1 Introduction

Typically, WSNs are having more number of sensor nodes deployed in various applications like defense, agricultural activity monitoring, atmospheric conditions forecasting, healthcare systems, smart vehicles, and home automation. Once the nodes are deployed, each sensor node must have the capability to autonomously organize them into a wireless communication network. Also, they have the ability to accumulate and process the data as well as transmit the sensed data to one or more sink nodes via wireless link in multihop transmission manner. In these networks, each sensor node is equipped with the restricted power resources which are not easy to restore. In general, these types of networks are classified with denser levels of node’s functionality, unpredictability, constrained power, computation, and storage. These sole features and restrictions may cause several problems [1]. Specifically, the routing holes or energy holes have occurred i.e., a region free of nodes nearer to the destination is barely circumvented in WSNs in different authentic geographical atmospheres like blockage, constructions, etc. This acquires more EC for data transmission. Therefore, those networks require an appropriate energy-aware GR protocol to implement various network control techniques such as node localization, synchronization and network prediction with reduced EC and increased Network Lifetime (NL).

Typically, a routing protocol is a process to select a suitable path for transmitting the data from one node to another. In previous years, different energy-aware GR protocols have been suggested to improve data transmission. GR has been developed for resource-constrained WSNs because it utilizes neighborhood position data obtained by Global Positioning System (GPS) receiver rather than overall topology data for packets transmission. Their protocols do not need allocation of routing tables for all sensors. So, these protocols are having high efficiency and scalability for WSNs [2, 3].

Most of the protocols are easy to be executed, but the most familiar limitation is that they perform only one region of the energy holes for recovering the path. Such protocols can provide the traffic load congregated on the edge of the energy holes and degrade the network efficiency in data transmission. Also, all these protocols do not ensure data transmission in an energy-efficient way. Distributed VOronoi based Cooperation scheme (DVOC) uses the Local Voronoi Diagrams which helps in the avoidance of hole. Nodes in the network govern only their transmission path and DVOC made constraint for every node. Based on the constraint, generation of new holes in the critical path is avoided. Huang et al. [4] proposed an EDGR protocol to achieve enhanced path recovery from energy holes. This protocol uses local data, remaining power and the features of EC to decide the routing path. Also, two node-disjoint anchor lists sent via two regions of the energy holes were used for altering the route to achieving load-balancing. Besides, this protocol was extended to 3D sensor networks for achieving an energy-aware routing that deviates energy holes. On the other hand, the node mobility can create fresh holes when moving to recover the existing ones and longer moving space can cause other nodes to terminate since their energy is exhausted i.e., the nodes are not able to identify the energy holes. Also, it does not have the ability to heal the energy holes.

The delivery of data to the destination is interrupted by various factors such as energy holes, traffic and exhaust of energy. Among this energy holes place vital role in the interruption of data delivery. As a result, this article focuses on detecting and healing energy holes efficiently by avoiding the new holes generation. The delayed delivery that is caused due to energy hole is rectified with the effective design of protocol that detects and prevents the energy holes. In this protocol, an energy-efficient distributed collaboration method is proposed for \(k\)-coverage energy holes discovery and recovery in WSN with EDGR protocol that reduces the DD. Also, the DVOC method is proposed where the nodes collaborate in detecting and healing the energy holes. It facilitates the nodes to observe the other’s key points around themselves by constructing the LVDs. After that, it constrains the movement of each node for avoiding the generation of fresh holes. If a node does not arrive at its destination because of the constraint, its holes recovery process will transfer to the other collaborating nodes i.e., \({k}{\text{th}}\) generating node. Moreover, this protocol is further improved as ODVOC-EDGR to reduce the moving space of the nodes based on the IWD algorithm that minimizes the total amount of moving routes i.e., obtain the globally optimized paths that reduce the DD significantly. Thus, the energy holes generated in the network is detected and healed to minimize the DD significantly.

