s , w s ) , here the term v s = v 1 , v 2 , , v n depicts vertex set, l s = l 1 , l 2 , , l n indicates the set of bidirectional links and w s = w 1 , w 2 , , w n signifies the set of link weights [28]. The random deployment of SNs monitors and gathers the data from the network field. Furthermore, the collected data of SNs are stored in the BS for further processing. The sensors erected on the network field have a unique ID, a set of neighboring nodes with a communication radius ( ) that are delineated as n ( ν x ) = { ν y / D ( ν x , ν y )   and   ν y v s } . The terms n ( ν x ) and D ( ν x , ν y ) represent number of multimedia sensor nodes in the network and distance between the nodes ν x and ν y , respectively. Due to the deployment of SNs in hostile regions, the battery replacement process becomes a complicated task. In this mechanism, the cluster member senses the data and transmits them to the CH. However, the WMSN is also subject to network hole issues which greatly affect the data transmission capability of network. Also, due to restricted resources such as network bandwidth, energy, and memory, the WMSN performance becomes extremely influenced. Therefore, to overcome these difficulties, the multipath routing mechanism is utilized. The parameters, namely, throughput, delay and data delivery ratio are the main consideration of this mechanism, which helps to detect the optimal path for transmitting the data to the BS. Thus, this technique enhances the performance of the WMSN in multiple aspects, particularly by increasing the lifespan and reducing energy consumption. Based on the QoS demands, the mechanism necessitates the data to flow through trouble free paths for delay sensitive and time critical data packets.

3.2. Energy Model

The battery-powered sensor nodes deplete their energy on continuous data transmission. Due to the deployment of SNs in the farthest location, it is difficult to recharge the batteries. Consider E ( f , D ) t as energy consumed by the SN to broadcast f -bit data to neighboring nodes and D implies the distance of two neighboring nodes. Each node senses data and broadcast to the neighboring nodes repeatedly, thereby depleting the energy of SNs. The energy consumption of SNs depends on the single-hop or multi-hop transmission. The mathematical expression for the computation of E ( f , D ) t is given by,
E ( f , D ) t = { f .   E e + f .   e F l . D 2 , D < D 0 f .   E e + f .   e M l . D 4 , D D 0
The term E e represents electronics energy, e F l and e M l indicates free space energy loss and multipath energy loss, respectively; D 2 and D 4 depicts power loss in single-hop and multi-hop transmission, respectively. Moreover, the threshold distance D 0 = e F l e M l helps to find whether the data transmission is single-hop or multi-hop. The energy consumption according to transmission distance is computed as follows,
E r ( f ) = f .   E e
The above expression describes the energy consumption of SN to receive f data bits at distance D .

3.3. Threat Model

Dolev-Yao (DY) is a well-known threat model which is applicable both in IoT as well as WSN environments for both wireless and wired sensor networks. According to the basics of DY design, two different communication groups can communicate over a public channel which is insecure. Various communication systems, namely, cloud servers, IoT sensors, and fog sensors are considered as non-trusted entities.
Let us assume A be the adversary that modifies, deletes as well as inserts messages in or from the ongoing communication. In addition to this, A is capable of capturing few IoT sensors and extracts the most vital data from the memory. Also, A clones various new malicious nodes containing diverse attacking functionalities (i.e., wormhole, blackhole as well as sinkhole) along with the utilization of extracted information. Under execution of malicious attack, the data packets were dropped, lost, or denied, which degrades the performances of the communication.

4. Proposed Methodology

The numerous standard image compression methods are not properly suited for resource constrained but the transmission and image coding method can eliminate the resource constraint problem in WMSNs [29]. The significant intention of this paper is to eliminate the data redundancy and to select optimal cluster heads, thereby minimizing the energy consumption as well as enhancing the network lifetime [30,31]. Therefore, this paper proposes a novel FCSEO algorithm for optimal selection of CHs. The following subsection deliberates the workflow of the proposed methodology.

4.1. Cluster Head Selection

Various approaches have been used to enhance a specific metaheuristic technique and based on this process we propose a novel FCSEO algorithm. The FCSEO algorithm is capable of selecting an optimal cluster head with high network lifetime and minimum energy consumption. The following subsection delineates the steps involved in the FCESO algorithm-based cluster head selection process.

