1 Introduction

The current advancement of limited cost sensors and microcontrollers supporting network is advancing the usage of conveyed observing and control algorithms in many industrial and civilian applications through designs made out of Wireless Sensor nodes [1]. Nowadays WSNs have concerned in a lot of concentrates because of the minimal effort of sensors and their wide-range applications. WSNs give another class of PC frameworks and grow human capacity to remotely associate with the physical world [2]. In terms of regular range observing device, site supervisors are doing their remote checking through a surveillance camera altogether stay away from exposures [3]. One more encouraging access innovation is a remote access system, for example, Wi-Fi and Wi-Max, which gives services at low cost and serves better adaptability to the client [4]. If the identities or the areas of the source node or destination nodes are uncovered, at that point it could be exceptionally harming to the sent sensor network [5]. Free space optics (FSO)-based networking is an alluring option for the next to next-generation cellular networks [6]. An FSO connect utilizes the free space between a couple of laser-photograph indicator handsets to transport information [7]. Research on sensor networks was essentially started for strategic observation in military applications, by tossing sensors in a cold landscape with the guide of an unmanned vehicle or a low flying airship; consequently empowering warriors to have upgraded attention to conceivable nearness of synthetic and natural operators [8].

The server energy constraints imposed on WSNs lead designers to endeavor for energy efficient process strategies and algorithms. Therefore, maximizing network lifetime by optimizing the energy dispersal of sensor nodes is thought to be the most significant plan objective for WSNs [9]. Sensor network has turned out to be one of the hot issues in another round advancement of financial, sciences and innovation in the present world. The utilization and advancement of it are extremely significant to advance financial improvement and social advance [10]. To limit the operational cost, there are two key issues to be tended to. One is that diverse client demands have distinctive service level agreements (SLAs), how to perform a distribution that meets different SLA necessities is testing. An answer is to assign the solicitations with a similar level SLA to one server farm [11,12,−13]. Thus, every data focus can ensure its support of the conceded demands with a given level SLA. This arrangement, however, may not be relevant to vast scale server farms with different SLA prerequisites [14].

Right now, an intriguing way to deal with expand the lifetime of sensor nodes is to outfit them with rechargeable innovations, which change over sources, for example, body warm, foot strike, finger strokes and sun oriented into power [15]. Some irregular or dishonorable back off procedures are used, which cause the impedances among two bounces transmissions and chop down the reliability increase; Most of the existing technologies [16] are intended for one source-goal combine correspondence, which can’t meet the necessity of many-to-one interchanges in WSNs [17].

2 Literature Review

In 2015 Bade et al. [18] to satisfy the bandwidth demands from end clients, dynamic engineering was proposed with co-existence of LTE, WiMax and UWB advance. Mixture wavelength division multiplexing (WDM) and a time division multiplexing (TDM) based optical access network offer reconfigurable arrangement. Upgrade the capacity to assign diverse wavelengths to various optical networking units (ONUs) on request. Furthermore, two distinctive channel routing modules (CRMs) are acquainted all together with address the cost adequacy and vitality productivity issues of the proposed network. Take-up rate versatile mode operation and activity versatile power administration is used to improve the advantages of low speculation cost with vitality effectiveness. Up to 26% power utilization lessening is accomplished at the time of minimum traffic conditions while 10% utilization is accomplished at the time of maximum traffic conditions. Besides 23% energy saving can be accomplished contrasted with ordinary frameworks in completely worked organize.

Utilizing VNS for the Optimal Synthesis of the Communication Tree in Wireless Sensor Networks by Erzin et al. [19]. NP-difficult issue finding an optimal spanning tree in a given undirected weighted chart which happens while limiting the power utilization of information transmission in radio systems. Proposed new heuristics and directed an a posteriori investigation. All the proposed techniques indicated high adequacy, however, it was signed a hybrid genetic algorithm (GA) utilizing variable neighborhood search (VNS) as mutations. From the outcomes, hole happens because, for the appraisal of the proportion for a huge measurement, the lower bound was utilized rather than the optimal value for the objective function. In fact, we accept that the 1.0009-surmised arrangement was worked for each measurement of the issue.

