1 Introduction

During the last decade, technological advancements in micro-electro-mechanical systems (MEMS) have enabled researchers and scientists to develop smart sensing enable monitoring systems. These systems can assist human beings in controlling various industrial processes, preferably hazard activities. Internet of Things (IoT) is a network of these devices \(C_i\), preferably MEMS-based sensors and actuators, with self-organization capabilities. These IoT-enabled networks are used to automate numerous activities through decision support systems (DSS) in smart cities, smart grids, agriculture, telemetric, agriculture and industrial processes etc., Rahim et al. (2021). Every member device \(C_i\) of the IoT network interacts directly with the environment and captures the desired data after a defined time interval transmitted to the concerned server \(S_j\) via a wireless communication medium. The communication approaches adopted by these devices \(C_i\) are single-hop (if devices are in direct communication range) or multi-hop if direct communication with the intended server module \(S_j\) is impossible. Usually, single-hop communication among various devices \(C_i\) (preferably sever and member device) is simpler than multi-hop communication where other devices are used as relaying devices in the IoT networks. These mechanisms should be smart enough to enable simultaneous communication of various interested devices \(C_i\) preferably with a common server module \(S_j\) in the IoT network Jan et al. (2020).

In the literature, various communication approaches have been presented to address this issue (preferably with available resources and infrastructure) and ensure the establishment of reliable communication sessions among various interested devices \(C_i\) in the IoT networks. The shortest path-enabled wireless communication approaches were reported to ensure successful transmission or delivery of packets in the multi-hop communication infrastructure. In these mechanisms, every device \(C_i\) is bound to find and enforce the shortest path, a path with minimum possible hops from source to destination modules, in the IoT networks Cheng et al. (2018). These approaches are ideal solutions for scenarios or application areas where timely data delivery is preferred over the lifetime of devices or networks such as military or border monitoring. These approaches are extremely useful for achieving a maximum delivery ratio with minimum possible delay as packets are forwarded via the most feasible path in the IoT networks. However, a common problem with shortest-path enabled approaches are that devices on these paths consume their onboard battery more rapidly. However, it is challenging when multiple devices \(C_i\) share these paths Singh et al. (2010). The literature reported multiple traffic distribution approaches to resolving the issue associated with the shortest path-enabled approaches. Usually, these schemes enforce every device to distribute overall traffic across the IoT networks uniformly. Residual energy \(E_r\) is one of the common metrics that is used by various devices in selecting an appropriate relaying device in the IoT networks Laouid et al. (2017); Kim (2016); Kamal and Hamid (2017); Sari and Caglar (2018). A biased traffic distribution approach was presented in Khan (2019); Zheng et al. (2020) where every device is bound to compute the vulnerability of its neighboring devices. Every source device is enforced to transmit or forward packets via those paths or neighbors where the probability of vulnerable devices is preferably low if not zero. For this purpose, the vulnerability or criticality of neighboring devices is computed before the network becomes operational, and thus, every device has information about its vicinity. Likewise, a similar approach with different parameter metrics and operational statistics were presented in Khan et al. (2019) where four optimal paths are identified. Then member devices are bound to use the two best optimal paths for communication until a specific threshold of their onboard battery. However, a common problem associated with these approaches is how to realize the computational vulnerability process, which seems not realistic in the IoT networking infrastructures.

In addition to the flat networking infrastructures, hierarchical or tree-enabled wireless communication mechanisms were reported to resolve coverage area problems, limited communication range, the burden on a particular device and utilization of the onboard batteries in the IoT-enabled networks Nori and Sharifian (2020). In these approaches, every ordinary device is bound to be the nearest cluster head (CH) member in the resource-limited network. Member nodes can communicate directly with the intended server or CH module as these nodes are deployed close to the concerned CH. Furthermore, CH may either communicate directly with the base station (if it is deployed within the expected wireless communication range of the transceiver module) or through other CH modules nearer to the base station. However, various issues are tightly coupled with these approaches, such as failure of a cluster head (CH) or transmission of packets simultaneously to a common destination module, CH selection process, ordinary devices and CH’s in the IoT networks. Apart from traffic distribution, the design and development of a reliable DSS are challenging issues. A technology-assisted DSS for the monitoring of orange orchards was presented in Khan et al. (2018) to automate irrigation activity. Sensor nodes were deployed in the agriculture field to capture real-time data and share the captured data with the base station after a defined time interval. Furthermore, a DSS was implemented on the server-side to ensure detection of the needy plot on time. Although this approach has automated the irrigation activity effectively, it did not mention how the system would respond if the number of deployed sensors were increased as there were currently three operational sensors deployed in the field. Thus, a reliable and efficient communication approach is needed to be developed to address most of the issues mentioned above associated with existing schemes. Furthermore, it should be integrated with the DSS to automate various activities in the IoT networks.

