21 Mateen MSThesis
21 Mateen MSThesis
21 Mateen MSThesis
net/publication/335652228
CITATIONS READS
38 1,465
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Abdul Mateen on 11 April 2020.
by
Hafiz Abdul Mateen
CIIT/FA17-RCS-009/ISB
MS Thesis
in
Computer Science
Spring, 2019
COMSATS University Islamabad
A Thesis presented to
in partial fulfillment
of the requirement for the degree of
MS (Computer Science)
by
Hafiz Abdul Mateen
CIIT/FA17-RCS-009/ISB
Spring, 2019
i
Towards Energy Efficient Routing in Blockchain
Based Underwater WSNs via Recovering the Void
Holes
Supervisor:
Co-Supervisor:
ii
Final Approval
by
Hafiz Abdul Mateen
CIIT/FA17-RCS-009/ISB
External Examiner:
Dr. Imtiaz Ahmad Taj
Professor, Dean Faculty of Engineering,
Capital University of Science and Technology (CUST),
Islamabad, Pakistan.
Supervisor:
Dr. Nadeem Javaid,
Associate Professor, Department of Computer Science,
COMSATS University Islamabad, Islamabad, Pakistan.
Co-Supervisor:
Dr. Sohail Iqbal,
Assistant Professor, Department of Computing,
School of Electrical Engineering and Computer Science (SEECS),
National University of Sciences and Technology (NUST),
Islamabad, Pakistan.
HoD:
Dr. Majid Iqbal Khan,
Associate Professor, Department of Computer Science,
COMSATS University Islamabad, Islamabad, Pakistan.
iii
Declaration
iv
Certificate
Date:
Supervisor:
Co-Supervisor:
v
DEDICATION
Dedicated
I am dedicating this thesis to my parents, who always support me
in my hard times and give me strength and encouragement to
achieve my goals. Thank you for supporting me and teaching me to
believe in me and my dreams. Without their support, I am unable
to complete this competitive phase of education. Without their
love and affection, none of this would matter.
vi
ACKNOWLEDGMENT
Thanks to ALLAH Almighty for giving me strength and ability to complete this
thesis. I deem it my pleasure to avail an opportunity to express the deepest appre-
ciation to my supervisor, Dr. Nadeem Javaid, Associate Professor at COMSATS
University Islamabad, for his enlightened supervision during my research period.
I owe a deep sense of gratitude to my family and friends (especially Arshed Sher,
Nimra Saleemi, Ayesha Anjum Butt and Tehreem Ashfaq) for their sincere guid-
ance, keen interest and encouragement throughout the degree.
vii
ABSTRACT
Towards Energy Efficient Routing in Blockchain Based
Underwater WSNs via Recovering the Void Holes
Underwater Wireless Sensor Networks (UWSNs) are promising and emerging frame-
works having a wide range of applications. The underwater sensor deployment is
beneficial; however, some factors limit the performance of the network, i.e., less
reliability, high end to end delay and maximum energy dissipation. The provision-
ing of the aforementioned factors has become a challenging task for the research
community. In UWSNs, battery consumption is inevitable and has a direct im-
pact on the performance of the network. Most of the time energy dissipates due
to the creation of void holes and imbalanced network deployment. In this work,
two routing protocols are proposed to avoid the void hole and extra energy dis-
sipation problems due to which lifespan of the network will increase. To show
the efficacy of the proposed routing schemes, they are compared with the state of
the art protocols. Simulation results show that the proposed schemes outperform
their counterpart schemes.
By keeping in mind the emerging security issues in sensor networks, we have pro-
posed a blockchain based trust model for sensor networks to enrich the security of
the network. Additionally, this model provides security along with data immutabil-
ity. We have used a private blockchain because it has all the security features that
are necessary for a private sensor network. Moreover, private blockchain cannot
be accessed by using the Internet. In the proposed trust model, the Proof of
Authority (PoA) consensus algorithm is used due to its low computational power
requirement. In PoA consensus mechanism, a group of the validator is selected
for adding and maintaining blocks. Moreover, smart contracts are used to val-
idate and transfer cryptocurrency to service providers. In the end, transaction
and execution costs are also calculated for each function to testify the network
suitability.
viii
Journal Publications
ix
Conference Proceedings
1 Mateen, Abdul, Nadeem Javaid, Muhammad Awais, Nasir Khan, Urva Latif,
and Ihtisham Ullah. “Bio-Inspired Optimization Techniques for Home En-
ergy Management in Smart Grid.” In 2018 32nd International Conference on
Advanced Information Networking and Applications Workshops (WAINA),
pp. 250-257. IEEE, 2018.
3 Awais, Muhammad, Abdul Mateen, Zahoor Ali Khan, and Nadeem Javaid.
“A Survey on Multi-hop Routing Protocols for Efficient Resource Alloca-
tion in IoTs.” In 2018 Fifth HCT Information Technology Trends (ITT), pp.
239-244. IEEE, 2018.
4 Butt, Suhail Ashfaq, Abdul Mateen, Nadeem Javaid, and Zahoor Ali Khan.
“Towards the void hole alleviation for energy efficiency in WSN.” In 2018
Fifth HCT Information Technology Trends (ITT), pp. 318-324. IEEE, 2018.
5 Awais, Muhammad, Nadeem Javaid, Abdul Mateen, Nasir Khan, Ali Mo-
hiuddin, and Malik Hassan Abdul Rehman. “Meta Heuristic and Nature
Inspired Hybrid Approach for Home Energy Management Using Flower Pol-
lination Algorithm and Bacterial Foraging Optimization Technique.” In 2018
IEEE 32nd International Conference on Advanced Information Networking
and Applications (AINA), pp. 882-891. IEEE, 2018.
6 Awais, Muhammad, Zahoor Ali Khan, Nadeem Javaid, Abdul Mateen, Ay-
men Rasul, and Farooq Hassan. “Cluster-Based Routing Protocols with
Adaptive Transmission Range Adjustment in UWSNs.” In International
Conference on Emerging Internetworking, Data & Web Technologies, pp.
x
528-539. Springer, Cham, 2019.
8 Latif, Urva, Nadeem Javaid, Syed Shahab Zarin, Muqaddas Naz, Asma Ja-
mal, and Abdul Mateen. “Cost Optimization in Home Energy Management
System using Genetic Algorithm, Bat Algorithm and Hybrid Bat Genetic
Algorithm.” In 2018 IEEE 32nd International Conference on Advanced In-
formation Networking and Applications (AINA), pp. 667-677. IEEE, 2018.
9 Javaid, Nadeem, Ihtisham Ullah, Syed Shahab Zarin, Mohsin Kamal, Ba-
batunji Omoniwa, and Abdul Mateen. “Differential-Evolution-Earthworm
Hybrid Meta-heuristic Optimization Technique for Home Energy Manage-
ment System in Smart Grid.” In International Conference on Innovative Mo-
bile and Internet Services in Ubiquitous Computing, pp. 15-31. Springer,
Cham, 2018.
xi
TABLE OF CONTENTS
Dedication vi
Acknowledgements vii
Abstract viii
Journal Publications 69
Conference Proceedings 70
1 Introduction 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1.2 Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.5 Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.2.1 Sub-problem 1 . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2.2 Sub-problem 2 . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3 System Models 19
4.1 GEDAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2 LMPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4.3 GEDPAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4.4 E2EVHR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
xiii
5 Simulation Results and Discussions 39
5.1.1 Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5.1.2 Throughput . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5.1.3 PAR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5.3.1.2 Ganache . . . . . . . . . . . . . . . . . . . . . . . . 53
5.3.1.3 MetaMask . . . . . . . . . . . . . . . . . . . . . . . 53
xiv
5.3.2.2 Estimating Transaction Cost . . . . . . . . . . . . 54
6.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
7 References 63
Journal Publications 69
Conference Proceedings 70
xv
LIST OF FIGURES
xvi
LIST OF TABLES
xvii
List of Algorithms
1 Periodic Beaconing . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2 Beacon Receive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3 Next Forwarder Node Selection . . . . . . . . . . . . . . . . . . . . 32
4 Void Hole Recovery for GEDAR . . . . . . . . . . . . . . . . . . . . 33
5 LMPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
6 Void Hole Recovery for GEDPAR . . . . . . . . . . . . . . . . . . . 36
7 E2EVHR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
xviii
List of abbreviations
xix
PoA Proof of Authority
PoC Proof of Collaboration
PoW Proof of Work
RF Radio Frequency
SDN Software Dened Network
UWSN Underwater Wireless Sensor Network
WSN Wireless Sensor Network
xx
List of symbols
xxi
Chapter 1
Introduction
1
CHAPTER 1. 1.1. INTRODUCTION
1.1 Introduction
The planet Earth, on which we live our lives, consists of 70% water. Whereas,
the oceans hold more than 90% of total water. This much quantity shows the
importance of the water medium. To explore the underwater medium for getting
and sharing the important information, a network is deployed in a specific region.
Information transmission using Underwater Wireless Sensor Networks (UWSNs)
is one of the emerging technologies and is used for the betterment of ocean obser-
vation systems. Applications of UWSNs range from aquaculture to oil industry;
instrument monitoring to climate recording; pollution control to prediction on
natural disasters; search and survey purposes to submarine purposes.
