Introduction

WSN has vast application in the field of medicine, military, home applications, environment, astronomy and many more. Every sensor node contains both processing as well as communication fundamentals that is intended to monitor the environment for different events that is specified by the designer of the network. Information regarding the environment is collected by the sensor node that is delivered to a central source node called the base station (BS) from where the user can extract or collect the desired data or information. Therefore, WSN must be easy to deploy, should have the possibility of multiple hop connections, be self-organizing in nature and should be able to support multimedia services. Since WSN contains large number of nodes that collect information from different sources, there exists a lot of redundancy [29]. Due to its low battery life, self-organizing nature and restricted transmission range, energy efficient routing remains a challenging research problem in WSN [20]. Node deployment is a process of setting up the sensor nodes in a particular region by finding out their relationship with each other. This process relies upon its intermediate node to find its next hop for delivering the packets from a source to a particular destination. Node deployment can either be self-organizing or deterministic [2]. Self-organizing systems has sensor nodes that are scattered randomly creating an adhoc like infrastructure, whereas in deterministic situation the sensors are placed physically and data are routed through predestined paths. As sensor nodes are deployed over larger physical area, it generates data that are highly redundant. If each and every sensor node begin to send their own data packet to the sink individually, then the time taken to traverse the data from source to destination would be very high which in turn will lead to high energy consumption and inconsistent result. Since sensor node operate on battery, there are chances of sensors to die midway [5]. Therefore, to increase the quality of service (QOS) of the network, data aggregation is required. Data fusion is the combination of data to remove redundancy using some basic mathematical function such as summation, min–max, average, etc. [4]. The LEACH-MA protocol is introduced by the authors in [18]. They have incorporated a modified ACO foundation that employs the residual energy parameter in conjunction with the low-energy adaptive cluster hierarchy (LEACH) protocol to select the current cluster head. By combining energy and distance considerations, the algorithm minimizes energy consumption during cluster head selection. However, no specific details are furnished regarding the threshold value for cluster head designation. In [21], an ANT-BFS approach, a hybrid tree-based search method, is proposed to optimize information communication routes. It combines breadth-first search with ACO to curtail energy consumption. Potential challenges concerning memory and computational demands may arise when the cluster head and sink are distant, making it less suitable for large-scale applications. A content-based routing (CCR) protocol is introduced to ensure reliable information transmission in IoT applications [10]. The proposed scheme employs data aggregation and load balancing technique to transmit data based on message content while integrating link quality information. Although it achieves traffic reduction, details concerning reliability estimation and associated parameters remain unspecified. An energy-conscious ant-based routing algorithm is presented in [3] that employs reward and punishment mechanisms, along with pheromone update rules, to enhance network lifetime and energy efficiency. Despite its merits, dealing of various energy utilization factors is necessary. The delay parameter of a node is employed, but the factors effecting delay is not mentioned. An improved energy-saving ant colony-based routing protocol for sensor networks is presented by the authors in [25]. The paper discusses three phases: neighbor discovery via link information, packet transmission using the exponentially weighted moving average (EWMA) technique and efficient and reliable end-to-end delivery. Simulation results highlight its efficiency, especially in terms of energy efficiency and throughput, compared to standard and novel routing algorithms. A multi-constrained technique ensuring Quality of Service (QoS), known as IAMQER, is presented in [28], focusing on ant colony optimization. Simulation outcomes demonstrate reduced average energy consumption and increased packet delivery ratio. Moreover, a route evaluation function is introduced. However, the IAMQER strategy's reliance on traditional ACO methods may result in extended processing delays. The authors in [11] have addressed the energy consumption issues of IoT core network using ACO. They have used MATLAB to simulate their proposed algorithm to evaluate the scalability of the network. A cluster based energy efficient routing approach for IoT network is presented in [22]. Where the authors have used different network parameters like energy consumption, PDR, package loss rates and the number of alive nodes to evaluate proposed methodology. Different concerns and ongoing challenges within WSNs, along with their heuristic and meta-heuristic solutions is discussed by the authors in [19, 27, 31]. Addressing a subset of communication parameters alone is insufficient to achieve the desired communication quality in energy-constrained WSN applications. To effectively address routing challenges and enable efficient communication within WSNs, a comprehensive approach is necessary. Optimal data transmission routes with minimal energy consumption require consideration of various factors influencing energy parameters. Leveraging the benefits of the ant system, our proposed approach incorporates a fitness function which acts as route evaluation index for selecting the optimal paths by considering the existing energy levels and route distances. The network parameters like throughput, delay, energy consumption and packet delivery ratio are used to evaluate the performance of the proposed work (by incorporating the fitness function) while comparing it with the traditional ACO algorithm (without using the fitness function).

