Professional Documents
Culture Documents
ABSTRACT
In wireless sensor networks (WSNs), nodes take restricted energy and could not be recharged. For tackling this
problem, clustering models were utilized for optimization energy utilization, collect information and also
improve the effectual lifespan of the network. Although the clustering models benefits, there are until a few
essential challenges namely selecting a sensor as cluster head (CH) that is an important effect on energy
efficiency. During the clustering phase, nodes are separated as few clusters and then few nodes is called as CH,
are elected that exist the head of all clusters. In classic clustered WSNs, nodes sense the field and send the
sensed data to CH, afterward gathered and aggregated data, CH transmitting themselves to BS. The node
clustering in WSNs is several benefits namely scalability, energy efficiency, and decreasing routing delay. In
this paper, a many clustering techniques were study for demonstrating benefits and drawbacks. Among them, a
few techniques deals with homogenous networks, whereas some deal with heterogeneous. In this paper,
clustering techniques based on evolutionary algorithms are reviewed.
Keyword: wireless sensor networks (WSNs), nodes take restricted energy and could not be recharged.
I. INTRODUCTION
Formation of WSNs shows difficulties because of
Recently, wireless sensor networks (WSNs) have the restricted assets regarding capacity, handling,
accomplished huge plays in many applications and and transmission of messages. In the majority of
have attracted the consideration of researchers sensor applications, these assets become non-
because of their difficult, diverse prerequisites renewable moreover. Hypothetical assessment
which frequently unveil inherent tradeoffs [1]. A couldn't be exact enough in numerous situations to
WSN is comprised of sensor nodes associated anticipate and forestall disappointment of sensor
through a specially appointed and automated networks. The structure difficulty of WSNs
availability. A sensor node comprises a radio increments with arising applications and their
transceiver (that carries out the part of both conditions. Conventional techniques intended for
transmitter and receiver), a microcontroller, and ad hoc networks are not adequate to oblige the
electronic circuit for interfacing with the related necessities of these sensor applications and this
sensors and energy source (generally the battery or orders new strategies and protocol that exits. The
an installed type of energy reaping). The expense groups are furnished with cluster heads (CH) and
and size of sensor nodes show a huge level of these group heads send the collected information to
variety relying on the idea of the applications. the base station (BS) or the sink. The essential
Based on the idea of uses, different classifications benefit of clustering is the scalability of execution
of sensor nodes are given for monitored parameters across the growing sensor networks. Furthermore,
like temperature, motion of objects, sound, clustering approach gives various optional benefits.
moisture, and so on. Generally, sensor networks A clustering arrangement can propose a
make up for human action in unavailable rest/wakeup plan for a WSN to adequately lessen
landscapes and present more agreeable, keen power utilization. In many sensor applications, all
depictions of the climate. In the new future, sensor the sensor nodes are not needed to be in wakeup
networks would overcome an essential piece of state and burn-through energy. In light of the
human existence and make existing PCs, mobile worldly and spatial conditions, some sensor nodes
transmission devices, and other registering gadgets can be placed in rest mode in which no energy is
less mainstream. A sensor network might be made burned-through. A powerful timetable can be
out of homogenous or heterogeneous sensor nodes. concocted and imparted to these sensor nodes
They may screen either space or articles or through the sink. Likewise, clustering makes sure
cooperations of these two. Each sensor application scalability of the application execution because of
requests its own arrangement of necessities and their semi-appropriated nature.
qualities. Some sensor applications utilize reactors In this paper, many clustering techniques were
in the location of customary sensors to respond to studied for demonstrating benefits and drawbacks.
the occasions in suitable way. Among them, a few techniques deals with
homogenous networks, whereas some deals with
heterogeneous. In this paper, clustering techniques swarm advancement and GSA and analyzes the
based on evolutionary algorithms are reviewed. outcome against LEACH protocol. [13] present an
energy efficient clustering routing technique.
II. RELATED WORK Regarding the non-uniform traffic distributions, it
can be present a lopsided cluster development
[2] established BM-BWO with FL based HEED model for load adjusting and energy effectiveness.
protocol (BMBWFL-HEED). In BMBWFL-HEED, Also, it is present a circulated CH turn system to
it is utilized the group of the helped transformation adjust energy utilization inside all clusters.
