Energy-Efficient Genetic Algorithm Variants of PEGASIS For 3D Wireless Sensor Networks
Energy-Efficient Genetic Algorithm Variants of PEGASIS For 3D Wireless Sensor Networks
https://www.emerald.com/insight/2210-8327.htm
ACI
19,3/4 Energy-efficient genetic algorithm
variants of PEGASIS for 3D
Wireless Sensor Networks
186 Aaqil Somauroo and Vandana Bassoo
Department of Electrical and Electronic Engineering, Faculty of Engineering,
Received 23 May 2019
Revised 8 July 2019
University of Mauritius, Reduit, Mauritius
Accepted 11 July 2019
Abstract
Due to its boundless potential applications, Wireless Sensor Networks have been subject to much research in
the last two decades. WSNs are often deployed in remote environments making replacement of batteries not
feasible. Low energy consumption being of prime requisite led to the development of energy-efficient routing
protocols. The proposed routing algorithms seek to prolong the lifetime of sensor nodes in the relatively
unexplored area of 3D WSNs. The schemes use chain-based routing technique PEGASIS as basis and employ
genetic algorithm to build the chain instead of the greedy algorithm. Proposed schemes will incorporate an
energy and distance aware CH selection technique to improve load balancing. Clustering of the network is also
implemented to reduce number of nodes in a chain and hence reduce delay. Simulation of our proposed
protocols is carried out for homogeneous networks considering separately cases for a static base-station inside
and outside the network. Results indicate considerable improvement in lifetime over PEGASIS of 817% and
420% for base station inside and outside the network respectively. Residual energy and delay performance are
also considered.
Paper type Original Article
1. Introduction
Breakthroughs in the field of microelectromechanical systems have led to the conception of
cheap and autonomous devices with sensing capabilities. These devices which are very small
in nature, are called sensor nodes. Nodes carry out collection of data from the environment
through sensing and monitoring. As transmission of data to the base station is a collaborative
effort, nodes form a network referred to as Wireless Sensor Network (WSN). Being
increasingly cost and size effective, WSNs have seen their application expand to include
vastly different areas ranging from enemy detection military applications to heart rate
monitoring in healthcare.
© Aaqil Somauroo and Vandana Bassoo. Published in Applied Computing and Informatics. Published by
Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY
4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for
both commercial and non-commercial purposes), subject to full attribution to the original publication
and authors. The full terms of this license may be seen at http://creativecommons.org/licences/by/4.0/
legalcode
Declaration of Competing Interest: None.
Publisher note: The publisher wishes to inform readers that the article “Energy-efficient genetic
algorithm variants of PEGASIS for 3D Wireless Sensor Networks” was originally published by the
previous publisher of Applied Computing and Informatics and the pagination of this article has been
subsequently changed. There has been no change to the content of the article. This change was
Applied Computing and
Informatics necessary for the journal to transition from the previous publisher to the new one. The publisher
Vol. 19 No. 3/4, 2023 sincerely apologises for any inconvenience caused. To access and cite this article, please use Somauroo, A.,
pp. 186-208
Emerald Publishing Limited Bassoo, V. (2019), “Energy-efficient genetic algorithm variants of PEGASIS for 3D Wireless Sensor
e-ISSN: 2210-8327 Networks”, Applied Computing and Informatics. Vol. ahead-of-print No. ahead-of-print. https://10.1016/
p-ISSN: 2634-1964
DOI 10.1016/j.aci.2019.07.002 j.aci.2019.07.002. The original publication date for this paper was 13/07/2019.
The block diagram of a sensor node is shown in Figure 1. Sensors are of various types and Energy-
measure some physical quantity such as temperature, motion, pressure and humidity. efficient genetic
Memory is needed to store intermediate sensor readings and also packets from other nodes.