System Model

This section describes the process of data fusion and its simulation using a network simulator. The result of the proposed mechanism is compared with the work performed by the same authors in [5].

Network Model

Two network scenarios called the mesh and the tree topology is considered for implementation purpose of the proposed algorithm. In the case of mesh topology, the nodes form a 20 × 20 Km2 square region, centered around the sink node, with 37 additional sensor nodes uniformly distributed. For tree topology, the sink is placed at the upper center of a 25 × 25 Km2 sensor field, organized hierarchically alongside 20 other nodes. The network configuration is presented in Table 1. The network also assumes the following:

  1. i.

    Initially all the sensor nodes contain same energy.

  2. ii.

    All nodes have similar characteristics and

  3. iii.

    Every node receive data from its neighboring sensor nodes

Table 1 Network configuration

Energy Model

The radio model adopted for communication is proposed in Heinzelman, Chandrakasan and Balakrishnan, 2002. If the distance di,j between the sensor nodes i and j are smaller than the threshold d0 then the free-space model is used; else, the multi-path fading model is employed. The amount of energy consumed by the sensor node to transmit 1-bit data over a distance of di,j is calculated using the following equation:

$${E}_{i,j}^{T}=\left\{\begin{array}{c}{E}_{\mathrm{elec}}+ {\xi }_{fs}{d}_{i,j}^{2}, if {d}_{i,j}<{d}_{0}\\ {E}_{\mathrm{elec}}+ {\xi }_{mp}{d}_{i,j}^{4}, if {d}_{i,j}\ge {d}_{0}\end{array}\right.,$$
(1)

where \({E}_{\mathrm{elec}}\) is the power consumed by the transmitter, \({\xi }_{fs}\) is the energy absorbed by the amplifier in free-space and \({\xi }_{mp}\) is the energy absorbed in the multi-path model by the amplifier. The energy \({E}_{RX}\) is assumed to be constant. \({d}_{0}\) is calculated using the following equation:

$${d}_{0}=\sqrt{{\xi }_{fs}/{\xi }_{mp}.}$$
(2)

The energy consumed, \({E}_{{con}_{i}}\) of node i to broadcast a data packet of size \({D}_{{\mathrm{size}}_{i}}\) at time t is found using the following equation:

$${E}_{{\mathrm{con}}_{i}}={E}_{i,j}^{T}*{D}_{{\mathrm{size}}_{i}}*t.$$
(3)

\({E}_{{\mathrm{initial}}_{i}}\) is considered to be the initial energy of the sensor. The sensor residual energy of the sensor node SNi is computed using the following equation:

$${E}_{{\mathrm{res}}_{i}}={E}_{{\mathrm{initial}}_{i}}-{E}_{{\mathrm{con}}_{i}}.$$
(4)

Proposed ACO

There are many possible paths to route a packet from CHs to the BS; apart from the shortest, most efficient and predictable path, it is critical to convey aggregated data from CHs to the BS. This section presents an ant colony optimization-based probabilistic routing technique. This technique is encouraged by the effectiveness of ants to determine the shortened route from their colony to a food source [24]. It is used to find solutions to numerous optimization problems, such as obtaining the optimal route in a graph [12, 26]. Ant proceeds along a randomly selected path in the nearby communities to look for food sources. They communicate with one another with the release of a chemical signal known as pheromones. The quantity of pheromone released by the ants while returning to its colony is proportionate to the amount and quality of the food it has found, thereby increasing the probability of other ants following the pheromone-rich path [30]. The proposed ACO algorithm is depicted in Fig. 1.

