<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">IASC</journal-id>
<journal-id journal-id-type="nlm-ta">IASC</journal-id>
<journal-id journal-id-type="publisher-id">IASC</journal-id>
<journal-title-group>
<journal-title>Intelligent Automation &#x0026; Soft Computing</journal-title>
</journal-title-group>
<issn pub-type="epub">2326-005X</issn>
<issn pub-type="ppub">1079-8587</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">30278</article-id>
<article-id pub-id-type="doi">10.32604/iasc.2023.030278</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks</article-title><alt-title alt-title-type="left-running-head">Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks</alt-title><alt-title alt-title-type="right-running-head">Secure and Energy Concise Route Revamp Technique in Wireless Sensor Networks</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Udhaya Sankar</surname><given-names>S. M.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><email>udhaya3@gmail.com</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Christo</surname><given-names>Mary Subaja</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Uma Priyadarsini</surname><given-names>P. S.</given-names></name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Department of Information Technology, Velammal Institute of Technology</institution>, <addr-line>Chennai, 601204</addr-line>, <country>India</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Networking and Communication, SRM Institute of Science and Technology</institution>, <addr-line>Kattankulathur, 603203</addr-line>, <country>India</country></aff>
<aff id="aff-3"><label>3</label><institution>Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences</institution>, <addr-line>Chennai, 600124</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: S. M. Udhaya Sankar. Email: <email>udhaya3@gmail.com</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-06-20"><day>20</day>
<month>06</month>
<year>2022</year></pub-date>
<volume>35</volume>
<issue>2</issue>
<fpage>2337</fpage>
<lpage>2351</lpage>
<history>
<date date-type="received"><day>22</day><month>3</month><year>2022</year></date>
<date date-type="accepted"><day>22</day><month>4</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Udhaya Sankar, Christo, Uma Priyadarsini, </copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Udhaya Sankar, Christo, Uma Priyadarsini, </copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_IASC_30278.pdf"></self-uri>
<abstract>
<p>Energy conservation has become a significant consideration in wireless sensor networks (WSN). In the sensor network, the sensor nodes have internal batteries, and as a result, they expire after a certain period. As a result, expanding the life duration of sensing devices by improving data depletion in an effective and sustainable energy-efficient way remains a challenge. Also, the clustering strategy employs to enhance or extend the life cycle of WSNs. We identify the supervisory head node (SH) or cluster head (CH) in every grouping considered the feasible strategy for power-saving route discovery in the clustering model, which diminishes the communication overhead in the WSN. However, the critical issue was determining the best SH for ensuring timely communication services. Our secure and energy concise route revamp technology (SECRET) protocol involves selecting an energy-concise cluster head (ECH) and route revamping to optimize navigation. The sensors transmit information over the ECH, which delivers the information to the base station <italic>via</italic> the determined optimal path using our strategy for effective data transmission. We modeled our methods to accomplish power-efficient multi-hop routing. Furthermore, protected navigation helps to preserve energy when routing. The suggested solution improves energy savings, packet delivery ratio (PDR), route latency (RL), network lifetime (NL), and scalability.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Wireless sensor network</kwd>
<kwd>wireless security</kwd>
<kwd>wireless routing</kwd>
<kwd>clustering</kwd>
<kwd><italic>ad hoc</italic> network</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>WSNs have various applications in several fields [<xref ref-type="bibr" rid="ref-1">1</xref>&#x2013;<xref ref-type="bibr" rid="ref-3">3</xref>]. Batteries usually give power to the sensor. They are small and affordable devices that capture valuable data and send it across wireless networks from the source region to sink nodes. The cells in these sensing nodes, on the other hand, are not interchangeable. The link terminates due to charge degradation. These sensors can communicate with one another or with the sink directly. As a result, optimize resource allocation and node interaction to lengthen the lifespan of the channel.</p>
<p>Furthermore, due to the limited computational capabilities and buffer features of WSNs, various challenges exist. A selection of appropriate limitations, routing techniques to reduce the power consumption, and grouping to ensure correct network functioning are some of the multiple methods to lengthen network life [<xref ref-type="bibr" rid="ref-4">4</xref>&#x2013;<xref ref-type="bibr" rid="ref-7">7</xref>]. WSN routing techniques divide into two categories: multilevel routing and flat routing. The balanced routing algorithm considers all terminals simple because they are all placed at the same tier. Furthermore, restrictions over scalability because of the overhead packet management, and as the channel capacity grows, it increases energy usage. Therefore, the system divides into clusters according to hierarchical routing. Every group has a CH node, which collects data from different nodes in the group and transmits it to the access point. As a result, extending the network duration and the energy demand in WSN is optimally balanced. When evaluating the efficiency and versatility of flat <italic>vs.</italic> multilevel routing protocols, hierarchical (multilevel) routing protocols stand ahead&#x2014;many researchers and scientists concentrating on cluster-based routing strategies [<xref ref-type="bibr" rid="ref-8">8</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>].</p>
<p>WSNs, on either hand, focuses primarily on how to advance energy conservation while minimizing transmission overhead expenses. Scalability, low costs, accuracy, stability, and ease of delivery are significant benefits of WSN applications over traditional network technology. However, power utilization is a unique resource in WSN circumstances considering the limited restrictions, and it must be dealt with smartly to improve network life and route navigation accuracy. Furthermore, due to the prominent dynamic properties of sensors, conventional and unicast routing techniques are not viable for sensor-based technologies [<xref ref-type="bibr" rid="ref-10">10</xref>&#x2013;<xref ref-type="bibr" rid="ref-12">12</xref>]. As a result, various academics have recently focused on creating adaptive and robust routing methods to increase power consumption and locate optimal routes to destinations.</p>
<p>Routing strategies play an essential role in WSN since they facilitate low power dissipation, reduced latency, and high bandwidth Quality of Service (QoS). Numerous methods have been designed for application-specific WSN to address the restrictions encountered while delivering datagrams that demand node geolocation data for additional processing. It can use the data or information to calculate the gap between two nodes and even the amount of energy expended. Multi-hop routing enables the system to route outside the energy-constrained network area [<xref ref-type="bibr" rid="ref-13">13</xref>]. The latency has now decreased at the expense of increased power consumption; thus, we must devise routing strategies to concise energy.</p>
<p>This study aims to reduce power consumption by adopting efficient ECH selection, resulting in more extended alive nodes. We organize the remaining portions of this work as follows: The literature review summary is in Section 2, and the discussion of driving factors and research problems is in Section 3. Section 4 describes the collaborative suggested method, Section 5 shows the outcomes and inferences, and Section 5 concludes with future direction.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Literature Review</title>