The sensor node in a UWSN acquires the desired information and transmit towards
the next forwarder node which is closer to the sink1 [1]. This sink may be the
onshore data center or a simple sensor node over the water surface. In the data
forwarding procedure, the source2 node generates data packets and communicate
with its neighbors to find the potential node. Afterward, the potential neighbor
node finds the next potential node from its neighbors and transmit data packet
towards that potential node. To find the potential neighbor from the forwarder
node, some criteria and routing procedure are defined. This criterion may base
upon efficient energy utilization or alleviation of void holes.
Blockchain attracts great courtesy of researchers as they have faith in that this
technology will bring remarkable changes and opportunities to industries. Blockchain
is very powerful technology for resolving trusted communications in a decentralized
fashion. Basically, it deals digitally and exemplified by the Bitcoin. This tech-
nology was introduced back in 2008 and circulated by the cryptography mailing
group.
The Radio Frequency (RF) waves cannot be used in an underwater medium. The
reason behind is that RF technology increases the energy consumption by increas-
ing the attenuation factor. At lower frequencies (30 to 300 HZ), water becomes
a conductor for RF waves. Moreover, the frequencies in this range require the
large size of antennas and these antennas require high transmitting power for data
transmission. These requirements cannot be fulfilled in UWSNs. Consequently,
RF waves cannot be used in UWSNs. Additionally, the technology of optical
waves requires very high precision on a single point for a transmitter and a re-
ceiver. However, sensor nodes move with the water current. In essence, we have
to use the acoustic waves in UWSNs. Nevertheless, the speed of acoustic waves is
almost five orders of magnitude less than the speed of RF waves [2].
The design of routing protocols has paramount importance in UWSN. These pro-
tocols indicate the routing path for data from the source node at the bottom
towards the sinks node at the surface of the ocean. Expressly, these protocols
face the different challenges which are associated with the underwater medium,
e.g., limited battery resources, interference, noise, reliable Packet Delivery Ratio
(PDR), high propagation delay, movements of sensors and void holes.
Efficient energy usage is one of the most important task during the design of a
routing protocol. As the batteries of sensor nodes in an underwater environment
are non-removable and have limited energy storage. This issue provides a strong
base for efficient battery utilization. Mostly, energy dissipates during the processes
of data packet transmission and reception. Efficient energy usage depends on var-
ious factors. For instance, the initial position and number of anchor nodes; sensor
nodes and the way in which nodes are deployed. The deployment of a network
must be one of the two types 1) sparse deployment and 2) dense deployment. The
sparse deployment leads toward the creation of a void hole and dense deployment
results in an excessive amount of sensors failure.
The energy and network stability have a direct relation. As more will be the
energy of sensors, longer will be the stability of the network and vice versa. Void
holes are areas within the transmission range of a network where a node cannot
find its next neighbor or forwarder. The void holes creation has following reasons
1) node becomes dead due to a lot of energy usage and 2) no forwarder node.
Topology control has the ability to overcome the undesired effects of UWSNs and
consequently to enhance the performance of routing protocols. The relationship
between topology control and UWSN is summarized as follows [7]:
• Blockchain based trust model for sensor networks is also proposed in current
thesis to enrich the security of the network.
• Smart contract for trusted blockchain model is written and transaction and
execution costs are recorded.
The rest of this thesis is organized as follows: Chapter 2 includes related work
and problem statement. The system models for routing protocols and blockchain
based trust model are presented in Chapter 3. The existing and proposed schemes
along with algorithms’ are elaborated in Chapter 4. The detailed discussions on
extensive simulation results are written in Chapter 5. Finally in Chapter 6, the
thesis is concluded along with the future work.
In this chapter, overview of UWSNs, WSNs, blockchain and routing protocols are
provided. Energy efficiency, network lifetime and the concept of void holes are
also discussed in this chapter. In addition, the existing literature regarding the
challenges for routing protocols are also mentioned. Nevertheless, the state of the
art literature regarding the aforementioned things will be provided in Chapter 2.
5 Thesis by: Hafiz Abdul Mateen
Chapter 2
6
CHAPTER 2. 2.1. RELATED WORK
In this chapter, we review and compare some recent works on the basis of covering a
specific area of UWSNs. The works which cover the energy efficiency and void holes
are compared in section 2.1.1. Additionally, the works that cover the concept of
localization or geographic routing are compared in section 2.1.2. Moreover, section
2.1.3 represents the comparison of topological control based schemes. The concept
of a void hole is presented in section 2.1.4. Finally, the works which implement
blockchain are presented in section 2.1.5. Nevertheless, Table 2.1 provides the
summary of these works.
The research works [3, 4, 5, 6] proposed different schemes to enhance the energy-
efficiency. The works in [3] and [4] have used the multi-hop techniques. Whereas,
the work [3] is focusing on network reliability, mobility management, PDR and
energy efficiency. On the other hand, the work [4] is only focusing on energy
efficiency. Both works [3] and [4] achieve their objectives; however, end to end
delay is compromised. The authors in works [5] and [6] mainly focus on reliability
by covering one-hop from the forwarder node. The proposed scheme EBLE from
the work [5] aims to minimize the energy dissipation with packet size management.
The objective is successfully achieved on the cost of delay. The cooperative routing
is used in work [6] for data reliability and mobility management, while PDR and
efficient energy usage are the main aims. The objectives are achieved successfully;
however, the network performs poorly in sparse network deployment.
The works [10, 11, 12, 13] are also using energy efficiency techniques. The works
[10] and [12] provide the reliability. Both of works discuss the concept of multi-
hoping. The proposed scheme in the work [10] is beneficial for a large amount of
data packets; however, this proposed technique does not perform well in sparse
network deployment. The MLPR from [12] looks toward the efficient path for
routing by utilizing minimum energy. For the implementation of MLPR, more
memory is required for the extra operations at each node. The energy dissipation
schemes; SDVF and EBULC are proposed in works [11] and [13], respectively. Both
schemes consider mobility management for decreasing the energy consumption in
UWSNs. Results show that end to end delay in the works [11] and [13] is enhanced.
The energy efficiency is focused in the works [14, 15, 16, 17]. In [14], some data
collection methods are discussed which used minimum energy for data transmis-
sion from source to the destination. In both [14] and [15], mobility management is
considered, while in the [14], reliability and packet size management is not consid-
ered. Nevertheless, the works [15, 16, 17] focus on the reliability of the network.
Additionally, [15] considers both types of forwarding strategies; single-hop and
multi-hop. While [14], [16] and [17] only focus on single-hop from the current
node. Moreover, the work in [15] considers the security issues of UWSNs. While
in [14], the authors discusses the problems of getting route information. In [16],
the complexity of the network is a major challenge. Additionally, the authors in
[17] work for energy efficiency by managing the size of data packet.
2.1.2 Localization
The authors in [1, 2, 9, 18, 22] discussed the geographic or localization-based rout-
ing. The work in [1] and [2] review the works in which the concept of localization
based routing is used. Both of these above, discuss reliability and none of them
work on mobility management or packet size management. Moreover in [1] and
[2], the concept of single-hop and multi-hop is devised. The challenges which are
discussed in these works are high interference, limited batteries of sensor nodes,
low bandwidth and malicious attacks. The work in [18] achieves the higher PDR
by finding the locations of alive nodes. Afterward, the data packets are sent to
these alive nodes, accordingly. The challenges discussed in [22] are localization,
feasible hardware, relevant simulation tools and low power gliders.
Authors in [4, 7, 8, 20] proposed topology control based solutions. TCEB and
GARM schemes are proposed for controlling the topology of UWSNs in [4] and
[8], respectively. In addition, the [7] classifies different topological protocols. From
[7], reliability and mobility is discussed. The work [7] focuses on single-hop and
multi-hop while the work [4] only focus on next forwarder node. The challenges
that discussed in [4, 7, 8, 20] are: high attenuation, mobility of sensor nodes, energy
efficiency, low bandwidth, connectivity loss, high bit rate error, high deployment
cost, complexities and optimal location of glider. Using dynamic topological strat-
egy, work in [4] achieves energy efficiency and the work in [8] enhances both PDR
and energy efficiency. In [20], mobility management is a major consideration using
8 Thesis by: Hafiz Abdul Mateen
CHAPTER 2. 2.1. RELATED WORK
EEL and the concept of multi-hoping. In addition, the work [20] achieves better
simulation results from compared ones.
The concept of a void hole is presented in [21, 23, 24, 25]. Void holes are the
regions within the network range from where further data delivery is not possible.
In other words, if a forwarder node does not have any further node for data packet
transmission then this node is called void node and the area where transmission is
not possible in called void holes. TORA is presented in [21] in order to avoid the
void holes. The proposed scheme uses the concept of multi-hoping to avoid void
holes and to improve energy efficiency. Nevertheless, reliability and complexity of
this scheme are not discussed.
2.1.5 Blockchain
In [34], Lin et al. proposed a blockchain-based solution for Long Range Wide Area
Networks (LoRaWAN). Authors integrate blockchain and LoRaWAN by consider-
ing the crowd sensing and sharing economy. They developed a LoRaWAN server
to solve the problems of trust on private network operators and lack of network
The authors in [36] proposed a data transmission scheme based on the multi-
link concurrent communication tree model. It is to handle the failure nodes in
blockchain. Results show that proposed scheme works effectively for 15% of failed
nodes. However, if this number reaches the 30%, communication time and delay
will increase.
In [37], problem of user access control for network optimization in a data-intensive
application was identified. Proposed solution considers authenticity of Channel
State Information (CSI) using blockchain consensus and deep learning. Analysis
shows that the proposed scheme increases the spectral efficiency.