In 2015 Kliks et al. [20] the pattern in wireless communications systems is the upgrade of the system foundation with the presentation of little cells, where a particular topographical territory is served by low-run, low-control get to focuses. The outcome was the creation of a heterogeneous topology where macrocells coincide with an assortment of small cell sorts. In the publication article, we quickly condense the current specialized advances in the plan and deployment of future heterogeneous networks addressed in the papers that make the exceptional issue. Specifically, the accompanying perspectives were viewed as: the plan of obstruction and radio asset administration algorithms, the examination of the energy efficiency and power control issues in heterogeneous networks, the idea of coordination in small cell networks, key backhaul parts of HetNets, organization issues and general administration methodologies.

In 2015 Lin et al. [21] Analysis network process (ANP) approach fulfills these necessities by considering inward and external conditions among different criteria. In this investigation, the objective is to utilize ANP to assess the relative weights and needs of the elements deciding passenger decision of LCCs. Firstly, writing a survey and expert opinion was led to create 16 sub-criteria alongside four criteria (e.g., perceived advantages, perceived external influence, perceived service quality, and perceived corporate value) that influence passenger decision of low-cost carriers (LCC). Also, ANP was connected to build up an assessment shows that organized the relative weights connecting the over four criteria with 16 assessed sub-criteria. The outcomes not just give an assessment model to decide the relative significance of the impacts of LCCs on passenger decision, yet can likewise enable supervisors to concentrate on the principle factors and distinguish the best approach for promoting passenger acknowledgment toward LCCs.

In 2015 Viswanath et al. [22] have proposed the Monitoring Systems are important to comprehend the progressions that happen in environments. Remote monitoring and information accumulation system are helpful and successful instruments to gather data from mass stockpiling tanks and to monitor the same. The estimation of fluid inside the tank was most imperative and such frameworks are helpful in industries which are ordered as security basic frameworks. The engineering and beginning testing consequences of a low power remote framework for tank level observing utilizing ultrasonic sensors.

In 2014 Xu et al. [23] have proposed the cost related with the service will be brought about, which will be dictated by the number of gateways employed and the total volume of information effectively received within a predetermined monitoring period. For the situation, the first figure a novel compelled optimization problem with a goal to limit the service cost while a pre-characterized organize throughput was ensured. Allude to the issue as the throughput ensured benefit–cost–minimization issue and demonstrate that it was NP-finished. The key elements of the heuristic incorporate distinguishing entryways and finding a system effective backwoods of directing trees established at the portals. We additionally perform a hypothetical examination of the arrangement acquired. At long last, we direct tests by reenactments to assess the execution of the proposed calculation. Experimental comes about exhibit the proposed algorithm outperforms different algorithms as far as both the service cost and the network lifetime.

3 Methodology

The service overheads caused for the communication of the assembled through the third party network comprises of a settled cost for particular information. This exploration work builds up the model for service-cost minimization of WSN with ensured throughput in remote monitoring with inspired optimization model. The virtual topology network is industrialized that incorporates an arrangement of different sensor nodes, one base station, and server considered, these nodes are gathered based on a various mobile network utilizing possibilistic fuzzy C means (PFCM) clustering method. Besides all clusters group are pick one cluster with help of trust measure and foreseen conspire marks a sensor as a cluster head, in the event that it has minimum energy utilization and shelters the best arrangement of attracted nodes which were arranged accessible in that connection arrangement and it offer ascent to additional phases on the premise of the association of the system. The mobile communication system ad hoc on-demand distance vector (AODV) protocol utilized to generate the path of various networks.