<p>Shende et al. [<xref ref-type="bibr" rid="ref-14">14</xref>] overcame the difficulties by introducing an energy-aware multichannel routing mechanism relying on whale optimization algorithm (WOA) and crow search algorithm (CSA) were combined in the crow whale energy trust routing optimizer [<xref ref-type="bibr" rid="ref-14">14</xref>] depending on power and trust parameters. To determine the paths picked effectively with crow whale optimizer algorithm (CWOA), trustworthiness, and power were calculated. Chose this channel as the best for data transfer; each node&#x2019;s reliability and capacity are updated at the end of each transaction, ensuring that selected trustworthy nodes boost the channel&#x2019;s security. The investigation with 100 and 200 nodes, with and without threats, yielded the shortest latency and highest power bandwidth.</p>
<p>The glowworm swarming optimization model (LBR-GSO) was invented by Sampathkumar et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] and proved beneficial in load balancing and navigation. This strategy combined a pseudo-random pathfinding mechanism with an improved pheromone trail-based update strategy to deal with nodes&#x2019; power consumption. Furthermore, for route optimization, use feasible heuristics update strategy, including cost-effective power measures. Finally, the LBR-GSO rendered energy-based broadcasts method decreased control overhead power usage. They examined LBR-GSO for various situations using metrics such as power consumption, power efficiency, and network throughput improvement, and it outperformed the competition.</p>
<p>First, utilizing the WOA by Mohan et al. [<xref ref-type="bibr" rid="ref-16">16</xref>] to select MANET&#x2019;s maximally protected route. Next, the trust feature and the range among nodes assess the routing&#x2019;s efficiency. Next, The k-disjoint path is identified, followed by optimal route analysis and interpretation of the assessed trustworthiness and range measurements. The performance indicators used to test WOA were increased power, bandwidth, and PDR. Finally, Ram et al. [<xref ref-type="bibr" rid="ref-17">17</xref>] suggested a hybrid M-Lion Whale optimizer that incorporated the lion approach and the WOA to find the optimal MANET routing plan for safe routing. Also, various QoS metrics such as range, power, lifespan, reputation, and latency examine these multiple objective approaches. In addition, designed fitness values are to find an optimal pathway with the parameters given. As a result, we attain the highest residual energy, performance, and PDR using this method.</p>
<p>Kumar et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] developed a new exponentially ant colony optimizer (EACO) method to expose connectivity in WSNs after selecting CHs using the fractional artificial bee colony (FABC) strategy. First, CHs employed the fitness value, which takes a range, latency, and power into account. Second, to find multi-path routes, improve the ant colony optimizer (ACO) technique using an exponential smoothing prototype. Finally, EACO weighed several criteria such as power, range, and a revised fitness value to anticipate inter-cluster and intra-cluster delay to find the optimum data transmission paths from every node to BS. They also integrated the artificial bee colony (ABC) and ACO techniques to develop a new hybrid ABC-ACO system [<xref ref-type="bibr" rid="ref-19">19</xref>] that solved WSNs&#x2019; non-deterministic polynomial constraints. The main functions of this approach are to select the optimal number of sub-regions, choose CH using the ABC algorithm, and effectively transfer data using the ACO strategy. Next, hierarchical clustering aids data transfer based on the cutoff. Finally, CH found the best path for transmitting data to BS using the ACO technique. This technology established a framework for wildfire detection and management. In addition, the ABCACO method increased robustness and performance.</p>
<p>Linear/Nonlinear Programming developed by Kuila et al. [<xref ref-type="bibr" rid="ref-20">20</xref>] created navigation methods that combined the techniques of multi-objective fitness value and particle swarm optimization (PSO). The clustering plan concentrates on load balance to conserve transmission power. By taking into account power consumption, network lifespan, dead sensor network, and packet delivery, the testing results demonstrated the superiority of this strategy.</p>
<p>Pachlor et al. [<xref ref-type="bibr" rid="ref-21">21</xref>] created a central routing scheme called Basestation controlled active clustering technique, which dispersed power dissipation uniformly between all nodes, conserving power and thus increasing network lifespan. Srbinovska et al. [<xref ref-type="bibr" rid="ref-22">22</xref>] proposed a stochastic optimization technique that used a genetic strategy to compute power consumption depending on transmitting duration and intensity&#x2014;solely tested this optimization method in various settings, which increased in communication range. Del-Valle-Soto et al. [<xref ref-type="bibr" rid="ref-23">23</xref>] developed a power model to assess the amount of energy required by the multi-Parent hierarchical routing mechanism and other widely used communication sensors routing algorithms. Conduct experimentation with a random architecture design and two collector nodes. Different wireless systems, including Bluetooth, Zigbee, and LoRa over WiFi, are used by each node. This project met its goal of examining the efficiency of a power model constructed using multiple routing algorithms of various kinds, Behera et al. [<xref ref-type="bibr" rid="ref-24">24</xref>] focused on developing a strategy for selecting CH and rotating its positioning among nodes with the highest power. Primary and residual power and the optimum value of CH were taken into account while selecting suitable CHs for IoT systems.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>Motivation and Problem Definition</title>
<p>The above study clearly shows that effective power utilization combined with secure routing is an important area of research. Many previous approaches, it has been discovered, are unable to alter routing efficiency concerning the prevailing situation and limited capabilities of WSN. Furthermore, contemporary work misses next-hop choice based on the best conclusion, and such techniques reduce network-wide performance with accuracy over routing. In addition, while data relay, routing pathways are reconstructed regularly, which adds to the effort and expense of communication. This inefficiency happens by the connection field&#x2019;s periodical transit of forwarding and control signals.</p>
<p>Furthermore, most previous work causes congestion issues and raises packet loss ratio in higher network-dense scenarios. As a result, we must explore the domain of power consumption centered on information gathering and transmission using a lightweight approach to improve network life while maintaining a consistent transmission rate. As a result, this research study proposes an energy-aware and dependable routing algorithm for heterogeneous networks that establish geographically scaled cluster centers by exploiting node positions to solve the challenges mentioned above. Furthermore, depending on a fitness value, the suggested protocol employs up-to-date neighborhood knowledge to uncover more efficient power shorter and far fewer congestion pathways over routing. Several aspects are associated with transmission power, the weighting value of Round Trip Time (RTT), and hop-count encompassed in the fitness weights. The RTT factor is vital in packet forwarding since it helps to avoid unreachable and distant companions and reduces the likelihood of repeated path re-discoveries [<xref ref-type="bibr" rid="ref-25">25</xref>]. Because the quantity of RTT changes from time to time, the suggested approach calculates a weighting factor.</p>