The rest of the article is structured as follows: Section II presents the earlier investigations of the energy-efficient GR protocols for WSN. Section III describes the methodology of DVOC-EDGR and ODVOC-EDGR in detail. Section IV demonstrates the simulation results for DVOC-EDGR and ODVOC-EDGR. Section V concludes the research work and suggests future scope.

2 Literature survey

Chen et al. [5] proposed an Adaptive Position Update (APU) scheme for GR that fine-tunes the frequency of PU using the mobility dynamics of the nodes and the transmission models [6]. This strategy was performed based on two rules such as nodes whose mobility were harder to predict update their locations regularly and nodes nearer to forwarding paths restore their locations frequently. However, load-balancing was not achieved and the optimal transmission range was needed to improve the protocol performance. Cheng et al. [7] proposed an Efficient QoS-aware Geographic Opportunistic Routing (EQGOR) protocol for achieving QoS including end-to-end consistency and delay constraints in WSNs. In this protocol, a forwarding candidate set was efficiently selected and prioritized. However, average link quality per-hop was not effective.

Petrioli et al. [8] presented an Adaptive Load-Balancing Algorithm with Rainbow (ALBA-R) protocol for WSN in which the cross-layer mixture of GR with contention-based MAC was performed for selecting the relay and balancing the load. Also, another mechanism was used for detecting and routing around connectivity holes. However, end-to-end latency was high. Coutinho et al. [9] proposed the Geographic and opportunistic routing with Depth Adjustment-based topology rule for transmission Recovery (GEDAR) protocol over invalid regions [10]. In this protocol, the local data of the neighboring nodes and few well-known sonobuoys were used for selecting the next-hop forwarder group of neighbors to maintain data transmission. Also, an invalid node healing depth regulation based topology rule algorithm was proposed to shift invalid nodes to fresh depths for restarting the GR. However, Packet Delivery Ratio (PDR) was less and NL was not considered.

Hieu et al. [11] proposed a Stability-Aware GR protocol for secure data transmissions in Energy-Harvesting (SAGREH) WSNs. By using this protocol, a reliable paths selection method was provided to increase the NL. Particularly, the influences of link quality on the network performance were analysed [12]. The link quality was computed based on the packet reception rate of all routes between the source and sink node. After that, the most reliable route was chosen for transmitting the packets. However, average hop count and EC were high.

Huang et al. [13] proposed an Energy-efficient Multicast GR (EMGR) that constructs an energy-aware multicast tree based on the energy for directing multicast data transmission and adaptively selecting the nodes nearest to the power-optimal relay position as the subsequent transmission [14]. Moreover, the RTS/CTS beaconless handshaking method was employed for constructing the local planarized Relative Neighborhood Graph (RNG) that removes a redundant cost for multicast GR [15]. However, control overhead was high while the network density was increased. Increase in control overhead may lead the poor performance and the delay in delivery of data.

Adnan et al. [16] suggested a Secure Region-Based GR (SRBGR) protocol for increasing the chance of choosing the suitable relay node. In this protocol, additional authorized nodes can be considered for routing by extending the allocated sextant and applying various message contention priorities [17]. Moreover, the bound set window was used for an adequate gathering interval and authentication rate for intruder detection and mitigation. However, the impact of more number of nodes as needed to analyze with different scenarios of network configurations.

3 System model

In this part, the DVOC-EDGR and ODVOC-EDGR are explained in brief. Consider that all sensor nodes have its position information and are dense enough for enabling the whole network to the well linked. Also, consider that sensor nodes can literally travel in any direction in the target area and there is no obstacle region where sensor nodes cannot travel in. Assume a group of sensor nodes \(S=\left\{1,\dots ,N\right\}\) disseminated over a target region \(\Lambda\) where the location of node \(u\) is characterized by its Cartesian coordinate \(\left({x}_{u},{y}_{u}\right)\).