In this paper, a DSS-enabled reliable communication is presented to ensure timely delivery of the captured data with a minimum possible delay. The DSS is smart enough to activate the concerned module when the threshold value is matched. Initially, the proposed system ensures timely delivery of the captured data by bounding every member device to transmit via the most optimal paths available in the IoT networks. Secondly, DSS is smart enough to activate the concerned unit when requirements are met. The contribution of this research work are

  1. 1.

    A novel wireless communication approach with minimum possible delay and maximum average packet delivery ratio for the IoT networks.

  2. 2.

    A mechanism to enforce every member device, \(C_i\), to transmit its packets via the most optimal paths or neighbors in an IoT-enabled network.

  3. 3.

    Development of smart decision support system for the IoT network to ensure activation of the concerned unit.

The rest of the paper is organized according to the following pattern. In Sect. 2, the literature review is discussed in detail. In Sect. 3, the proposed scheme is presented followed by results and discussion in Sect. 4. Finally, the paper is concluded in Sect. 5.

2 Literature review

In this section, a comprehensive literature review about reliable communication is presented to guarantee timely delivery of the captured data with minimum possible end-to-end delay IoT-enabled networks Wieland et al. (2019). The least-cost or shortest path-enabled wireless communication approaches were reported to resolve the issues mentioned above and are quite common in the Military application area of the IoT networks. In these approaches, member devices or sensor nodes are bound to find the most optimal path (preferably with minimum possible hop count value) and enforce it onward with the intended server or cluster head module. The network’s lifetime and ordinary nodes are among the common issue associated with these approaches. These become even more complicated if multiple sensor nodes(preferably source modules) share a common path in the operational resources constraint network.