For limiting the service cost, the network throughput is optimized with the threshold (α) value and assorted optimization techniques are considered to optimize the threshold parameter α. For optimizing the threshold value, the combination of two inspired optimization techniques which are krill herd optimization (KHO) and particle swarm optimization (PSO) considered; so the proposed model is termed as enhanced krill swarm optimization (EKSO) compared for service cost and a most extreme lifetime of the various mobile network. The execution of the solutions based on the fitness value is rehashed for finding the optimal threshold of the network. The general outline of the proposed system appears in Fig. 1.

Fig. 1
figure 1

Block diagram for proposed model

3.1 Designing of Network Topology

In the proposed routing algorithm, the source node situating in the physical framework chooses a course for information transmission based on the considered control framework states; transient and consistent states. Our proposed routing algorithm takes after an indistinguishable approach from AODV protocol. This protocol works responsively to diminish overhead discovering courses just on request. At the point when a route does not exist to a given destination, a route request (RREQ) message is overwhelmed by the source and by the intermediate node event that they have no past routes in their node. Subsequent to designing system topology additionally took after by clustering process.

3.2 Cluster Formation

In cluster arrangement process the cluster heads will broadcast request for a packet to the sensor nodes come in radio range to form a cluster. In a singlehop, the node transmits to the cluster head straightforwardly and in multi-hop, all sensor node will send their information through the neighbor node. Cluster arrangement helps to advance information transmission purpose PFCM clustering system utilized and its model appears in Fig. 2.

Fig. 2
figure 2

Network cluster formation


Possibilistic Fuzzy C-means clustering


The imperative motive of the probabilistic fuzzy C-means (PFCM) cluster module is committed to the predefined set of information into clusters. By methods for the clustering module, the training set is assembled into different subsets. The PCM utilizes the goal work (1) that depends on the averageness estimations of information to the clusters. These qualities result from the relaxation of the FCM requirement where the sum of every section of U must be equivalent to one. The system of PFCM clustering model demonstrated as follows.

$$J_{PFCM} (M,U,C;P) = \left\{ {\sum\limits_{k = 1}^{N} {\sum\limits_{i = 1}^{c} {(aM_{ik}^{h} + bU_{ik}^{\beta } )*||P_{k} - C_{i} ||^{2} + \sum\limits_{i = 1}^{c} {\beta_{i} \sum\limits_{k = 1}^{N} {(1 - m_{ik} )^{\beta } } } } } } \right\}$$
(1)

Beyond objective function is minimized and it will be \(\beta_{i} > 0,1 \le i \le h > 1\), the parameters a and b define the relative importance of the membership degrees and the typicality values. Here M → membership matrix, U → typicality matrix, c → resultant cluster center and P → data points.

  1. 1.

    Evaluate Distance matrix for sensor network nodes

At the point, when the cluster is resolved, the assessment of the distance between the centroids and data point for each segment is done. For the distance calculating process consider Euclidian distance formula. Further, the separation matrix is resolved in regard to every cluster.

$$ED(P_{k} ,C_{i} ) = \sqrt {\sum\limits_{i,k = 1}^{N,c} {(P_{k} - C_{i} )^{2} } }$$
(2)
  1. 2.

    Typicality matrix calculation for nodes

The commonality matrix, thusly, is gotten from PCM. The probability estimation of every datum point in connection to each centroid is completed. Consequently, the typicality network is made.

$$U_{ik} = \frac{1}{{1 + \left[ {\frac{{ED^{2} \left( {P_{k} ,C_{i} } \right)}}{{\beta_{i} }}} \right]^{{{\raise0.7ex\hbox{$1$} \!\mathord{\left/ {\vphantom {1 {\left( {c - 1} \right)}}}\right.\kern-0pt} \!\lower0.7ex\hbox{${\left( {c - 1} \right)}$}}}} }}$$
(3)
  1. 3.

