<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMES</journal-id>
<journal-id journal-id-type="nlm-ta">CMES</journal-id>
<journal-id journal-id-type="publisher-id">CMES</journal-id>
<journal-title-group>
<journal-title>Computer Modeling in Engineering &#x0026; Sciences</journal-title>
</journal-title-group>
<issn pub-type="epub">1526-1506</issn>
<issn pub-type="ppub">1526-1492</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">65599</article-id>
<article-id pub-id-type="doi">10.32604/cmes.2025.065599</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Efficient Resource Management in IoT Network through ACOGA Algorithm</article-title>
<alt-title alt-title-type="left-running-head">Efficient Resource Management In IoT Network through ACOGA Algorithm</alt-title>
<alt-title alt-title-type="right-running-head">Efficient Resource Management In IoT Network through ACOGA Algorithm</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Landge</surname><given-names>Pravinkumar Bhujangrao</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Singh</surname><given-names>Yashpal</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Mohapatra</surname><given-names>Hitesh</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-4" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Edalatpanah</surname><given-names>Seyyed Ahmad</given-names></name><xref ref-type="aff" rid="aff-3">3</xref><email>s.a.edalatpanah@aihe.ac.ir</email></contrib>
<aff id="aff-1"><label>1</label><institution>Department of CSE, Amity University</institution>, <addr-line>Rajasthan, 303002</addr-line>, <country>India</country></aff>
<aff id="aff-2"><label>2</label><institution>School of Computer Engineering, Kalinga Institute of Industrial Technology (KIIT) Deemed to be University</institution>, <addr-line>Bhubaneswar, 751024</addr-line>, <country>India</country></aff>
<aff id="aff-3"><label>3</label><institution>Department of Applied Mathematics, Ayandegan Institute of Higher Education</institution>, <addr-line>Tonekabon, 46818</addr-line>-<addr-line>53617</addr-line>, <country>Iran</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Seyyed Ahmad Edalatpanah. Email: <email>s.a.edalatpanah@aihe.ac.ir</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year></pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>30</day>
<month>05</month>
<year>2025</year></pub-date>
<volume>143</volume>
<issue>2</issue>
<fpage>1661</fpage>
<lpage>1688</lpage>
<history>
<date date-type="received">
<day>17</day>
<month>03</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>07</day>
<month>05</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMES_65599.pdf"></self-uri>
<abstract>
<p>Internet of things networks often suffer from early node failures and short lifespan due to energy limits. Traditional routing methods are not enough. This work proposes a new hybrid algorithm called ACOGA. It combines Ant Colony Optimization (ACO) and the Greedy Algorithm (GA). ACO finds smart paths while Greedy makes quick decisions. This improves energy use and performance. ACOGA outperforms Hybrid Energy-Efficient (HEE) and Adaptive Lossless Data Compression (ALDC) algorithms. After 500 rounds, only 5% of ACOGA&#x2019;s nodes are dead, compared to 15% for HEE and 20% for ALDC. The network using ACOGA runs for 1200 rounds before the first nodes fail. HEE lasts 900 rounds and ALDC only 850. ACOGA saves at least 15% more energy by better distributing the load. It also achieves a 98% packet delivery rate. The method works well in mixed IoT networks like Smart Water Management Systems (SWMS). These systems have different power levels and communication ranges. The simulation of proposed model has been done in MATLAB simulator. The results show that that the proposed model outperform then the existing models.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Energy management</kwd>
<kwd>IoT networks</kwd>
<kwd>ant colony optimization (ACO)</kwd>
<kwd>greedy algorithm</kwd>
<kwd>hybrid optimization routing algorithms</kwd>
<kwd>energy efficiency</kwd>
<kwd>network lifetime</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Internet of Things (IoT) is an inter-connective network system with sensors, actuators, and smart objects to collect, share and process information&#x2019;s. Most of the time these devices are deployed in power-sensitive scenarios with limited power, computational power, and bandwidth [<xref ref-type="bibr" rid="ref-1">1</xref>]. IoT networks are extensively being established in different businesses such as smart cities, industries, health care, and farming among others where the ability to gather and process real-time information is crucial. However, what is essential for a network of connected things is how data is transmitted from one device to another, this is even looking at the large scale deployments where power consumption and operational life span of the network is of paramount importance [<xref ref-type="bibr" rid="ref-2">2</xref>].</p>
<p>Routing in IoT networks is crucial as it affects directly the network&#x2019;s energy consumption, reliability and performance. A good routing algorithm helps in preventing the data frame from passing through unnecessary nodes hence helping reduce the energy used by nodes in transmission and reception [<xref ref-type="bibr" rid="ref-3">3</xref>]. It is important to note that most IoT devices are powered through battery which makes energy efficient routing protocols very vital for the network lifetime. In addition, dependency on a dependable routing improves the rate of data delivery, cuts down on latency, and minimizes packet loss so that the IoT applications can run optimally. Hence, efforts to build strong and flexible routing methodologies that meet objective IoT goals are critical for the sustainability of the IoT networks&#x2019; application in practical environments [<xref ref-type="bibr" rid="ref-4">4</xref>].</p>
<p>The routing algorithms used in conventional IoT networks have some drawbacks mainly due to the characteristics of resource-constraint IoT settings. Standard protocols such as Distance Vector Routing or Link State Routing are developed for the general-purpose network and do not take into consideration the limitation in energy on the IoT devices [<xref ref-type="bibr" rid="ref-5">5</xref>]. Thus, these algorithms usually result in high energy demands and energy depletion to the sensor nodes&#x2019; batteries. Also, these algorithm may not be able to easily cope with the dynamic characteristics of IoT networks where devices can frequently come into the network or leave or may change their places (mobility). Another disadvantage is their scalability with the size of the network they might communicate; route discovery as well as maintenance becomes resource demanding hence slow and costly for a large network [<xref ref-type="bibr" rid="ref-6">6</xref>].</p>
<p>The conventional algorithms fail to address the issue of dynamism in the nodes that mainly control IoT devices as some of the nodes demands may require higher computations, or reserve energy, or even possess better communication interfaces as compared to others [<xref ref-type="bibr" rid="ref-7">7</xref>]. Additionally, they do not take into account relevant features that characterise nodes in an IoT network, such as mobility or the dynamics of traffic, or requirements for real-time transfers of data. Because of these constraints, there has been a continuous realization of the need to develop new, sophisticate, energy-sensitive and adaptive routing protocols that address the need of IoT networks in terms of performance and energy consumption. In the process of addressing the energy optimization in IoT network there are several approaches have been proposed in the past literature. The proposed or existing algorithms can be segregated into multiple types such as deterministic, meta-heuristic, hierarchical, etc. [<xref ref-type="bibr" rid="ref-8">8</xref>].</p>
<sec id="s1_1">
<label>1.1</label>
<title>Deterministic Routing Algorithms</title>
<p>Deterministic routing algorithms also has its benefits especially for IoT networks; this is because deterministic routing algorithms will provide pre-calculated and determined paths for data to be routed. While probabilistic solutions have recourse to probability factors to select routes, deterministic algorithms have system specific objectives such as shortest path or minimum energy [<xref ref-type="bibr" rid="ref-9">9</xref>]. This makes it systematic in the sense that it will be in a position to control the network traffic hence reducing on extra transmission and low packets drop. In IoT networks where the concerned of devices are limited by their energy and computing capability, deterministic routing ensures each node in the network contributes and is constructive to the network, and thus improving the network lifetime [<xref ref-type="bibr" rid="ref-10">10</xref>].</p>
<p>Furthermore, deterministic routing algorithms are ideal for time-constrained IoT applications since they offer relatively lower latency as well as more instantiate predictability and reliability by minimizing or excluding the regular route discovery or maintenance procedures that are characteristic of adaptive or reactive protocols. As the flows create proper and effective channels it also enhances overall network throughput and QoS which is significant in smart city or industrial IoT applications where data is collected in real-time and then processed. They are deterministic, thus suitable for IoT large scale networks where performance is standardizing with the optimization of energy, resources and communication [<xref ref-type="bibr" rid="ref-11">11</xref>].</p>
</sec>
<sec id="s1_2">
<label>1.2</label>
<title>Meta-Heuristic Routing Algorithms</title>
<p>Meta-heuristic solutions have become popular ways of handling energy problems in IoT networks due to the optimization problem that is normally associated with multifaceted and complex IoT networks. Unlike conventional algorithms, meta-heuristic methods such as ACO, GA and PSO are algorithms derived from natural behavior and are more optimal in exploring large solution spaces [<xref ref-type="bibr" rid="ref-12">12</xref>]. These approaches are more suitable for the IoT networks due to the fact that they may offer nearly optimal solutions to IoT energy-efficient routing, clustering, and resource management under consideration of the IoT devices&#x2019; dynamics and heterogeneity.</p>
<p>Meta-heuristic algorithms are friendly in controlling energy since they allow the search for new paths to their optimal consumption while frequently employing the efficient paths in such a fashion that does not overwhelm them and exhaust their energy source in the process. These algorithms can detect structural changes of the nets and their traffic, that is why it is efficient when use in vast IoT ventures [<xref ref-type="bibr" rid="ref-13">13</xref>]. As far as routing path, communication overhead and selection of energy-aware node for data transfer meta heuristics enhances the life time of the network as well as throughput and energy. Thus, they play a role that is rather indicative - recently becoming decisive forms of controlling the energy constraints, which determine the IoT networks deployment and operation [<xref ref-type="bibr" rid="ref-14">14</xref>].</p>
</sec>
<sec id="s1_3">
<label>1.3</label>
<title>Hybrid Approach</title>
<p>The proposed deterministic approach combined with the meta-heuristic algorithm to perform the energy management of the IoT networks are more efficient and effective than the individual system as the proposed system comprises all the characteristics of the IoT network. As a result of centralized and predictable nature of these algorithms, pre-defined rules or criteria are used in an effort to provide deterministic routing paths, low latency, and predictable transmission of data. However, they may not be able to adapt quickly to changes in the IoT network environment where conditions change frequently including node failure, mobility and fluctuations in traffic loads. On the other hand metaheuristic algorithms such as ACO or GA are more suitable for discrete state space solution methods that allow the algorithm to fine-tune an optimal solution for energy efficient routing and resource allocation in large networks and conditions that are volatile to change. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrate the layout of the proposed approach.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Layout of the proposed approach</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-1.tif"/>
</fig>
<p>Combining the two approaches helps IoT networks to have a deterministic routing mechanism for the specific activities with low overhead, while the meta-heuristic part offers the competitiveness of creating the routing efficiency in the light of the real time states including energy levels in the nodes and overall traffic within the network and many other factors. This hybrid approach ensures that the energy efficient routing is used throughout the routing regardless of the complexity or dynamism of a network, thus ensuring that the nodes that are overused are either slowed down or depleted of energy fast. Overall, the combined approach leads to longer network lifetime, lower energy consumption and better data delivery all being an optimal or a well-balanced solution to the energy dilemma of IoT networks.</p>
</sec>
<sec id="s1_4">
<label>1.4</label>
<title>IoT Sensor Types and Application Domains</title>
<p>In modern IoT deployments, a wide variety of sensors are deployed depending on the application domain. These sensors differ in function, energy consumption, and communication requirements, which directly affect the need for efficient resource management.