3.1 Distributed Voronoi-based collaboration with EDGR (DVOC-EDGR) protocol

Initially, \(k\)-order VD is constructed by DVOC and \(k\)-coverage checking is performed based on the LVD. Typically, LVD assigns the node \(u\) nearest to a critical location of node \(v\) for conducting the precision analysis and \(k\)-coverage analysis on this location. Therefore, LVD minimizes the ring where the \(u\) requests to gather the position data. Thus, GPS searching space and the number of probed nodes of all nodes are minimized. In addition, a redundant searching cost due to the overlapping is avoided.

Observe that \(u\)’s 1-order Voronoi cell is equally restricted to any 1-order Voronoi cell of other node’s position. After that, LVD is defined as the intersection of \(u\)’s 1-order Voronoi cell and \(k\)-order VD. After that, the local \(k\)-order VD of each sensor node should be equally restricted. As well, the grouping of LVD creates the whole \(k\)-order VD. The set of locations that node \(u\) has gathered is denoted as \({\mathcal{L}}_{u}\). Subsequently, the local \(k\)-order VD of \(u\) is described as the intersection of \(u\)’s 1-order Voronoi cell and the \(k\)-order VD of \({\mathcal{L}}_{u}\):

$${\widehat{V}}_{k}^{u}\left({\mathcal{L}}_{u}\right)\triangleq {V}_{k}\left({\mathcal{L}}_{u}\right)\cap {\mathcal{V}}_{1}\left(u\right)$$
(1)

In Eq. (1), \({V}_{k}\left({\mathcal{L}}_{u}\right)\) is the \(k\)-order VD given by \({\mathcal{L}}_{u}\). An LVD \({\widehat{V}}_{k}^{u}\left({\mathcal{L}}_{u}\right)\) is said to as accurate if \({\widehat{V}}_{k}^{u}\left({\mathcal{L}}_{u}\right)={\widehat{V}}_{k}^{u}\left({\mathcal{L}}_{u}\right)\).

figure c

In DVOC, once the sensor nodes construct their own \(k\)-order LVDs, they cooperate with each other for detecting whether the vertices of the cells in the diagram i.e., critical locations are \(k\)-ordered by discovering if each vertex is covered by its \({k}{\text{th}}\) generating node. Normally, a sensor node travels towards the Voronoi vertex that is uncovered. Nonetheless, such node mobility may cause few regions to become discovered and much iteration may be required for converging while a fresh energy hole cannot be discovered by few other nodes. Hence, a technique is proposed for enabling a node to detect its secure region that it must not travel out. If the node travels out of the secure region, it no longer discovers its critical location.

If \(\mathcal{v}\) is a vertex of a \(k\)-order Voronoi cell, then \(\mathcal{v}\) should be the intersection of the bisectors \({\mathcal{B}}_{u,v}\) and the \({k}{\text{th}}\) generating nodes of \(\mathcal{v}\) are \(u,v\) and \(x\). Based on this, for any vertex \(\mathcal{v}\) of a \(k\)-order Voronoi cell, \(\mathcal{v}\) has at least three \({k}{\text{th}}\) generating nodes i.e., \(u,v\) and \(x,\) and \(\mathcal{v}\) denotes the centroid of the ring of \({\Delta }_{u,v,x}\). Besides, in the circle of \({\Delta }_{u,v,x}\), there should be \(\left(k-1\right)\) nodes closer to the centroid of ring than the triangle’s three vertices which indicate that the ring should have accurately \(\left(k-1\right)\) nodes. Thus, \(\left(k-1\right)\) order Delaunay Triangle (DT) is obtained by linking the three \({k}{\text{th}}\) generating nodes of any critical location in a node’s LVD.