The controller is tasked with collecting data from the sensors and processing it. It decides
algorithm
when and where by using routing protocols. It is also responsible for data aggregation. variants
Batteries provide the power source in a node and since WSNs are often deployed in remote
areas, they cannot be usually replaced or recharged. The transceiver is responsible for the
transmission and reception of data such that nodes can form a network. 187
As mentioned previously, batteries cannot be replaced making sensor nodes energy-
constrained devices. Hence, being as energy efficient as possible is of prime importance. To
this end, most research focus on energy efficient MAC and routing protocols. This paper will
be concerned with the development of power-aware routing protocols by adopting strategies
like clustering, data aggregation, multi-hop transmission to optimise network lifetime and
energy efficiency in WSN routing protocols.
One of the approaches in solving optimisation problems is the use of bio-inspired
algorithms that are modelled on processes and behaviours which occur in nature. These
algorithms are numerous and solve a wide variety of problems in WSNs [2]. This paper will
make use of genetic algorithm.
The proposed routing protocols bring the following contributions:
1. Clustering is implemented to reduce long chains and thus improve delay performance.
2. A genetic algorithm is used to build a near minimal length chain for transmission of
data.
3. A new cluster head (CH) selection mechanism is devised to improve load balancing in
diverse network types.
4. The extension of PEGASIS and variants to three-dimensions.
The remaining of the paper is organised as follows. Section 2 reviews literature on WSNs
and describes various existing routing protocols. Section 3 presents the system model and
proposed approach. Section 4 shows and discusses the obtained results. Section 5
concludes with an overall evaluation of the work and presents future research
opportunities.
Figure 1.
Wireless sensor node
block diagram [1].
ACI 2. Related works
19,3/4 2.1 PEGASIS
Lindsey and Raghavendra [3] suggest using a chain-based protocol called PEGASIS. The
chain is built such that all nodes are joined together using the greedy algorithm. This process
of chain building is essentially known as the Travelling Salesman Problem (TSP). It is
assumed that global knowledge of the whole network is available to all nodes. The chain
building is started at the sensor node located furthest from the BS. The greedy algorithm
188 entails finding a local minima at each step in a bid to eventually achieve a global minima. This
means that the start node will form the first segment of the chain by joining to the closest
node. This process repeats itself until finally reaching the end node. Chain reconstruction is
carried out in the same way at the death of a node.
A leader is selected randomly from the one of the nodes in the chain. The leader node is
responsible for transmission to the BS. It is important to note that the leader is rotated every
round in a round robin manner. To clearly explain this concept, a list of all nodes may be
considered. Once a node is selected as leader, it is crossed out on the list and it can only be
selected as leader again when a new list is used. This occurs only when all nodes have been
crossed out in the current list. In PEGASIS, data aggregation is carried out at every node
except for the nodes located at the two ends of the chain.
The transmission mechanism in PEGASIS is triggered by the use of a control token issued
by the leader and is passed on along the chain. To illustrate this, consider Figure 2 where C2 is
the leader node. The token is passed to C2 and then to C0. Node C0 will then return back the
token along with data to C1. C1 will in turn send data and the token to C2. After reception of
this data, C2 will pass the token to C4 along the chain and the same process which occurs at the
other end of the chain takes place here too. It is important to reiterate that data aggregation
occurs at every node except nodes at the end of the chain.
Figure 2.
Token passing
scheme [4].
method where both the residual energy of a node and its distance from the BS is considered. A Energy-
weighted score is obtained by the summation of a weighted energy and distance value. They efficient genetic
also state that a flexible weight for the energy and distance enables the application of this
method of leader selection to a wide variety of network situations with different requirements.
algorithm
2.2.3 CRBCC. The long chain in PEGASIS causes large delays. Zheng and Hu [9] propose variants
CRBCC which makes use of simulated annealing to build the chain. It also incorporates a
clustering mechanism which aims to break the single long chain into multiple ones thereby
reducing delay. Additionally, multihop inter-cluster communication is adopted as illustrated 189
in Figure 3. The results show a reduction in the energy consumption of CRBCC in contrast to
PEGASIS. It is also imperative to highlight the large improvement in delay performance for
networks of different sizes for CRBCC.