<list list-type="bullet">
<list-item>
<p><bold>Temperature and Humidity Sensors:</bold> Used extensively in environmental monitoring, smart agriculture, and industrial automation. These sensors transmit frequent but lightweight data packets and are sensitive to power constraints.</p></list-item>
<list-item>
<p><bold>Motion and Proximity Sensors:</bold> Commonly deployed in smart homes, surveillance systems, and healthcare monitoring. They require real-time responsiveness, which demands efficient routing and low latency.</p></list-item>
<list-item>
<p><bold>Gas and Chemical Sensors:</bold> Employed in air quality monitoring, industrial safety, and medical diagnostics. These sensors operate in critical scenarios where energy efficiency is crucial for prolonged operation.</p></list-item>
<list-item>
<p><bold>Pressure and Water Flow Sensors:</bold> Used in smart water management systems, oil pipelines, and structural health monitoring. These often involve distributed sensing in remote areas, making energy-aware communication strategies essential.</p></list-item>
<list-item>
<p><bold>Camera and Image Sensors:</bold> Widely used in smart cities, surveillance, and traffic monitoring systems. These are energy-intensive and generate large data volumes, requiring intelligent data transmission mechanisms.</p></list-item>
</list></p>
<p>The proposed ACOGA algorithm is designed to optimize energy usage and routing decisions irrespective of sensor type. Its adaptability makes it suitable for heterogeneous IoT networks. By considering the specific data rate, update frequency, and energy profile of different sensors, ACOGA ensures prolonged network lifetime and efficient resource utilization. The main contributions of this paper are as follows:
<list list-type="order">
<list-item><p>We propose a novel hybrid ACO-Greedy (ACOGA) algorithm that leverages the exploration capabilities of Ant Colony Optimization and the fast, heuristic-driven decisions of the Greedy approach to enhance routing in IoT networks.</p></list-item>
<list-item><p>A comprehensive energy model is integrated into the routing process to reflect realistic node-level energy consumption.</p></list-item>
<list-item><p>The proposed approach is implemented and evaluated using MATLAB simulations, comparing HEE and ALDC algorithms to assess performance trade-offs.</p></list-item>
<list-item><p>We further analyze network longevity by introducing dead node ratio tracking across different rounds (first node dead, half node dead, and all nodes dead).</p></list-item>
<list-item><p>Simulation results demonstrate that ACOGA significantly outperforms conventional routing methods in terms of energy efficiency, network lifetime, and dead node management.</p></list-item>
</list></p>
<p>The presentation of the proposed work has been divided into six main sections. <xref ref-type="sec" rid="s2">Section 2</xref>: Literature Review, gathers research works related to the topic under study and points out the main findings and research gaps. Formulation of the problem occurs in <xref ref-type="sec" rid="s3">Section 3</xref>, whereby the objectives as well as constraints pertinent to the research are specified. <xref ref-type="sec" rid="s4">Section 4</xref>: Titled implementation of the Hybrid Methodology, presents the application of the proposed hybrid approach as well as a discussion of its logic behind. <xref ref-type="sec" rid="s5">Section 5</xref> is labelled as Results and Discussion that involves presenting and explaining the results obtained in the study. Last but not the least, <xref ref-type="sec" rid="s6">Section 6</xref>: Conclusion and Future Work, previews the conclusion of the paper, explains significance of the research and offers some suggestions for future works followed by the references.</p>
</sec>
</sec>
<sec id="s2">
<label>2</label>
<title>Literature Review</title>
<p>Energy management in IoT networks has become an important research direction as most IoT devices are energy-limited devices. Such devices commonly work with limited battery energy, hence the efficient energy use is vital in these devices&#x2019; performance and durability [<xref ref-type="bibr" rid="ref-15">15</xref>]. Several research works have been done concerning how to conserve energy in different ways such as in routing algorithms and protocols. Solutions including adaptive transmission power control and sleep mode management have been proposed in order to prolong battery lifespan. This literature review focuses on reviewing the above approaches and their efficiency in enhancing energy efficiency in IoT network [<xref ref-type="bibr" rid="ref-16">16</xref>].</p>
<p>Scholars have exploited one of the several important properties of IoT nodes to advance energy efficiency. A salient feature is the node&#x2019;s state to be in several power modes inclusive of active, sleep, and idle states. It should be noted that these motes may be switched dynamically according to the traffic of the network so that energy is reduced [<xref ref-type="bibr" rid="ref-17">17</xref>]. Further, poor processing capability and memory of the IoT node are used to adopt fewer computational strategies that will somehow decrease power consumption [<xref ref-type="bibr" rid="ref-18">18</xref>]. The behaviours of the data patterns in space and time domain, obtained from the IoT nodes, can also be leverages to inform the best approaches to communications, for instance, avoiding unnecessary re-emission of data. Additionally, using geographical information of the node researchers are able to incorporate the best routing algorithms, hence minimising the distance and energy through which the data will pass through [<xref ref-type="bibr" rid="ref-19">19</xref>]. These properties form the core in establishing policies that maintain an optimal rate between energy usage and network achievement [<xref ref-type="bibr" rid="ref-20">20</xref>].</p>
<p>Smart IoT systems in today&#x2019;s society are contributing to the interconnectivity of devices and appropriate systems with the aim of sharing important data besides improving automation. In smart homes, IoT devices keep control over the home&#x2019;s lighting, heating, and security so that living becomes more comfortable. In health care, gadgets that are worn track physiological information and inform clinicians of changes or triggers enhancing health outcomes. The IoT networks also help to run industries efficiently through recording of the working status of machines and determining the time that it would require to have the machines serviced. In the practice of agriculture, IoT sensors detect the state of the soil and the crops to provide the farmers with the best practices concerning irrigation and fertilization. In general, IOT networks improve efficiency and inter connectivity of most industries and activities, and contribute to making these activities much easier to attain.</p>
<p>Wireless Sensor Networks (WSNs) are important in data acquisition in IoT devices comprising of small sensors which are battery operated and work in synergy [<xref ref-type="bibr" rid="ref-21">21</xref>]. As already mentioned, in densely deployed IoT networks based on WSNs, sensors may duplicate their data, which makes it difficult to address the problem of resource limitation, most notably energy. To overcome this, the proposed EFUCSS protocol incorporates energy efficient fuzzy based unequal clustering with sleep scheduling. This approach helps in increasing the Network life span and at the same time minimizing energy consumption in clustering; scheduling and transmission of data. Algorithms show that the advantage of using EFUCSS in the network is a twofold increase in energy storage retention as well as an Increase in the network life cycle compared to the traditional policies [<xref ref-type="bibr" rid="ref-22">22</xref>]. Authors also have focused on the energy consumption during state transition where it has been found that substantial amount of energy getting consumed during the on/off and sleep-mode energy management schemes [<xref ref-type="bibr" rid="ref-23">23</xref>]. The rise in the adoption of IoT devices both themselves and diverse and energy-constrained has driven an increased awareness of the need to be more vigilant about data security in IoT environments. In order to solve this problem, the authors of [<xref ref-type="bibr" rid="ref-24">24</xref>] have extended light-weight encryption-based solutions using traditional algorithms. The study presents a new IoT paradigm developed through the integration of lightweight crypto-graphic ciphers and Autonomic Computing by saving energy and providing different protection levels suitable to IoT application requirements and device behavior [<xref ref-type="bibr" rid="ref-25">25</xref>].</p>
<p>In this line of context, localization is one of the proven method for energy management in IoT network. The selection of appropriate mobile technique improves energy efficiency, enlarges sensor lifetime and consequently enables precise location-aware IoT applications, however open research challenges still must be addressed in face of new needs [<xref ref-type="bibr" rid="ref-26">26</xref>]. <xref ref-type="table" rid="table-1">Table 1</xref> presents the critical analysis of the proposed routing protocol against existing deterministic approaches. Energy optimization can also be effectively achieved by accurate localization estimation.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Analysis of existing meta-heuristic routing protocols</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr align="center">
<th>Deadlock</th>
<th>Traffic</th>
<th>Self-adaptive</th>
<th>Fault-tolerance</th>
<th>Localization</th>
<th>Positioning</th>
<th>Multi-Criteria</th>
</tr>
</thead>
<tbody>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-27">27</xref>]</td>
<td><inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-28">28</xref>]</td>
<td></td>
<td><inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-29">29</xref>]</td>
<td><inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-30">30</xref>]</td>
<td><inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td><inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-32">32</xref>]</td>
<td><inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-33">33</xref>]</td>
<td><inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-34">34</xref>]</td>
<td><inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-35">35</xref>]</td>
<td></td>
<td><inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-36">36</xref>]</td>
<td></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-37">37</xref>]</td>
<td><inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td><inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
</tr>
<tr align="center">
<td><bold>Proposed</bold></td>
<td><inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This paper [<xref ref-type="bibr" rid="ref-39">39</xref>] presents a cluster-based routing protocol and Modified Bat for Node Optimization to improve the coverage of nodes in terms of redundancy and energy-efficient symmetrical localization. A reinforcement-based Q-learning algorithm constructs, optimizes, and localizes the unknown nodes in a local fashion [<xref ref-type="bibr" rid="ref-40">40</xref>]. This work aims at improving the accuracy estimation between anchor nodes and their neighboring nodes, in order to optimize coverage of nodes and improve localization across the network [<xref ref-type="bibr" rid="ref-41">41</xref>]. Energy-efficient protocols are more vital as the number of sensor nodes rises. In particular, wireless communication typically has high energy costs. In this paper [<xref ref-type="bibr" rid="ref-42">42</xref>], a routing algorithm is proposed to reduce the energy consumption of the network by exploiting both localization and clustering. <xref ref-type="table" rid="table-2">Table 2</xref> presents the critical analysis of the proposed routing protocol against existing metaheuristic approaches.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Analysis of conventional routing protocols</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr align="center">
<th>Algorithm</th>
<th>Distance</th>
<th>Topology</th>
<th>Residual energy</th>
<th>Data aggregation</th>
<th>Node density</th>
<th>Sensor mobility</th>
</tr>
</thead>
<tbody>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-43">43</xref>]</td>
<td><inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-31">31</xref>]</td>
<td><inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-46"><mml:math id="mml-ieqn-46"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-44">44</xref>]</td>
<td></td>
<td><inline-formula id="ieqn-47"><mml:math id="mml-ieqn-47"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-48"><mml:math id="mml-ieqn-48"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-49"><mml:math id="mml-ieqn-49"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-45">45</xref>]</td>
<td></td>
<td><inline-formula id="ieqn-50"><mml:math id="mml-ieqn-50"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-51"><mml:math id="mml-ieqn-51"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-52"><mml:math id="mml-ieqn-52"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-46">46</xref>]</td>
<td><inline-formula id="ieqn-53"><mml:math id="mml-ieqn-53"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-54"><mml:math id="mml-ieqn-54"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-55"><mml:math id="mml-ieqn-55"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-47">47</xref>]</td>
<td><inline-formula id="ieqn-56"><mml:math id="mml-ieqn-56"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-57"><mml:math id="mml-ieqn-57"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-58"><mml:math id="mml-ieqn-58"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-48">48</xref>]</td>
<td><inline-formula id="ieqn-59"><mml:math id="mml-ieqn-59"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-60"><mml:math id="mml-ieqn-60"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-61"><mml:math id="mml-ieqn-61"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-34">34</xref>]</td>
<td><inline-formula id="ieqn-62"><mml:math id="mml-ieqn-62"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-38">38</xref>]</td>
<td><inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-49">49</xref>]</td>
<td><inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-50">50</xref>]</td>
<td><inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td></td>
<td></td>
<td><inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td>[<xref ref-type="bibr" rid="ref-51">51</xref>]</td>
<td><inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td></td>
<td><inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
<tr align="center">
<td><bold>Proposed</bold></td>
<td><inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
<td><inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:mi>&#x2713;</mml:mi></mml:math></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The current work focuses on reducing sensor energy consumption in IoT networks to extend network lifetime. It employs a hybrid metaheuristic algorithm combining Whale Optimization Algorithm (WOA) with Simulated Annealing (SA) to select the optimal Cluster Head (CH) [<xref ref-type="bibr" rid="ref-52">52</xref>]. IoT-enabled Wireless Sensor Networks are increasingly used for disaster management in smart cities, including applications like emergency medical services and flood control. However, these networks face challenges such as high energy consumption from communication, cluster overlapping, and large communication distances, which make efficient data collection difficult. To address the mentioned issues, an integrated modified Genetic Algorithm (GA) for Cluster Head (CH) election in wireless sensor networks (WSNs) is proposed, known as ModifyGA, which aims to maximize network lifetime [<xref ref-type="bibr" rid="ref-53">53</xref>].</p>
<p>To achieve the optimization of a set of design variables this research combines a meta-heuristic approach with a deterministic approach that is the proposed method. The following <xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows the classification of algorithms that are exist in the past literature. In the previous works several deterministic approaches have been premeditated in order to carry out improved energy management in IoT network. This is the Deterministic Energy-efficient Clustering protocol (DEC), a self organizing and adaptive method to minimize energy quality consumed in networks while choosing CHs, relative to residual energy. Nevertheless, problems arise with DEC that includes a failure to account for intra-cluster distance and node degree. In order to overcome these drawbacks, this paper presents PSO based Deterministic Energy Efficient Clustering (PSO-DEC) protocol by incorporating PSO to make the existing protocol more efficient [<xref ref-type="bibr" rid="ref-54">54</xref>].</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Classification of approaches</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-2.tif"/>
</fig>
</sec>
<sec id="s3">
<label>3</label>
<title>Proposed Method: Mathematical Formulation</title>
<p>The provisioned hybrid algorithm mainly targets the identification of better routes in both global and local arenas. This target is achieved by utilizing the IoT nodes&#x2019; properties in global and local space using meta-heuristic approach in harmony with the deterministic approach. The choice of ACO is, doing what ants do, find the shortest path when looking for a food source they drop pheromone trails. When employed in an IoT network, ACO can help locate the best path between nodes, and simultaneously, share the energy usage load among nodes. Agents are ants, the search is the path, and pheromone is the marking of good low-energy paths for future reference. In incorporation with Greedy Algorithm its next step best decision is taken to be the locally optimum one like choosing the next node with maximum residual energy or minimum distance from the source. As much as it is efficient and fast it does not guarantee optimization right from the global level down to the individual networks. The combination of these two, ACO can be used for global search and optimization, the GA provides for rapid, local decision making. This integrated approach is useful to explore and exploit knowledge to prevent convergence to local optima early on in the process.</p>
<p>As energy consumption of individual nodes has to be minimized in an IoT network, routing is the most critical factor affecting how much energy their data consumes. Here, the ACO provides the envisioned way of how to look for energy-efficient paths, and GA contributes toward choosing the nodes in a short amount of time with more energy left or shorter paths to the destination. In the long run, the two guarantees that the network load is equally distributed hence enhancing the network durability. The total energy consumed in the IoT network can be represented as <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>:
<disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:munderover><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula>where:</p>
<p><inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Total energy consumed</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:mi>N</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Number of nodes in the network</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Probability of choosing the&#xA0;</mml:mtext></mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mrow><mml:mtext>th</mml:mtext></mml:mrow></mml:mrow></mml:msup><mml:mrow><mml:mtext>&#xA0;node (determined by ACO)</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:msub><mml:mi>E</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Energy consumed by the&#xA0;</mml:mtext></mml:mrow><mml:msup><mml:mi>i</mml:mi><mml:mrow><mml:mrow><mml:mtext>th</mml:mtext></mml:mrow></mml:mrow></mml:msup><mml:mrow><mml:mtext>&#xA0;node</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p>This <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref> shows the total energy which is consumed in an IoT network where a large number of nodes are participating to have transmission of data in that network, <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>T</mml:mi><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> shown as the total energy consumed by all the nodes in the network, where <italic>N</italic> is the total number of nodes in that network. In IoT networks, nodes can be sensors, actuators or any of the devices that get connected to others. <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> represents the probability of choosing the <italic>i</italic>-th node to forward or transmit data in the entire network, which is the sum of the energy consumed by individual nodes. <italic>N</italic> denoted the number of nodes in the network. In IoT networks, nodes can be sensors, actuators, or any device communicating with others. <inline-formula id="ieqn-91"><mml:math id="mml-ieqn-91"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> denoted the This is the probability of selecting the <inline-formula id="ieqn-92"><mml:math id="mml-ieqn-92"><mml:mi>i</mml:mi></mml:math></inline-formula>-th node for data routing or transmission. In an ACO framework this probability is defined with reference to the pheromones deposited with relation to this node and the heuristic values which exist with reference to this node. <inline-formula id="ieqn-93"><mml:math id="mml-ieqn-93"><mml:msub><mml:mi>E</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> refers to the total energy expended by the <inline-formula id="ieqn-94"><mml:math id="mml-ieqn-94"><mml:mi>i</mml:mi></mml:math></inline-formula>-th node for its data transmission or data processing. Specifically the energy consumed by a node depends on a number of factors including the distance over which the nodes communicates and its residual energy.
<disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B1;</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:msup></mml:mrow><mml:mrow><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>S</mml:mi></mml:mrow></mml:munder><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B1;</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:msup></mml:mrow></mml:mfrac></mml:math></disp-formula>where:</p>
<p><inline-formula id="ieqn-95"><mml:math id="mml-ieqn-95"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Pheromone level on the path to node&#xA0;</mml:mtext></mml:mrow><mml:mi>i</mml:mi></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-96"><mml:math id="mml-ieqn-96"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Heuristic value (e.g., inverse of distance or residual energy)</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-97"><mml:math id="mml-ieqn-97"><mml:mi>&#x03B1;</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Parameter controlling the influence of pheromone factor</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-98"><mml:math id="mml-ieqn-98"><mml:mi>&#x03B2;</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Parameter controlling the influence of heuristic factor</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-99"><mml:math id="mml-ieqn-99"><mml:mi>S</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Set of available nodes</mml:mtext></mml:mrow></mml:math></inline-formula></p>
<p>The probability <inline-formula id="ieqn-100"><mml:math id="mml-ieqn-100"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> of choosing the node <inline-formula id="ieqn-101"><mml:math id="mml-ieqn-101"><mml:mi>i</mml:mi></mml:math></inline-formula> in ACO is given by <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>. Calculate the probability <inline-formula id="ieqn-102"><mml:math id="mml-ieqn-102"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> of the path leading to node <inline-formula id="ieqn-103"><mml:math id="mml-ieqn-103"><mml:mi>i</mml:mi></mml:math></inline-formula> in ACO for routing purposes. Where <inline-formula id="ieqn-104"><mml:math id="mml-ieqn-104"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> mean the pheromonetrail strength on the path that leads to the node <inline-formula id="ieqn-105"><mml:math id="mml-ieqn-105"><mml:mi>i</mml:mi></mml:math></inline-formula>. In ACO, the pheromone is a grephererpherereal agent that leaves scent by ants on the paths to be used, and the magnitude of the pheromone determines the number of times the path has been used. In IoT networks, the level of the pheromone is higher in the path (or node) that has been successful in terms of energy efficiency and reliability is identified by <inline-formula id="ieqn-106"><mml:math id="mml-ieqn-106"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> which indicates the heuristic value for node <inline-formula id="ieqn-107"><mml:math id="mml-ieqn-107"><mml:mi>i</mml:mi></mml:math></inline-formula>. This heuristic could mean that the path between the nodes is shortest or the remaining energy of a node and so on. The greater the residual energy or distance of the node, the higher the heuristic values. The pheromone levels <inline-formula id="ieqn-108"><mml:math id="mml-ieqn-108"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> and heuristic values <inline-formula id="ieqn-109"><mml:math id="mml-ieqn-109"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> are the factors with the tuning parameters <inline-formula id="ieqn-110"><mml:math id="mml-ieqn-110"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-111"><mml:math id="mml-ieqn-111"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula>, respectively. If <inline-formula id="ieqn-112"><mml:math id="mml-ieqn-112"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> is high, then pheromone&#x2019;s strength dominates; if <inline-formula id="ieqn-113"><mml:math id="mml-ieqn-113"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> is high, then heuristic value takes the precedence <inline-formula id="ieqn-114"><mml:math id="mml-ieqn-114"><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>S</mml:mi></mml:mrow></mml:munder><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B1;</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:msup></mml:math></inline-formula> the denominator is used to normalize the probability.mone is a substance that ants deposit on the paths they travel, and the strength of the pheromone represents how often that path has been used. In IoT networks, higher pheromone levels indicate that a path (or node) has been successful in terms of energy efficiency and reliability. <inline-formula id="ieqn-115"><mml:math id="mml-ieqn-115"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> represents the heuristic value for node <inline-formula id="ieqn-116"><mml:math id="mml-ieqn-116"><mml:mi>i</mml:mi></mml:math></inline-formula>. This heuristic could be the inverse of the distance between nodes (i.e., shorter paths are preferred) or it could depend on other factors like the remaining energy of a node. Nodes with more residual energy or closer proximity have higher heuristic values. <inline-formula id="ieqn-117"><mml:math id="mml-ieqn-117"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-118"><mml:math id="mml-ieqn-118"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> are the tunning parameters that control the influence of the pheromone levels <inline-formula id="ieqn-119"><mml:math id="mml-ieqn-119"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> and heuristic values <inline-formula id="ieqn-120"><mml:math id="mml-ieqn-120"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula>, respectively. If <inline-formula id="ieqn-121"><mml:math id="mml-ieqn-121"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> is high, the pheromone&#x2019;s influence dominates; if <inline-formula id="ieqn-122"><mml:math id="mml-ieqn-122"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> is high, the heuristic value is prioritized. <inline-formula id="ieqn-123"><mml:math id="mml-ieqn-123"><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>S</mml:mi></mml:mrow></mml:munder><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B1;</mml:mi></mml:msup><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">]</mml:mo><mml:mi>&#x03B2;</mml:mi></mml:msup></mml:math></inline-formula> the denominator ensures that the probability is normalized. It adds the pheromone and heuristic values of all nodes available in the set <italic>S</italic> so as to normalize the final probability <inline-formula id="ieqn-124"><mml:math id="mml-ieqn-124"><mml:msub><mml:mi>P</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> between 0 and 1.</p>
<p>The Greedy selection rule determines <inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:msub><mml:mi>i</mml:mi><mml:mrow><mml:mtext>next</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> through <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref>, while <inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:msub><mml:mi>i</mml:mi><mml:mrow><mml:mtext>next</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the next node in the route and determined by the GA. arg min This notation stand for &#x201C;argument of the minimum&#x201D; here it means that the selected node is the one that minimize the expression that is inside the parenthesis <inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:mi>D</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>&#x2014;This is the distance between the current node <italic>i</italic> and the candidate node <italic>j</italic>. In IoT networks, minimizing the distance between nodes is important because long distance transmission will consume more energy. <inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> refers to the energy that is left in node <italic>j</italic>. The greedy algorithm selects nodes with relatively high residual energy in order to avoid overloading particular nodes which will quickly get depleted and create partitions in a network.
<disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:msub><mml:mi>i</mml:mi><mml:mrow><mml:mrow><mml:mtext>next</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>arg</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:mi>D</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where:</p>
<p><inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:mi>D</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Distance between nodes&#xA0;</mml:mtext></mml:mrow><mml:mi>i</mml:mi><mml:mrow><mml:mtext>&#xA0;and&#xA0;</mml:mtext></mml:mrow><mml:mi>j</mml:mi></mml:math></inline-formula></p>
<p><inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>:</mml:mo><mml:mrow><mml:mtext>Residual energy of node&#xA0;</mml:mtext></mml:mrow><mml:mi>j</mml:mi></mml:math></inline-formula></p>
<p><xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> is used to determine the next node that has the least distance and within that least energy. The algorithm identifies the node <italic>j</italic> with the shortest distance to the node <italic>i</italic> and node <italic>j</italic> has enough energy level. That is how the Greedy Algorithm selects the nodes: in such a manner to distribute the energy intake the most and not let nodes exhaust their energy sources too quickly, thus extending the lifetime of the network.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Energy Consumption for Transmission <inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:msub><mml:mi mathvariant="bold-italic">E</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">T</mml:mi><mml:mi mathvariant="bold-italic">x</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and Reception <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:msub><mml:mi mathvariant="bold-italic">E</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">R</mml:mi><mml:mi mathvariant="bold-italic">x</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></title>
<p>Energy consumption during transmission and reception is critical in IoT networks. The total energy consumed by a node depends on both the data it transmits and receives. The first level of energy modeling can be expressed as <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> and <xref ref-type="disp-formula" rid="eqn-5">(5)</xref>:
<disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>elec</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mi>k</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mo>+</mml:mo><mml:msub><mml:mtext>&#x03B5;</mml:mtext><mml:mrow><mml:mrow><mml:mtext>amp</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mi>k</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msubsup></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>elec</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mi>k</mml:mi></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>where, <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Energy consumed by node <italic>i</italic> during data transmission. <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Energy consumed by node <italic>i</italic> during data reception. <inline-formula id="ieqn-135"><mml:math id="mml-ieqn-135"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>elec</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula>: Energy consumed by the electronics circuitry to transmit or receive 1 bit of data. <italic>k</italic>: Number of bits transmitted or received. <inline-formula id="ieqn-136"><mml:math id="mml-ieqn-136"><mml:msub><mml:mtext>&#x03B5;</mml:mtext><mml:mrow><mml:mtext>amp</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula>: Energy dissipated by the transmission amplifier (dependent on the distance and medium). <inline-formula id="ieqn-137"><mml:math id="mml-ieqn-137"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>: Distance between the transmitting node <italic>i</italic> and receiving node <italic>j</italic>. <italic>n</italic>: Path loss exponent (typically 2 for free-space, 4 for multi-path). The total energy consumed by a node is a combination of transmission and reception energy calculated by using <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref>:
<disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>total~node</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula></p>
<p>This allows dissipation to be measured in terms of distance of energy transmissions as well as the actual number of bits within the program. Pheromone levels are the key factor that is used by ACO in order to ensure the correct optimization. The pheromone update equation means that paths that would lead to better routing are bound to be strengthened while the others lose pheromone levels they ought to.
<disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C1;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where, <inline-formula id="ieqn-138"><mml:math id="mml-ieqn-138"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Updated pheromone level on the path between nodes <italic>i</italic> and <italic>j</italic> at time step <italic>t &#x002B; 1</italic>. <inline-formula id="ieqn-139"><mml:math id="mml-ieqn-139"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula>: Pheromone evaporation rate (controls how quickly pheromones decay, to avoid over-exploitation of certain paths). <inline-formula id="ieqn-140"><mml:math id="mml-ieqn-140"><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Pheromone deposited on the path between nodes <italic>i</italic> and <italic>j</italic> at time step <italic>t</italic>, influenced by the quality of the route (e.g., based on energy efficiency and path length). The amount of pheromone deposited can be modeled as in <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>.
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mi>Q</mml:mi><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>path</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mfrac></mml:math></disp-formula>where, <italic>Q</italic> is a scale factor associated with the pheromone update value. <inline-formula id="ieqn-141"><mml:math id="mml-ieqn-141"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the total energy despite the path which is used by all nodes. The generic algorithms avoid the construction of solutions that are energy-intensive and provide a low profit, by depositing higher concentrations of pheromones on such efficient paths. This pheromone update rule ensures that there is a positive bias towards paths which are more energy efficient over longer periods of time while less efficient paths become positively influenced and therefore less attractive due to pheromone trail decay. So as to force the selection of nodes with higher residual energy, a measure for the remaining energy of the nodes should be included into the equation. The residual energy after each communication round can be given as <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>.
<disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>initial</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mrow><mml:mtext>rounds</mml:mtext></mml:mrow></mml:mrow></mml:munder><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where, <inline-formula id="ieqn-142"><mml:math id="mml-ieqn-142"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Residual energy of node <italic>i</italic> after multiple rounds of transmission and reception. <inline-formula id="ieqn-143"><mml:math id="mml-ieqn-143"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>initial</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Initial energy of node <italic>i</italic>. <inline-formula id="ieqn-144"><mml:math id="mml-ieqn-144"><mml:munder><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mtext>rounds</mml:mtext></mml:mrow></mml:munder><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> is the total energy consumed by node <italic>i</italic> across all communication rounds. This method is useful in inclining on nodes which have more energy to in transmitting the data because the energy load is more balanced and some nodes do not get exhausted early.</p>
<p>To justify the proposed method in terms of overall network performance, an objective function that minimizes energy consumption and maximizes network lifetime should be defined. A possible optimization objective can be presents as in <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>.
<disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:mrow><mml:mtext>Minimize</mml:mtext></mml:mrow><mml:mtext>&#xA0;</mml:mtext><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:munderover><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>total~node</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where, <inline-formula id="ieqn-145"><mml:math id="mml-ieqn-145"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>total~node</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the objective function propose that we want to minimize the total overall energy consumption of all the nodes in <italic>N</italic> bearing in mind the energy left in each node <inline-formula id="ieqn-146"><mml:math id="mml-ieqn-146"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>. Reducing this ratio, the algorithm achieves load balancing of the energy consumption among nodes, providing the nodes with higher residual energy and enhancing the lifetime of the network.</p>
<p>The number of communication rounds until the first node dies is used as network lifetime, a useful measure for comparing the efficiency of the ACOGA method described in the paper, as shown in <xref ref-type="disp-formula" rid="eqn-11">Eq. (11)</xref>.
<disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mrow><mml:mtext>network~lifetime</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mo movablelimits="true" form="prefix">min</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>initial</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>total~node</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where, <inline-formula id="ieqn-147"><mml:math id="mml-ieqn-147"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mtext>network~lifetime</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the total number of operational time or number of rounds where the network can carry out its functions before the first node exhausts all its energy. This is done in order to find the lifetime of the network; this is the node with the least value of initial energy divided by total energy expended. This node will be the first to die hence defining the lifetime of the network. For an analysis of the energy per packet delivered successfully in the network, one can postulate the following equation in <xref ref-type="disp-formula" rid="eqn-12">Eq. (12)</xref>.
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>efficiency</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mfrac></mml:math></disp-formula>where, <inline-formula id="ieqn-148"><mml:math id="mml-ieqn-148"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>efficiency</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the energy efficiency per data packet delivered. <inline-formula id="ieqn-149"><mml:math id="mml-ieqn-149"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the total energy being used by the network. <inline-formula id="ieqn-150"><mml:math id="mml-ieqn-150"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the number of successfully transmitted packets at the destination-node. As <xref ref-type="disp-formula" rid="eqn-12">Eq. (12)</xref> shows, it calculates the energy utilization rate of the network to deliver packets. Alternatively, the value of Energy Efficiency Index (EEI) in <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref> may be used to find a building&#x2019;s Energy Efficiency Ratio, or EER: A lower value gives higher energy efficiency. The hybrid method should effectively use energy and achieve the technical goal of low network latency at the same time. This give us the network delay for data packet delivery as defined in <xref ref-type="disp-formula" rid="eqn-13">Eq. (13)</xref>.
<disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:msub><mml:mi>D</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></disp-formula>where, <inline-formula id="ieqn-151"><mml:math id="mml-ieqn-151"><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the total end-to-end delay in the network for a packet. <italic>H</italic> is equal to the number of hops starting from the source node to the destination node. In this sense <inline-formula id="ieqn-152"><mml:math id="mml-ieqn-152"><mml:msub><mml:mi>D</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> for every hop <italic>i</italic> is equal to the, transmission delay or propagation delay and processing or queuing delay. By reducing the total delay <inline-formula id="ieqn-153"><mml:math id="mml-ieqn-153"><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mtext>total</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula>, the hybrid method helps in completing the delivery of packets at the right time and boost the efficiency of the IoT network. Some nodes should not consume energy much faster than others, and for this reason, load balancing is very important. It is possible to introduce a load flow coefficient that specifies how well the energy consumption loads is balanced across the network nodes is described in <xref ref-type="disp-formula" rid="eqn-14">Eq. (14)</xref>.