An alternative approach, that is, uniform distribution of traffic, is one of the ideal approaches to an enhanced lifetime of both individual nodes and networks. Thus, a gradient-enabled traffic distribution and communication scheme is reported to address the lifetime issue of the resource-limited networks. In this mechanism, CH or sink is bound to find a feasible communication path ad enforce its member devices to utilize it for onward communication with the BS or CH. This process is continuously applied or followed unless one or more member devices consume their onboard battery completely Cheng et al. (2014). As shortest path-enabled approaches rely on an individual communication path, its lifespan is short because sensor nodes residing on these paths consume their energy more rapidly and thus cannot perform accordingly. Once a path becomes compromised, another optimal path is found and enforced by the concerned module for onward communication in the operational networking infrastructures. However, selecting and reinforcing the feasible alternative path is complex and time-consuming. A biased network traffic distribution approach was presented in Khan (2019); Zheng et al. (2020) where every member device is bound to compute vulnerability or criticality. The critically is defined as susceptibility of the network from a longer connectivity perspective of its neighboring devices. Every source device is enforced to transmit or forward packets via those paths or neighbors where the vulnerable devices or nodes are preferably low if not zero. For this purpose, the vulnerability or criticality of neighboring devices is computed, a one-step computation process that is performed only once as soon as the network is deployed, before the network becomes operational. Thus every device has information about its vicinity. Likewise, a similar approach with different parameter metrics and operational statistics were presented in Khan et al. (2019) where four optimal paths are identified. Then member devices are bound to use the two best optimal paths for communication until a specific threshold of their onboard battery. However, a common problem with these approaches is realizing the computational vulnerability process, which seems unrealistic in IoT networking infrastructures. Likewise, a traffic distribution approach which is based greedy-growing algorithm was presented to ensure a uniform traffic distribution across the network Kim et al. (2008). Similarly, Touray et al. Touray et al. (2012) have presented a biased traffic or load distribution mechanism to guarantee packets transmission uniformly across multiple available paths in the constraint oriented networking infrastructure. These traffic distribution approaches are quite well in those application areas where the priority of the network lifetime is higher than the expected delivery time of the captured data. Furthermore, these mechanisms have an approximately lower APDR ratio of the total transmitted packets in the operational networks. Likewise, multiple paths-based wireless communication approach was reported by Liu et al. Liu et al. (2019) where nature inspires mechanism is adopted to find reliable wireless communication paths., this procedure is repeated for every member device. A traffic distribution strategy that is based on the tree data structure is reported to enhance the lifespan of the underlined networks Daflapurkar et al. (2017). In this approach, every leaf node or device is forced to choose one of the parent nodes as its relaying node, which will be responsible for forwarding its captured data to the concerned destination module. Selection of the relaying parent node is subject to the residual energy and APDR ratio of the concerned device in the operational network. However, a challenging issue tightly coupled with these approaches is the failure of the concerned relaying node, i.e., single-point failure, which results in partitioning the entire network. Shah et al. Shah and Rabaey (2002) have reported a probabilistic and energy-aware traffic distribution approach for the ad-hoc networks. This mechanism has considerably enhanced the lifetime of the resource-limited networks with minimum possible additional overheads. Likewise, C. Schrugher et al. Schurgers and Srivastava (2001) have described three different ways, i.e., stochastic, stream-based and energy-based, to distribute traffic across various available paths and thoroughly examined which mechanism has the potential to increase the lifetime of the underlined networks with the available resources. They have concluded that energy-based traffic distribution is ideal for resource constraint networks. A weighted and optimal path-enabled traffic distribution mechanism was reported by Yousif et al. Khalid et al. (2018) to ensure how uniform traffic distribution is achieved. Although various techniques discussed here have resolved the enhanced lifetime issues, these approaches have compromised various other performance metrics such as end-to-end delays.

Ant colony-enabled traffic distribution mechanism was reported where a pseudo-random mechanism is utilized to find an optimal path. Furthermore, this approach is well suited to increase pheromone trail, and uniform energy consumption Li et al. (2019). Similarly, a broadcasting scheme, which is an opportunistic enable approach, is utilized to minimize the energy consumption overhead in the operational networks. Likewise, energy and gauge node-based traffic distribution strategy was reported to distribute traffic uniformly across the network Adil et al. (2020). However, the ratio of the gauge node and their deployments are among the challenging issues associated with this mechanism. Finally, a Path & distance-based traffic distribution mechanism was reported by Aissa et al. Ben et al. (2019) to resolve the aforementioned issues. However, it is effective in a closed building infrastructure only. In addition to the flat networking infrastructures, hierarchical or tree-enabled wireless communication mechanisms were reported to resolve coverage area problems, limited communication range, burdens on a particular device and utilization (preferably efficient) of the onboard batteries in the IoT-enabled networks Nori and Sharifian (2020). In these approaches, every ordinary device is bound to be a member of the nearest cluster head (CH) in the resource-limited network. Member nodes can communicate directly with the intended server or CH module as these nodes are deployed in close proximity of the concerned CH. Furthermore, CH may either communicate directly with the base station (if it is deployed within the expected wireless communication range of the transceiver module) or through other CH modules nearer to the base station. However, various issues are tightly coupled with these approaches, such as failure of a cluster head (CH) or transmission of packets simultaneously to a common destination module, CH selection process, ordinary devices and CH‘s in the IoT networks. Rajaram and Kumaratharan (2020). Multiple attributes-based load balanced and optimized clustering approach is proposed to enhance the lifetime of the operational WSNs Rajpoot and Dwivedi (2020). However, complexity is a common issue associated with these schemes. However, most of these schemes have various issues, i.e., application specificity, overlay complex and expensive due to change in existing technological infrastructure. Therefore, a reliable communication infrastructure with proper DSS is needed to resolve these issues, particularly available resources.