Branch based blockchain technology for Intelligent Vehicles (IVs) was proposed in
[38]. Branching is done at Locally Dynamic Blockchain (LDB). It is to handle the
large amount of data generated by IVs. While blockchain is used to keep track of
the data generated by IVs and to verify it. Additionally, the concept of Intelligent
Vehicle Trust Point (IVTP) is also introduced to build the trust. Problem with
branching is that duplicate state changes increase with increasing load.
The authors in [39] identified that there is a need to revise the current storage
mechanisms to save the storage space. They proposed the Network Coding based
Distributed Storage (NC-DS) framework and embed it into existing blockchain
to store the encoded packets of the block. They implemented NC Determinis-
tic DS (NC-DRDS) and NC Rate less DS (NC-RLDS) to save the storage space.
Analysis shows that the storage space can be largely saved using the above men-
tioned mechanism. However, due to different encoded packets on different nodes
consensus mechanism cannot be applied to defend from pollution attack.
Type of technique Technique/ Reliability Packet size Mobility Number Achievements Challenges Limitations
Protocol management management of hops
RE-PBR [3] X x X Multi-hop PDR and energy ef- Difficult to deploy dense In dense deployment, end
ficiency is enhanced network to end delay is increased
TCEB [4] x x x Multi-hop Less energy dissipa- Serious cause of energy End to end delay is en-
tion consumption is attenua- hanced
tion in UWSNs
EBLE [5] X X x Single-hop Lower energy dissi- Path loss/dead due to con- Energy consumption is de-
pation by balancing tinuous data packet trans- creased on the cost of de-
the traffic load mission lay
Cooperative X x X Single-hop Successful packet Wireless sensor nodes Network performance de-
routing [6] delivery and lower move with current grades in sparse conditions
Energy efficiency energy usage
CS [10] X x x Single- Beneficial for large Less number of resources Does not perform effec-
hop and amount of data and energy efficiency tively in Sparse network
multi-hop packets deployment
SDVF [11] X X X Single- Increase network Energy efficiency, network Increase in source to desti-
hop and lifetime and PDR complexity and routing se- nation delay
11
multi-hop curity
MLRP [12] X x x Multi-hop Find efficient path Loss of data during trans- More memory at each node
and minimize en- mission process is required for extra oper-
ergy dissipation ations
EBULC [13] x x X Multi-hop Energy efficiency Complexity of UWSNs Energy usage is minimizes
on the cost of end to end
delay
Energy ef- x x X Multi-hop Energy efficiency Overhead of routing infor- Delay is increased
ficient data enhanced success- mation and increase in op-
collecting fully erational time
method [14]
Review of X x X Single- - Security issues and energy Does not discuss the com-
existing tech- hop and consumption plexity of the reviewed
niques [15] multi-hop schemes
Retransmission X x x Single-hop Enhanced PDR Complexity of the network Proposed scheme is too
and redundant much complex to imple-
approach [16] ment
Integer-linear X X x Single-hop Lifetime of network Optimal solution for en- Source to destination de-
programming is increased ergy dissipation and data lay is increased
[17] packet size
12
TCEB [4] x x x Multi-hop Energy consump- Topology change is not End to end delay is in-
tion is reduced much efficient due to at- creased
due to dynamic tenuation
topology
Topology control based Classify topol- X x X - - Mobility of sensor nodes Does not provide efficient
ogy control al- makes difficulty in efficient algorithm
gorithm [7] usage of batteries, loss of
connectivity and high bit
rate error
GARM [8] x x x Single-hop PDR and energy ef- Optimal location of glider Proposed scheme works
ficiency enhanced and minimum channel at- better in predefined envi-
tenuation ronment
TORA [21] X x x Multi-hop End to end delay Low bandwidth, high la- Proposed scheme takes
Void node and alleviation of tency and error rate more time on computa-
void holes tions
GEDAR [24] X x X Multi-hop Void hole avoidance Computations and energy Energy consumption for
consumption depth adjustment is high
LMPC [25] X x x Multi-hop Void hole allevia- Dividing the network area Communication overhead
tions into layers due to multiple copies,
which results in communi-
cation delay
Validation
algorithm
Blockchain oriented IoT PoA Proposed scheme Efficient coordination be-
secure service pro- guards lightweight tween devices is still miss-
visioning mechanism devices ing
[31]
LoRaWAN [34] Crowd sensing - Solved the trust and Computational complexity
security problems is increased
Multi-link concurrent WSN - Proposed scheme Delay and computation
communication tree works effectively till time is increased when
model [36] 15% of nodes failure node failure reached at
30%
Network optimiza- IoT IVTP IVTP is introduced Duplicate state changes in-
Blockchain tion in a data- for building the trust crease with increasing load
intensive application between devices
[38]
NC-DRDS and NC- Storage issue in IoT - Storage is largely Due to different encoded
RLDS [39] devices saved packets on different nodes,
13
consensus mechanism can-
not be applied.
DApps framework for Automation and dis- PoW Security is major con- Transaction confirmation
multi domain service tributed harmony is- cern time should be defined
orchestration [40] sues in networking
Blockchain-based Privacy protection - Increased the user’s Results obtained on a lim-
location privacy in IoT devices using participation ited data
protection incentive CMA
mechanism [41]
Blockchain is inte- IoV PoW Large data storage Throughput is enhanced
grated with IoVs [44] and security issues on the cost of delay
Blockchain based AI-powered net- PBFT The proposed frame- No reward is given to the
data sharing frame- works work performs well in data provider
work [46] terms of privacy, secu-
rity and scalability
Rolling blockchain IoT - Removed PoW and Security issues and pollu-
[49] provide the central tion attacks are ignored
storage
Decentralized trust IoV PoS and PoW Finding of correct Security of the vehicle
management system nonce for hash func- owner is compromised
[54] tion
Increased male participation can also be seen in the proposed system. Conven-
tional models of business are not fit for E-business on IoT. Therefore, an IoT
E-business model is proposed in [42]. This model uses blockchain and smart con-
tract techniques. There are two main commodities in the model. Decentralization
is achieved using blockchain and smart contract is used to control the ownership
of assets. Realization of exchange of ownership of assets and designing a uniform
data format is still missing.
In [43], the authors proposed blockchain-based big data sharing framework to build
the trust among edge devices. They use Proof of Collaboration (PoC) consensus
mechanism, Futile Transaction Filters (FTF) algorithm, Express Transactions (E-
TX) and hollow blocks to save computational resources, storage resources and to
enhance the network efficiency respectively. They achieved high throughput and
low network usage. Designing the blockchain layer in the proposed framework in
a green and efficient manner is still an issue.
In [46], the authors proposed the first blockchain-based data sharing framework for
AI powered network operations. The authors used blockchain and smart contract
to overcome the issues of secure data sharing. For data validation the proposed
framework uses Practical Byzantine Fault Tolerance (PBFT) consensus algorithm.
The results show that the proposed framework performs well in terms of privacy,
security and scalability. However, no reward is given for data provider to motivate
them to share their data.
In [49], the authors proposed a method by considering the issues of research data
right management. The proposed method uses smart contract and blockchain to
manage research data right between publisher and user. The results show that
the cost of setting and execution of smart contract is approximately 1.87$ which
is very low as compared to Elsevier and Springer. However, the publishers are not
rewarded so they will not publish their research data for reuse. The authors in
[50] proposed a rolling blockchain concept for IoT devices. The IoT devices have
battery resources and computational power to carry out PoW. The results show
that the blockchain remains stable with increasing number of attacks. The lost
blocks depend on the density of the sensors and attack intensity. Rahmadika et.al
proposed a model for energy trading in a small environment by using blockchain.
Chord algorithm is used in the overlay network for fast distributed computation
of hash function mapping keys. Hash function mapping keys are distributed to
nodes responsible for them. The results show that 51% of the mining power is
required to add an invalid block in the blockchain. However, the attacks in the
overlay network are ignored in this work.
The authors in [53] examine how blockchain technology facilitates the transition of
health-care from institution driven to patient driven interoperability. The authors
summarized the work by declaring the challenges which should be addressed before
the implementation of the proposed solution. However, the challenges are clinical
transaction volume, privacy and security, patient key management and reward in
form of cryptocurrency.
In [54], the author analyses some of the present blockchain networks to determine
that they satisfy Metcalf’s law or not. The digital currency the network has is
considers the value of the network. The number of unique addresses, engage with
the network per day is considered as users of the network. Furthermore, a new
model is proposed, the value of the network is proportional to the exponential of
the square root of the active users. The analysis shows that the growth in the value
of the network is proportional to the number of addresses participating actively in
the network.
The authors in [55] proposed novel hybrid network architecture by leveraging SDN
and blockchain technology. The proposed architecture is divided into two parts;
core network and edge network. By dividing the architecture into two parts, the
architecture has both centralized and distributed features and strengths. The
proposed architecture is compared to ethereum blockchain and the difference of
16.1s is observed in latency. However, edge nodes are not deployed efficiently and
have issues in enabling caching techniques at edge nodes.
This section contains two problem statements. In section 2.2.1, the limitations for
existing state of the routing protocols for Underwater environment are discussed
and after that, solution for the problems are also proposed. In section 2.2.2, the
existing security limitations are discussed and trust model for the avoidance of
malicious nodes is proposed.