<disp-formula id="eqn-14"><label>(14)</label><mml:math id="mml-eqn-14" display="block"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mrow><mml:mtext>balance</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>N</mml:mi></mml:mfrac><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>N</mml:mi></mml:mrow></mml:munderover><mml:msup><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>initial</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup></mml:math></disp-formula>where, <inline-formula id="ieqn-154"><mml:math id="mml-ieqn-154"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mtext>balance</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is load factor of consuming energy for load balancing to show how effectively electrical energy has been distributed among all the nodes. <inline-formula id="ieqn-155"><mml:math id="mml-ieqn-155"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>initial</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the initial energy of node <italic>i</italic>. <inline-formula id="ieqn-156"><mml:math id="mml-ieqn-156"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> is the residual energy of the node <italic>i</italic>. <italic>N</italic> denote the total number of node. The <inline-formula id="ieqn-157"><mml:math id="mml-ieqn-157"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mtext>balance</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> value showing the distribution of energy consumption should be small; it is an indication that no node is over drained than the other node. It assists in extending the life span of the network. The average path length was measured to represent the number of step that a packet has to transverse to get to the final destination. This metric matters because short paths entail that less energy is used and that delays are minimized. It may be calculated as <xref ref-type="disp-formula" rid="eqn-15">Eq. (15)</xref>.
<disp-formula id="eqn-15"><label>(15)</label><mml:math id="mml-eqn-15" display="block"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mrow><mml:mtext>avg</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mfrac><mml:munderover><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>p</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:munderover><mml:msub><mml:mi>H</mml:mi><mml:mi>p</mml:mi></mml:msub></mml:math></disp-formula>where, <inline-formula id="ieqn-158"><mml:math id="mml-ieqn-158"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mtext>avg</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the average path length (average number of hops), <inline-formula id="ieqn-159"><mml:math id="mml-ieqn-159"><mml:msub><mml:mi>H</mml:mi><mml:mi>p</mml:mi></mml:msub></mml:math></inline-formula> is the number of hops for the packet <italic>p</italic>. <inline-formula id="ieqn-160"><mml:math id="mml-ieqn-160"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the total number of delivered packets.d. As can be observed from the figures, shorter distances require fewer transmissions and therefore less energy is needed. With reference to the hybrid method, it should be noted that the objective should be to reduce <inline-formula id="ieqn-161"><mml:math id="mml-ieqn-161"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mtext>avg</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> in order to get the best performance. To further refine the ACO-based path selection, we have added a factor in the pheromone update rule to promote energy balancing between nodes. This modified pheromone update <xref ref-type="disp-formula" rid="eqn-16">Eq. (16)</xref> can penalize paths that pass through nodes with low residual energy.
<disp-formula id="eqn-16"><label>(16)</label><mml:math id="mml-eqn-16" display="block"><mml:mi mathvariant="normal">&#x0394;</mml:mi><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>t</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mi>Q</mml:mi><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>path</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>&#x03BB;</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>min</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:math></disp-formula>where, <inline-formula id="ieqn-162"><mml:math id="mml-ieqn-162"><mml:mi>&#x03BB;</mml:mi></mml:math></inline-formula> is the weight factor that control the influence of the residual energy penalty <inline-formula id="ieqn-163"><mml:math id="mml-ieqn-163"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>min</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula>, minimum acceptable residual energy for a node <inline-formula id="ieqn-164"><mml:math id="mml-ieqn-164"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>residual</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> residual energy of node <italic>i</italic> on the path. This equation discourages selection of paths which has nodes with low residual energy, which helps to overcome problem of network partition and early dead nodes. The value of <inline-formula id="ieqn-165"><mml:math id="mml-ieqn-165"><mml:mi>&#x03BB;</mml:mi></mml:math></inline-formula> needs to be decided so that a balance can be obtained between how much importance the algorithm pays to energy balancing. To provide a more granular view of energy consumption, we have calculated the energy cost per hop in the network. This <xref ref-type="disp-formula" rid="eqn-17">Eq. (17)</xref> models the energy consumed to send a packet over a single hop:
<disp-formula id="eqn-17"><label>(17)</label><mml:math id="mml-eqn-17" display="block"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>hop</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>+</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></disp-formula>where, <inline-formula id="ieqn-166"><mml:math id="mml-ieqn-166"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>hop</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Energy consumed when transmitting a packet from node <italic>i</italic> and <italic>j</italic>. <inline-formula id="ieqn-167"><mml:math id="mml-ieqn-167"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>tx</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Energy consumed by node <italic>i</italic> to transmit the packet. <inline-formula id="ieqn-168"><mml:math id="mml-ieqn-168"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>rx</mml:mtext></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>: Energy consumed by node <italic>j</italic> to receive the packet. Summing up the energy consumption over all hops along the path gives a more detailed analysis of how much energy is used during packet transmission. To ensure that the selected paths are not only energy-efficient but also reliable, we have defined a path reliability factor by using <xref ref-type="disp-formula" rid="eqn-18">Eq. (18)</xref> that considers the probability of successful transmission over all hops.
<disp-formula id="eqn-18"><label>(18)</label><mml:math id="mml-eqn-18" display="block"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mrow><mml:mtext>path</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:munderover><mml:mo movablelimits="false">&#x220F;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>H</mml:mi></mml:mrow></mml:munderover><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></disp-formula>where, <inline-formula id="ieqn-169"><mml:math id="mml-ieqn-169"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mtext>path</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is reliability of the path from source to the destination. <inline-formula id="ieqn-170"><mml:math id="mml-ieqn-170"><mml:msub><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:math></inline-formula> is the reliability of hop <italic>i</italic> which could be defined as the probability that node <italic>i</italic> is was successfully transmitted to node <italic>i&#x002B;</italic>1. <italic>H</italic> is the number of hops on the path. Optimizing <inline-formula id="ieqn-171"><mml:math id="mml-ieqn-171"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mtext>path</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> guarantees that the algorithm chooses robust paths with minimal packet loss as well as re-transmissions, which are energy consumptive. Through put assess the data accepted passed through and transformed in the network in a time frame. Thus, to assess the efficiency of the hybrid approach in the context of the data delivery <xref ref-type="disp-formula" rid="eqn-19">Eq. (19)</xref> are used.
<disp-formula id="eqn-19"><label>(19)</label><mml:math id="mml-eqn-19" display="block"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mrow><mml:mtext>throughput</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mi>k</mml:mi></mml:mrow><mml:mi>T</mml:mi></mml:mfrac></mml:math></disp-formula>where, <inline-formula id="ieqn-172"><mml:math id="mml-ieqn-172"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mtext>throughput</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the throughput in the network. <inline-formula id="ieqn-173"><mml:math id="mml-ieqn-173"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mtext>delivered</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> is the number of packets successfully delivered, <italic>k</italic> the number of bits per packet and <italic>T</italic> the total time period over which the data was delivered. Higher throughput means better network performance, and this method ought to maximize <inline-formula id="ieqn-174"><mml:math id="mml-ieqn-174"><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mtext>throughput</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> without compromising for energy usage. To ensure convergence of the optimization process and avoid divergence, the following strategies are adopted within the ACOGA framework: The pheromone update is bounded within a fixed range:
<disp-formula id="eqn-20"><label>(20)</label><mml:math id="mml-eqn-20" display="block"><mml:mi>&#x03C4;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mrow><mml:mtext>min</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mrow><mml:mtext>max</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo stretchy="false">]</mml:mo></mml:math></disp-formula></p>
<p>This avoids excessive accumulation or evaporation and prevents the algorithm from being trapped in local optima or diverging. In each iteration, the best solutions are reinforced using both the ACO pheromone trails and the greedy selection criterion. This dual mechanism maintains a balance between exploration and exploitation. The optimization continues until either the best path remains unchanged for a fixed number of iterations or the improvement in energy consumption falls below a defined threshold. This is expressed as:
<disp-formula id="eqn-21"><label>(21)</label><mml:math id="mml-eqn-21" display="block"><mml:mrow><mml:mtext>If&#xA0;</mml:mtext></mml:mrow><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>prev</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mrow><mml:mtext>current</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">|</mml:mo></mml:mrow><mml:mo>&#x2264;</mml:mo><mml:mtext>&#x03B5;</mml:mtext><mml:mspace width="1em" /><mml:mrow><mml:mtext>for&#xA0;</mml:mtext></mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mtext>&#xA0;consecutive iterations, stop optimization</mml:mtext></mml:mrow></mml:math></disp-formula>where, <inline-formula id="ieqn-175"><mml:math id="mml-ieqn-175"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>prev</mml:mtext></mml:mrow></mml:msub><mml:mo>=</mml:mo></mml:math></inline-formula> Energy value from the previous iteration, <inline-formula id="ieqn-176"><mml:math id="mml-ieqn-176"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>current</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> &#x003D; Current energy value, <inline-formula id="ieqn-177"><mml:math id="mml-ieqn-177"><mml:mtext>&#x03B5;</mml:mtext></mml:math></inline-formula> &#x003D; Small positive threshold (e.g., <inline-formula id="ieqn-178"><mml:math id="mml-ieqn-178"><mml:mn>0.001</mml:mn></mml:math></inline-formula>), <inline-formula id="ieqn-179"><mml:math id="mml-ieqn-179"><mml:mi>k</mml:mi></mml:math></inline-formula> &#x003D; Number of consecutive stable iterations. Parameters such as the evaporation rate <inline-formula id="ieqn-180"><mml:math id="mml-ieqn-180"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula>, initial pheromone level <inline-formula id="ieqn-181"><mml:math id="mml-ieqn-181"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:math></inline-formula>, and the greedy bias factor are empirically tuned through simulation to ensure consistent convergence.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Deployment and Simulation</title>
<p>The use of the proposed hybrid approach to prolong the IoT network lifetime follows several main activities. When comparing the efficiency of the method, input parameters for the algorithms which are implemented are assessed in addition to various deployment scenarios. The present section discusses the requirements of the data set, the network architecture, and the validation.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Simulation Setup and Environment Details</title>
<p>To ensure reproducibility and clarity of experimental results, detailed simulation settings are outlined below. The proposed ACO-Greedy hybrid algorithm was evaluated using MATLAB in a controlled simulation environment designed to mimic realistic IoT network conditions.