<p>Moreover, rather than flood the overall network field with route request RREQ packets to facilitate data delivery, the suggested technique sends unicast messages to a single next-hop, reducing navigation overhead expenses and power consumption. As a result, the recommended protocol enables dependable next-hop determination, which substantially affects data passing and network connectivity. In addition, overweight wireless routes, identify the nodes and restructure the routed patterns according to network connection and node capabilities to improve route lifespan and packet transmission performance [<xref ref-type="bibr" rid="ref-26">26</xref>].</p>
</sec>
<sec id="s4">
<label>4</label>
<title>Proposed SECRET Protocol</title>
<p>With WSN optimization, We designed a novel energy-concise, multi-objective safe routing strategy. The suggested SECRET method, which included the route revamping methodologies, was used to perform multi-hop navigation. We created the suggested SECRET with many aims to enable safe energy-concise multi-hop path discovery in WSN. We depict the framework of the SECRET technique in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Assumptions</title>
<p>Specific networking characteristics are assumed in a typical network, as highlighted below.<list list-type="bullet"><list-item>
<p>The network is initially homogeneity, with static nodes.</p></list-item><list-item>
<p>Each node has a unique number that is arbitrary in the sensing region.</p></list-item><list-item>
<p>Sensor networks are location-aware according to GPS or a positioning computation.</p></list-item><list-item>
<p>Compared to regular nodes, heterogeneity nodes could have more considerable energy resources.</p></list-item><list-item>
<p>The capacities and limits of all normal nodes are identical.</p></list-item><list-item>
<p>Can use the receiving distance to alter the network throughput of the sensor network.</p></list-item><list-item>
<p>Each CH is in charge of data aggregation.</p></list-item><list-item>
<p>Sensor nodes must always communicate in a single-hop transmission.</p></list-item><list-item>
<p>CHs can communicate in either a single-hop or a multi-hop fashion.</p></list-item></list></p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Framework of SECRET Model</title>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Framework of SECRET model</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-1.png"/>
</fig>
<p>The node in the network is identified first, proceeded by cluster construction and ECH determination. Next, the suggested SECRET protocol performs multi-hop route discovery and route revamping techniques. Finally, it forwards the packets based on the SECRET protocol.</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Energy Concise Cluster Head Selection</title>
<p>Clusters of sensor nodes form in the wireless channel, and the CH node is the node with the maximum energy efficiency (residual energy) within this cluster. The CH&#x2019;s task is to maintain the rest of the nodes and interact with other CHs till the data reaches the base station. The network&#x2019;s CHs gather, combine, and communicate data to the BS using the most efficient path. Furthermore, every active node has the potential to be a CH, rebalancing the network&#x2019;s total energy usage. As a result, a CH is a node with more energy (En) and the highest rating among several nodes. Thus, E<sub>n</sub> is given by <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>,</p>
<p><disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">s</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">t</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">t</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">N</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">f</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p>where <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">s</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-2">
<mml:math id="mml-ieqn-2"><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">t</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">t</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> denote the leftover and total power of a node, respectively, when ultimately charged. N f is the data transfer frequency of the node. Each round identifies the node violation and blocks such nodes from becoming a CH in the subsequent CH selection round since they cannot actively connect to a network. As a result, stop these compromised nodes from serving as a CH, extending the network&#x2019;s lifespan and improving performance.</p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Energy Model of SECRET Protocol</title>
<p>This segment describes the energy representation for the suggested SECRET technique for heterogeneous nodes. In the sensing area, arrange the nodes randomly, and n represents the proportion of heterogeneous nodes with increased power compared to regular nodes. Only chosen CHs with more energy (En) are accountable for sending sensing data to BS through a multi-hop route throughout packet transmission. The needed power for the data packet&#x2019;s &#x2018;S&#x2019; volumes at range d<sub>n</sub> between sender and receiver calculate using <xref ref-type="disp-formula" rid="eqn-2">Eqs. (2)</xref> and <xref ref-type="disp-formula" rid="eqn-3">(3)</xref> using the wireless power consumption paradigm.</p>
<p><disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mrow><mml:msub><mml:mi>T</mml:mi><mml:mrow><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>c</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:mspace width="thickmathspace" /><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>2</mml:mn><mml:mo>&#x2217;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mi>f</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:mi>S</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>&#x003C;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>c</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:mspace width="thickmathspace" /><mml:mn>2</mml:mn><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>2</mml:mn><mml:mo>&#x2217;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mi>f</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:mi>S</mml:mi><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:mrow><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:mi>S</mml:mi></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:mrow><mml:mi mathvariant="normal">w</mml:mi><mml:mi mathvariant="normal">h</mml:mi><mml:mi mathvariant="normal">e</mml:mi><mml:mi mathvariant="normal">r</mml:mi><mml:mi mathvariant="normal">e</mml:mi></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>c</mml:mi></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mi>T</mml:mi><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mn>1000</mml:mn><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thickmathspace" /><mml:mo>&#x00D7;</mml:mo><mml:mi>S</mml:mi></mml:math>
</disp-formula></p>
<p>T<sub>En</sub> and R<sub>En</sub> represent the energy or power utilized in sending and receiving a single data bit. N<sub>f</sub> denotes node frequency, and P<sub>c</sub> indicates power consumption, and illustrated by Node power P<sub>n</sub> at time T is in <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref>, based on distance threshold d<sub>th</sub> from sender and receiver.</p>
</sec>
<sec id="s4_5">
<label>4.5</label>
<title>Fitness Function for Energy</title>
<p>We presented the fitness value (FCH)-based CH selection method, which also relies on the D<sub>nbs</sub>, D<sub>nch</sub>, starting energy of nodes (E<sub>n</sub>), and remaining power (Eres) of the nodes (N). Because the CH must be near its neighbor nodes and BS for optimal energy usage. D<sub>nbs</sub> and D<sub>nch</sub> are the node&#x2019;s Euclidean distance (ED) from the BS and its Cluster head CH, correspondingly, and can be written as follows:</p>
<p><disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>b</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mi>E</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>N</mml:mi><mml:mo>,</mml:mo><mml:mi>B</mml:mi><mml:mi>S</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mi>E</mml:mi><mml:mi>D</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>N</mml:mi><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mi>H</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>Every ECH is chosen simultaneously among its cluster members. First, as shown in <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>, the node with the best energy value in each cluster is picked as the network&#x2019;s ECH. Then, the F<sub>ECH</sub> is used to calculate each cluster member&#x2019;s fitness value calculated as follows:</p>