2.2.1 Sub-problem 1
In UWSN, each sensor has limited resources and requires effective utilization of
these resources. Efficient energy consumption has a major contribution to stabilize
the network for long term communication. In UWSNs, the packet is sent from the
source node to the sink node using different relay nodes. If a node cannot find
a forwarder node in its transmission range, it causes hindrance in the network
during communication.
In order to avoid the void holes in UWSNs, a routing protocol namely GEDAR
is presented in [24]. GEDAR addresses the issue by adjusting the depth of nodes;
however, the process of depth adjustment consumes lots of energy. In [25], LMPC
routing technique addresses the efficient data transmission by making the binary
tree from the root node. However, binary tree generation consumes high energy
and leads towards the transmission overhead. To overcome the aforementioned
problems, two routing protocol namely GEDPAR and E2EVHR are proposed for
avoiding the void holes and eliminating the extra energy consumption.
2.2.2 Sub-problem 2
In current chapter, first, the related work for sensor networks is elaborated. Sec-
ond, the state of the art work for blockchain is discussed. After that, a compre-
hensive and comparative analysis among current works is also performed in this
chapter. In the end, problem statements for our proposed work are written. In
Chapter 3, the proposed system models for routing protocols and blockchain based
trust model will be presented.
System Models
19
CHAPTER 3. 3.1. PROPOSED SYSTEM MODEL 1
In this chapter, two system models are elaborated. System model in section 3.1.1
represents the end to end path recovery along with adaptive transmission range
and depth adjustment. The second system model for our another proposed routing
protocol is presented in Figure 4.2
In this section, our first proposed system model is presented in Figure 3.1. This
system model consists of source nodes, relay nodes and sonobuoys. Source node
forwards data packets toward the destined sonobuoys during transmission. The
proposed protocol follows multi-hoping feature for packets transmission. Source
and relay nodes only use acoustic signals while radio waves are used for communi-
cation among sink node, submarine, satellite, base station and the main processing
unit.
In the proposed system model 1 (Figure 3.1), sensor nodes are randomly deployed
in an underwater medium. Nevertheless, sink nodes are deployed at the sea sur-
face. The same transmission range and energy are assigned to each sensor node.
Moreover, each sensor node has also the ability to adjust their depth from the
lower layer to the upper layer. During depth adjustment, nodes only move in a
vertical direction. The process of depth adjustment occurs in the case when a node
cannot find its next forwarder even by increasing the transmission range. There
are three different cases that are elaborated through the proposed system model
1.
• Successful transmission
Satellite
Submarine
Sink node
L4
New Depth
Base station
R1
R1
L3
Recovered node via enhancing
transmission range
Recovering node that enhanced
transmission range
L2
Node after depth adjustment
Relay node
L1
Source node
Radio waves
Acoustic waves
Figure 3.1: End to End Adaptive Transmission Range and Depth Adjustment
Based Model
a packet is transmitted from the initial node, it follows different paths to reach a
destination. During transmission process, packet moves from one depth to other
and one layer to other. However, the direction of the packets is the sink node.
Sink node
Void node
Source node
of a void hole. On the other hand, LMPC uses the concept of the binary tree and
forward multiple copies of each packet.
In the proposed scheme, we can use the option of an increase in transmission range
or depth adjustment. Depth adjustment is used in the case when a neighbor node
could not found even in maximum transmission range. Figure 3.3 presents the
transmission range adjustment. The solid circle shows the original transmission
range while dotted circle shows the enhanced transmission range. Depth adjust-
ment procedure is shown in Figure 3.4. In this figure, R1 shows the minimum
transmission range and R2 indicates the maximum transmission range. In case,
if a node cannot find next forwarder in R2 then the current node must adjust its
depth vertically. The node in blue color shows the new depth.
Sensor nodes are deployed in an underwater environment and each sensor generates
a hello message (control message) to find its neighbors. This hello message is a
tuple of several things: source-id, destination-id, the status1 of a node (dead or
alive), type of node (source node or sink node), coordinates node and residual
energy of current node. This structure is presented in Figure 3.5.
1
Status: The words state and status are used alternatively to show the state of nodes.
Sink node
Source node
Figure 3.3: Transmission Range Adjustment
Sink node
Depth adjustment
R1 R2
Source node
Figure 3.4: Depth Adjustment
The estimated and the actual distances of each neighbor are calculated on the
basis of coordinates.
Hello packet
According to our proposed system model, neighbor node is selected on the op-
timality basis. The criteria for optimality in this scenario for a node is to have
efficient energy and must lead towards the sink node. Optimal energy point for a
node is calculated using the following formula (adapted from [24]):
s
B
DistSDop = σ . (3.1)
(1 − 2(1−σ) )
Here, DistSDop represents the optimal distance from source to the destination
node. Where, σ is a path loss constant and calculation for B is as follows:
B = 2 × Ecom . (3.2)
Where, Ecom represents the communication energy. The slope for straight line m
from source node to the destination node is calculated as:
yS − yD
m= . (3.3)
xS − xD
Here, yS , yD , xS and xD are the coordinates of sending and receiving nodes. The
Eq. 3.4 describes the path loss during attenuation of signal. This equation is taken
from [24].
where, a(f ) is the absorption coefficient, k is a spreading factor and DistSDop in-
dicates the optimal distance from a source to the destination node. The absorption
coefficient is described by Throp’s formula.
0.11 × f 2 44 × f 2
10loga(f ) = ( ) + ( ) + 2.75 × 10−4 f 2 + 0.003. (3.5)
1 + f2 4100 + f 2
Transmitting probability for any node with distance d is calculated using the Eq.
3.6.
Turbulence noise N oisetur , shipping noise N oiseship , wind noise N oisewind and
thermal noise N oisether are calculated using the Eqs. 3.7, 3.8, 3.9 and 3.10, re-
spectively. These aforementioned equations are taken from [18].
In this section, the blockchain base system model for malicious node avoidance in
WSNs is presented. The key components for this system model are classified as
follow:
• Main server
• Sink nodes
These sensor nodes only monitor the environment and collect the real-time data
and upload this data to the associated sink node.
These nodes perform three major responsibilities; first, data collection from ordi-
nary sensor node; second, new node addition using PoA consensus mechanism and
last, smart contract execution which is published by the main server. Sink nodes
differentiate data on the base of id and location of the ordinary node. Each sink
node has its own database consists of hashes to keep the record of transactions.
Every sink node has the ability to communicate with ordinary sensor node, other
sink nodes and the main server. Sink node uses the private keys for accessing the
data from the main server.
The main server is also known as endpoint or base station. The major tasks for
base station are to publish the smart contracts, issuance of activity and processing
of sensed data. The main server records each and every transaction along with
sink id and location in its immutable database. This database can only be accessed
by the main server itself or pre-authorized sink nodes.
It can be observed from the Figure 3.6 that the ordinary nodes are connected with
sink nodes. Every sink node will get the data from ordinary sensor nodes. Sink
nodes can send their data to other sinks as well as to the main server. Where, a
smart contract is implemented on sink nodes and issued by the main server. Sink
nodes can authenticate and blacklist any ordinary sensor node at any time on the
detection of malicious activity. Each sink has a communication record of its own
as well other nodes in its distributed ledger.
Database
Database Database
Database
Database Database
In this system model, the validity of data is checked at sink nodes. Noticeable
thing is that access on the main server is only granted to the sink nodes. The
main server checks the working status of sink nodes and ordinary nodes. It can
also remove any node if 1) it is dead or 2) involved in any suspicious activity.
For each transaction, a hash is generated which is called transaction hash. A hash
is just a function which takes the input value and generates the output value. This
output is a deterministic value against the input value. This can be mathematically
written as
f (a) = b, (3.12)
where, a is any input and b is associated output against the a; e.g., hash value for
“hi” in kessak-256 is “7624778dedc75f8b322b9fa1632a610d40b85e106c7d9bf0e74-
3a9ce291b9c6f”. Hash values are generally ‘irreversible’ which means that input
cannot be figured out by knowing the output except hit and trial method.
27 Thesis by: Hafiz Abdul Mateen
CHAPTER 3. 3.3. CONCLUSION OF THE CHAPTER
Main Hash
Hash a Hash b
A hash tree or Merkle tree consists of the leaf nodes, which are a label with the
hash of data block and non-leaf nodes, which are labeled with the hash of its
own child nodes. This tree allows safe, secure and efficient content verification of
large data structure. A Merkle tree compiles all the transactions in a block by
composing a digital signature for the entire set of transactions. The structure for
this hash tree is presented in Figure 3.7.
In this chapter, we have discussed the proposed techniques along with system
models in detail. Blockchain based trust model for avoiding the malicious node
attacks in sensor networks is also presented. Additionally, the details and working
of this trust model are also elaborated in this chapter. In next chapter, the existing
and proposed schemes are discussed in details.
29
CHAPTER 4. 4.1. GEDAR
4.1 GEDAR
Algorithm 3 elaborates the selection procedure of next potential node. The packet
will only be sent to the potential node and this criterion is defined in Algorithm
3. Where, ςj is a copy of {j and n1 show the highest priority of node. In this
algorithm, firstly, we define the set of candidate neighbor nodes. Each time ςj
takes a copy of {j for maintaining the list of nodes within its transmission radius.
Algorithm 4 involves the steps for the recovery of the void hole. First of all,
value for the current node is set to “1” for its identification and stops the beacon
messages (lines 1-3). The symbol ∅ shows that current node has no neighbor (line
4). In other words, it is a void node. ν is a set which contains the record of
next forwarder nodes. ∆ and nv are the void nodes set and current void node,
respectively. The distance for each forwarder near the current void is calculated
in line 10. In lines 11-14, this distance is compared with the transmission range.
If the distance is less than the transmission range, then the next forwarder node
is within the range of the current forwarder node and vice versa. In case, if no
forwarder node exists within transmission range then depth adjustment takes place
and the status for the void node is set to “0” from “1” (lines 17-18).
4.2 LMPC
greater the attenuation of noise, lower will be the layer size and vice versa. The
pictorial form of these layers is presented in Figure 4.1 and Algorithm 5 elaborates
the steps for LMPC routing scheme. From Algorithm 5, line 1 shows the input
and line 2 represents the parameters’ initialization. Total energy of each node is
calculated in lines 3-5. Total number of layers in which network is divided are de-
cided in line 6. Line 7 shows the deployment of nodes. Neighbor finding procedure
is done at lines 8-11. The start of the communication is represented by the line
12. On successful communication, acknowledgment message is sent to the source
node.
4.3 GEDPAR
GEDPAR is a proposed routing protocol and to show the efficacy of this protocol,
GEDAR and LMPC are taken as benchmark schemes. In GEDPAR, the concept
of depth adjustment is taken from the GEDAR. GEDPAR takes transmission
enhancement step on the appearance of void holes. Transmission enhancement
takes some extra energy; however, most of the void holes are removed in this
process. If a node cannot cover the void hole even by increasing the transmission
range then depth adjustment takes place for that node. Figure 3.1, Figure 3.2,
Figure 3.3 and Figure 3.4 show the pictorial summary of the proposed algorithms.
Working of Algorithm 1, Algorithm 2 and Algorithm 3 are the same for GEDAR
and GEDPAR. However, Algorithm 6 plays an important role for differentiating
GEDPAR from GEDAR.
Sink node
Source node
4.4 E2EVHR
This proposed protocol is the improved version of LMPC. However, in this routing
protocol first of all complete route finding procedure is executed. In E2EVHR,
binary tree is generated (as in LMPC) for ensuring the successful packet trans-
mission. Actually, after ensuring that there is no void hole in the routing path,
multiple copies of the packets are transmitted towards the sink node using bi-
nary tree. The layering concept for LMPC is presented in Figure 4.1. The major
difference between LMPC and E2EVHR is that E2EVHR avoids the void hole
by looking the path from source to the destination, while LMPC looks forward
one-hop from neighbor node.
Algorithm 5 LMPC
1: input: LMPC(node)
2: initialization
3: for each node n do
4: calculate total energy
5: end for
6: total number of layers L
7: deploy the nodes n
8: for each node n do
9: find neighbor: (neighbor.id, neighbor.coordinates, neighbor.layer)
10: end for
11: hello messages
12: packet sent from lower depths to the higher ones
13: acknowledgment message
14: end
Sink node
Source node
Algorithm 7 E2EVHR
1: input: E2EVHR (node)
2: initialization
3: total number of layers L
4: deploy the nodes n
5: for each node n do
6: calculate total energy
7: end for
8: for each node n do
9: find neighbor: (neighbor.id, neighbor.coordinates, neighbor.layer)
10: end for
11: hello messages
12: for route finding do
13: find the path which ensures end to end delivery
14: save all the paths
15: end for
16: for potential neighbor do
17: select the potential neighbors
18: end for
19: packet sent towards the potential neighbor
20: acknowledgment message
21: end
Algorithm 7 presents the steps for E2EVHR protocol. The lines (1-2) are present-
ing the input and initialization, respectively. The line (3) involves the layering
while line (4) shows deployment of the nodes in the network. Total energy for
each node is calculated in lines (5-7). The neighbors for each node are calculated
in lines (8-10). In lines (12-15), the paths having no void node are evaluated.
The lines (16-17) help to find the potential neighbors from the current forwarder.
The packets are then transmitted toward the potential neighbor for continuing the
process of transmission. These potential neighbors help the packets to reach at
the destination, successfully.
run which takes the input as sensor node S and sink node D. Secondly, Algorithm
2 is called in the response of Algorithm 1. After that, Algorithm 3 is called for
potential neighbor selection. In the end, Algorithm 6 is called (in case of void hole
occurrence) for void node recovery. While in the case of E2EVHR, void holes are
avoided by finding the path which ensures end to end delivery.
In this chapter, the existing and proposed schemes are discussed in details. Ad-
ditionally, pseudo-codes of routing protocols are also presented for better under-
standing the flow of work. Further, simulation results and discussions are ap-
pended in Chapter 5.
39
CHAPTER 5. 5.1. SIMULATIONS FOR ROUTING PROTOCOLS
Simulations are performed to validate the proposed routing techniques. The pro-
posed techniques are compared with GEDAR and LMPC. GEDPAR and E2EVHR
are greedy opportunistic routing protocols in which next forwarder node is selected
on the criteria of minimum distance from the current node. In the GEDPAR,
firstly, current node enhances transmission range when it finds no neighbor in its
transmission range. After that, if the current forwarder still not able to find any
node in its range then it executes depth adjustment. During depth adjustment,
the node moves from a deeper layer to the shallower one. The second proposed
routing algorithm (E2EVHR) takes some steps from LMPC.
5.1.1 Delay
5.1.2 Throughput
Throughput is calculated as the total number of packets received at the sink node
to the total number of packets sent from source node in percentage.
5.1.3 PAR
PAR is a ratio between packets received at the sink to the packets sent from the
source node.
The number of times nodes move from deep water to the shallow water to find the
next neighbor node in their range.
The network is deployed over the area of 1500m × 1500m × 1500m. The num-
ber of nodes and sinks are 100 and 45, respectively. Initially, nodes are deployed
randomly. The initial transmission range of each node is 245m and nodes can
transmit up to 270m using some extra energy. This happens only when current
forwarder cannot find the next node in its transmission area. The initial energy of
each node is 100J. The velocity of acoustic waves and bandwidth for the network
is considered 1500m/s and 3000kHz, respectively. Transmission energy, reception
energy and idle time energy are considered as 2W, 0.1W and 10 × 10−3 W, re-
ceptively. Size of hello packet is 100bytes while the sizes of all other packets are
150bytes. Summary of these parameters is presented in Table 5.1.
Parameter Value
Network dimensions 1500m × 1500m × 1500m
Number of sink nodes 45
Other nodes 100
Minimum transmission range 245m
Maximum transmission range 270m
Initial energy of nodes 100J
Velocity of acoustic waves 1500m/s
Bandwidth 3000kHz
Packet transmission energy 2W
Packet reception energy 0.1W
Idle time energy 10 × 10−3 W
1500
1000
Depth
500
0
1500
1000 1500
1000
500 500
Breadth 0 0
Width
In Figure 5.2, final deployment is presented. This final deployment is done after
adjusting the transmission range and depth of all nodes. These transmission ranges
and depths are only adjusted in case of void hole occurrence. When void hole
occurs, first transmission range is enhanced for finding the next forwarder node
using some extra energy. If none of the forwarder neighbors is found then depth
adjustment occurs. Depth adjustment is done after enhancing transmission range
because it consumes more energy.
Figure 5.3 depicts the depth adjustment of nodes. We can see from the Figure 5.3
that most of the depth adjustment is done during the start of network deployment.
Once the network is deployed and initial depth adjustments are done then there
exist only a few occasions on which depth adjustment is required. A large amount
of energy is dissipated during the process of depth adjustment. So, we make sure
that the depth adjustment only occurs when it is necessary. Otherwise, try to avoid
the nodes by enhancing the transmission range. It is clear from the Figure 5.3
42 Thesis by: Hafiz Abdul Mateen
CHAPTER 5. 5.1. SIMULATIONS FOR ROUTING PROTOCOLS
1500
1000
Depth
500
0
1500
1000 1500
1000
500
500
Breadth 0 0
Width
that in GEDPAR routing protocol, the nodes require fewer depth adjustments as
compare to GEDAR. This step further involved in lessening the energy dissipation.
70
GEDAR
Number of depth adjustments
60 GEDPAR
50
40
30
20
10
0
0 50 100 150
Time (msec)
Figure 5.3: Depth Adjustment
while GEDPAR outperforms both GEDAR and LMPC. The efficiency of the pro-
posed scheme is better than LMPC and GEDAR by the percentage of 13% and
37%, respectively. As we can see from the Figure 5.4 that the second proposed
technique also outperforms the counterparts. Firstly, E2EVHR performs poor
during the end to end node finding process; however, when the proposed scheme
finds the end to end routes than its throughput is improved drastically.
Figure 5.5 shows the performance of GEDAR, GEDPAR, E2EVHR and LMPC
with respect to PAR. PAR is already defined in section 5.1.3 as it is a ratio between
packets received at sonobuoys to the packets sent from source nodes. We measure
PAR from the range of 0 to 1. Here, 0 indicates the minimum PAR and 1 represents
maximum PAR. In our scenario, during PAR calculation it is noticed that PAR
of GEDAR, LMPC, E2EVHR and GEDPAR is about 0.6, 0.8, 0.93 and 0.95,
respectively. These statistics clearly show that GEDPAR and E2EVHR perform
best among the comparing ones.
1.2
0.8
PAR
0.6
GEDAR
GEDPAR
0.4
LMPC
E2EVHR
0.2
0 50 100 150
Time (msec)
Figure 5.5: Packets Received at Sink
it finds the complete path by ensuring that there is no void node in the route
then it transfers the packets directly from selecting paths. On the other hand,
GEDPAR involves more calculations and the reason is that it takes more time to
the comparing schemes. Delay of the comparing schemes is presented in Figure
5.6. Moreover, Figure 5.6 also shows the trade-off and this trade-off authenticates
the simulation results. This means that for getting minimum energy consumption
and throughput, we have to compromise on computational time.
In Figure 5.7, the comparison among the different routing protocols with respect
to energy consumption is presented. From the Figure 5.7, GEDPAR consumes less
energy as compared to the GEDAR and LMPC. GEDAR consumes more energy
then counterparts because it focuses on depth adjustment during the void hole
avoidance. Depth adjustment takes 1500mJ energy for one meter while transmis-
sion range enhancement takes less energy than depth adjustment (adapted from
[24]). Figure 5.7 is also representing the average energy consumption of all com-
paring schemes. Simulations are performed multiple times to check the average
results. LMPC uses multiple transmissions for one packet which resulted in en-
ergy dissipation. The proposed routing protocol (GEDPAR) consumes less energy
because it covers the void holes by increasing the transmission range. GEDPAR
only changes the depth when no forwarded node is found even by increasing trans-
mission range.
104
3.5
Average energy consumption (J)
2.5
1.5
0.5
0
GEDAR LMPC GEDPAR E2EVHR
Feasible region is the area where all possible solutions of a particular problem ex-
ists. In this section, mathematical formulation using linear programming is used
46 Thesis by: Hafiz Abdul Mateen
CHAPTER 5. 5.2. FEASIBLE REGIONS
to find the feasibility of the proposed protocol. To achieve the optimal solutions,
we define some constraints (listed below). By defining these constraints, the co-
ordinates of feasible regions are calculated. In this work, we have calculated the
coordinates for three feasible regions according to the proposed schemes (GEDPAR
and E2EVHR).
In Figure 5.8- 5.10, we annotate the feasible regions as P1, P2, P3 and P4. Figure
5.8 presents the feasible region of energy consumption versus throughput. Fig-
ure 5.9 illustrates the feasible region (energy consumption versus PAR) for the
GEDPAR routing protocol. While in Figure 5.8, the feasible region of energy
consumption versus delay is presented.
In Figure 5.11- 5.13, we annotate the feasible regions for E2EVHR as P1, P2,
P3 and P4. Figure 5.11 presents the feasible region of energy consumption ver-
sus throughput, whereas the Figure 5.12 illustrates the feasible region of energy
consumption versus PAR, for the E2EVHR routing protocol. In Figure 5.11, the
feasible region of energy consumption versus delay is presented.
The feasible region between energy consumption and throughput of the network
is calculated by taking the following parameters into account.
Four points are taken in order to draw the feasible region between energy consump-
tion and throughput. Figure 5.8 shows the feasible region for energy consumption
and throughput.
105
15
10
P3
5
P1
P2
0
0 5000 10000 15000
Energy consumption
Figure 5.8: Feasible Region for Energy Consumption and Throughput using
GEDPAR
Feasible region for energy consumption and PAR is shown in Figure 5.9. The four
points for the feasible region of energy consumption and PAR are taken as:
Figure 5.10 depicts the coordinates of feasible region for energy consumption and
delay. We take four points between energy consumption and delay to draw the
feasible region.
15000
P4
10000 P3
PAR
5000
P1
P2
0
0 5000 10000 15000
Energy consumption
Figure 5.9: Feasible Region for Energy Consumption and PAR using GED-
PAR
The feasible region between energy consumption and throughput of the network
is calculated by taking the following parameters into account.
15000
P4
10000
P3
Delay
5000
P1
P2
0
0 5000 10000 15000
Energy consumption
Figure 5.10: Feasible Region for Energy Consumption and Delay using GED-
PAR
Four points are taken in order to draw the feasible region between energy consump-
tion and throughput. Figure 5.11 shows the feasible region for energy consumption
and throughput.
25
Number of packets received at sink
20 P4
15
10
P1
5
P3
P2
0
-5
0 5 10 15 20 25
Energy consumption
Figure 5.11: Feasible Region for Energy Consumption and Throughput using
E2EVHR
Feasible region for energy consumption and PAR is shown in Figure 5.12. The
four points for the feasible region of energy consumption and PAR are taken as:
25
20
P4
15
PAR
10
P1
5
P3
P2
0
-5
0 5 10 15 20 25
Energy consumption
Figure 5.12: Feasible Region for Energy Consumption and PAR using
E2EVHR
Figure 5.13 depicts the feasible region for energy consumption and delay. We take
four points between energy consumption and delay to draw the feasible region.
30
25
P4
20
15
Delay
10
P1
5
P2 P3
0
-5
0 5 10 15 20 25
Energy consumption
Figure 5.13: Feasible Region for Energy Consumption and Delay using
E2EVHR
In this section, we will discuss the simulation results which are obtained using
different tools and the reasons for these results. In section 5.3.1, simulation tools
are explained. Moreover, results and their reasoning will be discussed in section
5.3.2.
In order to take the simulation results, we have used multiple tools. Four tools are
reviewed for developing and testing the smart contract. First, we write a smart
52 Thesis by: Hafiz Abdul Mateen
CHAPTER 5. 5.3. SIMULATIONS FOR BLOCKCHAIN TRUST MODEL
contract on Remix IDE. Second, Ganache is used to show the clear deployment
visualization of the smart contract. Third, to connect the Etherium node with
browser, MetaMask which is the extension of Chrome browser, is used. Fourth,
execution cost and transaction cost of different transactions are obtained from
Remix IDE and later plotted with MATLAB.
It is an open source tool which allows you to debug, test and compile smart
contract from browser. IDE stands for the integrated development environment
and it helps programmers for designing the software and other different tasks
relating to software development.
5.3.1.2 Ganache
5.3.1.3 MetaMask
MetaMask is a Google Chrome extension which connects the Etherium node and
browser. It allows us to send and receive ethers from Ganache. For this, the
connection of Ganache wallet with MetaMask is possible by using a private key.
MetaMask is also connected with Remix IDE. When Remix IDE and MetaMask
are connected, ether will be deducted on each transaction.
In this section, the simulation tools, results and reasoning of these results will be
discussed. Nevertheless, we provide an overview of some important terms which
require for understanding the term gas price and about its calculation.
Execution cost is a cost which requires the gas as a fuel on the execution of the
functions (code lines). It also requires storage allocation for different variables as
a result of the execution of operations. On the other hand, the transaction cost
requires for sending the data on the blockchain.
The total ether cost of a transaction is based on the following two factors:
• Gas price: it is a price (in ether) of one unit of gas specified in the transaction.
Where, Ugas and Pgas represent the gas used in transaction and price specified for
that transaction, respectively.
Actually, it is made to decouple the cost of any operation from the market price of
ether. As we know that the cryptocurrency prices are volatile and ether also has
no exception. The gas limit for each action is constant and this the reason why
we use gas instead of ether.
106
6
4
Cost (gas)
0
Transaction Cost Execution Cost
104
3
2.5
2 Transaction Cost
Execution Cost
Cost (gas)
1.5
0.5
0
Current states of Sink nodes Current states of Sink nodes on main server
Parameter Value
status 0x1 Transaction mined and execution succeed
transaction hash 0x98933, ..., 75f15
contract address 0x08970, ..., 659fb
from 0xca35b, ..., a733c
to Clustering.(constructor)
gas 300000000 gas
transaction cost 5674465 gas
execution cost 4272505 gas
hash 0x98933, ..., 75f15
input 0x608...40029
decoded input {}
decoded output -
logs []
value 0 wei
2.5
Cost (gas)
1.5
0.5
0
Sink Node 1 Sink Node 2 Sink Node 3 Sink Node 4 Sink Node 5
Cost (gas)
3
0
Sink Node 1 Sink Node 2 Sink Node 3 Sink Node 4 Sink Node 5
Parameter Value
transaction hash 0xfbaef, ..., 840f96
from 0xca35b7, ..., fa733c
to Clustering.StateOfSNs() 0xbbf28, ..., 732db
transaction cost 27886 gas (Cost only applies when called by a con-
tract)
execution cost 6614 gas (Cost only applies when called by a con-
tract)
hash 0xfbaef, ..., 840f96
input 0x38e, ..., fccad
decoded input {}
decoded output {
“0”: “string: Current state of Sink Node 1 is: 1”,
“1”: “string: Current state of Sink Node 2 is: 1”,
“2”: “string: Current state of Sink Node 3 is: 0”,
“3”: “string: Current state of Sink Node 4 is: 0”,
“4”: “string: Current state of Sink Node 5 is: 1”,
“5”: “string: State of selected Ordinary Node is:
1”
}
logs []
Parameter Value
transaction hash 0x8f442, ..., 7434c0
from 0xca35b, ..., fa733c
to Clustering.StateOfSNonMainServer() 0xbbf28, ...,
732db
transaction cost 27911 gas (Cost only applies when called by a con-
tract)
execution cost 6639 gas (Cost only applies when called by a con-
tract)
hash 0x8f442, ..., 7434c0
input 0x44e, ..., ce4a7
decoded input {}
decoded output {
“0”: “string: Current state of Sink Node 1 is: 1”,
“1”: “string: Current state of Sink Node 2 is: 1”,
“2”: “string: Current state of Sink Node 3 is: 0”,
“3”: “string: Current state of Sink Node 4 is: 0”,
“4”: “string: Current state of Sink Node 5 is: 1”,
“5”: “string: State of selected Ordinary Node is:
1”
}
logs []
Simulations for the calculation of execution and transaction costs are performed in
Remix IDE. During simulations, it is observed that the transaction cost is always
high with the comparison of execution cost. We perform a cost analysis for a
smart contract using the aforementioned costs in term of gas consumption. Figure
5.14 shows the transaction and execution costs required for network deployment.
We can see from the Figure 5.14 that the operation for network deployment is the
most expensive. It can also be seen from the Table 5.2 that the transaction cost
for network deployment is 5674465 gas which is higher than the execution cost
(4272505 gas).
Figure 5.15 depicts the state checking cost of sink nodes. State checking cost
means that the cost which is used for ensuring the active or de-active status of
sink nodes. To check whether the sink nodes are active or not, their status has
been checked by other sink nodes and then by the main server. This active or
de-active states must be the same in both places. If the status is same then the
node is working perfectly, otherwise, the node is malicious and need to be removed
from the network. This state checking cost is presented in Figure 5.15. Similarly,
Figure 5.16 shows the transaction and execution costs for each sink node‘s state.
Moreover, status for each node is presented in Figure 5.16 and this status is cross-
verified by the main server as shown in Table 5.4. Nevertheless, notable thing is
that the active status of nodes is represented by “1” and vice versa by “0”.
Transaction and execution costs per transaction are shown in Figure 5.17. We can
easily observe the difference between both of aforementioned costs. Transaction
cost is always high and execution cost is low. We have already discussed the
reasons for the higher transaction cost than the execution cost.
Current State (Active/De-active) of Sink Nodes According to Main Server 27911 6639
We execute different functions and calculate the transaction and execution costs
in terms of gas. After that, these costs are plotted using MATLAB. Moreover,
the aforementioned costs for different functions are provided in Table 5.2, Table
5.3 and Table 5.4, respectively. Nevertheless, we also provided comprehensive
comparison in Table 5.5.
The detailed discussions of simulation results are part of this chapter. The adap-
tivity of this proposed work is tested by comparing with the state of the art
routing protocols. Moreover, the transaction and execution costs for our proposed
blockchain based trust model are also calculate using different tools. The compar-
ison of these costs are also held in this chapter. Nevertheless, in Chapter 6, the
conclusion of this thesis along with future directions is bestowed.
61
CHAPTER 6. 6.1. CONCLUSION
6.1 Conclusion
In this thesis, imbalance and unnecessary energy dissipation are avoided by cov-
ering the void hole in an efficient way. We proposed two routing protocols namely
GEDPAR and E2EVHR for void hole recovery. In order to show the efficiency of
the proposed protocols, comparative analysis is performed with the existing state
of the art protocols: GEDAR and LMPC. Simulations result show that GED-
PAR outperforms GEDAR and LMPC in terms of throughput by the percentage
of 13% and 37%. PAR of GEDAR, LMPC, E2EVHR and GEDPAR is 0.6, 0.8,
0.93 and 0.95, respectively. While E2EVHR also outperforms the counterparts in
terms of throughput, PAR and energy efficiency. However, the proposed protocol
(GEDPAR) is minimizing the energy consumption at the cost of affordable delay.
Security is one of the emerging and big challenge in the field of sensor networks.
So in this thesis, security issue is tackled using the concepts of blockchain. Now,
blockchain based trust model for providing the security in sensor networks is pro-
posed. This model provides the security from malicious nodes using the concepts
of blockchain. It also ensures no loss of data, due to the blockchain’s properties of
distributed ledger and immutability.
Future Work
In the future, we will explore and implement some other routing protocols to
avoid void holes. To implement these techniques on a test bed for getting more
precision in results will be the new direction of our research. An idea about
the implementation of “IoTs” is also under consideration. Moreover, we can also
implement blockchain in any state of the art routing protocol and compare the
performance with original one.
References
63
References
[1] Wang, Hua, Yingyou Wen, Yao Lu, Dazhe Zhao and Chunlin Ji. “Secure Lo-
calization Algorithms in Wireless Sensor Networks: A Review.” In Advances in
Computer Communication and Computational Sciences, pp. 543-553. Springer,
Singapore, (2019).
[2] Latif, Kamran, Nadeem Javaid, Ashfaq Ahmad, Zahoor Ali Khan, Nabil Al-
rajeh, and Majid Iqbal Khan. “On energy hole and coverage hole avoidance in
underwater wireless sensor networks.” IEEE Sens. J 16, no. 11 (2016).
[3] Khasawneh, Ahmad, Muhammad Shafie Bin Abd Latiff, Omprakash Kai-
wartya and Hassan Chizari. “A reliable energy-efficient pressure-based routing
protocol for the underwater wireless sensor network.” Wireless Networks 24,
no. 6 (2018).
[4] Hong, Zhen, Xiaoman Pan, Ping Chen, Xianchuang Su, Ning Wang and Wenqi
Lu. “A Topology Control with Energy Balance in Underwater Wireless Sensor
Networks for IoT-Based Application.” Sensors 18, no. 7 (2018).
[5] Wang, Hao, Shilian Wang, Eryang Zhang and Luxi Lu. “An Energy Balanced
and Lifetime Extended Routing Protocol for Underwater Sensor Networks.”
Sensors 18, no. 5 (2018).
[6] Khan, Anwar, Ihsan Ali, Atiq Ur Rahman, Muhammad Imran and Hasan
Mahmood. “Co-EEORS: Cooperative Energy Efficient Optimal Relay Selection
Protocol for Underwater Wireless Sensor Networks.” IEEE Access (2018).
[7] Coutinho, Rodolfo WL, Azzedine Boukerche, Luiz FM Vieira and Antonio
AF Loureiro. “Underwater Wireless Sensor Networks: A New Challenge for
Topology Control–Based Systems.” ACM Computing Surveys (CSUR) 51, no.
1 (2018).
[8] Jin, Zhigang, Ning Wang, Yishan Su and Qiuling Yang. “A Glider-Assisted
Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Net-
works.” Sensors 18, no. 2 (2018).
[9] Nayyar, Anand, Vikram Puri and Dac-Nhuong Le. “Comprehensive Analysis
of Routing Protocols Surrounding Underwater Sensor Networks (UWSNs).”
In Data Management, Analytics and Innovation, pp. 435-450. Springer, Singa-
pore, (2019).
64
CHAPTER 7. REFERENCES
[10] Wu, Fei-Yun, Kunde Yang and Rui Duan. “Compressed Sensing of Underwa-
ter Acoustic Signals via Structured Approximation l0 Norm.” IEEE Transac-
tions on Vehicular Technology (2018).
[11] Khosravi, Mohammad Reza, Hamid Basri and Habib Rostami. “Efficient rout-
ing for dense UWSNs with high-speed mobile nodes using spherical divisions.”
The Journal of Supercomputing 74, no. 2 (2018).
[12] Gomathi and Martin Leo Manickam. “Energy Efficient Shortest Path Routing
Protocol for Underwater Acoustic Wireless Sensor Network.” Wireless Personal
Communications 98, no. 1 (2018).
[13] Hou, Rui, Liuting He, Shan Hu and Jiangtao Luo. “Energy-Balanced Unequal
Layering Clustering in Underwater Acoustic Sensor Networks.” IEEE Access
6 (2018).
[14] Iwata, Masanari, Suhua Tang and Sadao Obana. “Energy-Efficient Data Col-
lection Method for Sensor Networks by Integrating Asymmetric Communica-
tion and Wake-Up Radio.” Sensors 18, no. 4 (2018).
[16] Jan, Mian Ahmad, Zhiyuan Tan, Xiangjian He, and Wei Ni. “Moving Towards
Highly Reliable and Effective Sensor Networks.” Ad Hoc & Sensor Wireless
Networks 40, no. 3-4 (2018).
[17] Yildiz, Huseyin Ugur, Vehbi Cagri Gungor, and Bulent Tavli. “Packet size op-
timization for lifetime maximization in underwater acoustic sensor networks.”
IEEE Transactions on Industrial Informatics 15, no. 2 (2019).
[18] Khalid, Muhammad, Yue Cao, Naveed Ahmad, Waqar Khalid, and Piyush
Dhawankar. “Radius-based multipath courier node routing protocol for acous-
tic communications.” IET Wireless Sensor Systems 8, no. 4 (2018).
[19] Sher, Arshad, Aasma Khan, Nadeem Javaid, Syed Ahmed, Mohammed Aal-
salem, and Wazir Khan. “Void Hole Avoidance for Reliable Data Delivery in
IoT Enabled Underwater Wireless Sensor Networks.” Sensors 18, no. 10 (2018).
[20] Yuan, Yali, Chencheng Liang, Megumi Kaneko, Xu Chen and Dieter Hogrefe.
“Topology Control for Energy-Efficient Localization in Mobile Underwater
Sensor Networks using Stackelberg Game.” arXiv preprint arXiv:1805.12361
(2018).
[21] Rahman, Ziaur, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid and Mohamed
Othman. “Totally opportunistic routing algorithm (TORA) for underwater
wireless sensor network.” PloS one 13, no. 6 (2018).