4.1.1. Criminal Search Optimization Algorithm (CSOA)

The objective of this criminal search optimization algorithm (CSOA) [32] is to find the criminal by the evidence that is collected by the investigators. Cooperative jamming and power randomness are used to improve covertness performance [33]. To achieve the goal of CSOA, the entire process is segmented into four phases. These phases are explained below:
Phase 1: Initialization
This initialization process is carried out in this phase. Here the parameters, SI (sub-investigators), and the undercover officers are initialized that are being used by the CSOA. At first, all informants and SIs are obtaining suspects’ random information at their pre-defined search location. The parameters such as i n q max and R a n d o m max represent maximum inquiries and the random numbers’ maximum limit, respectively.
Phase 2: Evaluating the Performance and Searching for the Criminal
The chief investigator (CI) collects all the information that is gathered by the informer and SI and creates the evidence against the accused person by using the objective function. Initially ( s = 0 ), the defender is considered as primary suspect based on best fitness (evidence) as shown by below equation.
P s = B [ S I s * , I n s * ]
The terms P s is the primary suspects’ information that is available in CI; B represents the best, S I s * represents the accused persons’ best information available with the SI; and I n s * represents the accused persons’ best information available with the informers; then s is for investigation steps. In the following phases ( s 0 ), the comparison is made between the primary accused persons’ present inquiry stage and previous inquiry stage to select the evidence of the present primary accused person by using Equation (4),
B I n f o s = { p r i A P s                 i f   e ( p r i A P s ) < e ( p r i A P s 1 ) p r i A P s 1                 e l s e   i f   e ( p r i A P s ) e ( p r i A P s 1 )
In the above equation, the term B I n f o s represents the accused persons’ best information that is present with the CI; the term p r i A P s 1   signifies the best prior information of the primary accused person with the CI; the terms e ( p r i A P s ) and e ( p r i A P s 1 ) represents the evidence after processing p r i A P s and p r i A P s 1 information, respectively; in the beginning, viz. when s = 0 , p r i A P s is considered as B I n f o s .
Phase 3: Update Information
The updating of information is carried out in three steps. They are:
Interrogation—The accused persons’ information with the investigator is upgraded using Equation (5).
B I n f o s + 1 = B I n f o s + B I n f o s × R s
From the above equation, the term B I n f o s + 1 represent the primary accused persons’ updated information; the term B I n f o s represents the primary accused persons’ present information which is available with CI; R s is the random number with the range [−1, 1]. The term s is the investigation stages.
Information Updating of SI—The information from SI is upgraded by using Equation (6) in this step.
S I s + 1 = S I s + d 1 × S I B I n f o s + x × d 2 × S I y s + ( 1 x ) × d 3 × S I d s
The term S I s is the primary suspects’ present information that is available in SI; the term S I s + 1 is the primary suspects’ updated information that is available in SI; the evidence gathered from the primary accused person by the SI is represented as S I B I n f o s and is given as ( B I n f o s S I s ). The evidence gathered from previous best evidence by SI is given as ( S I B I n f o s 1 S I s ) is represented by S I y s . The evidence collected from random SI is given as ( S I d s S I s ) is represented by S I d s . The random numbers from [0, d max ] range are represented as d 1 , d 2 ,   and   d 3 and d max is a random number with a maximum limit. Here x is an influencing factor with [0, 1] range random number which represents SI’s influence over evidence after comparing.
Information updating of Informer—The information from informer is upgraded by using Equation (7) in this step.
I s + 1 = I s + d 1 × I y s + d 2 × I S I s
The term I s define the accused persons’ evidence available with informers, the updated defender evidence present with the undercover officer is represented as I s + 1 . Then the gathered evidence from previous evidence which is present with the undercover officer is shown as ( I y s 1 I s ) which is represented as I y s . The updated evidence gathered by an undercover officer from SI is represented as I S I s and it is given as ( S I s + 1 I s ).
Phase 4: Termination
After the information are updated from SI and informers, the updated data is reviewed to see if it is contained inside the search space. When the termination criteria ( s = s max ) is met, the inquiry is terminated and the primary accused person present is considered as criminal; otherwise, phases 2–4 are repeated.
Phase 5: Output
The final phase of CSOA is the output phase, here the culprit is announced. When the requirement of termination is reached the inquiry is terminated. The criminal informer is considered as suspect information that generates the strongest proof, and the accused person is declared as the criminal.

4.1.2. Ebola Optimization Search Algorithm (EOSA)

This section represents the different stages of the condition checking and initialization process [30]. The computation process leading to the investigation and utilization of the EOSA algorithm is shown and the subgroup’s updated procedures are determined. The below equation which describes updating the positions of the individual is expressed as,
M i j T + 1 = M i j T + α N ( i )
where α , N ( i ) represents the scale factor and movement rate, respectively. M i j T , M i j T + 1 are the original and updated positions. The movement rate is defined as,
N ( i ) = S R a t e R a n d ( 0 , 1 ) + N ( i n d B e s t )
N ( S ) = L R a t e R a n d ( 0 , 1 ) + N ( i n d B e s t )
The term S R a t e implies short-distance movement. The investigation stage is used to find the impact when the infected individual shifts beyond the range of L R a t e . The L R a t e and S R a t e are arranged by using neighborhood parameters.
Initializing the susceptible populations
Initially, the initial populations are generated by using a random value of distributions along with zero position. The generation of individuals is shown in the below equation,
i n d i v i d u a l j = l j + R a n d ( 0 , 1 ) ( u j + l j )
where, u j , l j signifies both upper and lower boundaries, respectively. i represents the values from 1 ,   2 ,   3 , ,   n . The combination of best solution selection and infected individuals are shown in the below equation,
B e s t D = { G   b e s t ,     F i t n e s s ( C   b e s t ) < F i t n e s s ( G   b e s t ) C   b e s t ,     F i t n e s s ( C   b e s t ) F i t n e s s ( G   b e s t )
Here, B e s t D , G   b e s t , C   b e s t represents the best solutions, global best solutions, and current best solutions respectively. G   b e s t , C   b e s t denote super-spreader and transmitter, respectively.
The vaccinated ( v ) , infected ( i ) , exposed ( e ) , susceptible ( D ) , hospitalized ( h ) , quarantine ( q ) , funeral ( f ) , dead ( d ) , and recovered ( r ) are used in the differential calculus and is shown below,
D ( T ) T = π ( η 1   i + η 3   d + η 4   r + η 2   ( p e ) )   D ( ϕ   D + φ   i )
i ( T ) T = ( η 1   i + η 3   d + η 4   r + η 2   ( p e )   ψ )   D ( φ + θ )   i ( ϕ )   D
h ( T ) T = β   i ( θ + μ )   h
r ( T ) T = θ   i φ   r
v ( T ) T = θ   i ( λ + σ )   v
d ( T ) T = ( ϕ   D + φ   i ) τ   d
q ( T ) T = ( π   i ( θ     r + φ   d ) ) ω   q
The above-mentioned equations are denoted as a scalar function which has one value; that value is represented as a float. The exponential growth is described by using a scalar differential equation:
k = ϑ   k
where, k implies the growth rate.