<p><disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>E</mml:mi><mml:mi>C</mml:mi><mml:mi>H</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mi>&#x03C9;</mml:mi><mml:mi>R</mml:mi><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C9;</mml:mi></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mi>R</mml:mi><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>b</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>R</mml:mi><mml:mrow><mml:msub><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>b</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mi>&#x03C9;</mml:mi><mml:mi>R</mml:mi><mml:msub><mml:mi>E</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>&#x03C9;</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mi>R</mml:mi><mml:msub><mml:mi>D</mml:mi><mml:mi>n</mml:mi></mml:msub><mml:mo>,</mml:mo></mml:mtd><mml:mtd><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>b</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>&#x003C;</mml:mo><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>where RE<sub>n</sub> is the ratio of the node&#x2019;s remaining power to its initial power, RD<sub>n</sub> and RD&#x2019;<sub>n</sub> are the node&#x2019;s relative ED to the cluster head and BS, respectively.</p>
<table-wrap id="table-2">
<table><colgroup>
<col/>
</colgroup>
<thead>
<tr>
<th><bold>Algorithm 1.</bold> Energy concise cluster head selection</th>
</tr>
</thead>
<tbody>
<tr>
<td>&#x2003;&#x2003;<bold>if</bold> (E<sub>n</sub> &#x003D; E<sub>th</sub>) <bold>then</bold>,</td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;Cluster the nodes with high energy</td>
</tr>
<tr>
<td>&#x2003;&#x2003;<bold>else</bold></td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;Do not perform clustering process</td>
</tr>
<tr>
<td>&#x2003;&#x2003;<bold>end if</bold></td>
</tr>
<tr>
<td>&#x2003;&#x2003;<bold>for</bold> opti(T<sub>En,</sub> R<sub>En</sub>) do</td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;<bold>for</bold> every E<sub>n</sub> do</td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;<bold>Find</bold> the value of <inline-formula id="ieqn-3">
<mml:math id="mml-ieqn-3"><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>b</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula> and <inline-formula id="ieqn-4">
<mml:math id="mml-ieqn-4"><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>h</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math>
</inline-formula></td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;<bold>Find</bold> F<sub>ECH</sub></td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;<bold>end for</bold></td>
</tr>
<tr>
<td>&#x2003;&#x2003;&#x2003;&#x2003;Cluster node with peak FCH, called as <bold>F</bold><sub><bold>ECH</bold></sub>&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;&#x2003;</td>
</tr>
<tr>
<td>&#x2003;&#x2003;<bold>end for</bold></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_6">
<label>4.6</label>
<title>Routing Revamping Fitness Function</title>
<p>Fitness Calculation for each link uses the fitness function to assess the route efficiency. The new fitness mechanism effectively creates a path from each gateway to the sink.</p>
<p>The mathematical model shows the overall distance (D) traversed by the gateways as follows:</p>
<p><disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">T</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">k</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /><mml:mi mathvariant="normal">N</mml:mi><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p>Total gateway hops are evaluated by</p>
<p>where Ni is the neighboring node, and Ni(En) is the energy of the adjacent nodes.</p>
<p><disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">G</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">H</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">k</mml:mi></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mi mathvariant="normal">C</mml:mi><mml:mi mathvariant="normal">o</mml:mi><mml:mi mathvariant="normal">u</mml:mi><mml:mi mathvariant="normal">n</mml:mi><mml:mi mathvariant="normal">t</mml:mi></mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi mathvariant="normal">N</mml:mi><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">E</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</disp-formula></p>
<p>Consider the minimum hop count and the minimal distance covered when calculating the path. As a result, a better fitness value yields the optimized value, indicating that the variables mentioned above are inversely proportionate to fitness. Therefore, it describes the newly incorporated route revamping fitness feature as follows:</p>
<p><disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">F</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">R</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mrow><mml:mi mathvariant="normal">c</mml:mi></mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03B1;</mml:mi></mml:mrow></mml:mrow><mml:mn>1</mml:mn><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">T</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">D</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03B1;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">G</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">H</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:math>
</disp-formula></p>
<p>where (<inline-formula id="ieqn-5">
<mml:math id="mml-ieqn-5"><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03B1;</mml:mi></mml:mrow></mml:mrow><mml:mn>1</mml:mn></mml:math>
</inline-formula>,<inline-formula id="ieqn-6">
<mml:math id="mml-ieqn-6"><mml:mrow><mml:mspace width="thickmathspace" /><mml:mi>&#x03B1;</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:math>
</inline-formula>) &#x03F5; {0, 1} such that, <inline-formula id="ieqn-7">
<mml:math id="mml-ieqn-7"><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03B1;</mml:mi></mml:mrow></mml:mrow><mml:mn>1</mml:mn></mml:math>
</inline-formula> &#x002B; <inline-formula id="ieqn-8">
<mml:math id="mml-ieqn-8"><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03B1;</mml:mi></mml:mrow></mml:mrow><mml:mn>2</mml:mn><mml:mrow><mml:mspace width="thickmathspace" /></mml:mrow></mml:math>
</inline-formula> &#x003D; 1 as well as c1 is the constant of proportionality. The network&#x2019;s maximum displacements and entire hops are well balanced.</p>
<fig id="fig-12">
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-12.png"/>
</fig>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Simulation Outcomes and Analysis</title>
<p>The section compares previous works Taylor Based Grey Wolf Optimization Algorithm (TGWOA) [<xref ref-type="bibr" rid="ref-27">27</xref>], Reliable Cluster-based Energy-aware Routing protocol (RCER) [<xref ref-type="bibr" rid="ref-28">28</xref>] with our SECRET protocol. Using the NS2 simulator to analyze the routing performance of the SECRET protocol and various experiments relies on a node with high-density and variable network load are carried out during the evaluation. The NL, RL, network throughput, Power saving, and PDR are all used to measure the SECRET protocol&#x2019;s performance. Sensor nodes are stationary and distributed at random in a square-shaped network environment. In the beginning, it assigns power levels in the range of 2j to 6j to nodes to start transmission. In addition, the nodes&#x2019; broadcast range is set to 25 m to compare the proposed protocol to existing work, and the simulation time is 1500 s as mentioned in <xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Simulation setup</title></caption>
<table><colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Parameter</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>Sensor field</td>
<td>500 &#x00D7; 500 m<sup>2</sup></td>
</tr>
<tr>
<td>Simulation Time</td>
<td>1500 s</td>
</tr>
<tr>
<td>Initial energy level</td>