3 Proposed methodology: ensemble-based communication for IoT networks

This section presents a detailed description of the proposed parametric ensemble-enabled wireless communication mechanism designed specifically for IoT networks. The proposed scheme enables every member device \(C_i\) in the IoT networks to achieve a maximum APDR ratio with minimum possible end-to-end delivery ratio. Furthermore, every device \(C_i\) is bound to collect valuable information from the neighboring devices \(C_i\) to select and enforce a least-cost path for onward communication with the intended server or base station module \(S_j\) in the IoT networks. The proposed scheme is comprised of three phases (1) hop count discovery phase, (2) Information collection and path identification phase (3) communication phase. A detailed description of these phases is provided below.

3.1 Hop count discover phase in the IoT networks

In this phase, server module or base station \(S_j\) is forced to broadcast a control message preferably in the form of a packet, \(Msg_{hc}\) where the value of parameter hop count \(H_c\ =\ 0\) in the payload. Usually, this message is received by devices \(C_i\) residing in the direct coverage area of the concerned server module‘s transceiver according to the Euclidean distance measure as described in Eq. 1.

$$\begin{aligned} \left\{ \begin{array}{@{}ll@{}} \forall _{i=0 \dots n}\ \frac{\sqrt{(C_{x_i}-C_{x_{i+1}})^2 + (C_{y_i}-C_{y_{i+1}})^2 }}{(x_i\ +\ y_j)} \ < \ \delta \\ \\ \exists _{i=0 \dots n}\ \frac{\sqrt{(C_{x_i}-C_{x_{i+1}})^2 + (C_{y_i}-C_{y_{i+1}})^2 }}{(x_i\ +\ y_j)}\ == \ \delta \end{array} \right. \end{aligned}$$
(1)

where \(C_{i}\) & \(C_{i+1}\) represents neighboring devices preferably with different hop count values in the IoT network.

These devices \(C_i\) store hop count value of the concern server module \(S_j\) and update value of parameter hop count to 1, i.e., \(H_c\ =\ 1\). Furthermore, these devices \(C_i\) wait for the defined time interval, that is, the time required to receive such message from all neighbors, preferably those with similar hop count values, according to Eq. 2.

$$\begin{aligned} T_{\mathrm{wait}} = \sum _{i=0}^{m} (T_b+T_p+T_d)\mid (C_i \in \mathrm{Neighbors}) \end{aligned}$$
(2)

where m represents neighbors of the particular device and \(T_b\) is the backoff time that a device \(C_i\) is bound to wait before broadcasting its packet. Likewise, parameters \( T_p \& T_d\) represent propagation time and average transmission delay, respectively. As soon as the waiting time is expired, the concerned device is ready to broadcast the updated message. However, it is bound to postpone transmission of this packet until the backoff time \(T_b\) is expired, as depicted in Eq. 3. their \(H_c\) values accordingly and broad-cast an updated version of \(Msg_{hc}\), i.e., with value of \(H_c = 1\). A backoff timer-based approach is adopted to minimize the probability of collisions where every node \(C_i\) holds its packets until the backoff timer is expired. The backoff timer is selected randomly using Eq. 3.

$$\begin{aligned} T_b{(C_i)} = \mathrm{rand}(0-1000)\ u \sec \end{aligned}$$
(3)

Backoff timer is used to ensure a collision-free transmission of packets because it is highly likely that multiple neighboring devices \(C_i\) have received and updated this packet \(Msg_{hc}\) concurrently. Thus in the proposed mechanism, back off timer \(T_b\) is utilized to resolve simultaneous transmission of packets that result in a collision. Furthermore, if a collision is detected, both devices are bound to repeat the procedure as mentioned above. This mechanism, i.e., receive and update of \(Msg_{hc}\), is repeatedly applied by every device in the operational IoT networks and continues until the very last member device \(C_i\) repeats this procedure. Thus, every device \(C_i \in IoT\) has computed its hop count value and equally received hop count of the neighboring devices \(C_i\) in the IoT networks.