figure d

If the \({k}{\text{th}}\) generating a node’s sensing distance discovers their critical location, then the radius of their \(\left(k-1\right)\)-order DT is lesser than or identical to their sensing distance. So, the issue that whether the radius of each of such \(\left(k-1\right)\)-order DTs less than the sensing distances of the \({k}{\text{th}}\) generating nodes. The correlation among the radius of triangle’s bounded ring \(\left(r\right)\) and triangle’s three edges \(\left({e}_{u,v},{e}_{u,x},{e}_{v,x}\right)\) for making the three \({k}{\text{th}}\) generating nodes to discover their critical location i.e.,

$$r=\frac{{e}_{u,v}{e}_{u,x}{e}_{v,x}}{\sqrt{{\left({e}_{u,v}^{2}+{e}_{v,x}^{2}+{e}_{u,x}^{2}\right)}^{2}-2\left({e}_{u,v}^{4}+{e}_{v,x}^{4}+{e}_{u,x}^{4}\right)}}$$
(2)

According to Eq. (2), any vertex of a \(k\)-order Voronoi cell can be discovered by its \({k}{\text{th}}\) generating nodes if the correlation of its \(\left(k-1\right)\)-order DT’s three edges guarantee the following criterion:

$${R}_{S}\ge \frac{{e}_{u,v}{e}_{u,x}{e}_{v,x}}{\sqrt{{\left({e}_{u,v}^{2}+{e}_{v,x}^{2}+{e}_{u,x}^{2}\right)}^{2}-2\left({e}_{u,v}^{4}+{e}_{v,x}^{4}+{e}_{u,x}^{4}\right)}}$$
(3)

Assume a \(\left(k-1\right)\)-order DT \({\Delta }_{u,v,x}\) where \(u\) and \(v\) are not moving, the secure region of \(x\) for \({\Delta }_{u,v,x}\) refers to the region where \(x\) can be placed to ensure that the triangle’s circumcenter is \(k\)-covered. According to this, node \(x\)’s secure region for \({\Delta }_{u,v,x}\) is computed. According to the Eq. (3), the position of \(x\) must ensure one of the following conditions where \(\left({i}_{x},{j}_{x}\right),\left({i}_{u},{j}_{u}\right)\) and \(\left({i}_{v},{j}_{v}\right)\) denote the Cartesian coordinates of \(x,u,\) and \(j\) correspondingly.

$${\left({i}_{x}-{i}^{^{\prime}}+{f}_{i}\right)}^{2}+{\left({j}_{x}-{j}^{^{\prime}}+{f}_{j}\right)}^{2}\le {R}_{S}$$
(4)
$${\left({i}_{x}-{i}^{^{\prime}}-{f}_{i}\right)}^{2}+{\left({j}_{x}-{j}^{^{\prime}}-{f}_{j}\right)}^{2}\le {R}_{S}$$
(5)

where \({i}^{^{\prime}}=\frac{{i}_{u}+{i}_{v}}{2}, {j}^{^{\prime}}=\frac{{j}_{u}+{j}_{v}}{2}, {f}_{i}=\left|{i}_{v}-{i}_{u}\right|\sqrt{{\left({R}_{S}/{e}_{u,v}\right)}^{2}-\frac{1}{4}}\) and

$${f}_{j}=\left|{j}_{v}-{j}_{u}\right|\sqrt{{\left({R}_{S}/{e}_{u,v}\right)}^{2}-\frac{1}{4}}\times \frac{{i}_{u}-{i}_{v}}{{j}_{v}-{j}_{u}}$$
(6)

When \(x\) requires to travel to discover an energy hole, it must not travel out of its secure region of the other discovered critical location i.e., its position \(\left({i}_{x},{j}_{x}\right)\) must satisfy Eq. (4) and (5). Thus, the node’s mobility is constrained by a secure region for preventing new energy holes from being generated [18]. After that, a collaboration scheme is also introduced to heal \(k\)-coverage energy holes when avoiding new energy holes being generated during node mobility. Consider, \({S}_{m}\subseteq S\) is the set of nodes that can travel where the nodes in \({S}_{m}\) are called as mobile nodes. Mainly, \({S}_{m}\) aims to exist in its secure region while traveling to discover its critical location. If it cannot travel to its destination, it requests another mobile generating node of a similar critical location to travel towards the energy hole for compensation.