Fig. 1
figure 1

Working of the proposed ACO algorithm

While searching for an optimized path with reduced energy consumption from CHs to the BS, the \(q\mathrm{th}\) ant at time \(t\) uses the probabilistic formula given in the following equation:

$${p}_{i,j}^{q}\left(t\right)=\frac{{({\tau }_{i,j}(t))}^{\alpha }{({\eta }_{i,j}(t))}^{\beta }}{{{\sum }_{s}({\tau }_{i,s}(t))}^{\alpha }{({\eta }_{i,s}(t))}^{\beta }},$$
(5)

where the heuristic constants \(\alpha (\ge 0)\) and \(\beta (\ge 1)\) control the influence of pheromone strength and heuristic information, respectively. On the edge \(i,j\), \({\tau }_{i,j}(t)\) represents the strength of the pheromone and \({\eta }_{i,j}(t)\) represents the desirableness.\({\eta }_{i,j}\left(t\right)\) is calculated using the following equation:

$${\eta }_{i,j}\left(t\right)=\frac{1}{{d}_{i,j}},$$
(6)

\({d}_{i,j}\) is the length between \(i\) and \(j\). The quantity of pheromone is calculated using the following equations:

$${\tau }_{i,j}\left(t+1\right)=\left(1-\rho \right){\tau }_{i,j}\left(t\right)+\rho\Delta {\tau }_{i,j}\left(t\right),$$
(7)
$${\Delta \tau }_{i,j}\left(t\right)=\sum_{q=1}^{Q}\Delta {\tau }_{i,j}^{q},$$
(8)

where \(\rho\) is the pheromone evaporation coefficient and \(\Delta {\tau }_{i,j}(t)\) is the quantity of pheromone raised or deposited at edge \(i,j\), which is given by the following equation:

$${\Delta \tau }_{i,j}(t)=\left\{\begin{array}{c}M/{L}_{q} \quad if\, ant\, q \,uses \,an \,edge(i,j)\\ 0 \quad otherwise\end{array},\right.$$
(9)

\(M\) denotes pheromone intensity and \({L}_{q}\) denotes the length of the path taken by the qth ant to complete the tour. Additionally, the pheromone trail is globally updated when all ants have finished their route, i.e., a complete iteration. The pheromone is updated using the following equation. The process of modified ACO algorithm is explained with the help of Algorithm 1.

$${\tau }_{i,j}\left(t+1\right)=\left(1-{\rho }_{g}\right){\tau }_{i,j}\left(t\right)+{\rho }_{g}\Delta {\tau }_{i,j}\left(t\right).$$
(10)
figure a

Time and Space Complexity

In the algorithm, there are three loops located at steps 4, 5 and 7 accordingly. According to the laws of algorithms, the time complexity will be regarded as O(n) if there is a loop that runs from an initial value to a specific range. Time complexity increases with the increase of number of loops in nested loops. The time complexity, for instance, will be O(n2) if there are two loops in the nested loop. Time complexity for nested loops with three loops will be O(n3). Since there are three loops in nested structure in the proposed ACO method, the worst case time complexity is O(n3). The while loop has a condition \(\mathrm{iter}\le {M}_{\mathrm{iter}}\), which might not always be true depending on certain circumstances. This scenario may be considered as best case for the algorithm and the time complexity will be O(n2). But this situation is rare, so the average case time complexity is O(n3).

In space complexity, if in the algorithm a matrix of size m × n exist space complexity is considered as O(m × n). If a k-dimensional array is used, where each dimension is considered as n, then the algorithm has a space complexity of O(nk). In the proposed algorithm, there are three main arrays namely CH for cluster heads, \({\eta }_{i,j}\left(t\right)\) and \({p }_{i,j}^{q}\left(t\right)\). All are linear arrays so the space complexity will be O(n). Moreover, there are two matrices pheromone matrix and taboo table, each of them need a space in the order m × n. Space complexity in this case will be O(m × n). Other than these space requirements a few variables are present in the proposed algorithm namely N, t, iter, ants, etc. Each of them will be considered as O(1). Therefore, the final space complexity of the proposed algorithm is O(m × n) and the average case space complexity is O(n).