3.2 Data collection and path identification phase in the IoT network

In this phase, every device \(C_i\) is forced to collect valuable information about its neighboring devices \(C_i\), which is used to find the most optimal or least-cost path in the IoT networks. For this purpose, devices \(C_i\) with a hop count value of 1 generate a message \(Msg_{data}\) with three different parameters such as several neighbors \(N_k\), turn around time TAT as described in Eq. 4, and received signal strength indicator (RSSI) as depicted in Eq. 6. In addition, however, these devices must be used back off timers to minimize the collision probability, described in Eq. 3.

$$\begin{aligned} \mathrm{TAT}(C_i) = 2* T_p(C_i,C_{i-1}) \end{aligned}$$
(4)

However, path loss ratio of the concerned neighboring device \(C_{i+1}\) is needed to be computed using Eq. 5 which is given below.

$$\begin{aligned} P(d) =P(d_0)-10nlog\frac{d}{d_0}-X_{\sigma } \end{aligned}$$
(5)

Where P(d) represents the average path loss ratio which is an important parameter in computing RSSI value of a particular devices \(C_i\) in the operational IoT networks. As soon as the value of P(d) is calculated then it is used to find RSSI of the neighboring device \(C_{i+1}\) using Eq. 6.

$$\begin{aligned} \mathrm{RSSI} (S_j) = P_t - P_{\mathrm{loss}}(d) \end{aligned}$$
(6)

Every neighboring device \(C_i\), preferably those that reside in the direct communication range of the source device, receive this message and generate an updated version of this message where values are assigned the different parameters in the \(Msg_{data}\). However, these devices \(C_i\) do not send their messages immediately rather wait for the backoff timer to expire, which is depicted in Eq. 3. Therefore, this mechanism is repeatedly applied by every member device in the operational IoT network to collect neighboring information.

Once a device \(C_i\) collects the desired information about its neighboring devices, then optimal neighboring device \(C_i\) is selected using equation 7 given below.

$$\begin{aligned} C_{\mathrm{opt}} = \mathrm{min}\left( \sum _{i=1}^{l}(H_c + N_k + TAT + RSSI)\right) \mid C_i \in \mathrm{Neighborhood}\nonumber \\ \end{aligned}$$
(7)

where l represents neighboring devices of the concerned source device \(C_i\) in the IoT network. It is to be noted that these parameters have different values, therefore, these values are needed to be normalized before applying Eq. 7. For normalization of these values, the following function is used to normalize these parameters.

$$\begin{aligned} x_{\mathrm{norm}} = \frac{x - x_{\mathrm{min}}}{x_{\mathrm{max}}-x_{\mathrm{min}}} \end{aligned}$$
(8)

where \(x_{norm}\), \(x_{min}\) and \(x_{max}\) are used to represent normal, minimum and maximum values restively.

As soon as every device \(C_i\) finds its optimal neighboring device then it share this device with other neighboring devices in the IoT networks. Thus, every source device \(C_i\) finds an optimal path using Eq. 9 as presented below.

$$\begin{aligned} O_{\mathrm{path}} = \mathrm{Min}\left( \sum _{i=0}^{n} C_{\mathrm{opt}}\right) \end{aligned}$$
(9)

Thus, every device \(C_i\) finds the most optimal path (preferably least-cost path in this case) and enforces it for onward communication, i.e., the transmission of packets.

3.3 Communication phase in the IoT network

Every device \(C_i\) (“X”) captured the required data by interacting with the phenomenon in this phase. Device X is needed to send this data to the server module, say server “Y”, via the most optimal path selected and enforced in the previous phase. As soon as device X capture data value and generate a packet, the next step is to ensure a collision-free transmission of this packet. For this purpose, device X generates a random number using an Eq. 3 as described in the previous phase and waits for the time interval \(T_b\) to expire. Back off timer is necessary as it is highly likely that another device may be interested in starting a communication session with the concerned neighboring device, or maybe another device \(C_{i+1}\) may share the same least cost path with source device X. In order to avoid or at least minimize the collision probability, the backoff timer parameter is utilized in the operational IoT networks. Re-transmission is a costly mechanism as it directly correlates with the average throughput of the networks as described in Eq. 10

$$\begin{aligned} R_{\mathrm{avg}} = \frac{\sum _{i=0}^{m}(Y_i)}{\sum _{i=0}^{n}(T_x+P_{rTx})} \end{aligned}$$
(10)