2.2.4 PEG-ACO vertical clustering. The PEGASIS variants discussed previously aim to
mitigate the limitations of PEGASIS. They address one, or at most two, of our stated
limitations. Ramluckun and Bassoo [10] propose a very elegant solution incorporating some
concepts from all three previously discussed protocols.
PEG-ACO Vertical Clustering makes use of clustering according to the x-coordinates of
nodes. A chain is built in every cluster by using ACO as shown in Figure 4. Multihop
transmission is adopted by CHs to send the data to the BS. All CH are chosen according to a
weighted score between energy and distance. The performance of the protocol is assessed
and improvements are obtained in lifetime, residual energy and delay. Another type of
clustering method, Horizontal Clustering which always elects the CH responsible for
transmission to BS in the uppermost cluster is also proposed. It is to be noted that the analysis
is carried out solely for homogeneous networks with a static BS situated outside the network.
While not always possible due to the nature of the application, having a BS inside the network
increases its lifetime. Hence this work will consider both cases separately.
2.3 3D WSN
Most routing protocols found in WSN literature consider routing protocols only in two
dimensions albeit the fact that we live in a 3D world. Roy and Mukherjee [11] remark that 3D
rather than 2D design is required for many applications. One example is the design of
underwater WSNs [12]. Other possible applications include deploying WSNs on trees with
varying heights, railway tunnels and underground mines [11]. WSNs deployed in uneven
Figure 3.
Clustering into
multiple chains [9].
ACI
19,3/4
190
Figure 4.
Vertical Clustering and
ACO chains [10].
terrains also fall under that category. Literature focuses on the coverage problem in 3D and
research on routing protocols is relatively sparse. Kohli et al. [13] and Baghouri et al. [14] both
propose extending LEACH to 3D. Hence, extension of PEGASIS to 3D would be a worthwhile
research opportunity to enhance energy efficiency in 3D applications. To the best of our
knowledge, this has not been carried out before.
3. Methodology
3.1 Network model
N sensor nodes are randomly dispersed (non-deterministic deployment) in a square field
whose length is M as shown in Figure 5 and with a static base station. Nodes are considered to
Energy-
efficient genetic
algorithm
variants
191
Figure 5.
Network model of 100
nodes in a 100 m 3
100 m 3 100 m
3D space.
be static once deployed. All nodes are considered to have a fixed amount of energy Eo. All
parameters are specified in Section 3.7.
where Eelec is the energy expended per bit to run the transmitter or receiver.
The transmission energy used by the amplifiers is a function of both the number of bits
and transmission distance (d) [18].
efs 3 k 3 d 2 ; if d < d0
ETx−amp ¼ (2)
emp 3 k 3 d 4 ; if d > d0
d0 is a threshold used to determine which fading model is used (free space or multipath) and is
given by:
Figure 6.
First-order radio
model [17].
rffiffiffiffiffiffiffi
ACI efs
d0 ¼ (3)
19,3/4 emp
where efs and emp are constants which are used in the free-space and multipath model
respectively.
Hence, the total energy required for transmission is:
192 Eelec 3 k þ efs 3 k 3 d 2 ; if d < d0
ETx ¼ (4)
Eelec 3 k þ emp 3 k 3 d 4 ; if d > d0
The energy required for reception consists of energy required to run the circuitry only.
ERx ¼ Eelec 3 L (5)
where Eda is the energy per bit expended in aggregating and s the number of signals being
aggregated.
(b) Flip operation Part of the solution is flipped randomly as illustrated below:
a → b → c → d → e → f becomes a → e → d → c → b → f after flipping at
positions 2 and 5
(c) Slide operation Part of the solution is selected randomly and it is ‘slid’ across to
modify the solution. For illustration, the part of the solution from position 2 to 5 is
considered.
a → b → c → d → e → f becomes a → c → d → e → b → f
An open source code was used to implement the GA for chain building Kirk [22]. It makes use
of selection and mutation. The steps in the GA algorithm are outlined below.