based BM-BWO technique with HEED protocol [14] introduced a protocol that considers several
for choosing the greater RE. Especially, the change clustering factors identified with energy utilization
period of the BWO technique is enhanced with to choose CH like RE, distance from node to BS,
assistance of heading normal methodology (BM- neighbors, and count of neighbors with weighting
BWO). The FL framework chooses the most lastly changes the subject of productive Clustering
significant and optimum CH. [3] present a bio- as to optimize of 2 parameters. [15] propose a
motivated and trust-based CH determination fuzzy decision-making model to determination of
method for WSN received in ITS uses. A trust bunch heads. The fuzzy multiple attribute decision-
method is planned and utilized for registering a making (MADM) model is utilized for choosing
trust level to all nodes and BOA is employed to CHs utilizing three standards containing REs, count
choose the CHs. of neighbours, and the separation from the BS of
[4] centers around an efficient CH political race the nodes.
conspire that pivots the CH position amongst the
nodes with superior energy level when contrasted III. CONCLUSION
with other. [5] present a strategy named the HQCA
for creating high-quality clusters. [6] presented In this paper, a many clustering techniques were
FEEC-IIR protocol for WSN helped IoT studied for demonstrating benefits and drawbacks.
framework. In order to an ideal CH choice, AF- Among them, a few techniques deals with
MCDM is utilized that is a combine fuzzy AHP homogenous networks, but few deals with
and TOPSIS technique is presented an energy- heterogeneous. In this paper, clustering techniques
efficient clustering calculation. [7] manages based on evolutionary algorithms are reviewed.
determination of optimum way in routing which
improves network lifetime and network's energy REFERENCES
effectiveness. Different meta-heuristic strategies [1] Saleh, Y.N., Chibelushi, C.C., Abdel-
especially PSO have been adequately utilized yet Hamid, A.A. and Soliman, A.H., 2020.
with worst local optimal issue. The presented Privacy Preservation for Wireless Sensor
strategy is based on PSO and Tabu search Networks in Healthcare: State of the Art,
algorithms. and Open Research Challenges. arXiv
[8] direct a wide review of presented improved preprint arXiv:2012.12958.
clustering arrangements these days. To assess them, [2] Sheriba, S.T. and Rajesh, D.H., 2021.
we think about 10 parameters. In view of this Energy-efficient clustering protocol for
parameter, it can be presented an examination of WSN based on improved black widow
these optimized clustering techniques. [9] presents optimization and fuzzy
a hierarchical routing protocol dependent on the k- logic. Telecommunication Systems, pp.1-18.
d tree technique, to take a separate data structure of [3] Gaber, T., Abdelwahab, S., Elhoseny, M.
the space to sort out nodes as to clusters. In [10], and Hassanien, A.E., 2018. Trust-based
enhanced clustering hierarchy (ECH) model was secure clustering in WSN-based intelligent
presented for accomplishing energy-efficiency in transportation systems. Computer
WSNs by utilizing sleeping-waking method for Networks, 146, pp.151-158.
covering and adjoining nodes. [11] introduces [4] Behera, T.M., Mohapatra, S.K., Samal,
another plan of distinguishing gathered data U.C., Khan, M.S., Daneshmand, M. and
accuracy for collecting information in CHs in Gandomi, A.H., 2019. Residual energy-
hierarchical WSN dependent on enhancing based cluster-head selection in WSNs for
grouping of SVM. The optimum parameter SVM is IoT application. IEEE Internet of Things
carried out by improved flower pollination Journal, 6(3), pp.5132-5139.
algorithm (IFPA) to accomplish classifier accuracy. [5] Baradaran, A.A. and Navi, K., 2020.
In [12], the procedure of CH choice is developed as HQCA-WSN: High-quality clustering
single-objective optimize issue to discover better algorithm and optimal cluster head selection
group CHs to shape, one-hop clusters, to adjust using fuzzy logic in wireless sensor
energy utilization, and scalability utilizing GSA. networks. Fuzzy Sets and Systems, 389,
The issue has been addressed utilizing molecule pp.114-144.
[6] Preeth, S.S.L., Dhanalakshmi, R., Kumar, R. learning. Int. J. Neural Netw. Appl, 5(1), 47-
and Shakeel, P.M., 2018. An adaptive fuzzy 53.
rule based energy efficient clustering and [18] Jayanthi, J., Jayasankar, T., Krishnaraj, N.,
immune-inspired routing protocol for WSN- Prakash, N. B., Sagai Francis Britto, A., &
assisted IoT system. Journal of Ambient Vinoth Kumar, K. (2021). An Intelligent
Intelligence and Humanized Computing, Particle Swarm Optimization with
pp.1-13. Convolutional Neural Network for Diabetic
[7] Vijayalakshmi, K. and Anandan, P., 2019. A Retinopathy Classification Model. Journal
multi objective Tabu particle swarm of Medical Imaging and Health
optimization for effective cluster head Informatics, 11(3), 803-809.