Where \(R_{\mathrm{avg}}\), \(Y_i\), \(T_x\) and \(P_{rTx}\) represent average throughput, successfully delivered packet, transmitted and retransmitted packets respectively. Therefore, the proposed scheme bounds every device \(C_i\) to wait for backoff timer expiry prior to transmitting actual data in the IoT network. Moreover, if the collision is detected, then both devices are forced to repeatedly apply the procedure mentioned above to ensure successful and collision-free delivery of the captured data using a multi-hop communication mechanism. A collision may occur if two or more two devices initiate a communication session with a common destination device simultaneously, as described in Eq. 11

$$\begin{aligned} Tx_{C_i}+\sum _{i=1}^{4}(\mathrm{delay}) (C_i) == Tx{C_{i+1}}+\sum _{i=1}^{4}(\mathrm{delay}) (C_{i+1}) \end{aligned}$$
(11)

where TX and delay represents transmission time and end-to-end delay, receptively.

The proposed approach bound every device \(C_i\) to utilize those paths identified in the previous phase, as long as one or more devices consume their onboard battery completely. In those scenarios, a source device \(C_i\) must repeat the procedure as mentioned above to find another optimal path and enforce it for onward communication in the IoT networks.

3.4 Algorithm for the hop count discovery in the IoT network

Hop count parameter plays a vital role in the development of an efficient and reliable communication approach. Therefore, a simplified algorithm, as Algorithm 1, is presented below for the hop count discovery phase as described in the previous section.

figure a

Likewise, the proposed parametric ensemble-enabled algorithm, as Algorithm 2, for finding and enforcing optimal or least-cost path is presented below, where it is assumed that the hop discovery phase is completed successfully. Furthermore, member devices are willing to cooperate and share valuable information with other neighboring devices in the operational IoT network.

figure b

The proposed optimal or leas cost path algorithm, Algorithm. 3 in this case, is represented below which guarantees reliable communication among source and destination devices in the IoT network.

figure c

3.5 Decision support system for the IoT networks

Decision support system (DSS), along with the IoT networks, play a vital role in developing automatically controlled infrastructure for various application areas such as industries, smart buildings and cities, agriculture, military etc. The proposed DSS is implemented on the IoT networks’ server module or base station. The proposed DSS thoroughly examined captured data values received from various devices \(C_i\), deployed to monitor the phenomenon. It classifies this data into two classes (1) accurate data values (2) outliers or noise. For this purpose, the proposed DSS approach uses Euclidean distance measure as described below in Eq. 11

$$\begin{aligned} d_{i,j} = \frac{\sqrt{(C_{x_i}-C_{x_{i-1}})^2 + (C_{y_i}-C_{y_{i-1}})^2 }}{(x_i\ +\ y_j)} \end{aligned}$$
(12)

if the value of d ij is 0.5, then it is added to the class where accurate data is stored; otherwise, it is added to the outliers class. Furthermore, these outliers are needed to be refined to improve the accuracy of the proposed DSS and minimize the data loss ratio. For this purpose, if a data value is identified as noise or outlier, then the average of the previously stored accurate value is computed first. Then, the noisy data value is replaced with the refined data value, i.e., the average of the previous two consecutive readings.

4 Results and performance evaluation

This section presents a detailed description of numerous possible simulation results. The proposed parametric ensemble-enabled wireless communication approach and field-proven approaches were implemented in OMNET++, an open-source networks simulation software, to verify the applicability of these approaches. Furthermore, these approaches were tested on various topological structures such as graph-enabled, tree, random top, random-centre, etc. Various simulation parameters and their possible values are provided in the table below. The energy required to transmit and receive a message is assumed to be different, i.e., 91.4 and 59.1 mW, respectively. Likewise, both static and deterministic deployments are utilized. They are used to evaluate the performance of these schemes, i.e., proposed scheme, vulnerability-based, vulnerability aware, multiple path-based, hybrid and opportunistic routing algorithms.

Table 1 Simulation Parameters for the Internet of Things

4.1 End-to-End delay performance evaluation metric

End-to-end delay is one of the common evaluation metrics that is used by the research community to verify performance of the newly developed wireless communication mechanisms against benchmark approaches. For this purpose, both static and random deployment strategies of the IoT networks are adopted and the communication approach is examined thoroughly. Furthermore, a communication approach which has minimum possible ratio of the end-to-end delay metric is assumed as an ideal solution preferably in the resources constraint networks i.e., IoT and wireless sensor networks.

