Volume 9 , Issue 2 , PP: 37-44, 2024 | Cite this article as | XML | Html | PDF | Full Length Article
Chandra Sekar P. 1 * , K. R. N. Aswini 2
Doi: https://doi.org/10.54216/IJBES.090205
Efficient energy management in Wireless Sensor Networks (WSNs) is vital for extending network lifetime, particularly in applications requiring continuous monitoring in remote or challenging environments. This study proposes an energy-efficient multi-hop clustering approach for WSNs, utilizing intelligent swarm-based algorithms to optimize cluster formation and data routing. By applying Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) techniques, the proposed method dynamically selects optimal cluster heads and minimizes energy consumption during multi-hop data transmission. The algorithm was evaluated on simulated WSN scenarios with varying node densities, achieving an average energy savings of 28% compared to traditional clustering methods and a 35% increase in network lifetime. Additionally, the proposed approach improved packet delivery ratio and reduced latency by 20% and 15%, respectively. This swarm-based, energy-efficient clustering framework is well-suited for applications in environmental monitoring, smart agriculture, and industrial automation, where prolonged network operation is essential.
Energy Efficiency , Multi-Hop Clustering , Wireless Sensor Networks (WSN) , Swarm Intelligence , Particle Swarm Optimization (PSO) , Ant Colony Optimization (ACO) , Cluster Head Selection , Network Lifetime , Packet Delivery Ratio , Latency Reduction , Environmental Monitoring , Smart Agriculture
[1] Agarkar Aarti Amod and Himanshu Agrawal (2019a), “Lightweight R-LWE-Based Privacy Preservation Scheme for Smart Grid Network”, International Journal of Information and Computer Security, Vol. 11, No. 3, p. 233.
[2] Agarkar Aarti Amod and Himanshu Agrawal (2019b), “LRSPPP: Lightweight R-LWE-Based Secure and Privacy-Preserving Scheme for Prosumer Side Network in Smart Grid”, Heliyon, Vol. 5, No. 3, p. e01321.
[3] Akyildiz .I.F, Melodia .T and Chowdhury .K.R (2008) “Wireless Multimedia Sensor Networks: Applications and Testbeds”, Proceedings of the IEEE, Vol. 96, No. 10, pp. 1588-1605.
[4] Al Ameen, Moshaddique, Jingwei Liu, and Kyungsup Kwak. (2012), “Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications”, Journal of Medical Systems, Vol. 36, No. 1, pp. 93-101.
[5] Alicherry Mansoor and Angelos D Keromytis (2009), “DoubleCheck: Multi-Path Verification against Man-in-theMiddle Attacks”, (2009) IEEE Symposium on Computers and Communications, pp. 557-563, doi: 10.1109/ISCC.2009.5202224.
[6] Al-Jemeli Marwan and Fawnizu A. Hussin (2015), “An Energy Efficient Cross Layer Network Operation Model for IEEE 802.15.4-Based Mobile Wireless Sensor Networks”, IEEE Sensors Journal, Vol. 15, No. 2, pp. 684-692.
[7] Al-Zubaidie, Mishall Zhongwei Zhang, and Ji Zhang (2019), “RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications”, Security and Communication Networks (2019), pp. 1-26. 148
[8] Amin Ruhul, Hafizul Islam .S. K, Biswas .G. P, and Mohammad S. Obaidat. (2018), “A Robust Mutual Authentication Protocol for WSN with Multiple Base-Stations”, Ad-Hoc Networks, Vol. 75-76, pp. 1-18.
[9] Anon (2015), “Security in WSN”, Building Wireless Sensor Networks, pp. 125-160.
[10] Athmani Samir, Azeddine Bilami and Djallel Eddine Boubiche (2019), “EDAK: An Efficient Dynamic Authentication and Key Management Mechanism for Heterogeneous WSNs”, Future Generation Computer Systems, Vol. 92, pp. 789-799.
[11] Baadache Abderrahmane and Ali Belmehdi (2014), “Struggling against Simple and Cooperative Black-hole Attacks in Multi-Hop Wireless Ad Hoc Networks”, Computer Networks, Vol. 73, pp. 173-84.
[12] Bag Samiran and Bimal Roy (2015), “A New Key Predistribution Scheme for General and Grid-Group Deployment of Wireless Sensor Networks”, EURASIP Journal on Wireless Communications and Networking, pp 313-329.