1. Initialise the initial population. Energy-
The initial population contains multiple solutions which are generated in a random efficient genetic
manner. Variable globalMin indicates the shortest chain length that has been achieved
so far and it is assigned to infinity.
algorithm
variants
2. Calculate the fitness of each member of the population.
populationMin is assigned to infinity. populationMin is a variable which indicates the
best fitness value (smallest overall chain length) in the current population. 193
3. Record solution having best fitness in bestPopSolution.
bestPopSolution is a variable which records the best solution in the current
population. populationMin is assigned the value of best fitness.
4. If populationMin < globalMin, a new value globalMin is recorded as populationMin and
the globalBestSolution is recorded as bestPopSolution. Variable globalBestSolution
indicates the best solution which has been achieved so far.
5. The order of solutions in the population are randomised.
For instance, solution 1 can become solution 30 and so on.
6. For every four members of the population(solutions 1–4, 5–8 and so on), the best
solution is taken and the following steps are taken to create 4 new routes
(a) Create random route insertion points. These consist of 2 points which indicate
where a solution will be modified.
(b) The best solution of the initial 4 is taken as new route 1.
(c) Flip operation is applied to the best solution to create new route 2.
(d) Swap operation is applied to the best solution to create new route 3.
(e) Slide operation is applied to the best solution to create new route 4.
7. Hence, a new population is formed consisting of new solutions.
8. Steps 2 to 7 are repeated until the total number of iterations are completed.
whereby
w1 þ w2 ¼ 1 (9)
w3 þ w4 ¼ 1 (10)
The distance dnextCH needs more clarification. The designation of the primary CH is carried
out first. Then the CHs of neighbouring clusters are selected one at a time. This is done by
moving to the right and left of the primary cluster (Vertical Clustering) or inwards and
outwards (Spherical Clustering). Naturally, if the primary CH is found at an edge cluster, CH
selection proceeds in one direction only. An edge cluster would be the leftmost or rightmost
cluster in Vertical Clustering. In the case of Spherical Clustering, it would be the innermost or
outermost cluster. Hence dnextCH is the distance to the neighbouring CH which has already
been elected.
The weights w1, w2, w3 and w4 are determined after extensive trial and error simulations.
Weights w1 and w3 are varied from 0.1 to 1 and the combination of weights which result in
the highest First Node Death (FND) is selected.
where C is the C th cluster, Ctotal is the total number of clusters and x is the x coordinate
of nodes.
3.5.3 Spherical clustering. Spherical Clustering is carried out according to the distance of
nodes from the centre of the network. We consider an imaginary sphere of radius equal to the
distance of the furthest node from the centre of the network. The sphere has centre (M/2, M/2,
M/2) and is divided radially. Nodes are assigned a cluster according to between which radii of
Energy-
efficient genetic
algorithm
variants
195
Figure 7.
Vertical Clustering (3
clusters).
the sphere they lie as illustrated in Figure 8. CH selection and data transmission occur
similarly to Vertical Clustering except that multi-hop transmission occur inwards or
outwards until primary CH is reached.
Mathematically, the threshold for the C th cluster is given by:
ðC 1ÞR CR
<r< (12)
Ctotal Ctotal
where R is the distance from the centre of the furthest node and r is the distance of nodes from
the centre.
3.5.4 Number of cluster selection. The main objective of clustering is to decrease the high
delay created by a large number of hops present in a long chain. Increasing, the number of
clusters in three-dimensional networks causes the number of inter-cluster communication to
generally increase. Consequently, the energy consumed per round also increases. Therefore, a
trade-off between delay and energy exhausted must be made. The average energy consumed
per node per round for the first 1000 rounds and the maximum delay is considered.
Figure 8.
Spherical Clustering (3
clusters).
ACI The total energy consumed is:
19,3/4 X
N X
N
Econsumed ¼ initial energy residual energy (13)
X
N
¼ N 3 Eo residual energy (14)
196 The average energy consumed per node per round for the first 1000 rounds is given by:
Econsumed at 1000 rounds
Eavg−1000 ¼ (15)
N 3 1000
3.5.5 Flowchart of proposed clustered protocol. Figure 9 indicates the main steps taking place
in the proposed clustered protocol.