4.1.3. Formulation of Fuzzy Criminal Search Ebola Optimization (FCSEO)

The Criminal search and Ebola optimization are novel algorithms which apply unique patterns for both exploration and exploitation. Both algorithms have their own advantages in solving the non-constrained statistical functions, but in the case of complex engineering problems, their performance often drops.
The main reason is the exploration–exploitation tradeoff achieved via a constant ratio (neighborhood parameter or best information of the prime suspect). Often the best individual in both the algorithm populations is the individual with the maximum fitness which often becomes trapped in the local minimum.
This is the major reason for premature convergence. These are the problems that affect the algorithm’s convergence rate and accuracy, and it is overcome in this work using the FCSEO algorithm. The exploration and exploitation behaviors are controlled here using the fuzzy decision-making strategy.
A new support agent called a virtual individual is defined and included in the navigation process. The search behavior of the algorithm is constantly modeled using the fuzzy strategy based on a threshold value.
The search procedure (optimal cluster head selection and energy minimization) is improved by applying a nine-rule fuzzy policy and speeding up the convergence.
A virtual agent is introduced in the Ebola population to share every individual’s experience and also provide a different search direction for the population in each iteration.
In this way, the individual in the population escapes the local minima and identifies some significant region in the search space [31]. The FCSEO algorithm gives equal chances to the individuals in the population to perform both exploration and exploitation in every iteration. Hence the CSO algorithm is used for local search and the Ebola algorithm is used for global search.
The virtual agent (BV) is mainly induced inside the population instead of using the random interaction between the individuals in the population. According to the fitness function value, the direction of the individual in the population connected with the virtual agent is determined.
The new self-adaptive method formulated is known as the FCSEO algorithm where the search behavior is controlled using a fuzzy decision module.
The working of the FCSEO algorithm is shown in Figure 2 and the algorithm is formulated as shown below:
B j i + 1 = B j i + . ψ j . ( z 1 2 × G B j i ) + β . ¯ . ψ j ( z 2 2 × B j A ( i ) B j i )
Here, ¯ i is given as 1 i and
β = { 1                   i f   f ( B j A ( i ) ) < f ( B j i ) 1                 i f   f ( B j A ( i ) ) f ( B j i )
The jth individual in the population is represented as the jth subscript, is the fuzzy decision factor, ¯ i is the complementary value of , z1 and z2 are the two random numbers in the interval [0, 1], ψ j is the growth rate in the Ebola optimization algorithm, and B j A ( i ) is the virtual agent used. The fuzzy tendency factor is mainly used to alter the search behavior of the Ebola and criminal search optimization algorithms. The nine fuzzy rules used in the proposed work illustrate the search behavior of the individual in the algorithm. A normalized objective function called G is introduced to ensure fairness in this algorithm and the G function for the jth individual in the population is stated below:
G j = f ( B j ) f ( G * ) f ( B w o r s t ) f ( G * ) + τ
In Equation (23), the jth object in the population is represented as B j , the worst individual in the population is represented as B w o r s t , and the best solution is represented as G * . A positive scalar value called τ is used to control the zero-condition divergence. An energy-efficient route has a high G j value and the fuzzy tendency factor ( G * ) is obtained using the below equation.
o = o o l d + Δ o
In Equation (24), o o l d is the previous fuzzy decision factor and the incremented fuzzy decision factor is represented as Δ o .

4.1.4. FCSEO Algorithm for CH Selection

Residual energy ( G ) is considered as the main parameter of WMSN which decides whether the SN is to be selected as CH or hop nodes. In a fuzzy system, the linguistic variables namely Very Higher (VH), Higher (H), Medium (M), Lower (L) as well as Very Lower (VL) are introduced to delineate the residual energy. Figure 3 describes the fuzzy rule of residual energy (input variable). Moreover, radio energy dissipation is also considered to be a significant parameter for CH selection. Centrality ( j ) , is a parameter that calculates how central and the role of SN inside the cluster. The SN, which is located at center of cluster, has more possibility to be selected as CH. So, the central location of cluster is determined by the following expressions.
C e n t e r A = a + w 2
C e n t e r B = b + h 2
The term w indicates the width of cluster and h depicts height of cluster. Also, ( a , b ) represent the left down corner position of the cluster. Then the location of the cluster center is found by measuring the centrality of SN using Euclidean distance, which is given by,
D ( P j a ,   C l u s t e r c e n t e r ) = ( P j a C e n t e r A ) 2 + ( P j b C e n t e r B ) 2
From the above equation, A t h and B t h positions of SN are denoted as P j a and P j b . Table 2 presents the 9 fuzzy mapping rules for the selection of CH.
The FCSEO parameters G and j represent the input variables residual energy and centrality; the parameter Δ j represents the output variable probability of CH selection.
Figure 3a illustrates the fuzzy rule for generating residual energy (input variable) where purple color signifies the membership function with very high value (VH), blue indicates higher value (H), Pink represents medium value (M), Green and Orange represents low (L) and very low value (VL).
Figure 3b indicates the fuzzy rule generation based on centrality. Pink and Green lines denote very high (VH) and high (H) values, Blue and purple represent Medium (M) and low values (L) respectively.
Figure 3c portrays the probability of selecting the cluster head; where green and pink signifies very high (VH) and high values (H), blue indicates medium value(M), orange and green represents low (L) and very low (VL)values respectively.