<td>2&#x2013;6 Jules</td>
</tr>
<tr>
<td>Pc</td>
<td>50 nJ/bit</td>
</tr>
<tr>
<td>Nf</td>
<td>15 nJ/bit/m<sup>2</sup></td>
</tr>
<tr>
<td>Packet size, k</td>
<td>128 bits</td>
</tr>
<tr>
<td>MAC protocol</td>
<td>IEEE 802.15.4</td>
</tr>
<tr>
<td>Transport protocol</td>
<td>UDP</td>
</tr>
<tr>
<td>Channel bandwidth</td>
<td>10 mbps</td>
</tr>
<tr>
<td>Simulation time</td>
<td>1500 s</td>
</tr>
<tr>
<td>Node&#x2019;s transmission range</td>
<td>25 m</td>
</tr>
<tr>
<td>Evaluated protocols</td>
<td>RCER, TGWOA, and SECRET</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s5_1">
<label>5.1</label>
<title>Network Lifetime Analysis</title>
<p><xref ref-type="fig" rid="fig-2">Fig. 2</xref> compares the network life of the SECRET protocol to that of previous techniques in a scenario with a variable node density. The SECRET approach outperforms the others, with system lifespan improvements of 12.5%, 13.2%, 15.7%, and 25%.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>NL with varying number of nodes</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-2.png"/>
</fig>
<p>In contrast to TGWOA and RCER, the SECRET protocol creates geographically sized groups and begins the CHs selection procedure among a small number of nodes. Furthermore, the most power effective, quickest, and select least congestion next-hops to follow data transmission. In addition, congested and remote next-hops are prevented during packet transmission, resulting in a significant increase in network lifetime for the SECRET protocol.</p>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> compares the network life of SECRET with that of other existing technologies under various network load scenarios. As a result of the increased network congestion, data traffic rises, and a more significant network load on either side reduces network longevity. The SECRET technique increased network longevity by 10.26%, 10.7%, 20.54%, and 45%, respectively, over existing options. Because the position factor is taken into account when generating groups, and the location of CHs is altered based on usage than regularly, SECRET significantly saves energy usage while also prolonging network life.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Network lifetime with varying network load</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-3.png"/>
</fig>
</sec>
<sec id="s5_2">
<label>5.2</label>
<title>Energy Saving Analysis</title>
<p>We depict the behavior of the SECRET protocol in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, along with a comparison of previous methods for an average power consumption model with various numbers of nodes. According to the findings, the SECRET protocol reduces network power consumption by 15.5%, 17%, 35.5%, and 50%, respectively, compared to existing systems.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Energy-saving with different number of nodes</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-4.png"/>
</fig>
<p>SECRET method, unlike RCER and TGWOA, eliminates communication and computation overheads by allowing CHs electing procedure to take place within limited zones. Furthermore, just a tiny network size is responsible for routing decisions, resulting in regulated power consumption.</p>
<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> exhibits better power consumption efficiency by 25%, 35%, 45%, and 55% with varied network loads. Reduced energy usage aims to optimize network load between the next hops. Furthermore, a small number of sensor nodes participated in the voting and shifted their locations due to network measurements [<xref ref-type="bibr" rid="ref-29">29</xref>&#x2013;<xref ref-type="bibr" rid="ref-31">31</xref>]. Integrating the connection latency factor into route selection also minimizes re-transmissions, resulting in much lower energy use.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Energy saving with varying network load</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-5.png"/>
</fig>
</sec>
<sec id="s5_3">
<label>5.3</label>
<title>Network Throughput Analysis</title>
<p>In <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, The SECRET method&#x2019;s performance is contrasted to prior work in terms of system throughput by taking a varied number of nodes into account. In comparison to previous systems, SECRET obtained higher network throughput by 18.5%, 24.5%, 30.5%, and 38.5%, according to simulated data. RCER and TGWOA choose next-hops based on non-optimal routing decisions, but the SECRET method chooses next-hops based on multiple criteria.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Throughput with different number of nodes</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-6.png"/>
</fig>
<p>As a result, SECRET identifies the least trafficked, dependable, and power-efficient nodes for datagram transmission. As a result, neighbors with the fewest hop counts, the highest residual power, and the shortest RTT gives greater weight [<xref ref-type="bibr" rid="ref-32">32</xref>,<xref ref-type="bibr" rid="ref-33">33</xref>]. The SECRET protocol&#x2019;s route decision reduces the length of the transmission link and conserves power, but it also creates a reliable way, increasing system throughput.</p>
<p>In a changing network load situation, <xref ref-type="fig" rid="fig-7">Fig. 7</xref> compares the performance of SECRET with other alternatives in terms of network performance. In reality, a more extensive network load affects bandwidth utilization and routing reliability in high-traffic environments. Based on the findings, the SECRET method has the best data delivery performance, with improvements of 18%, 20%, 35%, and 40% over previous work. Due to multi-criterion data navigators, the next-hop location is re-formulated using network measurements. Furthermore, including connection delay in routing decisions reduces traffic load by reducing the number of re-forwardings, which substantially impacts data delivery performance.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Throughput with varying network load</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-7.png"/>
</fig>
</sec>
<sec id="s5_4">
<label>5.4</label>
<title>Route Lifetime Analysis</title>
<p><xref ref-type="fig" rid="fig-8">Fig. 8</xref> shows the route lifespan compared to existing systems in a situation with a variable node density. According to the modeling results, SECRET obtains a 17% higher route lifespan than previous methods. 18%, 25%, and 37% are the percentages. SECRET&#x2019;s improved performance is that it incorporates node capabilities and a link latency component for routing revamp.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>RL with different number of nodes</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-8.png"/>
</fig>
<p>In contrast, RCER and TGWOA schemes regularly restructured routing pathways without viewing network restrictions. Furthermore, nodes with insufficient power levels have a lesser chance of being involved in routing decisions. Moreover, the multi-criteria for selecting next-hops increase the integrity of the transmission process [<xref ref-type="bibr" rid="ref-34">34</xref>&#x2013;<xref ref-type="bibr" rid="ref-36">36</xref>].</p>
<p>From the perspective of route lifespan under fluctuating network load, <xref ref-type="fig" rid="fig-9">Fig. 9</xref> shows how SECRET performs better than previous systems. The computational results reveal that SECRET outperforms the opposition, with gains of 19%, 22%, 43%, and 47%. Existing techniques shortened the path lifespan due to substantial network traffic and many re-transmissions in increased network load circumstances. However, SECRET also leads to resilient navigation with a reasonably steady performance by detecting fatigued and increased latency nodes on multipath routing.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Route lifetime with varying network load</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-9.png"/>
</fig>
</sec>
<sec id="s5_5">
<label>5.5</label>
<title>PDR Analysis</title>