<list list-type="bullet">
<list-item>
<p><bold>Network Area:</bold> The simulation area was set to 100 m <inline-formula id="ieqn-182"><mml:math id="mml-ieqn-182"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 100 m for baseline tests. Larger areas such as 100 m <inline-formula id="ieqn-183"><mml:math id="mml-ieqn-183"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 100 m were used for scalability analysis.</p></list-item>
<list-item>
<p><bold>Node Distribution:</bold> IoT nodes (ranging from 50 to 200) were randomly deployed following a uniform distribution.</p></list-item>
<list-item>
<p><bold>Sink Node Location:</bold> The sink node was placed at the center.</p></list-item>
<list-item>
<p><bold>Energy Model:</bold> A first-order radio model was used. Transmission and reception energy were set as <inline-formula id="ieqn-184"><mml:math id="mml-ieqn-184"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>50</mml:mn></mml:math></inline-formula> nJ/bit and <inline-formula id="ieqn-185"><mml:math id="mml-ieqn-185"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>50</mml:mn></mml:math></inline-formula> nJ/bit. Amplifier energy was <inline-formula id="ieqn-186"><mml:math id="mml-ieqn-186"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>a</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>100</mml:mn></mml:math></inline-formula> pJ/bit/m<sup>2</sup>.</p></list-item>
<list-item>
<p><bold>Initial Energy:</bold> Each node was initialized with 0.5 J of energy.</p></list-item>
<list-item>
<p><bold>Packet Size:</bold> The data packet size was fixed at 4000 bits per transmission round.</p></list-item>
<list-item>
<p><bold>Channel Model:</bold> A simple free-space propagation model was used. Channel noise was considered negligible for this simulation phase.</p></list-item>
<list-item>
<p><bold>Simulation Duration:</bold> Each run was executed until the network reached 1000 rounds or until 90% of nodes were dead, whichever occurred earlier.</p></list-item>
<list-item>
<p><bold>Mobility and Dynamics:</bold> Static nodes were considered for the primary evaluation. In later scenarios, node failures and dynamic topology changes were introduced at fixed intervals to analyze robustness.</p></list-item>
</list></p>
<p>These configurations help replicate the network conditions under which the proposed hybrid method was tested, and form a baseline for future real-world or emulated deployments.</p>
<p><bold><italic>Network Topology and Node Distribution</italic></bold></p>
<p>The presented deployment considers a general multi-hop IoT network having <italic>N</italic> nodes randomly deployed in the two-dimensional area. The network employs wireless communication in which nodes transmit data to neighboring nodes or sink nodes (gateway). Concentrated topology can be of random or grid type, depending on the specific scenario for its use. <xref ref-type="table" rid="table-1">Table 1</xref> below captures the parameters used in the simulation. In the deployment phase, the power consumed during transmission and reception are obtained using the <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> and <xref ref-type="disp-formula" rid="eqn-5">(5)</xref>. This guarantees that the energy needed to perform each communicating stage accurately determines the nodes to be selected in both ACO and GA.</p>

<p><bold><italic>Network Topology and Node Distribution</italic></bold></p>
<p>The presented deployment considers a general multi-hop IoT network having <italic>N</italic> nodes randomly deployed in the two-dimensional area. The network employs wireless communication in which nodes transmit data to neighboring nodes or sink nodes (gateway). Concentrated topology can be of random or grid type, depending on the specific scenario for its use. <xref ref-type="table" rid="table-3">Table 3</xref> below captures the parameters used in the simulation. In the deployment phase, the power consumed during transmission and reception are obtained using the <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> and <xref ref-type="disp-formula" rid="eqn-5">5</xref>. This guarantees that the energy needed to perform each communicating stage accurately determines the nodes to be selected in both ACO and GA.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Input parameters for the IoT network simulation</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr align="center">
<th>Parameter</th>
<th>Notation</th>
<th>Definition</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr align="center">
<td>Number of nodes</td>
<td><italic>N</italic></td>
<td>Total number of nodes in the IoT network</td>
<td>50, 75, 100</td>
</tr>
<tr align="center">
<td>Initial energy</td>
<td><inline-formula id="ieqn-188"><mml:math id="mml-ieqn-188"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>initial</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>Initial energy of each node</td>
<td>0.5 J</td>
</tr>
<tr align="center">
<td>Energy per bit (Tx/Rx)</td>
<td><inline-formula id="ieqn-189"><mml:math id="mml-ieqn-189"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>elec</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>Energy consumed per bit for transmission/reception</td>
<td>50 nJ/bit</td>
</tr>
<tr align="center">
<td>Amplification energy</td>
<td><inline-formula id="ieqn-190"><mml:math id="mml-ieqn-190"><mml:msub><mml:mtext>&#x03B5;</mml:mtext><mml:mrow><mml:mtext>amp</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>Transmission amplifier energy for long-range communication</td>
<td>100 pJ/bit/m<sup>2</sup></td>
</tr>
<tr align="center">
<td>Data packet size</td>
<td><inline-formula id="ieqn-192"><mml:math id="mml-ieqn-192"><mml:mi>k</mml:mi></mml:math></inline-formula></td>
<td>Size of data packets transmitted per node</td>
<td>4000 bits</td>
</tr>
<tr align="center">
<td>Pheromone evaporation rate</td>
<td><inline-formula id="ieqn-193"><mml:math id="mml-ieqn-193"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula></td>
<td>Rate of pheromone decay in ACO</td>
<td>0.1 to 0.5</td>
</tr>
<tr align="center">
<td>Heuristic importance</td>
<td><inline-formula id="ieqn-194"><mml:math id="mml-ieqn-194"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula></td>
<td>Importance of heuristic information in ACO</td>
<td>2.0</td>
</tr>
<tr align="center">
<td>Pheromone importance</td>
<td><inline-formula id="ieqn-195"><mml:math id="mml-ieqn-195"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula></td>
<td>Importance of pheromone in ACO probability</td>
<td>1.0</td>
</tr>
<tr align="center">
<td>Path loss exponent</td>
<td><inline-formula id="ieqn-196"><mml:math id="mml-ieqn-196"><mml:mi>n</mml:mi></mml:math></inline-formula></td>
<td>Models signal attenuation with distance</td>
<td>2 (free-space), 4 (multipath)</td>
</tr>
<tr align="center">
<td>Distance between nodes</td>
<td><inline-formula id="ieqn-197"><mml:math id="mml-ieqn-197"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>Distance between nodes <inline-formula id="ieqn-198"><mml:math id="mml-ieqn-198"><mml:mi>i</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-199"><mml:math id="mml-ieqn-199"><mml:mi>j</mml:mi></mml:math></inline-formula></td>
<td>Calculated dynamically</td>
</tr>
<tr align="center">
<td>Pheromone deposit constant</td>
<td><italic>Q</italic></td>
<td>Determines amount of pheromone deposited</td>
<td>1.0</td>
</tr>
<tr align="center">
<td>Minimum residual energy</td>
<td><inline-formula id="ieqn-200"><mml:math id="mml-ieqn-200"><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mtext>min</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>Minimum energy before penalizing a node&#x2019;s pheromone</td>
<td>0.05 J</td>
</tr>
<tr align="center">
<td>Transmission range</td>
<td><inline-formula id="ieqn-201"><mml:math id="mml-ieqn-201"><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></td>
<td>Maximum range a node can transmit data</td>
<td>20 m</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn id="table-3fn1" fn-type="other">
<p>Note: All parameters are assumed for simulation in Matlab R2022b.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<p><bold><italic>Ant Colony Optimization (ACO) Setup</italic></bold></p>
<p>Initially each possible path from node to node is attributed the same amount of pheromones. Every ant, or better say every packet, builds a path where they choose nodes in random but their decision is influenced by the pheromone level and the heuristic (distance or energy). In visualizing the data on paper, in the chosen paths, after each round of communication is over, the amount of pheromone is modified as per the <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref>. While the Greedy algorithm finds the next node <inline-formula id="ieqn-202"><mml:math id="mml-ieqn-202"><mml:msub><mml:mi>i</mml:mi><mml:mrow><mml:mtext>next</mml:mtext></mml:mrow></mml:msub></mml:math></inline-formula> by dividing the ratio of distance by the remaining energy using <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref>. This enables choices to be made on which nodes have the greatest residual energy with shortest communication distance hence enabling the load balance within the network. Algorithm 1 depicts the overall procedure of the present work. Initialization: The algorithm includes an initialization of pheromone levels, node energies, and location of the sink node. Ant Colony Optimization: The ACO builds energy efficient path probabilistically choosing nodes according to pheromone and heuristic information of distance and energy. Pheromone Update: New values of pheromones are determined by the energy-efficiency of the paths chosen by the ants. Greedy Node Selection: For every node in the route, the next node in the route is chosen using a greedy approach of the ratio of distance and residual energy. Energy Update: Each node&#x2019;s remaining energy is changed depending on the energy used for transmission and reception. Termination: The Markov chain algorithm stops running when the maximum number of iterations is achieved or an event such as the first node death occur.</p>
<p>The Algorithm 1 adapts to choose low power consumption paths with a nice trade off between pheromone quality and heuristic factor (node energy and distance). The Greedy algorithm implemented improves the selection of nodes with higher residual energy, avoiding the early exhaustion of some nodes. The method is extendable to larger networks since it is flexible to accommodate different numbers of nodes and structures The combined solution prolongs the network duration by maintaining optimal methods for choosing the shortest path as well as avoiding rapid discharge of nodes&#x2019; power sources. <xref ref-type="fig" rid="fig-3">Fig. 3</xref> illustrates the deployment stage, where the IoT-nodes with sink are used for data transmission.</p>
<fig id="fig-10">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-10.tif"/>
</fig>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Deployment of sensor nodes</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-3.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> illustrates the placement of IoT nodes initially done on a 2D area. The nodes are deployed randomly for example in a 100 m <inline-formula id="ieqn-216"><mml:math id="mml-ieqn-216"><mml:mo>&#x00D7;</mml:mo></mml:math></inline-formula> 100 m area while there is a sink node in the middle of the area. Nodes have a certain amount of energy at the start and the plot there provides a first look on the geographical positioning of the nodes for multi-hop communication. Without this plot one does not understand how the communication paths will be built because distances between the nodes must have implications into energy consumption. Architecture also lays the groundwork upon which the algorithm provision of path finding and energy consumption will be based.</p>

<p>This is reflected in <xref ref-type="fig" rid="fig-4">Fig. 4</xref> prove paths chosen by ants during the first iteration for applying ACO algorithm. In this case, every ant stands for a possible route of transmitting packets from source nodes to sink node. These paths are chosen stochastically in accordance with the initial grade of pheromone trails and heuristic knowledge of the problem domain including distance and energy storage. At this early stage, the paths selected are not very rich, for the pheromone trail has not been strengthened much yet. Special reference to this plot will make it easier to explain how the initial communication paths are established by considering a balance between distances between the nodes and their energy. From the formula for transition probability <inline-formula id="ieqn-217"><mml:math id="mml-ieqn-217"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, we are able to see both the distance heuristic <inline-formula id="ieqn-218"><mml:math id="mml-ieqn-218"><mml:msub><mml:mi>&#x03B7;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and the pheromone level <inline-formula id="ieqn-219"><mml:math id="mml-ieqn-219"><mml:msub><mml:mi>&#x03C4;</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> play an important role in path choices.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>ACO path-Iteration 1</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-4.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> also labels thicker lines or more intensive colors between some node pairs where paths are used more often because of their energy optimal. The pheromone update formula given by <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> plays an important role here. Those with less energy or shorter distances get more pheromone added with every iteration than the other paths, and hence, incoming iterations will try to follow the paths preferentially.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Pheromone level</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-5.tif"/>
</fig>
<p>As shown in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, it is expected that the nodes that were involved in the communication in one way or the other, by transmitting or forwarding packets, will have low residual energy than those nodes that did not participate in the communication. According to the Greedy algorithm the nodes closest to the base station are selected with more remaining energy, thus avoiding early death of nodes and prolonging the network life time.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Residual energy of the participated node</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-6.tif"/>
</fig>
<p>The final path chosen for data transmission from source nodes to the sink node using the equally tuned ACOGA algorithm is depicted in the <xref ref-type="fig" rid="fig-7">Fig. 7</xref>. In addition to it, the plot may display energy consumption of the network depending on the path. Appearing as straight lines running between nodes symbolizing the pathways which were active during the communication in the last phase. Nodes may or may not be colour coded or zoomed based on the residual amount of energy so that we can determine which nodes has used up more power or less power. It demonstrates the performance improvement brought about by the hybrid case, where both energy-efficient routes are chosen and nodes with higher residual energy are used for packet forwarding. The energy consumption profile assists in assessing the manner in which the load is distributed as well as the network lifetime that the algorithm offered. It shows that the ACO path reinforcement works well and that the Greedy approach is selecting energy-aware nodes.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Final path proposed by hybrid approach</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-7.tif"/>
</fig>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Result and Discussion</title>
<p>The ACOGA algorithm yields a minimum dead node ratio and therefore proves that it is more energy efficient since less number of nodes exhaust their energy. However, the ratio of that algorithm is lower than the Hybrid energy-efficient (HEE) algorithm [<xref ref-type="bibr" rid="ref-55">55</xref>] and ALDC algorithm [<xref ref-type="bibr" rid="ref-56">56</xref>], which suggests that these two algorithms achieve less efficient energy distribution. The evaluation of the proposed algorithm shows that it increases the network lifetime more than HEE and ALDC causing the first node die after a significantly large time. This is because the ACO selects the path out of the two available paths and the Greedy algorithm concentrates on the equal energy consumption. The proposed algorithm also denotes a higher capability in the preservation of a functional network relative to HEE and ALDC in that fifty percent of nodes live longer than their counterparts in those algorithms. This has proven the fact that hybrid architecture has better load balancing and energy saving mechanisms compared to the other options out of the four. ACOGA algorithm consumes 15% less energy than HEE illustrating optimization in path selection and the minimum number of transmissions. However, even better than ALDC, which outperforms HEE, the proposed method is better. ALDC performs marginally better in the realm of delay due to the fact that the proposed method was designed to compress data for efficient time transfer. But the presented ACOGA approach proposed compromise delay of 1.5 s although it balances energy usage and enhances network live time. Routing of a call is more inefficient in HEE case and hence the delays tend to be higher than when using intelligent electronic agent.</p>