selection in WSN. Cluster computing, 22(5), [19] S. Kumari and S. Namasudra, “System
pp.12275-12282. reliability evaluation using budget
[8] Wohwe Sambo, D., Yenke, B.O., Förster, A. constrained real d-MC search”, Computer
and Dayang, P., 2019. Optimized clustering Communications, vol. 171, 2021. DOI:
algorithms for large wireless sensor https://doi.org/10.1016/j.comcom.2021.02.0
networks: A review. Sensors, 19(2), p.322. 04
[9] Anzola, J., Pascual, J., Tarazona, G. and [20] Shankar, K., Perumal, E. A novel hand-
Gonzalez Crespo, R., 2018. A clustering crafted with deep learning features based
WSN routing protocol based on kd tree fusion model for COVID-19 diagnosis and
algorithm. Sensors, 18(9), p.2899. classification using chest X-ray
[10] El Alami, H. and Najid, A., 2019. ECH: An images. Complex Intell. Syst. (2020).
enhanced clustering hierarchy approach to https://doi.org/10.1007/s40747-020-00216-6
maximize lifetime of wireless sensor [21] Mansour, R. F., & Aljehane, N. O. (2021).
networks. IEEE Access, 7, pp.107142- An optimal segmentation with deep learning
107153. based inception network model for
[11] Dao, T.K., Nguyen, T.T., Pan, J.S., Qiao, Y. intracranial hemorrhage diagnosis. Neural
and Lai, Q.A., 2020. Identification failure Computing and Applications, 1-13.
data for cluster heads aggregation in WSN [22] Alzubi, J. A. (2020). Bipolar fully recurrent
based on improving classification of deep structured neural learning based attack
SVM. IEEE Access, 8, pp.61070-61084. detection for securing industrial sensor
[12] Morsy, N.A., AbdelHay, E.H. and Kishk, networks. Transactions on Emerging
S.S., 2018. Proposed energy efficient Telecommunications Technologies, e4069.
algorithm for clustering and routing in [23] Kavitha, M., Lavanya, G., & Janani, J.
WSN. Wireless Personal (2018). Enhanced SVM classifier for breast
Communications, 103(3), pp.2575-2598. cancer diagnosis. International Journal of
[13] Wang, Z., Qin, X. and Liu, B., 2018, April. Engineering Technologies and Management
An energy-efficient clustering routing Research, 5(3), 67-74.
algorithm for WSN-assisted IoT. In 2018 [24] Parvathy, P., Subramaniam, K., Venkatesan,
IEEE Wireless Communications and G. P., Karthikaikumar, P., Varghese, J., &
Networking Conference (WCNC) (pp. 1-6). Jayasankar, T. (2020). Development of hand
IEEE. gesture recognition system using machine
[14] Han, G. and Zhang, L., 2018. WPO-EECRP: learning. Journal of Ambient Intelligence
energy-efficient clustering routing protocol and Humanized Computing, 1-8.
based on weighting and parameter [25] S. Namasudra, “Data access control in the
optimization in WSN. Wireless Personal cloud computing environment for
Communications, 98(1), pp.1171-1205. bioinformatics”, International Journal of
[15] Azad, P. and Sharma, V., 2013. Cluster head Applied Research in Bioinformatics
selection in wireless sensor networks under (IJARB), vol. 11, no. 1, pp. 40-50, 2021.
fuzzy environment. International Scholarly DOI: 10.4018/IJARB.2021010105
Research Notices, 2013. [26] K. Shankar, Y. Zhang, Y. Liu, L. Wu and C.
[16] Alzubi, J. A. (2021). Blockchain-based Chen, "Hyperparameter Tuning Deep
Lamport Merkle Digital Signature: Learning for Diabetic Retinopathy Fundus
Authentication tool in IoT Image Classification," in IEEE Access, vol.
healthcare. Computer Communications, 170, 8, pp. 118164-118173, 2020, doi:
200-208. 10.1109/ACCESS.2020.3005152.
[17] Kavitha, M., & Palani, S. (2012). Retinal [27] Mansour, R. F., & Abdelrahim, E. M.
blood vessel segmentation algorithm for (2019). An evolutionary computing enriched
diabetic retinopathy and abnormality RS attack resilient medical image
classification by supervised machine steganography model for telemedicine
work for IoT based Sensor Networks. cloud computing”, Peer-to-Peer Networking
Computer Networks, 186, 107649. and Applications, 2020. DOI:
[48] Zhang, Y. H., Li, Z., Zeng, T., Chen, L., Li, 10.1007/s12083-020-00959-6
H., Gamarra, M., ... & Cai, Y. D. (2021). [59] Mansour, R. F. (2015). Using adaptive
Investigating gene methylation signatures mutation to accelerate the convergence of
for fetal intolerance prediction. Plos one, immune algorithms for prediction of 3D
16(4), e0250032. molecular structure. International Journal of
[49] Alzubi, O. A., Alzubi, J. A., Dorgham, O., Computers and Applications, 37(3-4), 127-
& Alsayyed, M. (2020). Cryptosystem 133.
design based on Hermitian curves for IoT [60] Shankar, K., Elhoseny, M., Kumar, R. S.,
security. The Journal of Lakshmanaprabu, S. K., & Yuan, X. (2020).