While a node identifies that there exists a critical location \(\mathcal{\nu}\) beyond the sensing range of its \({k}{\text{th}}\) generating nodes, it will transmit a notification to all the three generating nodes. If there be at least one mobile generating node, then the mobile generating node is needed to travel towards \(\mathcal{\nu}\) to recover the energy hole. If not, \(v\) requests to transmit the notification to a near mobile node that is further away from \(\mathcal{\nu}\) than \(v\) to renovate the \(k\)-coverage energy hole. Consider \(u\) is the mobile node that needs to travel to recover the \(k\)-coverage energy hole. After that, \(u\) discovers its destination \(d\) to discover the energy hole where \(d\) denotes the closest location that \(u\) desires to travel to formulate its sensing range arrive at its undiscovered critical location. At this point, the shortest route is the line that links \(u\) and \(u\)’s undiscovered critical location.

For preventing the new energy holes generation, node \(u\) needs to compute the secure region \({O}_{joint}^{u}\) for all of its critical locations. Once the secure region is computed, node \(u\) finds the distance it needs to travel towards \(d\). Assume \({d}^{^{\prime}}\) is the intersection of the line and \({O}_{joint}^{u}\). If \({d}^{^{\prime}}\) is inside \({O}_{joint}^{u}\), node \(u\) directly travels to it; or else, the destination is \({d}^{^{\prime}}\). A collaboration scheme is introduced to overcome the problem that the node may not be capable to arrive at the computed destination due to the limit of a secure region. In this scheme, while a node cannot travel adequate space to arrive at its critical location, its collaborators i.e., nodes in a similar critical location are needed to travel to heal the energy holes. The detailed process of movement carried out by each node is described in Algorithm 3.

figure e

Moreover, the moving distance is shortening by using IWD algorithm for reducing the total moving routes i.e., globally optimized routes.

3.2 Optimized distributed Voronoi-based collaboration with EDGR (ODVOC-EDGR) protocol

Each sensor node often discovers optimal moving path based on the activities and responses that take place among water drops and the water drops with the riverbeds. At each iteration, each water drop floods with speed and collects a quantity of soil. According to this, the following crucial features are described:

  • Every water drop collects a quantity of soil relative to its speed. Therefore, the higher the velocity of drops, the larger the quantity of soil it brings.

  • Speed of water drops raises further on routes with low soil quantity than on those with more soil quantity.

  • While a water drop has to choose a route, it selects the route containing the less quantity of soil.

Therefore, artificial water drop is defined with two proprieties as:

  • \(Soil\left(IWD\right)\): The quantity of soil passed by the IWD.

  • \(Vc\left(IWD\right)\): The speed of the IWD.

The amount of soil (messages while a node discovering an energy hole or moving to recover it) from source \(\left(u\right)\) to destination \(\left(d\right)\) is denoted as \(MSG\left(u,d\right)\). The velocity of this \(MSG\) transmission via the route is represented as \({V}^{ud}\).

$$V\left(t+1\right)=V\left(t\right)+\frac{{a}_{d}}{{b}_{d}+{c}_{d}\left({MSG}_{t}\left(u,d\right)\right)}$$
(7)

In Eq. (7), \(V\left(t+1\right)\) is the updated speed of water drop at subsequent node \(d\), \({a}_{d}, {b}_{d}\) and \({c}_{d}\) are constant parameters for shortening the moving distance. An observed utility \({E}_{f}\) is used to determine an undesirability of a water drop to travel from one node to another. The time \(\left(time\left(u,d; {V}^{ud}\left(t+1\right)\right)\right)\) taken by the water drop with speed \({V}^{ud}\) to travel from \(u\) to \(d\) is computed as:

$$time\left(u,d;V\right)=\frac{{E}_{f}\left(u,d\right)}{max\left(\varepsilon ,{V}^{ud}\right)}$$
(8)

In Eq. (8), the parameter \(\varepsilon\) is a positive value which is equal to 0.001. The function \({E}_{f}\left(u,d\right)\) is the heuristic undesirability of moving a node from \(u\) to \(d\). Regarding shorten the moving distance, \({E}_{f}\left(u,d\right)\) is represented as \({Ef}^{op}\).