<p>The simulation studies of SECRET with other alternatives under a variable amount of nodes situation are depicted in <xref ref-type="fig" rid="fig-10">Fig. 10</xref> to assess system stability. According to the results of the experiments, the SECRET method achieved a higher packet delivery than the previous method by 23.5, 25, 28, and 40 percent.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>PDR with different number of nodes</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-10.png"/>
</fig>
<p>Unlike RCER and TGWOA, the SECRET method&#x2019;s established data transmission pathways are more trustworthy because the channel quality component considers the routing decision. Furthermore, SECRET stops energy-inefficient intermediary nodes from data forwarding, and the SECRET protocol honestly chooses the next-hop based on the multi-criteria SECRET approach [<xref ref-type="bibr" rid="ref-37">37</xref>&#x2013;<xref ref-type="bibr" rid="ref-39">39</xref>].</p>
<p>SECRET&#x2019;s functionality concerning previous methods depicts in <xref ref-type="fig" rid="fig-11">Fig. 11</xref>. The modeling tests determine the system reliability in PDR under changing network loads. Because it prioritizes those next-hops appropriate for message transmission, SECRET achieved superior reliability than current methods like 22, 25, 29, and 34 percent. In addition, due to the non-optimal selection procedure, present systems produce severe congestion issues under large network load, resulting in a low PDR. Furthermore, because SECRET regularly detects link traffic delays and faulty nodes based on response periods, overburdened nodes and connections are given the weakest weights for message transmission. As a result, the SECRET procedure has been successful in minimizing packet transmission disruptions and improving the network&#x2019;s performance [<xref ref-type="bibr" rid="ref-40">40</xref>,<xref ref-type="bibr" rid="ref-41">41</xref>].</p>
<fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>PDR with varying network load</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="IASC_30278-fig-11.png"/>
</fig>
</sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Conclusion and Future Scope</title>
<p>We suggest a SECRET method for increasing the network&#x2019;s lifespan in this research. This technique presents a new fitness value for ECH classification. The route optimization technique relies on the nodes&#x2019; residual energy, their ED from BS and the cluster head, and their relative ED. The routing protocol approach conserves energy by eliminating long distances between the transmitter and the receiver. We have proved that the SECRET outperforms other algorithms based on PDR, network lifespan, Route Lifespan, energy savings, and performance. Because more scientific studies are published annually, there would be plenty of future opportunities to suggest sophisticated meta-heuristic algorithms to improve WSN coverage and connection. The goal functions addressed here are range and latency and might include other essential restrictions to boost performance. Despite their suitability for handling the location-based sensor deployment challenge, existing algorithms affect the initiation and number of iterations. As a result, choosing the proper initialization process and convergence rate can attain the goals at low computational complexity. It is something that can research thoroughly in the future.</p><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
</sec>
</body>
<back>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Mughal</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Shi</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Ullah</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Mahmood</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Abid</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Logical tree based secure rekeying management for smart devices groups in IoT enabled WSN</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>7</volume>, pp. <fpage>76699</fpage>&#x2013;<lpage>76711</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Huang</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Wu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Li</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Personalized and professionalized medical recommendations based on hybrid matrix factorization</article-title>,&#x201D; <source>Future Generation Computer Systems</source>, vol. <volume>66</volume>, no. <issue>1</issue>, pp. <fpage>30</fpage>&#x2013;<lpage>35</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Wen</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Xun</surname></string-name> and <string-name><given-names>J.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Connecting intelligent things in smart hospitals using NB-IoT</article-title>,&#x201D; <source>IEEE Internet of Things Journal</source>, vol. <volume>5</volume>, no. <issue>3</issue>, pp. <fpage>1550</fpage>&#x2013;<lpage>1560</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Lee</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Ke</surname></string-name></person-group>, &#x201C;<article-title>Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: Design and evaluation</article-title>,&#x201D; <source>IEEE Transactions on Instrumentation and Measurement</source>, vol. <volume>67</volume>, no. <issue>9</issue>, pp. <fpage>2177</fpage>&#x2013;<lpage>2187</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Xiuwu</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Qin</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Yong</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Mufang</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Ke</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Uneven clustering routing algorithm based on glowworm swarm optimization</article-title>,&#x201D; <source>Ad Hoc Networks</source>, vol. <volume>93</volume>, no. <issue>3</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>8</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Priyadarshi</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Gupta</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Anurag</surname></string-name></person-group>, &#x201C;<article-title>Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues</article-title>,&#x201D; <source>The Journal of Supercomputing</source>, vol. <volume>76</volume>, no. <issue>9</issue>, pp. <fpage>7333</fpage>&#x2013;<lpage>7373</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Ghafoor</surname></string-name> and <string-name><given-names>I.</given-names> <surname>Koo</surname></string-name></person-group>, &#x201C;<article-title>CR-SDVN: A cognitive routing protocol for software-defined vehicular networks</article-title>,&#x201D; <source>IEEE Sensors Journal</source>, vol. <volume>18</volume>, no. <issue>4</issue>, pp. <fpage>1761</fpage>&#x2013;<lpage>1772</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>B. N.</given-names> <surname>Silva</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Diyan</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Cao</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Han</surname></string-name></person-group>, &#x201C;<article-title>A clustering based routing algorithm in IoT aware wireless mesh networks</article-title>,&#x201D; <source>Sustainable Cities and Society</source>, vol. <volume>40</volume>, no. <issue>1</issue>, pp. <fpage>657</fpage>&#x2013;<lpage>666</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Guravaiah</surname></string-name> and <string-name><given-names>R. L.</given-names> <surname>Velusamy</surname></string-name></person-group>, &#x201C;<article-title>Energy efficient clustering algorithm using RFD based multi-hop communication in wireless sensor networks</article-title>,&#x201D; <source>Wireless Personal Communication</source>, vol. <volume>95</volume>, no. <issue>4</issue>, pp. <fpage>3557</fpage>&#x2013;<lpage>3584</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Liu</surname></string-name> and <string-name><given-names>P.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Data drainage: A novel load balancing strategy for wireless sensor networks</article-title>,&#x201D; <source>IEEE Communication Letter</source>, vol. <volume>22</volume>, no. <issue>1</issue>, pp. <fpage>125</fpage>&#x2013;<lpage>128</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Sajwan</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Gosain</surname></string-name> and <string-name><given-names>A. K.