4.2. Data Redundancy Process

When multimedia sensors are placed close to each other, an overlapped field of view (FoV) is determined. The threshold value τ mainly denotes the part of the isosceles triangle in FoV and M represents the congruent side of the triangle. If any item is present in between the FoV of two interlinked sensor nodes, then it results in a polygon. The polygon mainly implies that the data is redundant if two nodes send the image of the item. The shapes such as quadrilateral and triangle are not always large enough to fit inside the threshold or minimal threshold. Since the triangle and quadrilateral generated can be small or big, the data redundancy algorithm used in our paper is also formulated using the same concept. The data redundancy algorithm is specified in Algorithm 1 and the object that overlaps in the FOV regions is said to be redundant. The nodes with the high energy elected as the cluster head by the FCSEO optimization algorithm are used to transmit the data.
Algorithm 1: Data redundancy model
WMSN node-1→a1, WMSN node-2→a2,
Remaining energy of a1→z1, Remaining energy of a2→z2
Initialize τ
confirm whether the Euclidean distance (EC) between a1 and a2 is EC > 2 M
If (EC > 2 M)
  No overlap found in the FOV
End If
If (EC <= 2 M)
  If the shape is a polygon, then
     Redundancy is present
  End If
    If shape is either quadrilateral or triangle
      Compute the area of either the quadrilateral or triangle
    End If
   If (Area > τ)
        Redundancy present
   Else
        Redundancy absent
   End If
End If
If (z1 > z2)
  Then a1 is responsible for the items FoV and the CH transmits the data
Else
 Then a2 is responsible for the items FoV and the CH transmits the data
End If

5. Experimental Results and Discussions

The experimental analysis is carried out under MATLAB 2018 (b) version containing an internal processor of Intel® Core TM i7-3770 [email protected] GHz, 500 Gb, 12 GB RAM for simulation. By comparing with some existing methods, the efficiency of the proposed technique is determined. The MATLAB is employed, which includes timings, protocols, nodes, etc. The simulation parameters are mentioned in Table 3.

5.1. Parameter Description

The parameters utilized to tune the proposed method are represented in Table 4.

5.2. Evaluation Measures

5.2.1. Network Lifetime analysis ( N l )

The ratio of the active node ( A N o d e ) to the availed node ( T N o d e ) is referred to as network lifetime.
N l = A N o d e T N o d e

5.2.2. Packet Delivery Ratio ( P D r a t i o )

The fraction of delivered packet to the transmitted packet is termed as the packet delivery ratio.
P D r a t i o = T o t a l     n u m b e r     o f   d e l i v e r e d   p a c k e t s     T o t a l   n u m b e r   o f   t r a n s m i t t e d   p a c k e t s      

5.2.3. Throughput

The total time taken for the amount of data to transmit or receive to the destination node is known as throughput.
T p   =   A m o u n t     o f   d a t a   t o   t r a n s m i t   o r   r e c e i v e   Re q u i r e d   t i m e  

5.2.4. End-to-End Delay

The mathematical relation of delay is expressed in Equation (31),
END END d e l a y =   k = 0 q END END N u m b e r   o f   d a t a     t r a n s m i t t e   d  
In the above equation, the packet id is represented as q and the number of packets received is represented as k   .

5.2.5. Residual Energy

After each data transmission and sensing, some amount of energy is lost in the SNs and the remaining energy availed in the SNs is termed as residual energy. The mathematical expression for A v e r a g e   λ ε is given as,
A v e r a g e   λ ε = 1 q z q λ ε z
The term λ ε z represents the residual energy availed in the SNs and the amount of sensor node is denoted q .

5.2.6. Energy Consumption

The amount of energy consumed in each number of rounds by the sensor node is termed as energy consumption. Equation (33) represents the standard deviation of energy consumption:
φ e c = 1 q z = 1 q ( A v e r a g e   λ ε J c o n s u m e d ( z ) ) 2  
From the Equation (33), the number of alive nodes is represented as q , the average residual energy is A v e r a g e   λ ε , energy consumed by z t h   sensor is denoted as J c o n s u m e d .

5.2.7. Structural Similarity Index Measure (SSIM)

The mathematical relation of SSIM is expressed in Equation (34),
S S I M ( a , b ) = ( 2   σ a   σ b   + D 1 )   ( 2   α a b + D 2 ) ( σ a 2 + σ b 2 + D 1 )   ( α a 2 + α b 2 + D 2 )

5.2.8. Routing Overhead

The control overhead mainly refers to the transfer of the control information such as channel length, queue length, to the overall information acquired at each sensor node.