$${E}_{f}\left(u,d\right)={Ef}^{op}=\Vert w\left(u\right)-w\left(d\right)\Vert$$
(9)

In Eq. (9), \(w\left(u\right)\) and \(w\left(d\right)\) are 2D locational vectors for the moving nodes \(u\) and \(v\). This function normally computes the Euclidean norm. While \(u\) and \(d\) are close to each other, the observed undesirability measure \({E}_{f}\left(u,d\right)\) becomes small which reduces the time taken for the water drop to travel from move \(u\) to \(v\). When the water drop travels from one node to another, it brings a quantity of soil within it. The quantity of soil passed is inversely proportional to the time taken by the water drop for arriving at the destination. The quantity of soil i.e., \(MSG\left(u,d\right)\) carried by water drop is computed as:

$$\Delta MSG\left(u,d\right)=\frac{{a}_{Vc}}{{b}_{Vc}+{c}_{Vc}\left(time\left(u,d;{V}^{ud}\right)\right)}$$
(10)

In Eq. (10), \(\Delta MSG\left(u,d\right)\) denotes the amount of \(MSG\) neglected by the water drop travelling from node \(u\) to \(d\). Besides, \({a}_{Vc}, {b}_{Vc}\) and \({c}_{Vc}\) are constant velocity parameters. After the water drops travel between node \(u\) and \(d\), \(MSG\) between them is minimized by,

$$MSG\left(u,d\right)={\rho }_{0}.{MSG}_{t}\left(u,d\right)-{\rho }_{n}.\Delta MSG\left(u,d\right)$$
(11)

In Eq. (11), \({\rho }_{0}\) and \({\rho }_{n}\) are positive numbers selected between 0 and 1. The water drop that has traveled from \(u\) to \(v\) can increase the \(MSG\) transfer \({MSG}^{ud}\) by:

$${MSG}^{ud}={MSG}^{ud}+\Delta {MSG}_{t}\left(u,d\right)$$
(12)

The most significant property of IWD is choosing a route with less quantity of soil (packet transfer) than other routes. This is achieved by transferring on a chance to each node except the current node. The probability \(\left({\mathcal{P}}_{u}^{ud}\left(d\right)\right)\) of water drop moving from \(u\) to \(d\) is computed by:

$${\mathcal{P}}_{u}^{ud}\left(d\right)=\frac{f\left({MSG}_{t}\left(u,d\right)\right)}{\sum_{k\notin {y}^{ud}}f\left({MSG}_{t}\left(u,k\right)\right)}$$
(13)

In Eq. (13), \({y}^{ud}\) is the node that the water drop must not stay to remain the conditions and \(f\left({MSG}_{t}\left(u,d\right)\right)\) determines the inverse of the \(MSG\) between the node \(u\) and \(d\) as:

$$f\left({MSG}_{t}\left(u,d\right)\right)=\frac{1}{{\varepsilon }_{m}+{MSG}_{t}\left(u,d\right)}$$
(14)

In Eq. (14), the value of the parameter \({\varepsilon }_{m}=0.01\times g\left({MSG}_{t}\left(u,d\right)\right)\) is used for shifting \(MSG\left(u,d\right)\) on the path linking \(u\) and \(d\) towards progressive results and \(g\left({MSG}_{t}\left(u,d\right)\right)\) is computed as:

$$g\left(MSG\left(u,d\right)\right)=MSG\left(u,d\right)-\underset{l\notin {y}^{\mathit{ud}}}{\mathrm{min}}MSG\left(u,l\right)$$
(15)

This function must be used to determine an approximation of the solution i.e., shortest moving distance. The best shortest moving distance \(\left({D}^{m}\right)\) is computed by \(n\left({D}^{m}\right)\). This process terminates iteration while all water drops have discovered their solution. The overall best shortest moving distance is determined by,

$${D}^{best}=\underset{\forall {D}^{m}}{\mathrm{argmin}}n\left({D}^{m}\right)$$
(16)

Thus, the best solution is the shortest moving distance that minimizes the sum of all moving paths from source to destination is obtained.