    Membership Function generation

The evaluation of the membership matrix Mik is performed by way of assessing the membership value of information point which is gathered from the FCM. As illustrated in the help of the following Eq. (4), the membership value of each data point in relation to each centroid is finished.

$$M_{ik} = \frac{1}{{\sum\nolimits_{j = 1}^{h} {\left( {\frac{{\left\| {P_{k} - C_{i} } \right\|}}{{\left\| {P_{k} - C_{j} } \right\|}}} \right)^{{\frac{2}{c - 1}}} } }}$$
(4)
  1. 4.

    Updating of centroid

After the creation of the clusters, the modernization of the centroids is performed in accordance with the equation shown below.

$$C_{i} = \frac{{\sum\nolimits_{k = i}^{N} {\left( {M_{ik}^{c} + U_{ik}^{\beta } } \right)P_{k} } }}{{\sum\nolimits_{k = 1}^{N} {\left( {M_{ik}^{c} + U_{ik}^{\beta } } \right)} }}$$
(5)

Ensuring to the modernization of the centroids in regard to every cluster, the assignment of assessing the separation with the lately modernized centroids is begun and proceeded until the assessment of the modernization of the centroids. If we increment the significance (weight) of membership then that essentially drives us to lessen the significance of typicality by a similar amount. Likewise, we will see later that the optimal ordinariness values rely upon the size of a and b If give more importance to membership values than PFCM work closer to FCM algorithm and if give more importance to typicality values than PFCM work closer to PCM.

3.3 Cluster Head (CH) Selection

The CH accumulates and additionally gathers and gets data from nodes having a place with a similar cluster and after those exchanges on data to achieve the goal. By pivot of the cluster-head self-assertively, energy utilization is expected to be consistently scattered. Ordinarily, CHs are assigned from the organized nodes on the premise of the criteria like remaining energy, and network. This cluster heads far from the base station without considering nodes’ lingering energy and it’s chosen by the help of trust measure.

$$T_{1} \sim T_{2} = 1 - (1 - T_{2} )^{{T_{1} }}$$
(6)

where T1 → recommendation trust value and T2 → direct trust value

In the event that the node assigned as CH moves to rest state throughout transmission of messages then the node staying dynamic with least cost and maximum communication will be selected as CH in the clutter.

3.4 Enhanced Optimization Model for Service Cost in WSN

Minimize the service cost while keeping up the throughput prerequisite, the proposed heuristic needs to recognize a suitable number of portals, and configuration routing trees established at the entryways spanning the rest of sensors with the end goal that the service cost is limited while the normal throughput necessity is kept up. Our proposed model distinctive seven systems considered, in view of optimization technique (enhanced krill swarm optimization) to get ensured network with least cost, most extreme lifetime.


Service Cost

The service cost of remote observing is dictated by the number of gateways and the additional volume of information beyond the information amount at each gateway, as telecommunication organizations, for the most part, give the information transfer administration to each gateway through discretionary information designs, each of which is with a fixed cost and information design of various systems. It’s calculated by utilizing

$$C_{s} = a \cdot f_{c} + \sum\limits_{i = 1}^{a} {\hbox{max} \{ 0,(V[D^{\tau } (i)] - P)*p_{c} \} }$$
(7)

Here

$$V\left[ {\sum\limits_{i = 1}^{a} {D^{(\tau )} } (i)} \right] = \sum\limits_{i = 1}^{a} {k_{g} *\tau *\sum\limits_{l \in L}^{{}} {p(l,g_{i} )} }$$
(8)

To guarantee the required information integrity and the observing quality by a particular application, we characterize the network throughput necessity. Information transmission inside the sensor network is inconsistent; this will bring about information misfortune during its transmission. Above equation, the parameters are a → a number of gateways, fc → fixed cost, \(V[D^{\tau } ]\) → Volume of data received, P → Data plan, pc → Penalty rate τ → period and kg → Data generation rate.

The penalty to a portal is either 0 if the normal volume of transmitted information by the gateway does not surpass the arrangement. Since the penalty relies upon the normal volume of information surpassing the quantity, the measure of the service cost itself is a normal value, as well. For the sake of convenience, still, refer to it as service cost.