Supercomputing, 76(11), 8566-8589. Secret image sharing scheme with encrypted
[50] Kavitha, M., & Palani, S. (2020). A shadow images using optimal homomorphic
comprehensive analysis for retinal image encryption technique. Journal of Ambient
classification methods using real-time Intelligence and Humanized
database. International Journal of Business Computing, 11(5), 1821-1833.
Information Systems, 34(2), 229-252. [61] Abukharis, S., Alzubi, J. A., Alzubi, O. A.,
[51] Nair, L. R., Subramaniam, K., Alamri, S., & O'Farrell, T. (2016). Packet
PrasannaVenkatesan, G. K. D., Baskar, P. error rate performance of IEEE802. 11g
S., & Jayasankar, T. (2020). Essentiality for under bluetooth interface. arXiv preprint
bridging the gap between low and semantic arXiv:1602.05556.
level features in image retrieval systems: an [62] Kavitha, M., & Palani, S. (2015).
overview. Journal of Ambient Intelligence Hierarchical Classifier For Microaneurysm
and Humanized Computing, 1-13. Detection. International Journal of Applied
[52] S. Namasudra, “Fast and secure data Engineering Research, 10(1), 1449-1458.
accessing by using DNA computing for the [63] Anuradha, M., Ganesan, V., Oliver, S.,
cloud environment”, IEEE Transactions on Jayasankar, T., & Gopi, R. (2020). Hybrid
Services Computing, 2020. DOI: firefly with differential evolution algorithm
10.1109/TSC.2020.3046471 for multi agent system using clustering
[53] Shankar, K., Sait, A. R. W., Gupta, D., based personalization. Journal of Ambient
Lakshmanaprabu, S. K., Khanna, A., & Intelligence and Humanized Computing, 1-
Pandey, H. M. (2020). Automated detection 10.
and classification of fundus diabetic [64] Hnatiuc, M., Geman, O., Avram, A. G.,
retinopathy images using synergic deep Gupta, D., & Shankar, K. (2021). Human
learning model. Pattern Recognition Signature Identification Using IoT
Letters, 133, 210-216. Technology and Gait Recognition.
[54] Mansour, R. F. (2017). Evolutionary Electronics, 10(7), 852.
computing enriched ridge regression model [65] Miled, A. B., Dhaouadi, R., & Mansour, R.
for craniofacial reconstruction. Multimedia F. (2020). Knowledge Deduction and Reuse
Tools and Applications, 1-18. Application to the Products’ Design Process.
[55] Pustokhina, I. V., Pustokhin, D. A., Kumar International Journal of Software
Pareek, P., Gupta, D., Khanna, A., & Engineering and Knowledge Engineering,
Shankar, K. (2021). Energy‐efficient 30(02), 217-237.
cluster‐based unmanned aerial vehicle [66] S. Namasudra, R. Chakraborty, A.
networks with deep learning‐based scene Majumder and N. R. Moparthi, “Securing
classification model. International Journal of multimedia by using DNA based encryption
Communication Systems, e4786. in the cloud computing environment”, ACM
[56] Sholiyi, A., Alzubi, J. A., Alzubi, O. A., Transactions on Multimedia Computing,
Almomani, O., & O'Farrell, T. (2016). Near Communications, and Applications, vol. 16,
capacity irregular turbo code. arXiv preprint no. 3s, 2020. DOI:
arXiv:1604.01358. https://doi.org/10.1145/3392665
[57] Muthumayil, K., Buvana, M., & Jayasankar, [67] Shankar, K., & Elhoseny, M. (2019). Trust
T. (2021). Energy Utilization using Based Cluster Head Election of Secure
Artificial Bee Colony Algorithm for Message Transmission in MANET Using
Network Life Time Enhancement of Multi Secure Protocol with TDES. J.
Homogeneous WSNs. International Journal UCS, 25(10), 1221-1239.
of Modern Agriculture, 10(2), 1649-1656. [68] Chen, T. M., Blasco, J., Alzubi, J. A.,
[58] S. Namasudra, R. Chakraborty, S. Kadry, G. & Alzubi O. A. (2014). Intrusion
Manogaran and B. S. Rawal, “FAST: Fast detection. IET, 1(1), 1-9.
accessing scheme for data transmission in