[13] Basile Claudio, Zbigniew Kalbarczyk and Ravishankar K Iyer (2007), “Inner-Circle Consistency for Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol. 6, No. 1, pp. 39-55.
[14] Bechkit Walid, Yacine Challal, Abdelmadjid Bouabdallah and Vahid Tarokh (2013), “A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 12, No. 2, pp. 948-959.
[15] Bhadane Yugashree and Pooja Kadam (2018), “A Survey on Hierarchical Cluster Based Secure Routing Protocols and Key Management Schemes in Wireless Sensor Networks”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, pp. 18-26. 149
[16] Bilal Muhammad and Shin-Gak Kang (2017), “An Authentication Protocol for Future Sensor Networks”, Sensors (Basel, Switzerland), Vol. 17, No. 5, p. 979.
[17] Boubrima Ahmed, Walid Bechkit and Herve Rivano (2017), “A New WSN Deployment Approach for Air Pollution Monitoring”, 14th IEEE Annual Consumer Communications & Networking Conference, pp. 455-460, doi: 10.1109/CCNC.2017.7983151.
[18] Qing Chang, Y. Zhang and Lin-lin Qin (2010), "A node authentication protocol based on ECC in WSN", International Conference On Computer Design and Applications, Qinhuangdao, China, pp. V2-606-V2-609, doi: 10.1109/ICCDA.2010.5541288.
[19] Chang, Chin-Chen, and Hai-Duong Le. (2016), “A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad Hoc Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 15, No. 1, pp. 357-366.
[20] Chen Zhansheng and Hong Shen (2018), “A Grid-Based Reliable Multi-Hop Routing Protocol for Energy-Efficient Wireless Sensor Networks”, International Journal of Distributed Sensor Networks, , Vol.14, No. 3, pp. 155014771876596.
[21] Chen, Chi-Tung, Cheng-Chi Lee, and Iuon-Chang Lin (2020), “Correction: Efficient and Secure Three-Party Mutual Authentication Key Agreement Protocol for WSNs in IoT Environments”, PloS One, Vol. 15, No. 6, pp. e0234631.
[22] Chen, Xuhui & Yu, Peiqiang. (2010), "Research on Hierarchical Mobile Wireless Sensor Network Architecture with Mobile Sensor Nodes", Proceedings - 2010 3rd International Conference on Biomedical Engineering and Informatics, pp 2863 - 2867. 10.1109/BMEI.2010.5639549.
[23] Choi Jaewoo, Jihyun Bang, LeeHyung Kim, Mirim Ahn and Taekyoung Kwon (2017), “Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks”, IEEE Systems Journal, Vol. 11, No. 2, pp. 494-502. 150
[24] Choi Sung Jin, Kyung Tae Kim and Hee Yong Youn (2013), “An Energy-Efficient Key Predistribution Scheme for Secure Wireless Sensor Networks Using Eigenvector”, International Journal of Distributed Sensor Networks, Vol.9, No. 6, pp. 216754.
[25] Chong Chee-Yee and Kumar .S. P (2003), “Sensor Networks: Evolution, Opportunities, and Challenges”, Proceedings of the IEEE, Vol. 91, No. 8, pp. 1247-1256. [26] Dargie Waltenegus and Christian Poellabauer (2010), “Fundamentals of Wireless Sensor Networks”, doi: 0.1002/9780470666388.
[27] Deng Hongmei, Wei Li and Agrawal.D.P (2002), “Routing Security in Wireless Ad Hoc Networks”, IEEE Communications Magazine, Vol. 40, No. 10, pp. 70-75.
[28] Djahel Soufiene, Farid NaïtâAbdesselam, Zonghua Zhang and Ashfaq Khokhar (2008), “Defending against Packet Dropping Attack in Vehicularad Hocnetworks”, Security and Communication Networks, Vol. 1, No. 3, pp. 245-258.
[29] L. Doherty, W. Lindsay and J. Simon, (2007) "Channel-Specific Wireless Sensor Network Path Data", 16th International Conference on Computer Communications and Networks, Honolulu, USA, pp. 89-94, doi: 10.1109/ICCCN.2007.4317802.
[30] El Zouka, Hesham A., and Mustafa M. Hosni (2019), “Towards Secure Integration of Wireless Sensor Networks and Cloud Computing”, IEEE Global Conference on Internet of Things (GCIoT), pp. 1-7, doi: 10.1109/GCIoT47977.2019.9058407.