3.4.1 Threshold Optimization: Enhanced Krill Swarm Optimization (EKSO)

Given the number of portals, need to address which sensors ought to be recognized as the portals. The decision of portals is guided by the accompanying reason. Optimize the throughput EKSO will be used to limit service cost of on WSN network. Here at first consider KHO to two rule goals, for instance, expanding krill thickness and Reaching sustenance, so the swarming behavior of extending thickness and finding food. In addition, consider PSO demonstrate speed and position to the physical diffusion of KHO process and the flowchart appears in underneath Fig. 3.

Fig. 3
figure 3

Flowchart for KSO


Objective function as

Fitness function of this model is a limit service cost in the mobile network model. The entire data into various clusters and objective of threshold optimization, it’s shown in the below equation.

$$F_{i} = Min(C_{s} )$$
(9)

The new threshold updating procedure

It is realized that an optimization algorithm ought to be fit for searching spaces of self-assertive dimensionality. Along these lines, the accompanying Lagrangian model is summed up to an n-dimensional choice space.

$$\frac{{dO_{i}^{{}} }}{dt} = M_{i} + J_{i} + P_{i}$$
(10)

Here Mi → motion induced by other krill individuals; Ji → foraging motion, and Pi → physical diffusion of the ith krill individuals (achieved by the PSO).


Movement induced by other krill individuals

In the improvement, the course of development of a krill individual is resolved both by the neighborhood swarm thickness (local effect), an objective swarm thickness (target effect) and a ghastly swarm thickness (repulsive impact). The krill advancement can be described as

$$M_{i}^{new} = M^{\hbox{max} } \gamma_{i} + \omega_{n} M_{i}^{old}$$
(11)

In the aboveconditions, the documentationare clarified just like Mmax the greatest incited rate, ωn is the idleness weight of the movement instigated to the extent [0, 1],


Foraging motion

The scavenging movement is thought as far as two primary successful parameters. The first is the sustenance area and the second one is the past experience about the nourishment area. This movement can be communicated to the ith krill individual as takes after:

$$J_{i} = S_{v} \delta_{i} + \omega_{m} J_{i}^{old}$$
(12)

Here Sv is the scavenging velocity, ωm is the dormancy weight of the searching movement in the reach [0, 1], is the last scrounging movement, \(\delta_{i}^{food}\) is the nourishment appealing and \(\delta_{i}^{best}\) is the impact of the best wellness of the krill as such. As indicated by the deliberate estimations of the searching rate it is taken 0.02 ms−1.


Physical Diffusion

The physical diffusion of krill individuals is believed to be an unpredictable method. This development can be express the extent that a most extraordinary dispersion speeds and an irregular directional vector.


Enhanced process or steps in EKSO

The physical diffusion of krill swarm algorithm is enhanced by the updation of speed and position of the PSO. The particles will move in every cycle to an alternate position until the point that they achieve an optimum position. At each time, the particle velocity is updated by Eq. (13),

$$P_{i}^{(t + 1)} = w \cdot P_{i}^{(t)} + h_{1} \cdot r_{1} \cdot (C^{t}_{Pbest} - C_{i}^{t} ) + h_{2} \cdot r_{2} \cdot (C^{t}_{Gbest\,k} - C_{i}^{t} )$$
(13)
$$C_{i}^{t + 1} = C_{i}^{t} + P_{i}^{t + 1}$$
(14)

Here Pt → particle velocity, Ct → current particle, h1 and h2 → learning factor, r1 and r2 → a random value within the [0, 1]. In the event of discriminating the velocity and location assessment of the particles, the fitness value is once more established for the freshly evaluated velocity of the particles.

3.5 Optimal Network with Communication in WSN

Remote observing scenario where a homogeneous sensor network with unreliable wireless communications is deployed in a locale that is topographically different from the one of the monitoring focus. From the proposed model chose optimal WSN mobile network with information exchange by employing administration from third-party telecommunication organization brings about least service cost and most extreme lifetime with optimal data design are recognized. From that model sensors are to be distributed to portals and an arrangement of steering trees established at the doors are to be worked to traverse all sensors with the end goal that the aggregate of the service cost of all passages is limited, while the normal volume of information relayed by the gateways meets the system throughput necessity.

4 Simulation Result analysis

In this segment, we assess the execution of the proposed algorithm and examine the service cost investigation in WSN mobile network actualized in network simulation Version 2 (NS2) with simulation parameters and IEEE 802.11b is connected as the MAC layer protocol and user datagram protocol (UDP) is connected as the transmission port operator. Mobile network and execution measurements depict in beneath and it’s contrasted with the existing optimization model.


Mobile Networks

Airtel

BhartiAirtel is an Indian multinational telecommunication service, headquartered in New Delhi. It works in 20 nations across over South Asia, Africa, and the Channel Islands. It gives GSM, 3G and 4G LTE mobile service. Additionally, it offers broadband and telephone utilities in 94 urban communities. Airtel is the biggest mobile operator in South Asia and the third biggest in the world with a 303 million endorser base.

MTS

MTS India is the Telecommunication Company of Russian Mobile Tele frameworks headquartered in New Delhi. It gives innovation of CDMA, EVDO to principle conditions of India. In Tamil Nadu, totally 30 Lakhs subscriber base are utilized for MTS mobile network.

Idea

Idea cellular normally alludes as Idea. It is an Indian mobile network administrator situated in Mumbai, India. The idea is incorporated with GSM administrator, which gives 2G and 3G mobile services. By supporter base, it is the third most operators in India. In Tamil Nadu, Idea provides the 2G pack with Unlimited (1.5 GB FUP) information, with the cost of Rs. 199 and for 3G, the cost is Rs. 374 for 1.64 GB with 28 days of legitimacy. In Tamil Nadu, Idea was utilized by 54 Lakh subscriber base.

Reliance

Reliance is an Indian web access and broadcast communications organization headquartered in Navi Mumbai, India. It gives CDMA, GSM and settled line broadband. Reliance Network coverage in Tamil Nadu is just 2G and CDMA yet no 3G. Reliance offers 2G pack, it gives an amazingoffer to their client with the least expensive cost, 1 GB 2G Data + Rs 100 Core Talk time at Rs. 189 with 28 days legitimacy. It likewise offers 3G pack, 1 GB 3G Data with the cost of Rs. 199 for 30 days. A number of Subscriber base in Telangana is 70 lakhs for CDMA.

Aircel

Aircel is an Indian mobile network administrator, headquartered in Chennai. It offers voice, 2G, 3G and 4G information benefit. In Tamil Nadu, Aircel gives both 2G and 3G benefit as postpaid and prepaid Mobile broadband Wireless Internet information designs.

BSNL

BSNL has a complete scope of telecom benefits in India including wireline, CDMA mobile, GSM mobile, web, Broadband, Carrier Service, MPLS-VPN, VSAT, VoIP administrations, IN administrations and so on. It is one of the biggest open segment organization in India. BSNL gives just 2G pack, with the cost of Rs. 198 for 1 GB information with the legitimacy of 28 days.

Vodafone

Vodafone is a British multinational telecommunications organization, headquartered in London. It is the second biggest telecommunication organization. It has 184 million clients as of April 2015. Vodafone gives both 2G and 3G mobile services. In Tamil Nadu, Idea was utilized by 10 Lakhs subscriber base.


Simulation Model

For the development of the nodes, the aggregate number of nodes is set to 250 nodes in the 1000 M × 1000 m network region. The random way point (RWP) demonstrates is utilized. In our simulation, the minimum speed is 5 m/s, the node generation appeared in Fig. 4. The source–destination pairs are spread arbitrarily finished the network. The ns-2 Constant Bit-Rate (CBR) traffic generator is connected to set up the connection patterns with various irregular seeds. Every node has one CBR movement associated with a single unique destination. The parameters appeared in Table 1.