</given-names> <surname>Sharma</surname></string-name></person-group>, &#x201C;<article-title>Hybrid energy-efficient multi-path routing for wireless sensor networks</article-title>,&#x201D; <source>Computers &#x0026; Electrical Engineering</source>, vol. <volume>67</volume>, no. <issue>1</issue>, pp. <fpage>96</fpage>&#x2013;<lpage>113</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Panchal</surname></string-name> and <string-name><given-names>R. K.</given-names> <surname>Singh</surname></string-name></person-group>, &#x201C;<article-title>REHR: Residual energy based hybrid routing protocol for wireless sensor networks</article-title>,&#x201D; in <conf-name>IEEE Conference on Information and Communication Technology</conf-name>, <publisher-loc>Allahabad, India</publisher-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>, <year>2019</year>. </mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Vinoth Kumar</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Jayasankar</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Eswaramoorthy</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Nivedhitha</surname></string-name></person-group>, &#x201C;<article-title>SDARP: Security based data aware routing protocol for ad hoc sensor networks</article-title>,&#x201D; <source>International Journal of Intelligent Networks</source>, vol. <volume>1</volume>, no. <issue>1</issue>, pp. <fpage>36</fpage>&#x2013;<lpage>42</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D. K.</given-names> <surname>Shende</surname></string-name> and <string-name><given-names>S. S.</given-names> <surname>Sonavane</surname></string-name></person-group>, &#x201C;<article-title>CrowWhale-ETR: CrowWhale optimization algorithm for energy and trust aware multicast routing in WSN for IoT applications</article-title>,&#x201D; <source>Wireless Networks</source>, vol. <volume>26</volume>, no. <issue>6</issue>, pp. <fpage>4011</fpage>&#x2013;<lpage>4029</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Sampathkumar</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Mulerikkal</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Sivaram</surname></string-name></person-group>, &#x201C;<article-title>Glowworm swarm optimization for effectual load balancing and routing strategies in wireless sensor networks</article-title>,&#x201D; <source>Wireless Networks</source>, vol. <volume>26</volume>, no. <issue>6</issue>, pp. <fpage>4227</fpage>&#x2013;<lpage>4238</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Mohan</surname></string-name> and <string-name><given-names>A. V.</given-names> <surname>Reddy</surname></string-name></person-group>, &#x201C;<article-title>T-Whale: Trust and whale optimization model for secure routing in mobile Ad-Hoc network</article-title>,&#x201D; <source>International Journal of Artificial Life Research</source>, vol. <volume>8</volume>, no. <issue>2</issue>, pp. <fpage>67</fpage>&#x2013;<lpage>79</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Ram</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Venugopal</surname></string-name></person-group>, &#x201C;<article-title>M-LionWhale: Multi-objective optimization model for secure routing in mobile Ad-hoc network</article-title>,&#x201D; <source>IET Communications</source>, vol. <volume>12</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>7</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Kumar</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Dilip</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Dinesh</surname></string-name></person-group>, &#x201C;<article-title>EACO and FABC to multi-path data transmission in wireless sensor networks</article-title>,&#x201D; <source>IET Communications</source>, vol. <volume>11</volume>, no. <issue>4</issue>, pp. <fpage>522</fpage>&#x2013;<lpage>530</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Kumar</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Dilip</surname></string-name></person-group>, &#x201C;<article-title>Hybrid swarm intelligence energy efficient clustered routing algorithm for wireless sensor networks</article-title>,&#x201D; <source>Journal of Sensors</source>, vol. <volume>2016</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>19</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Kuila</surname></string-name> and <string-name><given-names>P. K.</given-names> <surname>Jana</surname></string-name></person-group>, &#x201C;<article-title>Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach</article-title>,&#x201D; <source>Engineering Applications Artificial Intelligence</source>, vol. <volume>33</volume>, pp. <fpage>127</fpage>&#x2013;<lpage>140</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Pachlor</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Shrimankar</surname></string-name></person-group>, &#x201C;<article-title>VCH-ECCR: A centralized routing protocol for wireless sensor networks</article-title>,&#x201D; <source>Journal of Sensor</source>, vol. <volume>2017</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>10</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Srbinovska</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Cundeva-Blajer</surname></string-name></person-group>, &#x201C;<article-title>Optimization methods for energy consumption estimation in wireless sensor networks</article-title>,&#x201D; <source>Journal of Sustainable Development of Energy, Water and Environment Systems</source>, vol. <volume>7</volume>, no. <issue>2</issue>, pp. <fpage>261</fpage>&#x2013;<lpage>274</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Del-Valle-Soto</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Mex-Perera</surname></string-name>, <string-name><given-names>J. A.</given-names> <surname>Nolazco-Flores</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Vel&#x00E1;zquez</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Rossa-Sierra</surname></string-name></person-group>, &#x201C;<article-title>Wireless sensor network energy model and its use in the optimization of routing protocols</article-title>,&#x201D; <source>Energies</source>, vol. <volume>13</volume>, no. <issue>3</issue>, pp. <fpage>728</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T. M.</given-names> <surname>Behera</surname></string-name>, <string-name><given-names>S. K.</given-names> <surname>Mohapatra</surname></string-name>, <string-name><given-names>U. C.</given-names> <surname>Samal</surname></string-name>, <string-name><given-names>M. S.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Daneshmand</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>Residual energy-based cluster-head selection in WSNs for IoT application</article-title>,&#x201D; <source>IEEE Internet of Things Journal</source>, vol. <volume>6</volume>, no. <issue>3</issue>, pp. <fpage>5132</fpage>&#x2013;<lpage>5139</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Panchal</surname></string-name> and <string-name><given-names>R. K.</given-names> <surname>Singh</surname></string-name></person-group>, &#x201C;<article-title>EADCR: Energy aware distance based cluster head selection and routing protocol for wireless sensor networks</article-title>,&#x201D; <source>Journal of Circuits, Systems, and Computers</source>, vol. <volume>30</volume>, no. <issue>4</issue>, p. <fpage>2150063</fpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. M. M. H.</given-names> <surname>Daneshvar</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Alikhah Ahari Mohajer</surname></string-name> and <string-name><given-names>S. M.</given-names> <surname>Mazinani</surname></string-name></person-group>, &#x201C;<article-title>Energy-efficient routing in WSN: A centralized cluster-based approach via grey wolf optimizer</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>7</volume>, pp. <fpage>170019</fpage>&#x2013;<lpage>170031</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Rahim</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Murugan</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Priya</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Magesh</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Manikandan</surname></string-name></person-group>, &#x201C;<article-title>Taylor based grey wolf optimization algorithm (TGWOA) for energy aware secure routing protocol</article-title>,&#x201D; <source>International Journal of Computer Networks and Applications</source>, vol. <volume>7</volume>, no. <issue>4</issue>, p. <fpage>93</fpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Haseeb</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Abbas</surname></string-name>, <string-name><given-names>M. Q.