5.3. Performance Evaluation

Figure 4 shows the network lifetime analysis of the proposed FCSEO method. The FCSEO method is compared with various protocol techniques, namely, the efficient region source routing (ER-SR) protocol, firefly load balancing based energy optimized routing(FLB-EOR), evolutionary-game-based routing (EGR), hybrid red deer salp swarm (HRDSS). The proposed method has attained maximum alive sensor nodes compared to ER-SR, FLB-EOR, EGR, and HRDSS. The number of alive nodes in each round is greater for the proposed FCSEO method, with 275 alive nodes in 10,000 rounds, 225 alive nodes in 2000 rounds and 100 alive nodes in 3000 rounds, while for other compared methods the values are lower than the proposed FCSEO method.
Figure 5 and Table 5 depicts the analysis of throughput with respect to the number of nodes. The throughput of the proposed method was compared with the throughput of some existing methods such as ER-SR, FLB-EOR, EGR, and HRDSS. From the analysis, the proposed method obtains higher throughput than other methods. The royal blue line graph denotes the proposed method. The throughput value obtained by the proposed FCSEO method is high as compared to other methods with the value 0.75 for 40 nodes, 1.1 for 120 nodes and 1.9 for 200 nodes.
Figure 6 describes the comparative evaluation of the energy consumption of various methods. The graph is plotted with the number of rounds and energy consumption. The proposed method is compared with various existing methods such as ER-SR, FLB-EOR, EGR, and HRDSS. Lower consumption of energy in the proposed approach maximizes the network lifetime. The energy consumed by the nodes in each round is less for the proposed FCSEO method than other compared methods. For the proposed FCSEO method, the energy consumed in 1000 rounds is 0.2 J, 2000 rounds is 3.5 J, and 8 J for 3000 rounds.
Figure 7 and Table 6 portray the comparative analysis of residual energy, and the proposed approach is compared with various existing methods, such as ER-SR, FLB-EOR, EGR, and HRDSS. More energy is stored in the proposed method than other methods, however, at a particular number of rounds, there is a drop in energy. The proposed FCSEO method achieves greater residual energy as compared to other with 12 J in 1000 rounds, 9 J in 2000 rounds and 5.9 J in 3000 rounds, while for other techniques the value is lower.
Figure 8 and Table 7 indicate a comparison of the routing overhead of the proposed method, where the x-axis specifies the nodes, and the y-axis specifies the routing overhead. From the figure, the proposed method has a lower routing overhead than ER-SR, FLB-EOR, EGR, and HRDSS. The overhead value increases for each number of nodes. The royal blue graph line represents the proposed method. With the increasing number of nodes, the overhead increases. The proposed FCSEO method achieves less routing overhead than other compared methods, achieving 5500 for 50 nodes, 5700 for 100 nodes, 5900 for 150 nodes, and 10,150 for 200 nodes. Figure 9 depicts the comparative analysis of the structural similarity index measure (SSM) of the proposed method. The proposed method is compared with various existing methods, such as ER-SR, FLB-EOR, EGR, and HRDSS. A higher structural similarity index measure was achieved by the proposed method. For 6 bits per pixels, the SSIM value obtained is 0.87, and for 12 bits per pixel, the SSIM value achieved is 0.96 by the proposed FCSEO method.
The comparative analysis of the packet delivery ratio is depicted in Table 8. Here, x-axis specifies the nodal number, and the y-axis specifies the packet delivery ratio. The proposed method is compared with various existing methods, such as ER-SR, FLB-EOR, EGR and HRDSS. The proposed method achieves a high packet delivery ratio than other methods.
Table 9 represents the determination of end-to-end delay, where the x-axis specifies the nodes and the y-axis specifies the end-to-end delay in seconds. The efficiency of the proposed approach was evaluated by comparing with existing methods, such as ER-SR, FLB-EOR, EGR and HRDSS. The end-to-end delay of the proposed technique is very low compared to other methods.

6. Conclusions

This paper proposed a novel fuzzy criminal search Ebola optimization (FCSEO) algorithm for optimal selection of cluster heads. The significant intention of this paper is to eliminate data redundancy and to select optimal cluster heads thereby minimizing the energy consumption as well as enhancing the network lifetime. Also, the data redundancy present in the proposed algorithm is mitigated and thus the network lifetime is enhanced. The experimental setup was executed using the MATLAB platform by evaluating various parameters. Finally, the proposed method is compared with efficient region source routing protocol, firefly load balancing based energy optimized routing, evolutionary-game-based routing, and hybrid red deer salp swam. From the extensive experimentation, the analysis revealed that the proposed approach attains higher performances than the existing technique. The throughput value obtained by the proposed FCSEO method is high compared to other methods, with the value 0.75 for 40 nodes, 1.1 for 120 nodes, and 1.9 for 200 nodes. With the increasing number of nodes, the overhead increases. The proposed FCSEO method achieves lower routing overhead than other compared methods, achieving 5500 for 50 nodes, 5700 for 100 nodes, 5900 for 150 nodes, and 10,150 for 200 nodes. The proposed FCSEO method achieves greater residual energy as compared to others with 12.J in 1000 rounds, 9 J in 2000 rounds, and 5.9 J in 3000 rounds, while for other techniques the value is lower. In future, the proposed approach will be evaluated by including the real-time videos for data transmission as well as data aggregation.