Fig. 4
figure 4

Node generation model for proposed WSN

Table 1 Simulation parameters

Table 1 shows the simulation parameters for different nodes and their relating values for different networks. The movement for a total number of nodes in the network is set to 250 nodes. The ns-2 constant bit-rate (CBR) traffic generator is connected to set up the link designs with various irregular random seeds for different network examinations. The total number of nodes in the network is thought to be 500 for the network zone 1000 m × 1000 m. The reception apparatus sort is taken as Omni antenna and the transmission go for the network is 250 m and packet size is 512.

Figure 4 the above chart demonstrates the node creation show for the diverse networks Airtel, MTS, Idea, Reliance, Aircel, BSNL, and Vodafone. In this model the service cost is limited by the proposed WSN mobile network form is actualized. The nodes are connected and we have computed the separation of the connected nodes.


Performance Parameters

A number of data Transmitted: It is the quantity of information that the sensor node transmits in a time period which is typically 1 s.

Energy Consumption

Energy utilization is very much characterized as the communication overhead of the nodes where a firm number of false information are infused into a network.

Packet to Delivery Ration (PDR)

The amount of information which was viably transferred to the end node related to the measure of information which was transferred by the transmitter.

Network Life Time (NLT)

The amount of information which was viably transferred to the end node related to the measure of information which was transferred by the transmitter.

Service Cost (SC)

Service cost incurred about by transferring sensing information to the remote information monitoring focus utilizing third-party telecommunication. The decision form of the expanding network throughput with limited service cost issue in an inconsistent sensor network.

Table 2 demonstrates the node based result for various networks. For every single node compute the data transmitted (MB), energy consumption (J), the packet to delivery ratio, network lifetime (h), and service cost ($). Here, the parameters are analyzed for five types of nodes i.e. 100–500. Propositions parameters are analyzed with the proposed technique ad hoc on-demand distance vector (AODV) with EKSO. It is clarified in the underneath diagram.

Table 2 Node based proposed (AODV-KSO) results

Nodes Based Results

Figure 5a demonstrates the data transmitted (MB) for various nodes. For PSO algorithm the data transmitted from 0.9 to 2.2 MB. For constrained optimization, the data transmitted from 1 to 3 MB. But for EKSO algorithm, the data transmitted from 2 to 5 MB. Contrasted with the existing algorithm, the proposed algorithm EKSO transmitted the maximum data.

Fig. 5
figure 5

Node versus measures

Figure 5b represents the energy utilization (J) for different nodes. In this graph, the energy consumption is calculated based on three optimization techniques i.e. EKSO, constrained and PSO. Based on this examination, the energy consumption for EKSO reaches 300–1250 J, constrained technique attained 300–1050 J, and PSO algorithm the energy consumption obtains 200–600 J. For the comparison of all the three optimization techniques, EKSO consumed minimum energy compared to other algorithms.

Figure 5c shows the packet to delivery ratio (PDR) for different nodes (i.e.), the amount of data transferred by the transmitter. In the PSO algorithm, the amount of data increases and then decreases linearly, then for the constrained algorithm the amount of data increases and then decreases. For EKSO algorithm the amount of data linearly increases and then decreases slightly. Contrasted to these algorithms, EKSO algorithm gives better performance for every node.

Figure 5d shows the network lifetime (h) for different nodes based optimization techniques. In node 100, the EKSO algorithm achieves the network lifetime as 125.63 h, constrained technique as 90.3 h; PSO reaches NLT as 36 h. For the analysis of this node, KSO has a higherlifetime than the other two techniques. Similarly, for other nodes (200–500) the data increases and then decreases in PSO then the data increases and then decreases linearly for the constrained technique. For EKSO algorithm, the data linearly increases and then slightly decreases. Compare to the other two algorithms EKSO gives the maximum NLT (h).