Fitness Function

The fitness function evaluates the route by incorporating the residual energy of the node, length of the routing path and the angle formed by between the cluster Member (CM), CH and BS. Neglecting the evaluation of remaining energy, as seen in the conventional ACO algorithm, can impact the overall lifespan of the network. Each specific ant becomes associated with a routing path once all ants reach the destination node. The following are the two fitness functions that have been used to find the cost of an optimal path.

For the first fitness function, the length of the routing path and the angles formed between the CM, CH and BS are considered, and the fitness value is determined using the following equation:

$${f}_{{\mathrm{fitness}}_{q}^{k}}=\frac{1}{{\theta }_{i}*{L}_{q}^{k}}.$$
(11)

The second fitness function considers the residual energy of the node along with the parameters used in the first fitness function. The fitness value is calculated using the following equation:

$${f}_{{\mathrm{fitness}}_{q}^{k}}=\frac{{E}_{{\mathrm{res}}_{i}}}{{\theta }_{i}*{L}_{q}^{k}},$$
(12)
$${\theta }_{i}={\mathrm{cos}}^{-1}\left(\overrightarrow{{v}_{1}}.{\overrightarrow{{v}_{2}}}/{\left|\overrightarrow{{v}_{1}}\right|}.\left|\overrightarrow{{v}_{2}}\right|\right)*\left({180}/{\pi }\right),$$
(13)

where the residual energy of the sensor node \({SN}_{i}\) is given by \({E}_{{\mathrm{res}}_{i}}\). \({\theta }_{i}\) is the angle formed between the CH, CM and BS calculated using Eq. (13). The length of the route for qth ant and kth iteration is indicated by the \({L}_{q}^{k}\). After all the ants have arrived at their destination, each ant compares their route to a prior one. The path with the highest level of fitness is considered.

Data Fusion

A simple topology with four nodes is considered to understand the basic workings of the algorithm. Network parameters like throughput, energy, delay, packet delivery ratio, etc. have shown better results on performing data fusion. The output of the same network without performing data fusion is also observed. We also attempt to reduce the number of sensors used for the proposed algorithm. A simple topology is depicted in Fig. 2 to illustrate the fusion process. From the figure, we notice that only three out of four nodes are required to generate the optimized path to reach the destination. The selected three nodes, called as the active nodes will participate during the process of fusion, by minimizing the overall energy consumed by the network. The simulation settings of Table 1 are kept intact, as shown in the previous work of the same author [5]. For this scenario, the length of the simulation is considered to be 6.1 s and the dimension of the network is modified to 100 × 100.

Fig. 2
figure 2

Data fusion process

One intermediate node N2 is used to transfer data from source node N1 to the sink node N0. We assume that node N1 sends 512 bytes of data packets at the rate of 600 Kbps for three seconds. N2 begins its own transmission for another three seconds after N1 has finished transmitting its data.

To demonstrate the concept of arithmetic data fusion, a topology involving five nodes is examined as shown in Fig. 3. Among these, one node functions as the destination, three nodes serve as transmitters and an intermediate node, termed the fusion node, collects data from the transmitters. This intermediate node performs arithmetic data fusion before forwarding the data to the sink node. The arithmetic fusion entails transmitters operating for 5-s intervals, each transmitting data packets of 512 bytes at a rate of 600 Kbps. The assumption is that transmitting nodes dispatch fixed-size data packets. If we consider the node labeled ‘0’ transmitting data packets for five seconds, given the specified packet attributes, this transmitter could send around 1172 packets per second, summing up to approximately 5860 packets over the 5-s duration, received by the intermediate node.

Fig. 3
figure 3

Arithmetic data fusion

Equation (14) can be used to find the number of data packets conveyed by N1 in 3 s.

$$\mathrm{Max}.\text{ Received Packets}=S\text{imulation Time }*\text{No}.\text{ of Bytes sent per second}.$$
(14)

Therefore, the maximum packet received by the destination node (N0) is calculated using the following equation:

$$\text{Max}.\text{Packet received by the fusion node}=\sum _{i=0}^{n-1}{K}_{i},$$
(15)

where \(Ki\) is the data packets received from the predecessor nodes.