<p>In the Greedy selection, the proposed algorithm guarantees that nodes utilize nearly an equal energy until the battery is depleted. While HEE delivers moderate performance, ALDC exhibits energy load imbalance where few nodes drain energy more quickly because of uneven compression loads. This proposed method a PDR of almost 98 % which shows that reliable packet delivery of packets is highly probable. HEE and ALDC PDR values are significantly lower than the other values because they encounter node failures more often, and paths are selected less efficiently. A major advantage of the proposed ACOGA algorithm is the path selection strategy, where the ACO showed the probabilistic path selection, while Greedy algorithm provided the optimal energy nodes selection. While implementing energy-awareness tasks, HEE shows reasonably good results but still cannot reach the level of optimization provided by ACO. ALDC optimizes the data compression field over routing which makes the path selection process less efficient. According to the analysis based on the significant industry parameters, it is clear that the proposed ACOGA algorithm is better than both HEE and ALDC in terms of network lifetime, dead node ratio, total energy consumption and path selection ratio. With a slight lower delay because of its compression, it causes less foldability in energy efficiency and network durability in ALDC. HEE had also been less optimal in terms of both energy and delay and hence the proposed method outperforms in enhancing energy efficiency in IoT networks. <xref ref-type="table" rid="table-4">Table 4</xref> presents the trade-off between proposed and existing methods.</p>
<table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Trade-off between proposed and existing methods</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr align="center">
<th align="center">Performance Factor</th>
<th align="center">Proposed Hybrid ACO-Greedy</th>
<th align="center">Hybrid Energy-Efficient (HEE)</th>
<th align="center">Adaptive Lossless Data Compression (ALDC)</th>
</tr>
</thead>
<tbody>
<tr align="center">
<td>Dead node ratio (after 500 rounds)</td>
<td>5%</td>
<td>15%</td>
<td>20%</td>
</tr>
<tr align="center">
<td>Network lifetime (rounds until first node dies)</td>
<td>1200 rounds</td>
<td>900 rounds</td>
<td>850 rounds</td>
</tr>
<tr align="center">
<td>Network lifetime (rounds until 50% of nodes die)</td>
<td>1500 rounds</td>
<td>1150 rounds</td>
<td>1100 rounds</td>
</tr>
<tr align="center">
<td>Overall energy consumption (Joules)</td>
<td>15% lower</td>
<td>Baseline</td>
<td>10% lower</td>
</tr>
<tr align="center">
<td>Delay (time per round, in seconds)</td>
<td>1.5 s</td>
<td>2.0 s</td>
<td>1.3 s</td>
</tr>
<tr align="center">
<td>Energy balance across nodes</td>
<td>Highly balanced</td>
<td>Moderately Balanced</td>
<td>Imbalanced (some nodes deplete energy faster)</td>
</tr>
<tr align="center">
<td>Packet Delivery Ratio (PDR)</td>
<td>98%</td>
<td>92%</td>
<td>90%</td>
</tr>
<tr align="center">
<td>Path selection efficiency</td>
<td>Highly efficient (ACO &#x0026; Greedy-based)</td>
<td>Moderate (Energy-aware)</td>
<td>Low (Focuses on Compression rather than Routing)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The composite graph in <xref ref-type="fig" rid="fig-8">Fig. 8</xref> provides a visual comparison of the proposed ACOGA algorithm against the HEE and ALDC algorithms across key performance factors: as primary features of comparison - Dead Node Ratio, Network Lifetime, Energy Consumption, and Delay per Round. In the Dead Node Ratio subplot the energy efficient algorithm proposed proved to be more efficient where only 5% were dead after certain rounds while in HEE and ALDC 15% and 20% respectively were dead. This could be explained by the fact that the distribution of energy consumption across the proposed algorithm is also very efficient. The Network Lifetime subplot shows that the proposed algorithm significantly outperforms in both metrics: the first node dies after passing 1200 rounds, the probabilities of 50% of nodes surviving reach up to 1500 rounds while nodes in HEE and ALDC fail early. This means that proposed method has longer operating cycle of network as compared to the traditional method of merging.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Trade-off between proposed and existing algorithms</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-8.tif"/>
</fig>
<p>Based on Energy Consumption, the proposed ACOGA algorithm outperforms the baseline (HEE) with 15% less energy consumption as compared to ALDC with a lower energy consumption profiling. This case of reduction in the energy utilization is an indication of the efficiency that is realized by the hybrid mode of operation. Lastly, the Delay per Round subplot represents the last aspect with ALDC having the lowest delay (1.3 s) however, the proposed method yields a good balance of mean delay (1.5 s). While HEE has higher delays of 2.0 s, thus it is less efficient than ACOGA. On the whole, the supplied composite graph evidently shows that the proposed ACOGA algorithm outperforms the other algorithms with respects to the energy efficiency factor, network lifetime, and energy consumption factor and similarly in a manner as far as, delay factor is concerned.</p>
<sec id="s5_1">
<label>5.1</label>
<title>Parameter Sensitivity Analysis</title>
<p>To evaluate the robustness and adaptability of the proposed ACO-Greedy algorithm, a parameter sensitivity analysis was performed. The focus was on three critical parameters: the pheromone evaporation rate (<inline-formula id="ieqn-220"><mml:math id="mml-ieqn-220"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula>), pheromone influence (<inline-formula id="ieqn-221"><mml:math id="mml-ieqn-221"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula>), and heuristic influence (<inline-formula id="ieqn-222"><mml:math id="mml-ieqn-222"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula>). Each parameter plays a vital role in shaping the search behavior and convergence characteristics of the ACO-based optimization process.</p>
<sec id="s5_1_1">
<label>5.1.1</label>
<title>Impact of Pheromone Evaporation Rate (<inline-formula id="ieqn-223"><mml:math id="mml-ieqn-223"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula>)</title>
<p>The pheromone evaporation rate governs how quickly the influence of past paths fades. A low value of <inline-formula id="ieqn-224"><mml:math id="mml-ieqn-224"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula> retains past knowledge longer, while a high value prioritizes recent exploration. As shown in the graph, increasing <inline-formula id="ieqn-225"><mml:math id="mml-ieqn-225"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula> from 0.1 to 0.9 leads to an initial improvement in network lifetime, peaking around <inline-formula id="ieqn-226"><mml:math id="mml-ieqn-226"><mml:mi>&#x03C1;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.5</mml:mn></mml:math></inline-formula>, beyond which performance declines. This trend indicates that moderate pheromone decay allows the algorithm to balance between exploration and exploitation effectively.</p>
</sec>
<sec id="s5_1_2">
<label>5.1.2</label>
<title>Impact of Pheromone Influence (<inline-formula id="ieqn-227"><mml:math id="mml-ieqn-227"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula>)</title>
<p>The parameter <inline-formula id="ieqn-228"><mml:math id="mml-ieqn-228"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> determines the emphasis on pheromone intensity during path selection. The analysis reveals that as <inline-formula id="ieqn-229"><mml:math id="mml-ieqn-229"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula> increases from 0.5 to 2.5, network lifetime improves until <inline-formula id="ieqn-230"><mml:math id="mml-ieqn-230"><mml:mi>&#x03B1;</mml:mi><mml:mo>&#x2248;</mml:mo><mml:mn>1.5</mml:mn></mml:math></inline-formula>, after which the performance begins to degrade. This demonstrates that too much reliance on pheromone trails can lead to premature convergence and stagnation, whereas too little undermines the learning effect of previous good paths.</p>
</sec>
<sec id="s5_1_3">
<label>5.1.3</label>
<title>Impact of Heuristic Influence (<inline-formula id="ieqn-231"><mml:math id="mml-ieqn-231"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula>)</title>
<p>The heuristic influence <inline-formula id="ieqn-232"><mml:math id="mml-ieqn-232"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> highlights the importance of domain-specific knowledge such as residual energy or proximity in routing decisions. The experiment shows that increasing <inline-formula id="ieqn-233"><mml:math id="mml-ieqn-233"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> positively influences network lifetime up to a threshold (<inline-formula id="ieqn-234"><mml:math id="mml-ieqn-234"><mml:mi>&#x03B2;</mml:mi><mml:mo>&#x2248;</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula>). Beyond this, excessive dependence on heuristics leads to under utilization of pheromone learning, reducing performance.</p>
<p>The sensitivity analysis in <xref ref-type="fig" rid="fig-9">Fig. 9</xref> confirms that the ACO-Greedy algorithm is sensitive to the proper tuning of its control parameters. The best performance was observed when <inline-formula id="ieqn-235"><mml:math id="mml-ieqn-235"><mml:mi>&#x03C1;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.5</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-236"><mml:math id="mml-ieqn-236"><mml:mi>&#x03B1;</mml:mi><mml:mo>=</mml:mo><mml:mn>1.5</mml:mn></mml:math></inline-formula>, and <inline-formula id="ieqn-237"><mml:math id="mml-ieqn-237"><mml:mi>&#x03B2;</mml:mi><mml:mo>=</mml:mo><mml:mn>2.0</mml:mn></mml:math></inline-formula>. These values offer a balanced trade-off between exploration of new paths and exploitation of learned optimal routes, leading to an extended network lifetime and efficient resource utilization.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Variations in the <inline-formula id="ieqn-238"><mml:math id="mml-ieqn-238"><mml:mi>&#x03B1;</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-239"><mml:math id="mml-ieqn-239"><mml:mi>&#x03B2;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-240"><mml:math id="mml-ieqn-240"><mml:mi>&#x03C1;</mml:mi></mml:math></inline-formula> impact on the average network lifetime through proposed ACO-Greedy algorithm</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMES_65599-fig-9.tif"/>
</fig>
</sec>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Scalability and Real-World Applicability of ACOGA</title>
<p>While the current simulation focuses on small to medium-sized IoT networks to validate the algorithmic behavior and performance, the ACOGA algorithm is designed with scalability in mind.</p>
<sec id="s5_2_1">
<label>5.2.1</label>
<title>Scalability Considerations</title>
<p><list list-type="bullet">
<list-item>
<p><bold>Distributed Decision-Making:</bold> ACOGA uses localized pheromone updates and greedy selection strategies, which limit the scope of decision-making to immediate neighborhoods. This reduces computational overhead and communication cost, making it scalable to larger networks.</p></list-item>
<list-item>
<p><bold>Cluster-Based Deployment:</bold> For very large-scale networks, ACOGA can be applied hierarchically by clustering nodes and executing the algorithm within each cluster. Inter-cluster communication can be managed via selected gateway nodes.</p></list-item>
<list-item>
<p><bold>Adaptive Parameters:</bold> The pheromone evaporation rate and greedy selection threshold can be dynamically adjusted based on network size and traffic load to maintain convergence in larger deployments.</p></list-item>
</list></p>
</sec>
<sec id="s5_2_2">
<label>5.2.2</label>
<title>Handling Network Heterogeneity</title>
<p>Real-world IoT networks often consist of heterogeneous devices with varying energy profiles, communication capabilities, and sensing intervals. ACOGA addresses heterogeneity through:
<list list-type="bullet">
<list-item>
<p><bold>Energy Weighting:</bold> The fitness function of ACOGA includes an energy-awareness factor that prioritizes nodes with higher residual energy, regardless of device type.</p></list-item>
<list-item>
<p><bold>Device Profiling:</bold> Devices can be profiled based on sensing type, energy budget, and criticality. These profiles help in defining customized routing paths that balance performance and longevity.</p></list-item>
<list-item>
<p><bold>Mobility and Topology Updates:</bold> For dynamic networks, ACOGA can be extended with periodic topology updates and pheromone reinforcement mechanisms that respond to node movement or failure.</p></list-item>
</list></p>
</sec>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Case Study of Smart Water Management System (SWMS) Using ACOGA Algorithm for IoT-Based Water Distribution Networks</title>
<p>In the contemporary society especially in both urban and rural areas, the proactivity of SWMS are mostly desirable in that they help in preventing wastage of water. These systems are based on IoT technology including sensors and intelligent devices for continual observation and data gathering for wise decision making. One of the primary issues in such systems is to transmit data between the IoT devices in an energy efficient manner so that the sensor nodes are not depleted often and need replacement of batteries frequently. Based on the proposed ACOGA algorithm, it can work on the routing paths with an optimal manner to allocate the energy and network lifetime and that&#x2019;s why is suitable for SWMS.</p>
<p>The ACOGA algorithm is developed here through combining the Ant Colony Optimization (ACO) technique and Greedy algorithm for the detection of data routing between IoT sensors used in a water management network. The ACO component guarantees that all the paths around the world for communication are explored and the Greedy Algorithm used will select the node according to energy available in that node thus helping in equal energy distribution around the network.</p>
<p><xref ref-type="table" rid="table-5">Table 5</xref> formulated by the ACOGA algorithm the optimization of energy consumption and network lifetime is highly efficient for the SWMS. Its service of carrying loads of data also prolongs the functional years of the network and perpetuates data stream from the peripheral nodes such as the sensors to the hub node.</p>
<table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Performance of SWMS with ACOGA algorithm</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr align="center">
<th>Performance metric</th>
<th>ACOGA</th>
<th>HEE</th>
<th>ALDC</th>
</tr>
</thead>
<tbody>
<tr align="center">
<td>Network lifetime (rounds)</td>
<td>1200</td>
<td>900</td>
<td>850</td>
</tr>
<tr align="center">
<td>Energy consumption (Joules)</td>
<td>85% of initial</td>
<td>100%</td>
<td>90%</td>
</tr>
<tr align="center">
<td>Average delay (seconds)</td>
<td>1.5</td>
<td>2.0</td>
<td>1.3</td>
</tr>
<tr align="center">
<td>Dead node ratio after 500 rounds</td>
<td>5%</td>
<td>15%</td>
<td>20%</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s7">
<label>7</label>
<title>Conclusions and Future Scope</title>
<p>IoT networks face major challenges in energy efficiency, network lifetime, and reliable data delivery. To address this, we proposed the ACOGA algorithm. Compared to HEE and ALDC, ACOGA delivers better results in several key areas. As per results, the dead node ratio stays below 5% even after 500 rounds. In contrast, HEE and ALDC show 15% and 20%, respectively. The network lifetime is also extended, with the first node dying after 1200 rounds. HEE and ALDC show lifespans of 900 and 850 rounds. This is mainly due to balanced energy use in ACOGA, leading to a 15% drop in total energy consumption. It also achieves a high packet delivery rate of 98%. Despite these strong results, the current work has limitations. The experiments use small, static networks. Real-world IoT networks are larger and more dynamic. The model also assumes ideal conditions, ignoring interference, packet loss, and node diversity. In the future, we plan to make the algorithm more dynamic using machine learning. This will help in predicting traffic, node failures, and adapting to changes. ACOGA can also be extended for heterogeneous IoT systems, where nodes differ in energy and communication range. Real-time data compression could further reduce energy use and delay. Another direction is adding adaptive mechanisms that adjust to network density and mobility. We also aim to test ACOGA on larger platforms like iFogSim or Cooja to study its behavior under real-world conditions.</p>
</sec>
</body>
<back>
<ack>