Author Contributions

Conceptualization, M.A.M.; methodology, M.A.M.; software, M.A.M.; validation, M.A.M.; formal analysis, M.A.M.; investigation, S.S.; writing—original draft preparation, M.A.M.; writing—review and editing, M.A.M.; supervision, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Barth, S.; de Jong, M.D.; Junger, M.; Hartel, P.H.; Roppelt, J.C. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telemat. Inform. 2019, 41, 55–69. [Google Scholar] [CrossRef]
  2. Yang, Z.; Wang, R.; Luo, D.; Xiong, Y. Rapid re-identification risk assessment for anonymous data set in mobile multimedia scene. IEEE Access 2020, 8, 41557–41565. [Google Scholar] [CrossRef]
  3. Selvi, V.; Karthiga, K. Different Types of Applications in Wireless Sensor Network: An Overview. Ed. Spec. Issue J. 2018, 5, 36–41. [Google Scholar]
  4. Kucukkececi, C.; Yazici, A. Multilevel object tracking in wireless multimedia sensor networks for surveillance applications using graph-based big data. IEEE Access 2019, 7, 67818–67832. [Google Scholar] [CrossRef]
  5. Borawake-Satao, R.; Prasad, R. Mobility aware multi-objective routing in wireless multimedia sensor network. Multimed. Tools Appl. 2019, 78, 32659–32677. [Google Scholar] [CrossRef]
  6. Li, S.; Kim, J.G.; Han, D.H.; Lee, K.S. A survey of energy-efficient communication protocols with qos guarantees in wireless multimedia sensor networks. Sensors 2019, 19, 199. [Google Scholar] [CrossRef] [Green Version]
  7. Sah, D.K.; Amgoth, T. Parametric survey on cross-layer designs for wireless sensor networks. Comput. Sci. Rev. 2018, 27, 112–134. [Google Scholar] [CrossRef]
  8. Yue, Y.-G.; He, P. A comprehensive survey on the reliability of mobile wireless sensor networks: Taxonomy, challenges, and future directions. Inf. Fusion 2018, 44, 188–204. [Google Scholar] [CrossRef]
  9. Arora, V.K.; Sharma, V. A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks. Peer-to-Peer Netw. Appl. 2021, 14, 807–820. [Google Scholar] [CrossRef]
  10. Sajwan, M.; Gosain, D.; Sharma, A.K. Hybrid energy-efficient multi-path routing for wireless sensor networks. Comput. Electr. Eng. 2018, 67, 96–113. [Google Scholar] [CrossRef]
  11. Din, M.S.U.; Rehman, M.A.U.; Ullah, R.; Park, C.-W.; Kim, D.H.; Kim, B.-S. Improving resource-constrained IoT device lifetimes by mitigating redundant transmissions across heterogeneous wireless multimedia of things. Digit. Commun. Netw. 2021, 8, 778–790. [Google Scholar]
  12. Aswale, S.; Ghorpade, V.R. Geographic multipath routing based on triangle link quality metric with minimum inter-path interference for wireless multimedia sensor networks. J. King Saud Univ.—Comput. Inf. Sci. 2021, 33, 33–44. [Google Scholar] [CrossRef]
  13. Genta, A.; Lobiyal, D.K.; Abawajy, J.H. Energy efficient multipath routing algorithm for wireless multimedia sensor network. Sensors 2019, 19, 3642. [Google Scholar] [CrossRef] [Green Version]
  14. Raja, G.P.; Mangai, S. Firefly load balancing based energy optimized routing for multimedia data delivery in wireless mesh network. Clust. Comput. 2019, 22, 12077–12090. [Google Scholar] [CrossRef]
  15. Awad, F.H. Optimization of relay node deployment for multisource multipath routing in Wireless Multimedia Sensor Networks using Gaussian distribution. Comput. Netw. 2018, 145, 96–106. [Google Scholar] [CrossRef]
  16. Habib, M.A.; Moh, S. Robust evolutionary-game-based routing for wireless multimedia sensor networks. Sensors 2019, 19, 3544. [Google Scholar] [CrossRef] [Green Version]
  17. Tripathi, Y.; Prakash, A.; Tripathi, R. Load aware multipath data forwarding for enhanced lifetime of WSN. Int. J. Inf. Technol. 2021, 13, 807–815. [Google Scholar] [CrossRef]
  18. Xu, C.; Xiong, Z.; Zhao, G.; Yu, S. An energy-efficient region source routing protocol for lifetime maximization in WSN. IEEE Access 2019, 7, 135277–135289. [Google Scholar] [CrossRef]
  19. Govindaraj, S.; Deepa, S.N. Network energy optimization of iots in wireless sensor networks using capsule neural network learning model. Wirel. Pers. Commun. 2020, 115, 2415–2436. [Google Scholar] [CrossRef]
  20. Ambareesh, S.; Madheswari, A.N. Hrdss-wmsn: A multi-objective function for optimal routing protocol in wireless multimedia sensor networks using hybrid red deer salp swarm algorithm. Wirel. Pers. Commun. 2021, 119, 117–146. [Google Scholar] [CrossRef]
  21. Gutub, A. Boosting image watermarking authenticity spreading secrecy from counting-based secret-sharing. CAAI Trans. Intell. Technol. 2022. [Google Scholar] [CrossRef]
  22. Chen, Z. Research on Internet Security Situation Awareness Prediction Technology based on Improved RBF Neural Network Algorithm. J. Comput. Cogn. Eng. 2022, 1, 103–108. [Google Scholar]
  23. Gope, P.; Amin, R.; Islam, S.H.; Kumar, N.; Bhalla, V.K. Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Futur. Gener. Comput. Syst. 2018, 83, 629–637. [Google Scholar] [CrossRef]