Path Optimization

Path optimization techniques are required for obtaining the desired goals like reduced energy consumption, increased lifetime of network, security, etc. In this paper, ant colony optimization (ACO) algorithm, developed by Marco Dorigo in 1997, is implemented to route the packets in the WSN meant for various applications [16]. This ant colony system is also used to resolve the travelling salesman problem and quadratic assignment problems [8, 9, 13, 23]. ACO is based on the point that ants are capable of find the shortest route between their nest and the food source [17]. They do this without any visual evidences, but by only exploiting pheromone information [14]. Pheromone is a chemical released by ants which is deposited in the way they move or travel. While moving to food source, pheromones are deposited on the ground by the ants, which in turn help the other ants to construct the path. Pheromone vaporizes with time, so the path having less pheromone is discarded by the follower ants and the path that has more concentration of pheromone is chosen. Finally an optimized route is obtained by the food source. ACO algorithm has the positive feedback system, uses greedy searching technique and is distributed and robust in nature. This makes ACO popular to be widely used in various optimization problems [15]. ACO is used only where predefined source and destination exits. Pheromone value is calculated based on the number of hops travelled from source to destination node by synthetic ant. Pheromone is inversely proportionate to the distance, that is, there are more chances for the artificial ants to move through the edge having less distance [1]. IoT consist of large collection of sensor nodes. Hence, in this paper, we have used the ACO algorithm to selectively choose few sensor nodes to take part in data transmission, to reduce the energy consumption. The nodes will be active only when it has data to transfer or else it will be in sleep mode for improved performance. In our proposed algorithm, we assume that the sensor nodes will operate with different modulations and code rates as required. We also assume that each sensor node must contain burst profiles with different modulation and code frequencies, as shown in Table 2.

Table 2 Bit rates and transmission ranges

The IEEE 802.16 standard offers the flexibility of employing diverse modulations and coding schemes across separate transmissions to achieve varying bitrates. As signal attenuation increases, the utilization of a robust modulation scheme with a lower data rate becomes crucial. Establishing a connection between a subscriber station and a base station can potentially yield enhanced throughput through the use of multiple short hops instead of a single lengthy hop. For instance, if the distance between a source and a destination is 5 km, a QPSK 1/2 (Quadrature Phase Shift Keying) modulation scheme operating at a data rate of approximately 2 Mbps could be employed. Conversely, if another subscriber station is positioned in between, say at a distance of 2.5 km, then employing a 16-QAM 3/4 (Quadrature Amplitude Modulation) scheme could yield around 11 Mbps on each link. Consequently, the overall end-to-end data rate would be approximately 5.5 Mbps. However, the introduction of a larger number of hops toward the base station can lead to increased control and scheduling overhead. The burst profiles of the nodes describe a range of modulation techniques along with their code rates over the link distances, to achieve different bit rates in the wireless medium. This offers higher data rates and a high end-to-end throughput for nodes with smaller distances. We try to optimize the network by evaluating the network parameters like energy (E), throughput (S), packet delivery ratio (PDR), and delay (D). The performance of the network is analyzed by performing data fusion upon them and also without it. The working of traditional ACO algorithm is shown in Fig. 4. In this paper, we are comparing the path generated by MA/MD and MD/MA in [6, 7] with that of the path generated by the ACO. We also compare the network parameters obtained for each of the above algorithms.

Fig. 4
figure 4

Working of ACO algorithm

Two topologies are taken into account in determining the efficiency of the said algorithms. The initial topology consists of 40 nodes with a base station located at the middle called ‘Mesh Topology’ and the second topology consists of 24 nodes with the base station placed at the topmost level, creating a hierarchical architecture called ‘Tree Topology.’ Both the mesh and the tree topologies are shown in Figs. 5 and 6. The network is configured in its entirety by optimizing each source–destination pair. Routes produced by ants taking into account the different number of ants are shown in Figs. 7, 8, 9, 10, 11 and 12.