<p>This work was partially supported by the Center for Research of Ayandegan Institute of Higher Education, Tonekabon, Iran.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: Conceptualization, Pravinkumar Bhujangrao Landge and Hitesh Mohapatra; methodology, Pravinkumar Bhujangrao Landge; software, Hitesh Mohapatra; validation, Pravinkumar Bhujangrao Landge, Yashpal Singh and Seyyed Ahmad Edalatpanah; formal analysis, Pravinkumar Bhujangrao Landge; investigation, Pravinkumar Bhujangrao Landge; resources, Pravinkumar Bhujangrao Landge; data curation, Pravinkumar Bhujangrao Landge; writing&#x2014;original draft preparation, Pravinkumar Bhujangrao Landge; writing&#x2014;review and editing, Pravinkumar Bhujangrao Landge; visualization, Hitesh Mohapatra; supervision, Yashpal Singh and Hitesh Mohapatra; project administration, Seyyed Ahmad Edalatpanah; funding acquisition, Seyyed Ahmad Edalatpanah. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>This article does not involve data availability, and this section is not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>This study doesn&#x2019;t involve humans or animals.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The author declares no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yeduri</surname> <given-names>SR</given-names></string-name>, <string-name><surname>Chilamkurthy</surname> <given-names>NS</given-names></string-name>, <string-name><surname>Pandey</surname> <given-names>OJ</given-names></string-name>, <string-name><surname>Cenkeramaddi</surname> <given-names>LR</given-names></string-name></person-group>. <article-title>Energy and throughput management in delay-constrained small-world UAV-IoT network</article-title>. <source>IEEE Internet of Things J</source>. <year>2023</year>;<volume>10</volume>(<issue>9</issue>):<fpage>7922</fpage>&#x2013;<lpage>35</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2022.3231644</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kuthadi</surname> <given-names>VM</given-names></string-name>, <string-name><surname>Selvaraj</surname> <given-names>R</given-names></string-name>, <string-name><surname>Baskar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Shakeel</surname> <given-names>PM</given-names></string-name>, <string-name><surname>Ranjan</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Optimized energy management model on data distributing framework of wireless sensor network in IoT system</article-title>. <source>Wirel Pers Commun</source>. <year>2022</year>;<volume>127</volume>(<issue>2</issue>):<fpage>1377</fpage>&#x2013;<lpage>403</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-021-08583-0</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Mohanta</surname> <given-names>BK</given-names></string-name>, <string-name><surname>Nikoo</surname> <given-names>MR</given-names></string-name>, <string-name><surname>Daneshmand</surname> <given-names>M</given-names></string-name>, <string-name><surname>Gandomi</surname> <given-names>AH</given-names></string-name></person-group>. <article-title>MCDM-based routing for IoT-enabled smart water distribution network</article-title>. <source>IEEE Internet of Things J</source>. <year>2023</year>;<volume>10</volume>(<issue>5</issue>):<fpage>4271</fpage>&#x2013;<lpage>80</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2022.3216402</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lenka</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Al-Turjman</surname> <given-names>F</given-names></string-name>, <string-name><surname>Altrjman</surname> <given-names>C</given-names></string-name></person-group>. <article-title>A review of energy saving routing schemes for WSN assisted IoT network</article-title>. <source>Int J Emer Elect Power Syst</source>. <year>2023</year>;<volume>24</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>11</lpage>. doi:<pub-id pub-id-type="doi">10.1515/ijeeps-2022-0104</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Rath</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>A fault tolerant routing scheme for advanced metering infrastructure: an approach towards smart grid</article-title>. <source>Cluster Comput</source>. <year>2021</year>;<volume>24</volume>(<issue>3</issue>):<fpage>2193</fpage>&#x2013;<lpage>211</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s10586-021-03255-x</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>khmas</surname> <given-names>Bf</given-names></string-name>, <string-name><surname>ALjawahery</surname> <given-names>Af</given-names></string-name>, <string-name><surname>Ibrahim</surname> <given-names>AA</given-names></string-name></person-group>. <article-title>Efficient energy management in smart homes using IoT-based low-power wide-area network (LoRaWAN) protocol</article-title>. In: <conf-name>2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)</conf-name>; <year>2020 Oct 22&#x2013;24</year>; <publisher-loc>Istanbul, Turkey</publisher-loc>. p. <fpage>1</fpage>&#x2013;<lpage>8</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ISMSIT50672.2020.9254942</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Anchitaalagammai</surname> <given-names>J</given-names></string-name>, <string-name><surname>Jayasankar</surname> <given-names>T</given-names></string-name>, <string-name><surname>Selvaraj</surname> <given-names>P</given-names></string-name>, <string-name><surname>Sikkandar</surname> <given-names>MY</given-names></string-name>, <string-name><surname>Zakarya</surname> <given-names>M</given-names></string-name>, <string-name><surname>Elhoseny</surname> <given-names>M</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Energy efficient cluster-based optimal resource management in IoT environment</article-title>. <source>Comput Mater Contin</source>. <year>2022</year>;<volume>70</volume>(<issue>1</issue>):<fpage>1247</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.32604/cmc.2022.017910</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Rath</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>Survey on fault tolerance-based clustering evolution in WSN</article-title>. <source>IET Netw</source>. <year>2020</year>;<volume>9</volume>(<issue>4</issue>):<fpage>145</fpage>&#x2013;<lpage>55</lpage>. doi:<pub-id pub-id-type="doi">10.1049/iet-net.2019.0155</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mishra</surname> <given-names>M</given-names></string-name>, <string-name><surname>Gupta</surname> <given-names>GS</given-names></string-name>, <string-name><surname>Gui</surname> <given-names>X</given-names></string-name></person-group>. <article-title>Network lifetime improvement through energy-efficient hybrid routing protocol for IoT applications</article-title>. <source>Sensors</source>. <year>2021</year>;<volume>21</volume>(<issue>22</issue>):<fpage>7439</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s21227439</pub-id>; <pub-id pub-id-type="pmid">34833516</pub-id></mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Guiloufi</surname> <given-names>AB</given-names></string-name>, <string-name><surname>El Khediri</surname> <given-names>S</given-names></string-name>, <string-name><surname>Nasri</surname> <given-names>N</given-names></string-name>, <string-name><surname>Kachouri</surname> <given-names>A</given-names></string-name></person-group>. <article-title>A comparative study of energy efficient algorithms for IoT applications based on WSNs</article-title>. <source>Multimed Tools Appl</source>. <year>2023</year>;<volume>82</volume>(<issue>27</issue>):<fpage>42239</fpage>&#x2013;<lpage>75</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-023-14813-3</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sharmin</surname> <given-names>A</given-names></string-name>, <string-name><surname>Anwar</surname> <given-names>F</given-names></string-name>, <string-name><surname>Motakabber</surname> <given-names>SMA</given-names></string-name>, <string-name><surname>Hashim</surname> <given-names>AHA</given-names></string-name></person-group>. <article-title>Secure ACO-based wireless sensor network routing algorithm for IoT</article-title>. In: <conf-name>2021 8th International Conference on Computer and Communication Engineering (ICCCE)</conf-name>; <year>2021 Jun 22&#x2013;23</year>; <publisher-loc>Kuala Lumpur, Malaysia</publisher-loc>. p. <fpage>190</fpage>&#x2013;<lpage>5</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ICCCE50029.2021.9467223</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jannu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Dara</surname> <given-names>S</given-names></string-name>, <string-name><surname>Thuppari</surname> <given-names>C</given-names></string-name>, <string-name><surname>Vidyarthi</surname> <given-names>A</given-names></string-name>, <string-name><surname>Ghosh</surname> <given-names>D</given-names></string-name>, <string-name><surname>Tiwari</surname> <given-names>P</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Energy efficient quantum-informed ant colony optimization algorithms for industrial Internet of Things</article-title>. <source>IEEE Trans Artif Intell</source>. <year>2024</year>;<volume>5</volume>(<issue>3</issue>):<fpage>1077</fpage>&#x2013;<lpage>86</lpage>. doi:<pub-id pub-id-type="doi">10.1109/tai.2022.3220186</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Lakshmanna</surname> <given-names>K</given-names></string-name>, <string-name><surname>Subramani</surname> <given-names>N</given-names></string-name>, <string-name><surname>Alotaibi</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Alghamdi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Khalafand</surname> <given-names>OI</given-names></string-name>, <string-name><surname>Nanda</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>Improved metaheuristic-driven energy-aware cluster-based routing scheme for IoT-assisted wireless sensor networks</article-title>. <source>Sustainability</source>. <year>2022</year>;<volume>14</volume>(<issue>13</issue>):<fpage>7712</fpage>. doi:<pub-id pub-id-type="doi">10.3390/su14137712</pub-id>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sagu</surname> <given-names>A</given-names></string-name>, <string-name><surname>Gill</surname> <given-names>NS</given-names></string-name>, <string-name><surname>Gulia</surname> <given-names>P</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>PK</given-names></string-name>, <string-name><surname>Hong</surname> <given-names>WC</given-names></string-name></person-group>. <article-title>Design of metaheuristic optimization algorithms for deep learning model for secure IoT environment</article-title>. <source>Sustainability</source>. <year>2023</year>;<volume>15</volume>(<issue>3</issue>):<fpage>2204</fpage>. doi:<pub-id pub-id-type="doi">10.3390/su15032204</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>N</given-names></string-name>, <string-name><surname>Paliwal</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Deterministic approach-based energy management of smart microgrids</article-title>. In: <conf-name>2023 International Conference on Power, Instrumentation, Energy and Control (PIECON)</conf-name>; <year>2023 Feb 10&#x2013;12</year>; <publisher-loc>Aligarh, India</publisher-loc>. p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi:<pub-id pub-id-type="doi">10.1109/PIECON56912.2023.10085904</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kabirifar</surname> <given-names>M</given-names></string-name>, <string-name><surname>Pourghaderi</surname> <given-names>N</given-names></string-name>, <string-name><surname>Rajaei</surname> <given-names>A</given-names></string-name>, <string-name><surname>Moeini-Aghtaie</surname> <given-names>M</given-names></string-name>, <string-name><surname>Safdarian</surname> <given-names>A</given-names></string-name></person-group>. <chapter-title>Deterministic and probabilistic models for energy management in distribution systems</chapter-title>. In: <source>Handbook of optimization in electric power distribution systems</source>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2020</year>. p. <fpage>343</fpage>&#x2013;<lpage>82</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-030-36115-0_12</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abdul-Qawy</surname> <given-names>ASH</given-names></string-name>, <string-name><surname>Almurisi</surname> <given-names>NMS</given-names></string-name>, <string-name><surname>Tadisetty</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Classification of energy saving techniques for IoT-based heterogeneous wireless nodes</article-title>. <source>Procedia Comput Sci</source>. <year>2020</year>;<volume>171</volume>(<issue>4</issue>):<fpage>2590</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.procs.2020.04.281</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Qian</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>F</given-names></string-name></person-group>. <article-title>An reactive void handling algorithm in sensor networks and IoT emergency management</article-title>. <source>Comput Commun</source>. <year>2020</year>;<volume>150</volume>(<issue>2</issue>):<fpage>254</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comcom.2019.11.010</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hameed</surname> <given-names>AR</given-names></string-name>, <string-name><surname>ul Islam</surname> <given-names>S</given-names></string-name>, <string-name><surname>Raza</surname> <given-names>M</given-names></string-name>, <string-name><surname>Khattak</surname> <given-names>HA</given-names></string-name></person-group>. <article-title>Towards energy and performance-aware geographic routing for IoT-enabled sensor networks</article-title>. <source>Comput Elect Eng</source>. <year>2020</year>;<volume>85</volume>:<fpage>106643</fpage>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Besher</surname> <given-names>KM</given-names></string-name>, <string-name><surname>Nieto-Hipolito</surname> <given-names>JI</given-names></string-name>, <string-name><surname>Buenrostro-Mariscal</surname> <given-names>R</given-names></string-name>, <string-name><surname>Ali</surname> <given-names>MZ</given-names></string-name></person-group>. <article-title>Spectrum based power management for congested IoT networks</article-title>. <source>Sensors</source>. <year>2021</year>;<volume>21</volume>(<issue>8</issue>):<fpage>2681</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s21082681</pub-id>; <pub-id pub-id-type="pmid">33920253</pub-id></mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Koz&#x0142;owski</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sosnowski</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Energy efficiency trade-off between duty-cycling and wake-up radio techniques in IoT networks</article-title>. <source>Wire Pers Commun</source>. <year>2019</year>;<volume>107</volume>(<issue>4</issue>):<fpage>1951</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-019-06368-0</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abdulzahra</surname> <given-names>AMK</given-names></string-name>, <string-name><surname>Al-Qurabat</surname> <given-names>AKM</given-names></string-name>, <string-name><surname>Abdulzahra</surname> <given-names>SA</given-names></string-name></person-group>. <article-title>Optimizing energy consumption in WSN-based IoT using unequal clustering and sleep scheduling methods</article-title>. <source>Internet Things</source>. <year>2023</year>;<volume>22</volume>(<issue>1</issue>):<fpage>100765</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2023.100765</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Agubor</surname> <given-names>CK</given-names></string-name>, <string-name><surname>Akande</surname> <given-names>AO</given-names></string-name>, <string-name><surname>Opara</surname> <given-names>CR</given-names></string-name></person-group>. <article-title>On-off switching and sleep-mode energy management techniques in 5G mobile wireless communications&#x2014;a review</article-title>. <source>IJ Wirel Microw Technol</source>. <year>2022</year>;<volume>6</volume>:<fpage>40</fpage>&#x2013;<lpage>7</lpage>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Garah</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mbarek</surname> <given-names>N</given-names></string-name>, <string-name><surname>Kirgizov</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Enhancing IoT data confidentiality and energy efficiency through decision tree-based self-management</article-title>. <source>Internet Things</source>. <year>2024</year>;<volume>26</volume>(<issue>4</issue>):<fpage>101219</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2024.101219</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Miao</surname> <given-names>L</given-names></string-name>, <string-name><surname>Huo</surname> <given-names>ZM</given-names></string-name>, <string-name><surname>Rong</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Mu</surname> <given-names>HW</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>ZX</given-names></string-name></person-group>. <article-title>IoT adaptive threshold energy management algorithm based on energy harvesting</article-title>. <source>Ad Hoc Netw</source>. <year>2023</year>;<volume>149</volume>(<issue>6</issue>):<fpage>103241</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.adhoc.2023.103241</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Limkar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Ashok</surname> <given-names>WV</given-names></string-name>, <string-name><surname>Wadne</surname> <given-names>V</given-names></string-name>, <string-name><surname>Wagh</surname> <given-names>SK</given-names></string-name>, <string-name><surname>Wagh</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Energy-efficient localization techniques for wireless sensor networks in indoor IoT environments</article-title>. <source>J Elect Syst</source>. <year>2023</year>;<volume>19</volume>(<issue>2</issue>):<fpage>47</fpage>. doi:<pub-id pub-id-type="doi">10.52783/jes.690</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sharma</surname> <given-names>V</given-names></string-name>, <string-name><surname>Tripathi</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>A systematic review of meta-heuristic algorithms in IoT based application</article-title>. <source>Array</source>. <year>2022</year>;<volume>14</volume>(<issue>1</issue>):<fpage>100164</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.array.2022.100164</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Rath</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>Fault-tolerant mechanism for wireless sensor network</article-title>. <source>IET Wire Sens Syst</source>. <year>2020</year>;<volume>10</volume>(<issue>1</issue>):<fpage>23</fpage>&#x2013;<lpage>30</lpage>. doi:<pub-id pub-id-type="doi">10.1049/iet-wss.2019.0106</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Rath</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>An IoT based efficient multi-objective real-time smart parking system</article-title>. <source>Int J Sens Netw</source>. <year>2021</year>;<volume>37</volume>(<issue>4</issue>):<fpage>219</fpage>&#x2013;<lpage>32</lpage>. doi:<pub-id pub-id-type="doi">10.1504/ijsnet.2021.119483</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Javaid</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Computationally efficient topology optimization of scale-free IoT networks</article-title>. <source>Comput Commun</source>. <year>2022</year>;<volume>185</volume>(<issue>6</issue>):<fpage>1</fpage>&#x2013;<lpage>12</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.comcom.2021.12.013</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ding</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Shen</surname> <given-names>L</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>H</given-names></string-name>, <string-name><surname>Yan</surname> <given-names>F</given-names></string-name>, <string-name><surname>Ansari</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Energy-efficient