4 Performance analysis

In this segment, the simulation outcomes of the proposed protocols DVOC-EDGR and ODVOC-EDGR are presented which are compared with the existing EDGR using Network Simulator (NS-2.34). The analysis is performed under three basic scenarios such as varying network density, energy holes size and communication sessions. The parameters used in this experiment are listed in Table 1.

Table 1 Simulation parameters

For performance evaluation, different metrics including PDR, DD, EC, and NL are utilized.

  • PDR: It refers to the percentage of the amount of effectively received packets at the destination to the number of packets sent from the source.

  • DD: It refers to the time delay from the creation of packets to its reception at the destination.

  • EC: It refers to the overall power used by the nodes that join in data transmission.

  • NL: It refers to the time taken from simulation establishing to the interval that nodes exhaust their 20% or more power in the network.

4.1 Analysis of varying network density scenario

Performance of the existing and proposed schemes is evaluated on the basis of network density. Variance in network density provides varied simulation analysis and provides accurate result for the simulation (Table 2).

Table 2 Comparison of PDR vs. network densities

Figure 1 illustrates the PDR of proposed and existing protocols with different network densities. It shows that if the network density is 1.6, then the PDR of ODVOC-EDGR protocol is 1.44% greater than EDGR and 0.51% greater than DVOC-EDGR. Therefore, it is observed that the ODVOC-EDGR increases PDR compared to the other protocols (Table 3).

Fig. 1
figure 1

PDR vs. network densities

Table 3 Comparison of DD vs. network densities

Figure 2 shows the DD of DVOC-EDGR, ODVOC-EDGR, and EDGR with different network densities. It shows that if the network density is 1.6, then the DD of ODVOC-EDGR is 7.45% less than EDGR and 4.4% less than DVOC-EDGR. Thus, it is observed that the ODVOC-EDGR minimizes DD than the DVOC-EDGR and EDGR (Table 4).

Fig. 2
figure 2

DD vs. network densities

Table 4 Comparison of EC vs. network densities

Figure 3 demonstrates the EC of DVOC-EDGR, ODVOC-EDGR, and EDGR under various network densities. It shows that if the network density is 1.6, then the EC of ODVOC-EDGR is 3.89% minimized than EDGR and 1.98% minimized than DVOC-EDGR. Therefore, it is observed that the ODVOC-EDGR minimizes the EC than the other protocols (Table 5).

Fig. 3
figure 3

EC vs. network densities

Table 5 Comparison of NL vs. network densities

Figure 4 illustrates the NL of DVOC-EDGR, ODVOC-EDGR, and EDGR with different network densities. It shows that if the network density is 1.6, then the NL of ODVOC-EDGR is 2.87% higher than EDGR and 1.42% higher than DVOC-EDGR. Hence, it is observed that the ODVOC-EDGR achieves higher NL compared to the DVOC-EDGR and EDGR (Table 6).

Fig. 4
figure 4

NL vs. network densities

Table 6 Comparison of PDR vs. energy hole sizes

4.2 Analysis of varying energy holes sizes scenario

Figure 5 illustrates the PDR of proposed and existing protocols with different energy holes sizes. It shows that if the energy holes size is 50, then the PDR of ODVOC-EDGR is 0.73% higher than EDGR and 0.42% higher than DVOC-EDGR. Therefore, it is observed that the ODVOC-EDGR achieves high PDR than the other protocols (Table 7).

Fig. 5
figure 5

PDR vs. energy holes size

Table 7 Comparison of DD vs. energy hole sizes

Figure 6 illustrates the DD of DVOC-EDGR, ODVOC-EDGR, and EDGR with varied energy holes size. It shows that if the energy holes size is 50, then the DD of ODVOC-EDGR is 7.29% less than EDGR and 3.31% less than DVOC-EDGR. Thus, it is observed that the ODVOC-EDGR has reduced DD than the DVOC-EDGR and EDGR (Table 8).