  24. Wani, A.; Khaliq, R. SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT-SDL). CAAI Trans. Intell. Technol. 2021, 6, 281–290. [Google Scholar] [CrossRef]
  25. Das, S.; Namasudra, S. A Lightweight and Anonymous Mutual Authentication Scheme for Medical Big Data in Distributed Smart Healthcare Systems. IEEE/ACM Trans. Comput. Biol. Bioinform. 2022, 1–12. [Google Scholar] [CrossRef]
  26. Verma, R.; Kumari, A.; Anand, A.; Yadavalli, V.S.S. Revisiting Shift Cipher Technique for Amplified Data Security. J. Comput. Cogn. Eng. 2022. [Google Scholar] [CrossRef]
  27. Sarkar, S.; Saha, K.; Namasudra, S.; Roy, P. An efficient and time saving web service based android application. SSRG Int. J. Comput. Sci. Eng. (SSRG-IJCSE) 2015, 2, 18–21. [Google Scholar]
  28. Sharma, A.S.; Kim, D.S. Energy efficient multipath ant colony based routing algorithm for mobile ad hoc networks. Ad Hoc Netw. 2021, 113, 102396. [Google Scholar] [CrossRef]
  29. Srivastava, A.; Das, D.K. Criminal Search Optimization Algorithm: A Population-Based Meta-Heuristic Optimization Technique to Solve Real-World Optimization Problems. Arab. J. Sci. Eng. 2022, 47, 3551–3571. [Google Scholar] [CrossRef]
  30. Oyelade, O.N.; Ezugwu, A.E.-S.; Mohamed, T.I.A.; Abualigah, L. Ebola Optimization Search Algorithm: A New Nature-Inspired Metaheuristic Optimization Algorithm. IEEE Access 2022, 10, 16150–16177. [Google Scholar] [CrossRef]
  31. Mortazavi, A.; Moloodpoor, M. Enhanced butterfly optimization algorithm with a new fuzzy regulator strategy and virtual butterfly concept. Knowl.-Based Syst. 2021, 228, 107291. [Google Scholar] [CrossRef]
  32. Matheen, M.A.; Sundar, S. Histogram and entropy oriented image coding for clustered wireless multimedia sensor networks (WMSNS). Multimed. Tools Appl. 2022, 81, 38253–38276. [Google Scholar] [CrossRef]
  33. Peng, H.; Tian, Z.; Li, X.; Wang, W.; Nauryzbayev, G.; Rabie, K.; Gadekallu, T.R. Covert communication for cooperative NOMA with two phases detection. Alex. Eng. J. 2023, 67, 39–49. [Google Scholar] [CrossRef]
Figure 1. WMSN model.
Figure 1. WMSN model.
Sensors 23 02218 g001
Figure 2. Formulation of the FCSEO algorithm.
Figure 2. Formulation of the FCSEO algorithm.
Sensors 23 02218 g002
Figure 3. (a) fuzzy set for residual energy, (b) fuzzy set for centrality and (c) fuzzy set for provability of CH selection.
Figure 3. (a) fuzzy set for residual energy, (b) fuzzy set for centrality and (c) fuzzy set for provability of CH selection.
Sensors 23 02218 g003
Figure 4. Comparative analysis of network lifetime.
Figure 4. Comparative analysis of network lifetime.
Sensors 23 02218 g004
Figure 5. Comparative analysis of throughput.
Figure 5. Comparative analysis of throughput.
Sensors 23 02218 g005
Figure 6. Comparative results of energy consumption.
Figure 6. Comparative results of energy consumption.
Sensors 23 02218 g006
Figure 7. Comparative analysis of residual energy.
Figure 7. Comparative analysis of residual energy.
Sensors 23 02218 g007
Figure 8. Comparative analysis of routing overhead.
Figure 8. Comparative analysis of routing overhead.
Sensors 23 02218 g008
Figure 9. Comparative analysis of SSIM.
Figure 9. Comparative analysis of SSIM.
Sensors 23 02218 g009
Table 1. Literary works of various authors.
Table 1. Literary works of various authors.
Author and YearTechniqueObjectiveProsCons
Rehman et al.
(2021) [11]
Sub-cluster head (SCH)Improving resource constraints in IoT devicesIncreased throughput and energy consumptionLow-speed applications
Aswale et al.
(2021) [12]
Geographic multipath routingEliminate hidden node problemImproved performance and network lifetimeCost rate was high
Genta et al.
(2019) [13]
Energy-effective multipath routing (EMR)Decrease energy consumption while communicatingHigh performance, minimum energy consumptionNot suited for mobile sensor nodes
Raja et al.
(2019) [14]
Firefly load balancing based energy optimized routing (FLB-EOR)Minimum weightage for multimedia data transmissionEnhanced LBE and throughputEnergy consumption was higher
Awad et al.
(2018) [15]
Gaussian distribution framework Multipath routing for delay node optimizationImprove packet delay, data distribution, power consumption, and network lifeTransmission delay was higher
Habib et al.
(2019) [16]
Evolutionary game-based routing (EGR)Reduce data redundancyEnhanced network performance and energy efficiencyFailed to apply in real time
Tripathi et al.
(2021) [17]
Efficient multipath routing methodEnhance network lifetimeImprove network performanceIneffective due to burst data
Xu et al.
(2019) [18]
Efficient region source routing protocol (ER-SR)Maximize the lifetime of WSNHigh efficiency and enhanced the performanceHigh network overload