Figure 9.
Main stages in
proposed clustered
protocol.
3.5.6 Summary of proposed protocols. The main features of the proposed protocols have Energy-
been summarised in Table 1. efficient genetic
algorithm
3.6 Metrics variants
3.6.1 Lifetime. Network lifetime is an important metric which is concerned with the round
number at which a certain number of nodes still have energy left. It has been given a number
of definitions [23]. The following ones are considered in our study: 197
1. First time instant whereby any sensor node fully exhaust its energy. This is also
known as stability period or First Node Death (FND).
2. Time instant when a percentage of nodes remain operational in the network. When the
50% mark is considered, it is referred to as Half Node Death (HND).
3. Time instant at which all nodes are dead commonly referred to as Last Node Death
(LND).
As FND is the most important metric as many applications require all nodes to be alive to
function properly, the analysis of the results will heavily focus on it.
To illustrate the performance of our protocols in relation to this metric, a graph of number
of nodes alive against round number is plotted. Also, a table is provided to show the rounds at
which FND, HND and LND occur (Table 2).
3.6.2 Residual energy. Residual energy indicates the total amount of energy that remain
with the whole network. A graph of residual energy against round number is plotted in our
results. It helps to visualise the overall energy consumption by the network at different points
in time. The slope of the graph gives an indication of how much energy is spent at a particular
point in the lifetime of the network. An increase in the slope would indicate that energy is
expended more rapidly. As the lines on the graph may be very close to each other, two graphs
Parameter Value
where is Tq the queue delay per intermediate forwarder, Tp is the propagation delay, Td is the
transmission and hops is the number of hops from first node transmitting (at the end of a
chain) to the BS. The maximum delay of each routing protocol will be considered in the results
section.
4.2 BS inside
Figure 16 and Table 4 show that PEG-GA and PEG-GA Vertical Clustering(3) perform best
with the latter outperforming the former by 31 rounds. PEGASIS shows very poor
Energy-
efficient genetic
algorithm
variants
199
Figure 10.
Maximum delay in
PEG-GA Spherical
Clustering with
varying cluster size.
Figure 11.
Maximum delay in
PEG-GA Vertical
Clustering with
varying cluster size.
200
Figure 12.
Average energy spent
in PEG-GA Spherical
Clustering with
varying cluster size(BS
Inside).
Figure 13.
Average energy spent
in PEG-GA Vertical
Clustering with
varying cluster size(BS
Inside).
between the greedy and the GA chain length explaining the 804% increase in FND from
PEGASIS to PEG-GA.
It can be deduced from Table 5 that PEG-GA Vertical Clustering(3) performs best in terms
of load balancing. PEGASIS and PEG-GA have the worst performance as CH are selected in a
round robin fashion. PEG-GA Spherical Clustering(8) and PEG-GA Vertical Clustering(8)
result in some clusters having a few number of nodes. The latter have to share the burden of
inter-cluster transmission amongst themselves. Compared to clusters with considerably more
nodes, the clusters with fewer nodes must use the same nodes for inter-cluster transmission
more often, thus affecting load balancing in the whole network.
Energy-
efficient genetic
algorithm
variants
201
Figure 14.
Average energy spent
in PEG-GA Spherical
Clustering with
varying cluster size(BS
Outside).
Figure 15.
Average energy spent
in PEG-GA Vertical
Clustering with
varying cluster size(BS
Outside).
BS In BS Out Table 3.
PEG-GA Spherical Clustering 3 and 8 3 and 8 Number of clusters
PEG-GA Vertical Clustering 3 and 9 3 and 9 selected.
ACI
19,3/4
202
Figure 16.
Alive nodes vs rounds
(3D BS Inside).