Fig. 6
figure 6

DD vs. energy holes size

Table 8 Comparison of EC vs. energy hole sizes

Figure 7 demonstrates the EC of proposed and existing protocols with different energy holes size. It shows that if the energy holes size is 50, then the EC of ODVOC-EDGR is 2.88% reduced than EDGR and 1.46% reduced than DVOC-EDGR. Thus, it is observed that the ODVOC-EDGR minimizes the EC than the other protocols (Table 9).

Fig. 7
figure 7

EC vs. energy holes size

Table 9 Comparison of NL vs. energy hole sizes

Figure 8 illustrates the NL of DVOC-EDGR, ODVOC-EDGR, and EDGR with varied energy holes size. It shows that if the energy holes size is 50, then the NL of ODVOC-EDGR is 3.13% higher than EDGR and 1.54% higher than DVOC-EDGR. Therefore, it is observed that the ODVOC-EDGR achieves higher NL compared to the DVOC-EDGR and EDGR (Table 10).

Fig. 8
figure 8

NL vs. energy holes size

Table 10 Comparison of PDR vs. communication sessions

4.3 Analysis of varying communication session scenario

Figure 9 illustrates the PDR of proposed and existing protocols with different communication sessions. It shows that if the number of the communication session is 5, then the PDR of ODVOC-EDGR is 0.63% higher than EDGR and 0.31% higher than DVOC-EDGR. Thus, it is observed that the ODVOC-EDGR increases PDR than the other protocols (Table 11).

Fig. 9
figure 9

PDR vs. communication sessions

Table 11 Comparison of DD vs. communication sessions

Figure 10 demonstrates the DD of DVOC-EDGR, ODVOC-EDGR, and EDGR with different communication sessions. It shows that if the number of communication session is 5, then the DD of ODVOC-EDGR is 6.38% less than EDGR and 3.3% less than DVOC-EDGR. Hence, it is observed that the ODVOC-EDGR minimizes DD than the DVOC-EDGR and EDGR. Effective discovery of energy holes and proper monitoring of nodes in network has prevented the formation of new holes that is achieved by the proposed algorithm (Table 12).

Fig. 10
figure 10

DD vs. communication sessions

Table 12 Comparison of EC vs. communication sessions

Figure 11 illustrates the EC of proposed and existing protocols with varied communication sessions. It shows that if the number of the communication session is 5, then the EC of ODVOC-EDGR is 2.4% less than EDGR and 1.21% less than DVOC-EDGR. Thus, it is observed that the ODVOC-EDGR protocol minimizes the EC than the other protocols (Table 13).

Fig. 11
figure 11

EC vs. communication sessions

Table.13 Comparison of NL vs. Communication Sessions

Figure 12 demonstrates the NL of DVOC-EDGR, ODVOC-EDGR, and EDGR with different communication sessions. It shows that if the number of communication session is 5, then the NL of ODVOC-EDGR is 6.58% higher than EDGR and 2.79% higher than DVOC-EDGR. Hence, it is observed that the ODVOC-EDGR has high NL compared to the DVOC-EDGR and EDGR.

Fig. 12
figure 12

NL vs. communication sessions

5 Conclusion

In this article, an optimized distributed collaboration mechanism is proposed with EDGR for \(k\)-coverage energy holes detection and healing in WSN that minimizes the DD. Initially, DVOC-EDGR method is applied in which the nodes can cooperate in energy holes detection and recovery. By using this method, LVDs are constructed and the nodes are enabled to monitor each other node’s critical locations around themselves. Moreover, an ODVOC-EDGR protocol is proposed that uses IWD algorithm to find the globally optimized routes for decreasing the DD. Finally, the simulation outcomes show that the ODVOC-EDGR protocol minimizes EC, DD and increases NL, PDR than the DVOC-EDGR and EDGR protocols under varied network densities, energy holes sizes and communication sessions.