Fig. 5
figure 5

Mesh configuration

Fig. 6
figure 6

Tree configuration

Fig. 7
figure 7

Path construction using 50 ants

Fig. 8
figure 8

Path construction using 100 ants

Fig. 9
figure 9

Path construction using 150 ants

Fig. 10
figure 10

Path construction using 200 ants

Fig. 11
figure 11

Tree topology with 50 ants

Fig. 12
figure 12

Tree topology with 20 ants

The simulation of data fusion on the active nodes for both the mesh and tree topology is shown in Fig. 13a and b, respectively.

Fig. 13
figure 13

Arithmetic data fusion on the optimized path generated by ACO for mesh and tree topology

After the optimized path is generated by ACO, data fusion is performed on them. The mesh topology of 40 nodes and the tree topology with 24 nodes is optimized to 26 nodes and 15 nodes, respectively. Each of the user transmits their own data by combining the data taken from the earlier node.

Performance Evaluation

Performance Metrics

The 26 active nodes of mesh and 15 nodes of tree topology are chosen for data fusion and the remaining nodes will be in inactive mode. The sensors which are active is selected to increase the overall routine of the network with regards to energy, throughput and delay. The nodes in our topology are varied only to perform data fusion, while the rest of the network features, such as antenna gain, transmit power, wireless channel, routing protocol, etc., remain unchanged. The details regarding the number of active nodes is shown in Table 3.

Table 3 Active nodes during data fusion

For performance evaluation, we have considered 2 network scenarios which have been optimized by ACO algorithm. The following parameters are considered to evaluate the performance of the network.

  1. 1.

    Throughput (S)—It is calculated as the amount of data packet that has been successfully transferred from a single source to a particular destination at a given period of time. It is evaluated using the following equation:

$$\text{Throughput }(\text{S})= ({T}_{\text{PR}}/1000 * 512)/1024,$$
(16)

where \({T}_{\text{PR}}\) is the number of total packets received.

  1. 2.

    Energy (\({{\varvec{E}}}_{{\varvec{N}}}\)) – This metric is used to measure the average energy and the total energy consumed by the network. It is calculated using the following equation:

    $$\text{Energy }\left({E}_{N}\right)= \left(\text{ N }* 10000\right)- {T}_{EC},$$
    (17)

    where, \(N\) is the total number of nodes and \({T}_{EC}\) is the overall energy consumption by the network.

  1. 3.

    Delay (\({{\varvec{D}}}_{{\varvec{N}}}\)) – This parameter describes the time taken a data packet takes to travel through the network. It is calculated using the following equation:

    $$\text{Delay}\left({D}_{N}\right)= {P}_{R}- {P}_{S},$$
    (18)

    where \({P}_{R}\) is the time at which receiver receives the packet and \({P}_{S}\) is the time taken to send each packet.

  1. 4.

    Packet delivery ratio (\({P}_{\text{DR}}\))—It is the ratio between the number of successful packets received by the receiver to that sent by the sender. It is evaluated using the following equation:

    $$\text{Packet Delivery Ratio} \left({P}_{\text{DR}}\right)= ({P}_{\text{TR}} /{P}_{\text{TS}}) * 100,$$
    (19)

    where \({P}_{\text{TR}}\) is the total number of packets received and \({P}_{\text{TS}}\) is the total number of packets sent.

Other than these four parameters, there are two parameters for testing the performance of the proposed mechanism using data analysis approaches. The network scalability and the database scalability of the network are important and are to be discussed for testing its performance. The network has two topology scenarios namely mesh and tree topology. In the experiment, number of nodes in mesh topology and tree topology 40 and 24, respectively. The expansion of the network in terms of nodes is a common requirement for any network. The network scalability Eq. (20) is to be measured to ensure its performance in the expanded form of network.

$$\text{Network scalability}=\left(\frac{{N}{\prime}}{N}\right)*\text{performance parameter},$$
(20)

where N is the number of nodes in the existing network and N’ is the number of nodes in the expanded network. Performance parameters can be any of parameters namely throughput, energy, delay and PDR of the existing network. Naturally the network scalability factor will be increased according to the increase of the number of nodes in the expanded network.