4.3 BS outside
Figure 19 and Table 6 once again show the very poor performance of PEGASIS in a 3D
environment as explained before and will result in the GA protocols exhibiting very high
percentage of improvement over it in terms of FND. Contrary to the BS inside case, PEG-GA is
not one of the better performing protocols in terms of FND. This is because of the method of
CH selection which is completely energy and distance oblivious. The CH has a high
transmission burden and will hence expend considerably more energy than in the BS Inside
case. If a CH’s energy level is low, this high energy expense is likely cause it to die. PEG-GA
Vertical Clustering(3) outperforms other protocols for FND with a 420% and a 42.7%
improvement over PEGASIS and PEG-GA respectively.
Figures 20 and 21 indicate that PEG-GA Vertical Clustering(3) is superior in terms of
residual energy. As it has only 3 clusters, it incurs less energy expense for inter-cluster
transmission. Additionally, it has a smaller overall chain length than the other protocols. In
three-dimensional networks, the chain length of PEG-GA is smaller than the overall chain
length in the clustered protocols. PEG-GA also does not have to cater for inter-cluster
transmission. Nevertheless, it is outperformed by the three of the other clustered protocols
due to the absence of a proper CH selection mechanism. PEG-GA Spherical Clustering(8),
Energy-
efficient genetic
algorithm
variants
203
Figure 17.
Residual Energy vs
rounds (3D BS Inside).
Figure 18.
Residual Energy vs
rounds enlarged (3D
BS Inside)[Enlarged].
ACI despite having said selection mechanism, suffers from a long overall chain length. It can be
19,3/4 observed that Vertical Clustering is more adept than Spherical Clustering at producing a
smaller overall chain length for this particular network size and density.
Table 7 illustrates that PEG-GA Vertical Clustering(3) has the best load balancing
property. The Spherical Clustering protocols are inferior to their equivalent Vertical
Clustering protocols because of the uneven distribution of nodes in clusters. This causes the
same nodes to be more frequently used for inter-cluster transmission in some clusters. This
204
PEGASIS 85.5
PEG-GA 7.0
Table 5. PEG-GA Spherical Clustering(3) 12.4
Percentage residual PEG-GA Spherical Clustering(8) 21.6
energy at FND (3D BS PEG-GA Vertical Clustering(3) 2.8
Inside Case). PEG-GA Vertical Clustering(8) 15.4
Figure 19.
Alive nodes vs rounds
(3D BS Outside).
205
Figure 20.
Residual Energy vs
rounds (3D BS
Outside Case).
Figure 21.
Residual Energy vs
rounds (3D BS Outside
Case)[Enlarged].
ACI
19,3/4
effect is more noticeable for a larger number of clusters with a larger difference of residual
energy at FND (1.1%) observed between PEG-GA Spherical Clustering(8) and PEG-GA
Vertical Clustering(9).
References
[1] M. Al Ameen, S.R. Islam, K. Kwak, Energy saving mechanisms for mac protocols in wireless
sensor networks, Int. J. Distrib. Sens. Netw. 6 (2010) 163413.
[2] S. Jabbar, R. Iram, A.A. Minhas, I. Shafi, S. Khalid, M. Ahmad, Intelligent optimization of wireless
sensor networks through bio-inspired computing: survey and future directions, Int. J. Distrib.
Sens. Netw. 9 (2013) 421084.
[3] S. Lindsey, C.S. Raghavendra, PEGASIS: power-efficient gathering in sensor information
systems, IEEE Aerospace Conference Proceedings 3 (2002) 1125–1130.
[4] X. Liu, J. Shi, I. Engineering, Clustering routing algorithms in wireless sensor networks: an Energy-
overview, KSII Trans. Internet Inf. Syst. 6 (2012) 1735–1755.
efficient genetic
[5] W. Guo, W. Zhang, G. Lu, PEGASIS protocol in wireless sensor network based on an improved
ant colony algorithm, 2nd International Workshop on Education Technology and Computer
algorithm
Science ETCS 2010 (3) (2010) 64–67. variants
[6] T. Li, F. Ruan, Z. Fan, J. Wang, J.-U. Kim, An improved PEGASIS routing protocol based on
neural network and ant colony algorithm, Int. J. Future Gener. Commun. Networking 8 (2015)
149–160. 207
[7] S. Ghosh, W. Bengal, Enhanced PEGASIS using Ant Colony Optimization for data gathering in
WSN, in: 2016 International Conference on Information Communication and Embedded Systems
(ICICES), 2016, pp. 1–6.