Govindaraj et al.
(2020) [19]
Capsule neural network (CNN)Enhancing the network performance of the sensorAchieved higher performanceHigh Computation time
Ambareesh et al.
(2021) [20]
Hybrid red deer salp swarm (HRDSS)To tackle the complications such as high packet loss and network congestionReduce packet loss, Expected Transmission (ETX) cost, and transmission delayNot implemented in engineering-related applications
Gutub et al. (2022) [21]Image authentication model Improve the image authentication process to secure the hidden data of watermarkingImprove performanceNot able to adjust the location
Chen et al. (2022) [22]Simulated annealing algorithm and hybrid hierarchy genetic algorithm (SA-HHGA)To secure private data Attained stable conditionSecurity was not guaranteed
Gope et al. (2018) [23]Radio frequency identification (RFID)Secure the lightweight and privacy data obtained in a smart cityImproved securityAttacker could be easily hacked without authorization
Wani et al. (2021) [24]SDN-based intrusion detectionTo protect lightweight protocols from anomaliesImproved performanceProcessing was further performed after modifying
Das et al. (2022) [25]Lightweight and anonymous mutual authentication schemeTo secure the unauthenticated usage of data from illegal accessHigh performancesImprove effectiveness and strength of security
Verma et al. (2022) [26]Shift cipher techniqueSecuring sensitive dataImprove security performancedecrypted data was easily hacked
Sarkar et al. (2015) [27]Web service-based android applicationReduce the consumption of time while using the android applicationImproved the bandwidthHacked information easily
Table 2. Fuzzy set for CH selection.
Table 2. Fuzzy set for CH selection.
Sl.No. Residual   Energy   ( G ) Centrality   ( j ) Probability   of   CH   Selection   ( Δ j )
Rule 1HHVH
Rule 2HMH
Rule 3HLM
Rule 4MHM
Rule 5MML
Rule 6MLL
Rule 7LHL
Rule 8LMVL
Rule 9LLVL
Table 3. Parameters employed for simulation.
Table 3. Parameters employed for simulation.
ParametersValues
Total area100 × 100 m
Offset angle 60 degrees
Total number of sensor nodes 100
Data and frame rates2 Mbps, 30 fps
Initial energy2 joules
Size of an image 175 × 145
Table 4. Parameter description for proposed method.
Table 4. Parameter description for proposed method.
TechniquesParametersRanges
Ebola Optimization Search AlgorithmPopulation size100
Total number of iterations50
Contact rate of infectious individuals0.1
Hospitalization rate [0, 1]
Recovery rate of human individuals
Criminal Search Optimization AlgorithmPopulation size50
Maximum number of sub investigators 25
No. of informers15
Total no. of iteration100
Maximum limit of random number 2
Table 5. Comparative results based on throughput.
Table 5. Comparative results based on throughput.
Total Number of NodesMethods
ProposedFLB-EOR ( )EGR ( )HRDSS ( )ER-SR ( )
00.170.160.160.160.16
400.750.60.40.150.23
8010.80.480.490.34
1201.10.90.570.510.4
1601.31.10.630.680.45
2001.91.70.90.70.47
Table 6. Comparative results based on residual energy.
Table 6. Comparative results based on residual energy.
Total Number of RoundsMethods
ProposedFLB-EOREGRHRDSSER-SR
5001312.311.611.310.5
100012.712.19.498.9
150011.8118.976.1
200098.55.743
250075.5.42.81
30005.9410.90.4
Table 7. Comparative results based on routing overhead.
Table 7. Comparative results based on routing overhead.
Total Number of NodesMethods
ProposedFLB-EOREGRHRDSSER-SR
050005000500050005000
50550018,00018,00017,0008000
100570021,00020,00018,0008200
150590035,00031,00029,00010,100
20010,15058,00056,00054,00022,000
Table 8. Comparative results based on packet delivery ratio.
Table 8. Comparative results based on packet delivery ratio.
Total Number of NodesMethods
ProposedFLB-EOREGRHRDSSER-SR
00.90.890.890.880.87
500.850.780.760.750.72
1000.820.770.670.630.59
1500.690.490.480.440.38
2000.50.380.360.330.29
Table 9. End-to-end delay analysis.
Table 9. End-to-end delay analysis.
Total Number of NodesMethods
ProposedFLB-EOREGRHRDSSER-SR
00.870.921.32.331.54
500.880.971.453.492.63
1001.21.71.974.034.27
1501.41.92.236.376.68
2001.72.12.48.498.67
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Matheen, M.A.; Sundar, S. A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors 2023, 23, 2218. https://doi.org/10.3390/s23042218

AMA Style

Matheen MA, Sundar S. A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors. 2023; 23(4):2218. https://doi.org/10.3390/s23042218

Chicago/Turabian Style

Matheen, M. A., and S. Sundar. 2023. "A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN" Sensors 23, no. 4: 2218. https://doi.org/10.3390/s23042218

APA Style

Matheen, M. A., & Sundar, S. (2023). A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors, 23(4), 2218. https://doi.org/10.3390/s23042218

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop