Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1

Abstract

In most Internet of Things (IoT) applications, network nodes are limited in terms of energy source. Therefore, the need for innovative methods to eliminate energy loss which shortens the life of networks is fully felt in such networks. One of the optimization techniques of energy consumption on the Internet of things is efficient energy routing that the required energy can be reduced by choosing an optimal path. In this paper, an informed or efficient energy approach is proposed for routing on the Internet of Things in which focus is on the sleep-wake schedule of nodes; therefore, a new optimization algorithm called chaos fuzzy grasshopper optimization algorithm was used. In chaos fuzzy grasshopper algorithm, the initial population of grasshoppers is generated by Lorenz chaos theory and the input and output parameters of the algorithm are adjusted by fuzzy approach. To evaluate the efficiency of the proposed method, three criteria of evaluation of remaining energy, network life and coverage rate were used. Investigating the findings in two different scenarios (efficiency over time and efficiency per number of different nodes) showed that the proposed method always is better than the base methods in all scenarios and for all performance evaluation criteria. So that in the study of the death of 30% of nodes which indicates the life of the network, results showed that the proposed method of the paper (FLGOA) has 9% better efficiency than FGOA, 12% better than GOA and 16% better than GSO. Also, the findings about the remaining energy of the network showed that the proposed method has 16% better efficiency than FGOA method, 21% better than GOA and 22% better than GSO. Finally, studies in the coverage rate evaluation criterion showed that the proposed method has 12% coverage rate better than FGOA method, 15% better than GOA and 16% better than GSO.

Authors and Affiliations

Masoomeh Mir,Mahdi Yaghoobi,Maryam kheirabadi,

Keywords

Related Articles

Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning

The presence of misbehaving users in Cognitive Radio Networks (CRN) can disrupt the process of spectrum sensing and detecting the status of the Primary User (PU). In order to reduce the destructive effect of this group o...

A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks

During the very last decade, people have been spending lots of time working with social networks to interact with friends and to share information, thoughts, news, and etc. These social networks comprise a very important...

Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment

Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced...

Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density

Satellite communication is considered a significant part of the enemy's communication information in electronic warfare due to its unique features and widespread use in communication systems. Therefore, from the electron...

A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge

In recent years, due to the profitability of the stock market in Iran, small and large investments were attracted to this market, but unfortunately, due to their lack of knowledge of the stock market and price forecastin...

Download PDF file
  • EP ID EP730540
  • DOI -
  • Views 54
  • Downloads 0

How To Cite

Masoomeh Mir, Mahdi Yaghoobi, Maryam kheirabadi, (2023). Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm. Electronic and Cyber Defense, 11(1), -. https://europub.co.uk/articles/-A-730540