Keywords

1 Introduction

Wireless sensor network (WSN) is a part of wireless network which is also known as subset of a wireless network. In [1], there are several frameworks discussed in terms of optimization, localization, troubleshooting, and security analysis. This design frameworks influence several variations of the wireless network based on applications. WSN is one of the variations that influences rapidly for solving different issues and problem. In [2,3,4], several works are proposed for WSN based on nature-inspired techniques or algorithms. Figure 1 shows an illustration of WSN communication between multiple users that consist of several types of sensor nodes, base station (BS), and users. The purpose of these entities is to establish an efficient communication. Wireless sensor nodes are used to sense environmental information and send it to the BS for future references. BS previously stores the user queries in its database, receives sensed information from the sensor nodes, analyses it based on received user queries, and provides responses to the users. In this diagram, there are four users present to establish communication, but in real life, the number of users is more based on number of sensors used in the operational region. In this figure, variation of sensor nodes is more, because battery capacity of each sensor node is different as “Low”, “Medium”, “Poor”, “Bad”, “High”, “Very High”, “Sufficient”, etc. These terms are known as linguistic variables in which assumptions are changed based on user or administrator.

Fig. 1
figure 1

Wireless sensor network communication between multiple users

The above-mentioned figure is one example, but there are several real-life applications of WSN such as emergency situation, disaster management, business, offices, entertainment, school and colleges. In each application, there are several types of randomness and uncertainties. It raises multiple interferences between one node to another node and source node to destination node or amongst multiple neighbour nodes. These interferences and uncertainties are main causes of imprecise information and network troubles. Hence, there is a need of robustness technique that helps to reduce the above issues by controlling network parameters and select optimal path for communication between multiple users. The proposed technique is a combination of intelligent technique as well as mathematical modelling that uses fuzzy logic as an intelligent technique and quadratic programming as a mathematical modelling for solving the proposed goal. The combination of both provides a robustness technique that uses two basic parameters as energy and distance for selecting optimal route of the WSN.

The roadmap of the paper is as follows. Unit 2 described some information about existing works. Unit 3 illustrated the basic preliminaries information related to the proposed method. Unit 4 describes the details of the proposed method. Unit 5 describes the simulation analysis. And Unit 6 concludes the paper.