[22] Heidemann, John, Milica Stojanovic and Michele Zorzi. “Underwater sensor
networks: applications, advances and challenges.” Phil. Trans. R. Soc. A 370,
no. 1958 (2018).
[23] Javaid, Nadeem, Abdul Majid, Arshad Sher, Wazir Khan, and Mohammed
Aalsalem. “Avoiding Void Holes and Collisions with Reliable and Interference-
Aware Routing in Underwater WSNs.” Sensors 18, no. 9 (2018).
[24] Coutinho, Rodolfo WL, Azzedine Boukerche, Luiz FM Vieira, and Antonio
AF Loureiro. “Geographic and opportunistic routing for underwater sensor
networks.” IEEE Transactions on Computers 65, no. 2 (2016).
[25] Xu, Junfeng, Keqiu Li, Geyong Min, Kai Lin, and Wenyu Qu. “Energy-
efficient tree-based multipath power control for underwater sensor networks.”
IEEE Transactions on Parallel and Distributed Systems 23, no. 11 (2012).
[27] Ahmed, Farwa, Zahid Wadud, Nadeem Javaid, Nabil Alrajeh, Mohamad
Souheil Alabed, and Umar Qasim. “Mobile Sinks Assisted Geographic and
Opportunistic Routing Based Interference Avoidance for Underwater Wireless
Sensor Network.” Sensors 18, no. 4 (2018).
[28] MacGillivray and Gorman, “Connecting the IoT:The Road to Success,” In-
ternational Data Corporation (IDC) Report, (2018).
[29] Butt, Suhail Ashfaq, Abdul Mateen, Nadeem Javaid, and Zahoor Ali Khan.
“Towards the void hole alleviation for energy efficiency in WSN.” In 2018 Fifth
HCT Information Technology Trends (ITT), pp. 318-324. IEEE, (2018).
[31] Liu, Mengting, F. Richard Yu, Yinglei Teng, Victor CM Leung, and Mei Song.
“Computation ooading and content caching in wireless blockchain networks
with mobile edge computing.” IEEE Transactions on Vehicular Technology 67,
no. 11 (2018).
[32] Xu, Yang, GuojunWang, Jidian Yang, Ju Ren, Yaoxue Zhang, and Cheng
Zhang. Towards Secure Network Computing Services for Lightweight Clients
Using Blockchain.“ Wireless Communications and Mobile Computing 2018
(2018).
[33] Lin, Jun, Zhiqi Shen, Chunyan Miao, and Siyuan Liu. Using “blockchain to
build trusted lorawan sharing server.” International Journal of Crowd Science
1, no. 3 (2017).
[34] Ren, Yongjun, Yepeng Liu, Sai Ji, Arun Kumar Sangaiah, and Jin Wang.
“Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor
Networks.” Mobile Information Systems 2018 (2018).
[35] Li, Jiao. “Data Transmission Scheme Considering Node Failure for
Blockchain.” Wireless Personal Communications103, no. 1 (2018).
[36] Lin, Di, and Yu Tang. “Blockchain Consensus Based User Access Strategies
in D2D Networks for Data-Intensive Applications.” IEEE Access 6 (2018).
[37] Singh, Madhusudan, and Shiho Kim. “Branch based blockchain technology
in intelligent vehicle.” Computer Networks 145 (2018).
[38] Dai, Mingjun, Shengli Zhang, Hui Wang, and Shi Jin. “A low storage room
requirement framework for distributed ledger in blockchain.” IEEE Access 6
(2018).
[40] Jia, Bing, Tao Zhou, Wuyungerile Li, Zhenchang Liu, and Jiantao Zhang. “A
Blockchain-Based Location Privacy Protection Incentive Mechanism in Crowd
Sensing Networks.” Sensors 18, no. 11 (2018).
[41] Zhang, Yu, and Jiangtao Wen. “The IoT electric business model: Using
blockchain technology for the internet of things.” Peer-to-Peer Networking and
Applications 10, no. 4 (2017).
[42] Xu, Chenhan, Kun Wang, Peng Li, Song Guo, Jiangtao Luo, Baoliu Ye, and
Minyi Guo. “Making big data open in edges: A resource cient blockchain-based
approach.” IEEE Transactions on Parallel and Distributed Systems (2018).
[43] Jiang, Tigang, Hua Fang, and Honggang Wang. “Blockchain-based Internet
of vehicles: distributed network architecture and performance analysis.” IEEE
Internet of Things Journal (2018).
[44] Sharma, Pradip Kumar, Seo Yeon Moon, and Jong Hyuk Park. “Block-VN: A
Distributed Blockchain Based Vehicular Network Architecture in Smart City.”
JIPS 13, no. 1 (2017).
[45] Zhang, Guozhen, Tong Li, Yong Li, Pan Hui, and Depeng Jin. “Blockchain-
Based Data Sharing System for AI-Powered Network Operations.” Journal of
Communications and Information Networks 3, no. 3 (2018).
[46] Novo, Oscar. “Scalable Access Management in IoT using Blockchain: a Per-
formance Evaluation.” IEEE Internet of Things Journal (2018).
[47] Sharma, Pradip Kumar, Saurabh Singh, Young-Sik Jeong, and Jong Hyuk
Park. “Distblocknet: A distributed blockchains-based secure sdn architecture
for iot networks.” IEEE Communications Magazine 55, no. 9 (2017).
[48] Pãnescu, Adrian-Tudor, and Vasile Manta. “Smart Contracts for Research
Data Rights Management over the Ethereum Blockchain Network.” Science &
Technology Libraries 37, no. 3 (2018).
[50] Rahmadika, Sandi, Diena Rauda Ramdania, and Maisevli Harika. “Security
Analysis on the Decentralized Energy Trading System Using Blockchain Tech-
nology.” Jurnal Online Informatika 3, no. 1 (2018).
[51] Liu, Xiaojun, Wenbo Wang, Dusit Niyato, Narisa Zhao, and Ping Wang.
“Evolutionary game for mining pool selection in blockchain networks.” IEEE
Wireless Communications Letters7, no. 5 (2018).
[52] Gordon, William, and Christian Catalini. “Blockchain technology for health-
care: facilitating the transition to patient-driven interoperability.” Computa-
tional and structural biotechnology journal 16 (2018).
[54] Sharma, Pradip Kumar, and Jong Hyuk Park. “Blockchain based hybrid net-
work architecture for the smart city.” Future Generation Computer Systems
86 (2018).
[55] Yang, Zhe, Kan Yang, Lei Lei, Kan Zheng, and Victor CM Leung.
“Blockchain-based decentralized trust management in vehicular networks.”
IEEE Internet of Things Journal (2018).
Journal Publications
Conference Proceedings
1 Mateen, Abdul, Nadeem Javaid, Muhammad Awais, Nasir Khan, Urva Latif,
and Ihtisham Ullah. “Bio-Inspired Optimization Techniques for Home En-
ergy Management in Smart Grid.” In 2018 32nd International Conference on
Advanced Information Networking and Applications Workshops (WAINA),
pp. 250-257. IEEE, 2018.
3 Awais, Muhammad, Abdul Mateen, Zahoor Ali Khan, and Nadeem Javaid.
“A Survey on Multi-hop Routing Protocols for Efficient Resource Alloca-
tion in IoTs.” In 2018 Fifth HCT Information Technology Trends (ITT), pp.
239-244. IEEE, 2018.
4 Butt, Suhail Ashfaq, Abdul Mateen, Nadeem Javaid, and Zahoor Ali Khan.
“Towards the void hole alleviation for energy efficiency in WSN.” In 2018
Fifth HCT Information Technology Trends (ITT), pp. 318-324. IEEE, 2018.
5 Awais, Muhammad, Nadeem Javaid, Abdul Mateen, Nasir Khan, Ali Mo-
hiuddin, and Malik Hassan Abdul Rehman. “Meta Heuristic and Nature
Inspired Hybrid Approach for Home Energy Management Using Flower Pol-
lination Algorithm and Bacterial Foraging Optimization Technique.” In 2018
IEEE 32nd International Conference on Advanced Information Networking
and Applications (AINA), pp. 882-891. IEEE, 2018.
6 Awais, Muhammad, Zahoor Ali Khan, Nadeem Javaid, Abdul Mateen, Ay-
men Rasul, and Farooq Hassan. “Cluster-Based Routing Protocols with
Adaptive Transmission Range Adjustment in UWSNs.” In International
Conference on Emerging Internetworking, Data & Web Technologies, pp.
8 Latif, Urva, Nadeem Javaid, Syed Shahab Zarin, Muqaddas Naz, Asma Ja-
mal, and Abdul Mateen. “Cost Optimization in Home Energy Management
System using Genetic Algorithm, Bat Algorithm and Hybrid Bat Genetic
Algorithm.” In 2018 IEEE 32nd International Conference on Advanced In-
formation Networking and Applications (AINA), pp. 667-677. IEEE, 2018.
9 Javaid, Nadeem, Ihtisham Ullah, Syed Shahab Zarin, Mohsin Kamal, Ba-
batunji Omoniwa, and Abdul Mateen. “Differential-Evolution-Earthworm
Hybrid Meta-heuristic Optimization Technique for Home Energy Manage-
ment System in Smart Grid.” In International Conference on Innovative Mo-
bile and Internet Services in Ubiquitous Computing, pp. 15-31. Springer,
Cham, 2018.