[8] S. Feng, B. Qi, L. Tang, An improved energy-efficient PEGASIS-based protocol in wireless sensor
networks, in: Proceedings – 2011 8th International Conference on Fuzzy Systems and Knowledge
Discovery, FSKD 2011 4 (2011) 2230–2233.
[9] G. Zheng, Z. Hu, Chain routing based on coordinates-oriented clustering strategy in WSNS, in:
2009 International Symposium on Computer Network and Multimedia Technology, 2009,
pp. 1–4.
[10] N. Ramluckun, V. Bassoo, Energy-efficient chain-cluster based intelligent routing technique for
Wireless Sensor Networks, Appl. Comput. Inf. (2018).
[11] S. Roy, N. Mukherjee, Topology construction of 3d wireless sensor network, in: Advances in
Computing and Information Technology, Springer, 2012, pp. 533–542.
[12] J. Heidemann, M. Stojanovic, M. Zorzi, Underwater sensor networks: applications, advances and
challenges, Philos. Trans. R. Soc. A: Math., Phys. Eng. Sci. 370 (2012) 158–175.
[13] S. Kohli, P. Pratim Bhattacharya, M. Kumar Jha, Implementation of homogeneous leach protocol
in three dimensional wireless sensor networks, Int. J. Sens. Wireless Commun. Control 6 (2016)
4–11.
[14] M. Baghouri, A. Hajraoui, S. Chakkor, Three-dimensional application-specific protocol
architecture for wireless sensor, Networks 15 (2015) 352–360.
[15] H.H. Mukhairez, A.Y. Maghari, Performance Comparison of Simulated Annealing, GA and ACO
Applied to TSP 6, 2015.
[16] D. Wohwe Sambo, B.O. Yenke, A. F€orster, P. Dayang, Optimized clustering algorithms for large
wireless sensor networks: A review, Sensors 19 (2019) 322.
[17] N. Anjum, M. Ahmad, S. Ahmad, Gateway based energy efficient routing: GEER, Int. J. Adv. Res.,
Ideas Innovations Technol. 3 (2017) 483–488.
[18] D. Sharma, A. Goap, A.K. Shukla, A.P. Bhondekar, in: Proceedings of 2nd International
Conference on Communication, Computing and Networking, vol. 46, Springer Singapore, 2019,
https://doi.org/10.1007/978-981-13-1217-5, URL: http://link.springer.com/10.1007/978-981-13-
1217-5.
[19] Y. Jaradat, M. Masoud, I. Jannoud, A mathematical framework of optimal number of clusters in
3D noise-prone WSN environment, IEEE Sens. J. PP (2018) 1.
[20] M. Mitchell, An Introduction to Genetic Algorithms, MIT, 1998.
[21] D. Gupta, S. Ghafir, An overview of methods maintaining diversity in genetic algorithms, Int. J.
Emerging Technol. Adv. Eng. 2 (2012) 56–60.
[22] J. Kirk, Traveling salesman problem – genetic algorithm, 2014. MATLAB Central File Exchange.
[23] H. Yetgin, K.T.K. Cheung, M. El-Hajjar, L. Hanzo, A survey of network lifetime
maximization techniques in wireless sensor networks, IEEE Commun. Surv. Tutorials 19
(2017) 828–854.
ACI [24] H. Kareem, H. Jameel, Maintain load balancing in wireless sensor networks using virtual grid
based routing, in: Protocol, 2018 International Conference on Advanced Science and Engineering
19,3/4 (ICOASE), 2018, pp. 227–232.
Corresponding author
Vandana Bassoo can be contact at: [email protected]
208
For instructions on how to order reprints of this article, please visit our website:
www.emeraldgrouppublishing.com/licensing/reprints.htm
Or contact us for further details: [email protected]