topology control mechanism for IoT-oriented software-defined WSNs</article-title>. <source>IEEE Internet Things J</source>. <year>2023</year>;<volume>10</volume>(<issue>15</issue>):<fpage>13138</fpage>&#x2013;<lpage>54</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2023.3260802</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Li</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Gao</surname> <given-names>H</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Han</surname> <given-names>Z</given-names></string-name></person-group>. <article-title>Residual energy maximization-based resource allocation in wireless-powered edge computing industrial IoT</article-title>. <source>IEEE Internet Things J</source>. <year>2021</year>;<volume>8</volume>(<issue>24</issue>):<fpage>17678</fpage>&#x2013;<lpage>90</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2021.3082161</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mishra</surname> <given-names>P</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Godfrey</surname> <given-names>WW</given-names></string-name></person-group>. <article-title>An evolutionary computing-based energy-efficient solution for IoT-enabled software-defined sensor network architecture</article-title>. <source>Int J Commun Syst</source>. <year>2022</year>;<volume>35</volume>(<issue>8</issue>):<fpage>e5111</fpage>. doi:<pub-id pub-id-type="doi">10.1002/dac.5111</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Amutha</surname> <given-names>J</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>SK</given-names></string-name></person-group>. <article-title>An energy efficient cluster based hybrid optimization algorithm with static sink and mobile sink node for Wireless Sensor Networks</article-title>. <source>Expert Syst Appl</source>. <year>2022</year>;<volume>203</volume>(<issue>8</issue>):<fpage>117334</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eswa.2022.117334</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Han</surname> <given-names>G</given-names></string-name>, <string-name><surname>Liao</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Mart&#x00ED;nez-Garc&#x00ED;a</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Dynamic collaborative charging algorithm for mobile and static nodes in Industrial Internet of Things</article-title>. <source>IEEE Internet Things J</source>. <year>2021</year>;<volume>8</volume>(<issue>24</issue>):<fpage>17747</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jiot.2021.3082633</pub-id>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Nair</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kulkarni</surname> <given-names>J</given-names></string-name>, <string-name><surname>Warde</surname> <given-names>M</given-names></string-name>, <string-name><surname>Dave</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Rawalgaonkar</surname> <given-names>V</given-names></string-name>, <string-name><surname>Gore</surname> <given-names>G</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Optimizing power consumption in IoT based wireless sensor networks using Bluetooth Low Energy</article-title>. In: <conf-name>2015 International Conference on Green Computing and Internet of Things (ICGCIoT)</conf-name>; <year>2015 Oct 8&#x2013;10</year>; <publisher-loc>Greater Noida, India</publisher-loc>. p. <fpage>589</fpage>&#x2013;<lpage>93</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ICGCIoT.2015.7380533</pub-id>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sennan</surname> <given-names>S</given-names></string-name>, <string-name><surname>Balasubramaniyam</surname> <given-names>S</given-names></string-name>, <string-name><surname>Luhach</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Ramasubbareddy</surname> <given-names>S</given-names></string-name>, <string-name><surname>Chilamkurti</surname> <given-names>N</given-names></string-name>, <string-name><surname>Nam</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Energy and delay aware data aggregation in routing protocol for Internet of Things</article-title>. <source>Sensors</source>. <year>2019</year>;<volume>19</volume>(<issue>24</issue>):<fpage>5486</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s19245486</pub-id>; <pub-id pub-id-type="pmid">31842437</pub-id></mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sankar</surname> <given-names>S</given-names></string-name>, <string-name><surname>Srinivasan</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Mobility and energy aware routing protocol for healthcare IoT application</article-title>. <source>Res J Pharm Technol</source>. <year>2018</year>;<volume>11</volume>(<issue>7</issue>):<fpage>3139</fpage>&#x2013;<lpage>44</lpage>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Balachandran Nair Premakumari</surname> <given-names>S</given-names></string-name>, <string-name><surname>Mohan</surname> <given-names>P</given-names></string-name>, <string-name><surname>Subramanian</surname> <given-names>K</given-names></string-name></person-group>. <article-title>An enhanced localization approach for energy conservation in wireless sensor network with Q deep learning algorithm</article-title>. <source>Symmetry</source>. <year>2022</year>;<volume>14</volume>(<issue>12</issue>):<fpage>2515</fpage>. doi:<pub-id pub-id-type="doi">10.3390/sym14122515</pub-id>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Aldin</surname> <given-names>HNS</given-names></string-name>, <string-name><surname>Ghods</surname> <given-names>MR</given-names></string-name>, <string-name><surname>Nayebipour</surname> <given-names>F</given-names></string-name>, <string-name><surname>Torshiz</surname> <given-names>MN</given-names></string-name></person-group>. <article-title>A comprehensive review of energy harvesting and routing strategies for IoT sensors sustainability and communication technology</article-title>. <source>Sens Int</source>. <year>2024</year>;<volume>2023</volume>(<issue>2</issue>):<fpage>100258</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.sintl.2023.100258</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khan</surname> <given-names>SB</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Mashat</surname> <given-names>A</given-names></string-name>, <string-name><surname>Pruthviraja</surname> <given-names>D</given-names></string-name>, <string-name><surname>Imam Rahmani</surname> <given-names>MK</given-names></string-name>, <string-name><surname>Mathew</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Artificial Intelligence in next-generation networking: energy efficiency optimization in IoT networks using hybrid LEACH Protocol</article-title>. <source>SN Comput Sci</source>. <year>2024</year>;<volume>5</volume>(<issue>5</issue>):<fpage>546</fpage>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Khriji</surname> <given-names>S</given-names></string-name>, <string-name><surname>Houssaini</surname> <given-names>DE</given-names></string-name>, <string-name><surname>Kammoun</surname> <given-names>I</given-names></string-name>, <string-name><surname>Besbes</surname> <given-names>K</given-names></string-name>, <string-name><surname>Kanoun</surname> <given-names>O</given-names></string-name></person-group>. <article-title>Energy-efficient routing algorithm based on localization and clustering techniques for agricultural applications</article-title>. <source>IEEE Aeros Elect Syst Mag</source>. <year>2019</year>;<volume>34</volume>(<issue>3</issue>):<fpage>56</fpage>&#x2013;<lpage>66</lpage>. doi:<pub-id pub-id-type="doi">10.1109/maes.2019.2905947</pub-id>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name>, <string-name><surname>Rath</surname> <given-names>AK</given-names></string-name></person-group>. <article-title>Fault tolerance in WSN through PE-LEACH protocol</article-title>. <source>IET Wire Sens Syst</source>. <year>2019</year>;<volume>9</volume>(<issue>6</issue>):<fpage>358</fpage>&#x2013;<lpage>65</lpage>. doi:<pub-id pub-id-type="doi">10.1049/iet-wss.2018.5229</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Shen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>A</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Hung</surname> <given-names>PCK</given-names></string-name>, <string-name><surname>Lai</surname> <given-names>CF</given-names></string-name></person-group>. <article-title>An efficient centroid-based routing protocol for energy management in WSN-assisted IoT</article-title>. <source>IEEE Access</source>. <year>2017</year>;<volume>5</volume>:<fpage>18469</fpage>&#x2013;<lpage>79</lpage>. doi:<pub-id pub-id-type="doi">10.1109/access.2017.2749606</pub-id>.</mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Memon</surname> <given-names>I</given-names></string-name>, <string-name><surname>Hasan</surname> <given-names>MK</given-names></string-name>, <string-name><surname>Shaikh</surname> <given-names>RA</given-names></string-name>, <string-name><surname>Nebhen</surname> <given-names>J</given-names></string-name>, <string-name><surname>Bakar</surname> <given-names>KAA</given-names></string-name>, <string-name><surname>Hossain</surname> <given-names>E</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Energy-efficient fuzzy management system for internet of things connected vehicular ad hoc networks</article-title>. <source>Electronics</source>. <year>2021</year>;<volume>10</volume>(<issue>9</issue>):<fpage>1068</fpage>. doi:<pub-id pub-id-type="doi">10.3390/electronics10091068</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mansouri</surname> <given-names>M</given-names></string-name>, <string-name><surname>Leghris</surname> <given-names>C</given-names></string-name></person-group>. <article-title>New Manhattan distance-based fuzzy MADM method for the network selection</article-title>. <source>IET Commun</source>. <year>2019</year>;<volume>13</volume>(<issue>13</issue>):<fpage>1980</fpage>&#x2013;<lpage>7</lpage>. doi:<pub-id pub-id-type="doi">10.1049/iet-com.2018.5454</pub-id>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Santos</surname> <given-names>BP</given-names></string-name>, <string-name><surname>Goussevskaia</surname> <given-names>O</given-names></string-name>, <string-name><surname>Vieira</surname> <given-names>LF</given-names></string-name>, <string-name><surname>Vieira</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Loureiro</surname> <given-names>AA</given-names></string-name></person-group>. <article-title>Mobile matrix: routing under mobility in IoT, IoMT, and social IoT</article-title>. <source>Ad Hoc Netw</source>. <year>2018</year>;<volume>78</volume>(<issue>16</issue>):<fpage>84</fpage>&#x2013;<lpage>98</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.adhoc.2018.05.012</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Muzammal</surname> <given-names>SM</given-names></string-name>, <string-name><surname>Murugesan</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Jhanjhi</surname> <given-names>N</given-names></string-name>, <string-name><surname>Hossain</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Yassine</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Trust and mobility-based protocol for secure routing in Internet of Things</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>16</issue>):<fpage>6215</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22166215</pub-id>; <pub-id pub-id-type="pmid">36015975</pub-id></mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chandnani</surname> <given-names>N</given-names></string-name>, <string-name><surname>Khairnar</surname> <given-names>CN</given-names></string-name></person-group>. <article-title>A comprehensive review and performance evaluation of recent trends for data aggregation and routing techniques in IoT networks</article-title>. In: <person-group person-group-type="editor"><string-name><surname>Shukla</surname> <given-names>R</given-names></string-name>, <string-name><surname>Agrawal</surname> <given-names>J</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>S</given-names></string-name>, <string-name><surname>Chaudhari</surname> <given-names>N</given-names></string-name>, <string-name><surname>Shukla</surname> <given-names>K</given-names></string-name></person-group>, editors. <conf-name>Social networking and computational intelligence</conf-name>; <source>lecture notes in networks and systems</source>. Vol. <volume>100</volume>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2020</year>. p. <fpage>467</fpage>&#x2013;<lpage>84</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-981-15-2071-6_37</pub-id>.</mixed-citation></ref>
<ref id="ref-50"><label>[50]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Yousefi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Karimipour</surname> <given-names>H</given-names></string-name>, <string-name><surname>Derakhshan</surname> <given-names>F</given-names></string-name></person-group>. <article-title>Data aggregation mechanisms on the internet of things: a systematic literature review</article-title>. <source>Internet Things</source>. <year>2021</year>;<volume>15</volume>:<fpage>100427</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.iot.2021.100427</pub-id>.</mixed-citation></ref>
<ref id="ref-51"><label>[51]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Subramani</surname> <given-names>N</given-names></string-name>, <string-name><surname>Mohan</surname> <given-names>P</given-names></string-name>, <string-name><surname>Alotaibi</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Alghamdi</surname> <given-names>S</given-names></string-name>, <string-name><surname>Khalaf</surname> <given-names>OI</given-names></string-name></person-group>. <article-title>An efficient metaheuristic-based clustering with routing protocol for underwater wireless sensor networks</article-title>. <source>Sensors</source>. <year>2022</year>;<volume>22</volume>(<issue>2</issue>):<fpage>415</fpage>. doi:<pub-id pub-id-type="doi">10.3390/s22020415</pub-id>; <pub-id pub-id-type="pmid">35062376</pub-id></mixed-citation></ref>
<ref id="ref-52"><label>[52]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Iwendi</surname> <given-names>C</given-names></string-name>, <string-name><surname>Maddikunta</surname> <given-names>PKR</given-names></string-name>, <string-name><surname>Gadekallu</surname> <given-names>TR</given-names></string-name>, <string-name><surname>Lakshmanna</surname> <given-names>K</given-names></string-name>, <string-name><surname>Bashir</surname> <given-names>AK</given-names></string-name>, <string-name><surname>Piran</surname> <given-names>MJ</given-names></string-name></person-group>. <article-title>A metaheuristic optimization approach for energy efficiency in the IoT networks</article-title>. <source>Softw Pract Exp</source>. <year>2021</year>;<volume>51</volume>(<issue>12</issue>):<fpage>2558</fpage>&#x2013;<lpage>71</lpage>. doi:<pub-id pub-id-type="doi">10.1002/spe.2797</pub-id>.</mixed-citation></ref>
<ref id="ref-53"><label>[53]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>S</given-names></string-name>, <string-name><surname>Nandan</surname> <given-names>AS</given-names></string-name>, <string-name><surname>Malik</surname> <given-names>A</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>N</given-names></string-name>, <string-name><surname>Barnawi</surname> <given-names>A</given-names></string-name></person-group>. <article-title>An energy-efficient modified metaheuristic inspired algorithm for disaster management system using WSNs</article-title>. <source>IEEE Sens J</source>. <year>2021</year>;<volume>21</volume>(<issue>13</issue>):<fpage>15398</fpage>&#x2013;<lpage>408</lpage>. doi:<pub-id pub-id-type="doi">10.1109/jsen.2021.3074497</pub-id>.</mixed-citation></ref>
<ref id="ref-54"><label>[54]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dohare</surname> <given-names>I</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>K</given-names></string-name></person-group>. <article-title>PSO-DEC: PSO based deterministic energy efficient clustering protocol for IoT</article-title>. <source>J Discrete Math Sci Crypto</source>. <year>2019</year>;<volume>22</volume>(<issue>8</issue>):<fpage>1463</fpage>&#x2013;<lpage>75</lpage>. doi:<pub-id pub-id-type="doi">10.1080/09720529.2019.1695898</pub-id>.</mixed-citation></ref>
<ref id="ref-55"><label>[55]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Razaque</surname> <given-names>A</given-names></string-name>, <string-name><surname>Jararweh</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Alotaibi</surname> <given-names>B</given-names></string-name>, <string-name><surname>Alotaibi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Almiani</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Hybrid energy-efficient algorithm for efficient internet of things deployment</article-title>. <source>Sustain Comput Inform Syst</source>. <year>2022</year>;<volume>35</volume>(<issue>1</issue>):<fpage>100715</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.suscom.2022.100715</pub-id>.</mixed-citation></ref>
<ref id="ref-56"><label>[56]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kolo</surname> <given-names>JG</given-names></string-name>, <string-name><surname>Shanmugam</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Lim</surname> <given-names>DWG</given-names></string-name>, <string-name><surname>Ang</surname> <given-names>LM</given-names></string-name>, <string-name><surname>Seng</surname> <given-names>KP</given-names></string-name></person-group>. <article-title>An adaptive lossless data compression scheme for wireless sensor networks</article-title>. <source>J Sens</source>. <year>2012</year>;<volume>2012</volume>(<issue>1</issue>):<fpage>539638</fpage>&#x2013;<lpage>20</lpage>. doi:<pub-id pub-id-type="doi">10.1155/2012/539638</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>