Figure 5e demonstrates the service cost ($) for different nodes. For PSO algorithm the cost increases linearly. Similarly, for the constrained algorithm the cost increases till it reaches the node 500. For EKSO algorithm the cost decreased for each node. Compared to the other two algorithms, EKSO gives the minimum cost and it gives the better performance.


Throughput Based Results

Figure 5a describes the throughput versus data transmitted (MB) for various nodes. In PSO algorithm the throughput value increases and the corresponding data increases. For the constrainedalgorithm, the data increases linearly. Similarly, for EKSO algorithm, the data transmitted from 3000–6000 MB. Finally, the proposed EKSO algorithm gives the maximum data transmitted compared to the other two.

Figure 6a represents the throughput versus network life time (h). In the throughput analysis, the NLT can be examined based on optimization techniques. The NLT increases and then decreases for the PSO algorithm. For the constrained technique, the NLT increases and then decreases. For EKSO algorithm, the NLT increases linearly. Compared to the other two algorithms EKSO gives the better network life time (NLT) (h).

Fig. 6
figure 6

Throughput versus measures

Figure 6c demonstrates the throughput versus service cost ($). For PSO algorithm, the throughput increases and the corresponding cost increases. Similarly, for the constrained algorithm the service cost increases. For EKSO algorithm the service cost reaches the minimum value and it gives the better performance compared to the other two algorithms.

Figure 7a demonstrates the service cost for various nodes. For network size 100, AODV protocol achieves 100, LEACH protocol achieves 152, and DSDV protocol achieves 152. For the network size 200, AODV protocol achieves 190, LEACH protocol achieves 200, and DSDV protocol achieves 150. Similarly, the network size at 300, 400, and 500, AODV gives the minimum cost.

Fig. 7
figure 7

Network size versus NLT and SC

Figure 7b represents the network size versus network life time and service cost for various nodes. For the node at 100, AODV protocol achieves NLT 100, LEACH protocol achieves NLT 10, DSDV protocol achieves NLT 9. For the node at 200, AODV protocol achieves NLT 90, LEACH protocol achieves NLT 20, DSDV protocol achieves NLT 18, similarly at 300, 400 and 500, and AODV achieves the improved performance.

Table 3 shows the throughput based results for different nodes. When the threshold value is set as 0.5, the service cost is minimum (75) at node 100 and NLT at 500. If the node increases the service cost also increases. When the threshold value is set as 0.7, the service cost is minimum at 100, the NLT at 500. Similarly, the threshold value set as 8, 0.9, and 1, the corresponding service cost and NLT varied according to the threshold value.

Table 3 Throughput based results

Figure 8 represents the service cost for different networks such as Airtel, Aircel, MTS, Idea, Vodafone BSNL, and reliance. The various nodes are 100, 200, 300, 400, and 500. For the node at 100, Airtel achieves 49, Aircel achieves 52, MTS achieves 99, Idea achieves 100, Vodafone achieves 100, BSNL achieves 48, and Reliance achieves 58. For node at 200, Airtel achieves 120, Aircel achieves 100, MTS achieves 150, Idea achieves 120, Vodafone achieves 160, BSNL achieves 100, and Reliance achieves 150. Similarly at node 300 and 400, the cost is maximum, at node 500, the cost is the minimum for all the networks.

Fig. 8
figure 8

Service cost for different networks

5 Conclusion

The study scrutinized Remote monitoring service for Wireless Sensor Network (WSN) with maximizing network throughput and minimal service cost. The cost associated with this service will be incurred, which will be determined by the number of gateways employed and the cumulative volume of data successfully received within a specified monitoring period. Furthermore, the main objective of this technique was to minimize the cost, depending on the number of nodes, performance parameters, clusters and confidentiality of the transmission. Additionally, various protocols such as AODV, LEACH, and DSDV were utilized for the generation of the path for different networks. From the simulation analysis, the proposed algorithm EKSO gives the minimum service cost and maximum lifetime, compared to the PSO and constrained technique.