2 Literature Review

In several years, various works are proposed in the context of WSN along with its variations. Some works are discussed in this section as follows. Movassagh and Aghdasi [5] designed a game theory-based scheduling algorithm for WSN. In this method, some nodes are active, and some other nodes are in sleep for optimizing the network lifetime and reducing the redundancy in coverage system. Finally, it helps in enhancing the network lifetime and network metrics of the WSN using the strategy management technique of WSN. Chen et al. [6] proposed a method for WSN based on game theory technique. This game theory technique is based on evolutionary system that is used to control and manage selfish nodes of the network. In WSN, the number of nodes is more for handling any operation. So, behaviour of the selfish nodes fluctuated frequently. The proposed method helps to manage packet forwarding system of the node by optimizing strategy of the network and increase fitness of the WSN. Sun et al. [7] proposed a technique for spectrum sharing in WSN where the nature of the network is heterogeneous. This is based on game theory optimization technique. In this network, several types of nodes are available where each node tries to enhance its own profit which degrades the performance of the network. The game theory optimization technique helps to establish a strategy where no one deviates the rule of the game and optimizes the network metrics efficiently. Yang et al. [8] designed an intelligent system for transportation system in wireless network. This is based on an existing transportation system based on process-structured system. Finally, it helps to enhance network capabilities and services of the network. It also helps to the user function and usages in the network and network metrics properly to maintain the network. Loganathan and Subbiah [9] designed an energy-based communication system for device-to-device communication in the network. It is based on multi-criteria decision-making system where multiple criteria are involved for integrating the network metrics efficiently. Finally, it helps to enhance the network lifetime and helps in communication system. Shen et al. [10] designed a predictable-based routing method for ad hoc network. In this work, topology is organized by the helps to static and dynamic topology distribution with the help of not completely predictable method. Here, incomplete predictable technique is initiated by anti-pheromone system. Finally, it achieves energy efficiency and node utilization both for enhancing the network lifetime. Chatterjee and Das [11] designed an ACO-based routing technique for MANET. The main aim of this routing method for enhancing the QoS is by increasing ratio of packet delivery ratio and decreasing network delay by using ant. This method uses DSR routing as a base routing protocol. The basic route packets like RREQ and RREP are used here—“request ant” and “reply ant” packet for managing the network. Finally, it determined the level of pheromone for each route to decide optimal route of the network. Fatemidokht and Rafsanjani [12] designed an anomaly detection method for VANET based on clustering approach. In this paper, VANET contains some malicious nodes that act as several vehicles in the area of transportation. The nodes in this work disconnect and organize frequently in terms of changes of topology. The clustering method in this work is used for decision of gateway selection, proper neighbour selection, and also cluster head selection. Finally, it helps in packet delivery ratio and reduction of end-to-end delay. Jat et al. [13] designed an intelligent technique for QoS in WLAN. This proposal is based on video delivery system. This is based on multimedia application for video data processing and analysing. The data is analysed here based on real-time data generated by the Internet. It also helps in video data transmission, storage, evaluating, and broadcasting. In WSN, data is gathered from multiple homogeneous or heterogeneous sources because real-life data is connected with different IoT, IoV, or cloud environment. So, it is difficult to keep the natures of the data in same structure. Information retrieval [14] is very important part in modern research areas which indicates collect information that is stored in unstructured form based on multiple local languages and processes it in particular pattern after observing. Hao et al. [15] designed an evaluation system for big data analysis. This data is based on IoV where it means Internet of vehicle. This proposal is based on K-means algorithm that is used here as a clustering. In this work, different behaviours of the driving are involved for controlling vehicle. Finally, it helps in reducing fuel consumption and helps in transportation globally. Das and Tripathi [16] proposed a method for software-defined network which is based on ad hoc manner. The main key element of this work is nonlinear formulation method which is used to optimize the network by using objective function and their constraints. Finally, it helps to manage conflicting strategies of the network efficiently. Singh et al. [17] designed an optimized-based localization system for WSN. This work is based on communication between anchor and target nodes. It helps to optimize several issues such as localization, organization, security, scheduling of task, routing, lifetime of the network, and computation of data. These fusions are handled and optimized with the help of PSO and H best PSO, where H indicates Hilbert trajectory technique for the optimization. Kotary and Nanda [18] proposed a distributed-based optimization for WSN. It is based on diffusion system of the WSN which indicates K-means clustering algorithm. This diffusion technique is mixed with PSO optimization technique and in identifying optimal clustering based on intra-distance system of the sensor node. The proposed method is easily helped as a robustness technique and employed as detection of outlier of the network. Mohammed et al. [19] designed an optimization technique for WANET fuzzy logic. In this system, fuzzy logic is basically used to reduce the uncertainty of the network. This work is based on clustering system where clustering is designed with the help of constraints of the fuzzy logic. The several network parameters are used as a design of fuzzy constraints such as hop count, speed, movement of the nodes, position of the nodes, and residual energy of the nodes. Finally, with the help of the stated network parameters, fitness function is designed that helps to evaluate optimal route of the network and increase productivity and throughput [20].

3 Preliminaries

In this section, basic preliminaries are described that help to understand the proposed method efficiently in terms of intelligent technique as well as mathematically. Short descriptions are as follows.

3.1 Linear Programming

Linear programming is used to solve linear relationship amongst objective function and constraints based on the problem and issue. In this model, objective function and constraints both are linear in nature. It easily helps to optimize different parameters in terms of finding optimal solution.

3.2 Quadratic Programming

Quadratic programming is a part of nonlinear programming which relates with objective function and constraints nonlinearly. This is based on second-order polynomial technique. In this mathematical modelling, the objective function is always nonlinear in nature but constraints are linear or nonlinear based on the situation.

3.3 Fuzzy Logic

Fuzzy logic is a multi-valued logic which is based on the relation between partial truth and partial false depending on degree of truth value. Degree of truth value is evaluated based on relation of universe of discourse and degree of membership function. Fuzzy logic deals with linguistic variables for reducing uncertainty of information and estimates imprecise parameters of the system.

3.4 Rule-Based System

Rule-based system is a fusion of fuzzy logic and knowledge-based system. It is basically used to solve uncertainty of the system using If–Then statement. It has two basic components such as antecedent and consequent. Antecedent handles “If” clause, and consequent handles “Then” clause. It is rapidly used in several applications such as engineering and science for reducing the uncertainly of the information.