The database scalability is an important testing parameter for increasing number of nodes. Since each node of the network work according to the route information available in the database. The cluster information, cluster head and other route information are stored in the database. The overall performance of the network also depends on the database scalability factor. When number of nodes increases, the route information increases exponentially.

$$\text{Database scalability}={\left(V\right)}^{d}/100,$$
(21)

where V is the volume of data in the database of the existing network and d is the scale factor \(\frac{{N}^{{^{\prime}}}}{N}\).

Results and Discussion

The path achieved using the traditional ACO algorithm is compared with the path generated by the proposed ACO algorithm. The comparison between the traditional ACO, Minimum Distance/Minimum Angle (MD/MA) and Minimum Angle/Minimum Distance (MA/MD) proposed in [5] is also made in this paper to check the efficiency of the route which is obtained by the minimum angle routing. The authors in [5] have reported minimum angle routing to be beneficial when the number of nodes in the network is larger.They have also reported that using minimum angle routing reduces the delay of the network as the subscriber node does not deviate much from the reference line which is being drawn to form the angle between the subscriber node, base station and the intermediate node. In “Time and Space Complexity”, the proposed ACO algorithm requires the length of the routing path, the residual energy of the node and the angles formed between the CM, CH and BS to evaluate both the fitness functions. The angle considered between the CM, CH and BS is calculated as proposed in [5]. By simulating both the topologies, we find that in mesh topology the traditional ACO produces better throughput when compared to both the algorithms MD/MA and MA/MD given in [5]. Delay and the energy consumption are also found to be higher in the traditional ACO algorithm than MD/MA and MA/MD. However, PDR is found to be higher in MA/MD than in traditional ACO algorithm. The throughput, energy consumption and packet delivery ratio of the mesh topology on performing data fusion is advanced in the traditional ACO algorithm when compared with MA/MD. After performing data fusion in tree topology, traditional ACO algorithm yields better result when compared to both MA/MD & MD/MA.

The performance of the traditional ACO algorithm is also compared with the proposed ACO algorithm by incorporating the fitness function. Table 4 shows the performance of the network in terms of throughput, energy, delay and PDR when the fitness function is used. The proposed ACO algorithm shows 20% more packet delivery ratio than the existing ACO algorithm. The energy consumption in case of the proposed ACO has been found to 78% less than the traditional approach. In case of end-to-end delay, the traditional ACO algorithm experiences 19% more delay then the proposed one. The performance of the network in terms of throughput in the proposed scenario is also better than the conventional approach. In the proposed method since the best path is found by taking into account the length of the routing path, the residual energy of the node and the angles formed between the CM, CH and BS it improves the overall performance of the network. The following graphs (Figs. 14, 15, 16 and 17) show the performance of the network for both the traditional and proposed ACO algorithm.

Table 4 Network performance
Fig. 14
figure 14

Representation of throughput (Kbps)

Fig. 15
figure 15

Representation of delay (ms)

Fig. 16
figure 16

Representation of energy (J)

Fig. 17
figure 17

Representation of PDR (%)

The network scalability of the Eq. (20) for throughput value (2.1253) for the proposed algorithm ranges from 2.66 to 122.88. And the database scalability is calculated as approximately 3.16 when the volume of the database in the existing network is 100 and number of nodes increased from 40 to 50 nodes.

Conclusion and Future Work

This paper elaborates the working of the ant colony optimization method to perform data fusion and compares the results with the work done by the authors previously. It has been observed that the throughput of the network is higher when packets are transferred from a particular source to certain destination by applying data fusion on them. Data fusion increases the overall throughput of the network. When ACO is applied on the mesh topology the results of parameter is better on performing data fusion. However, we see that energy consumption of ACO with fusion is slightly higher than that of without fusion. This higher energy consumption can be ignored as PDR is higher where data fusion is applied. When the data is transferred from source to destination without fusion the delay is found to be more in ACO. The throughput, delay of the tree topology is found to be better when data fusion is applied. We also notice that data fusion produces slightly higher energy consumption.

Therefore, for optimal application of network resources, wireless sensor networks can employ data fusion. We can also perform data fusion on other evolutionary algorithm and compare their performances by taking into consideration various performance evaluation parameter.

The work may be extended to next generation of IoT (NGIoT) with additional features for faster routing and path optimization may be implemented in future.