Fig. 1
figure 1

End-to-end Delay Comparison with Benchmark Approaches in Deterministic Deployment IoT Network

Fig. 2
figure 2

End-to-end Delay Comparison with Benchmark Approaches in Random Deployment IoT Network

The proposed parametric ensemble-enable wireless communication approach is checked against field-proven approaches. The simulation result verifies that the proposed scheme is the best possible solution as far as end-to-end latency is concerned. The proposed scheme performs exceptionally well in both scenarios where the IoT network is deterministic and random, as shown in Figs. 12. Furthermore, these results were obtained using different scalability of the IoT networks.

4.2 Average throughput performance evaluation metric

Generally, in traditional networks, average throughput is defined as the ratio of packets or frames received by the intended destination device to the number of packets or frames generated or retransmitted. Apart from end-to-end delay, it is assumed to be another important metric to evaluate the performance of the communication approaches. Likewise, this metric is more valuable in application areas where capturing data has higher priority than a lifetime of the IoT networks. The proposed parametric ensemble-enabled wireless communication approach is compared against field-proven approaches for the average throughput performance metric. Simulation results showed that the proposed scheme had achieved maximum possible average throughput than its rival schemes, as shown in Fig. 3.

Fig. 3
figure 3

Average throughput Comparison with Benchmark Approaches in Random Deployment IoT Network

4.3 Lifetime performance evaluation metric

Generally, in resource-limited networks, lifetime is assumed as one of the vital performance evaluation metrics because a prolonged operational IoT network is always needed. Therefore, various mechanisms have been reported in the literature to enhance the lifetime of the operational IoT network. The proposed parametric ensemble-enabled wireless communication approach can increase the lifetime of IoT networks, as shown in Fig. 4. The proposed scheme primarily enforces member devices to use the shortest path (if possible) for communication. However, when this path is no longer available, then a secondary optimal or leas cost path is enforced for onward communication in the IoT networks. The proposed communication approach has considerably enhanced the lifetime of the operational IoT networks with available resources and sampling intervals.

Fig. 4
figure 4

Lifetime Performance Comparison with Benchmark Approaches in Random Deployment IoT Network

4.4 Average Packet Delivery Ratio (APDR) performance evaluation metric

Ratio of packets or frames which are received successfully by the intended destination device is defined as average packet delivery ratio (APDR). A communication approach which has achieved maximum possible APDR is considered as the best suited solution for the IoT networks. The proposed parametric ensemble-enabled wireless communication approach is compared with various benchmark schemes and verifies that the proposed scheme is better than existing solutions preferably in terms of APDR as shown in Fig. 5.

Fig. 5
figure 5

APDR Performance Comparison with Benchmark Approaches in Random Deployment IoT Network

4.5 Limitation of the proposed scheme

Although the proposed decision support system performs exceptionally well in terms of different evaluation metrics. However, excessive messages for the computation of hop count value and residual energy of the neighboring devices are challenging issues with the proposed scheme.

5 Conclusion and future work

Internet of Things (IoT) networking infrastructures have been used in different application areas to monitor and control various activities which are hard to perform by human beings. Reliable communication among various member devices or servers is a challenging issue tightly coupled with the IoT networks. In this paper, we have proposed a reliable parametric ensemble-enabled wireless communication approach, specifically designed for the IoT networks, to address the aforementioned issues, preferably with available resources and infrastructures. Initially, server modules are bound to generate messages and broadcast them received by devices residing in the coverage area of the concerned server‘s transceiver module. Additionally, every member device is bound to collect valuable information from its neighboring devices to find a reliable path. However, it should be cheap as far as utilization of the available resource is concerned. In addition to the communication approach, a decision support system was implemented at the server-side to refine the captured data. The proposed and existing schemes were implemented in well-known simulation software, i.e., OMNET++. Simulation results have verified that the proposed scheme is ideal for IoT networks where maximum lifetime and minimum possible end-to-end delay are needed. In the future, we will try to implement and investigate the exceptional performance of the proposed parametric ensemble-enabled wireless communication approach in IoT networking infrastructure where either member devices or servers are mobile.