</given-names> <surname>Saleem</surname></string-name>, <string-name><given-names>O. E.</given-names> <surname>Sheta</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Awan</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>RCER: Reliable cluster-based energy-aware routing protocol for heterogeneous wireless sensor networks</article-title>,&#x201D; <source>PLoS One</source>, vol. <volume>14</volume>, no. <issue>10</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>24</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>N.</given-names> <surname>Partheeban</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Sudharson</surname></string-name> and <string-name><given-names>P. J.</given-names> <surname>Sathish Kumar</surname></string-name></person-group>, &#x201C;<article-title>SPEC- serial property based encryption for cloud</article-title>,&#x201D; <source>International Journal of Pharmacy &#x0026; Technology</source>, vol. <volume>8</volume>, no. <issue>4</issue>, pp. <fpage>23702</fpage>&#x2013;<lpage>23710</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Sudharson</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Mudassar Ali</surname></string-name> and <string-name><given-names>N.</given-names> <surname>Partheeban</surname></string-name></person-group>, &#x201C;<article-title>NUITECH &#x2013; natural user interface technique formulating computer hardware</article-title>,&#x201D; <source>International Journal of Pharmacy &#x0026; Technology</source>, vol. <volume>8</volume>, no. <issue>4</issue>, pp. <fpage>23598</fpage>&#x2013;<lpage>23606</lpage>, <year>2016</year>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Dhinakaran</surname></string-name> and <string-name><given-names>P. M.</given-names> <surname>Joe Prathap</surname></string-name></person-group>, &#x201C;<article-title>Ensuring privacy of data and mined results of data possessor in collaborative ARM</article-title>,&#x201D; in <source>Pervasive Computing and Social Networking: Lecture Notes in Networks and Systems</source>. Vol. <volume>317</volume>. <publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Arun</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Sudharson</surname></string-name></person-group>, &#x201C;<article-title>DEFECT: Discover and eradicate fool around node in emergency network using combinatorial techniques</article-title>,&#x201D; <source>Journal of Ambient Intelligence and Humanized Computing</source>, vol. <volume>10</volume>, no. <issue>10</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>12</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Sudharson</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Parthipan</surname></string-name></person-group>, &#x201C;<article-title> A survey on ATTACK &#x2013; anti terrorism technique for adhoc using clustering and knowledge extraction</article-title>,&#x201D; in <source>Advances in Computer Science and Information Technology. Computer Science and Engineering. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering</source>. Vol. <volume>85</volume>. <publisher-loc>Berlin, Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>, pp. <fpage>508</fpage>&#x2013;<lpage>514</lpage>, <year>2012</year>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A. A.</given-names> <surname>Abins</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Katiravan</surname></string-name> and <string-name><given-names>S. M.</given-names> <surname>Udhaya Sankar</surname></string-name></person-group>, &#x201C;<article-title>Performance optimization using heuristic approach in opportunistic WSR</article-title>,&#x201D; <source>Dynamic Systems and Applications</source>, vol. <volume>30</volume>, no. <issue>8</issue>, pp. <fpage>1304</fpage>&#x2013;<lpage>1317</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Kowshika</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ramakrishnan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Raja</surname></string-name> and <string-name><given-names>S. M.</given-names> <surname>Udhaya Sankar</surname></string-name></person-group>, &#x201C;<article-title>Energy aware detection and prevention of packet drop attack in wireless and mobile adhoc networks by packet drop battling mechanism</article-title>,&#x201D; <source>International Journal of Advanced Research in Engineering and Technology</source>, vol. <volume>11</volume>, no. <issue>10</issue>, pp. <fpage>1882</fpage>&#x2013;<lpage>1892</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>T.</given-names> <surname>Sujithra</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Sumathi</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Ramakrishnan</surname></string-name> and <string-name><given-names>S. M.</given-names> <surname>Udhaya Sankar</surname></string-name></person-group>, &#x201C;<article-title>ID based adaptive-key signcryption for data security in cloud environment</article-title>,&#x201D; <source>International Journal of Advanced Research in Engineering and Technology</source>, vol. <volume>11</volume>, no. <issue>4</issue>, pp. <fpage>205</fpage>&#x2013;<lpage>220</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. M.</given-names> <surname>Udhaya Sankar</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Vijaya Chamundeeswari</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Jeevaa</surname></string-name></person-group>, &#x201C;<article-title>An enhanced method to detect and prevent wormhole attach in m commerce</article-title>,&#x201D; <source>Asian Journal of Information Technology</source>, vol. <volume>16</volume>, no. <issue>1</issue>, pp. <fpage>77</fpage>&#x2013;<lpage>81</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. M.</given-names> <surname>Udhaya Sankar</surname></string-name> and <string-name><given-names>V.</given-names> <surname>Vijaya Chamundeeswar</surname></string-name></person-group>, &#x201C;<article-title>JIGSPASSZLE: A novel jigsaw based password system using mouse drag dynamics</article-title>,&#x201D; <source>Middle-East Journal of Scientific Research</source>, vol. <volume>21</volume>, no. <issue>11</issue>, pp. <fpage>2039</fpage>&#x2013;<lpage>2051</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. M.</given-names> <surname>Udhaya Sankar</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Vijaya Chamundeeswari</surname></string-name> and <string-name><given-names>K.</given-names> <surname>Jeevaa</surname></string-name></person-group>, &#x201C;<article-title>Identity based attack detection and manifold adversaries localization in wireless networks</article-title>,&#x201D; <source>Journal of Theoretical and Applied Information technology</source>, vol. <volume>67</volume>, no. <issue>2</issue>, pp. <fpage>513</fpage>&#x2013;<lpage>518</lpage>, <year>2014</year>.</mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>G. Z.</given-names> <surname>Dai</surname></string-name>, <string-name><given-names>P. S.</given-names> <surname>Change</surname></string-name> <etal>et al.</etal></person-group><italic>,</italic> &#x201C;<article-title>A multi-feature learning model with enhanced local attention for vehicle re-identification</article-title>,&#x201D; <source>Computers, Materials and Continua</source>, vol. <volume>69</volume>, no. <issue>3</issue>, pp. <fpage>3549</fpage>&#x2013;<lpage>3561</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zheng</surname></string-name> and <string-name><given-names>G.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Design of network cascade structure for image super-resolution</article-title>,&#x201D; <source>Journal of New Media</source>, vol. <volume>3</volume>, no. <issue>1</issue>, pp. <fpage>29</fpage>&#x2013;<lpage>39</lpage>, <year>2021</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>