4 Proposed Method

In this section, the main proposed method is illustrated with the help of two basic network parameters such as energy and distance. The purpose of these parameters is to design an optimal strategy for evaluating optimal route that enhances the network lifetime efficiently. The nature of the energy parameter is conflicting with the parameter distance because if energy is increased, then network lifetime is also increased, and if distance is increased, then network lifetime is decrease. So, energy is equal to inverse of distance parameter. In this paper, energy is considered as 500 unit, and distance is considered as 1600 unit. The membership functions of both parameters are shown in Tables 1 and 2. Network lifetime of the WSN is evaluated with these two parameters and optimization models of the proposed method shown in Eqs. (1)–(4).

$$\begin{array}{*{20}l} {{\text{Maximize:}} } \hfill & {{\text{Obj}}_{{1}} = \left( {x_{1} } \right)^{2} + \left( {x_{2} } \right)^{2} ;} \hfill \\ {{\text{Subject to constraints:}}} \hfill & {e_{1} x_{1} + d_{1} x_{2} \ge 500;} \hfill \\ {} \hfill & {e_{2} x_{1} + d_{2} x_{2} \ge 500;} \hfill \\ {} \hfill & {x_{1} > = 0; \, x_{2} \ge 0;} \hfill \\ {} \hfill & {e_{1} \ge 0;\,e_{1} \le 150;} \hfill \\ {} \hfill & {e_{2} \ge 0;\,e_{2} \le 150;} \hfill \\ {} \hfill & {d_{1} \ge 950;\,d_{1} \le 1600;} \hfill \\ {} \hfill & {d_{2} \ge 950;\,d_{2} \le 1600;} \hfill \\ \end{array}$$
(1)
$$\begin{array}{*{20}l} {{\text{Maximize:}}} \hfill & { {\text{Obj}}_{2} = \left( {x_{1} } \right)^{2} + \left( {x_{2} } \right)^{2} ;} \hfill \\ {{\text{Subject to constraints:}}} \hfill & {e_{1} x_{1} + d_{1} x_{2} \ge 1500;} \hfill \\ {} \hfill & {e_{2} x_{1} + d_{2} x_{2} \ge 1500;} \hfill \\ {} \hfill & {x_{1} > = 0; \, x_{2} \ge 0;} \hfill \\ {} \hfill & {e_{1} \ge 100; \, e_{1} \le 250;} \hfill \\ {} \hfill & {e_{2} \ge 100; \, e_{2} \le 250;} \hfill \\ {} \hfill & {d_{1} \ge 500; \, d_{1} \le 1200;} \hfill \\ {} \hfill & {d_{2} \ge 500; \, d_{2} \le 1200;} \hfill \\ \end{array}$$
(2)
$$\begin{array}{*{20}l} {{\text{Maximize:}}} \hfill & { {\text{Obj}}_{3} = \left( {x_{1} } \right)^{2} + \left( {x_{2} } \right)^{2} ;} \hfill \\ {{\text{Subject to constraints:}}} \hfill & { e_{1} x_{1} + d_{1} y_{1} \ge 2500;} \hfill \\ {} \hfill & {e_{2} x_{1} + d_{2} y_{1} \ge 2500;} \hfill \\ {} \hfill & {x_{1} > = 0;\,x_{2} \ge 0;} \hfill \\ {} \hfill & {e_{1} \ge 180;\,e_{1} \le 375;} \hfill \\ {} \hfill & {e_{2} \ge 180;\,e_{2} \le 375;} \hfill \\ {} \hfill & {d_{1} \ge 350;\,d_{1} \le 800;} \hfill \\ {} \hfill & {d_{2} \ge 350;\,d_{2} \le 800;} \hfill \\ \end{array}$$
(3)
$$\begin{array}{*{20}l} {{\text{Maximize:}}} \hfill & {{\text{Obj}}_{4} = \left( {x_{1} } \right)^{2} + \left( {x_{2} } \right)^{2} ;} \hfill \\ {{\text{Subject to constraints:}}} \hfill & {e_{1} x_{1} + d_{1} x_{2} \ge 3500;} \hfill \\ {} \hfill & {e_{2} x_{1} + d_{2} x_{2} \ge 3500;} \hfill \\ {} \hfill & {x_{1} > = 0;\,x_{2} \ge 0;} \hfill \\ {} \hfill & {e_{1} \ge 240;\,e_{1} \le 500;} \hfill \\ {} \hfill & {e_{2} \ge 240;\,e_{2} \le 500;} \hfill \\ {} \hfill & {d_{1} \ge 0;\,d_{1} \le 400;} \hfill \\ {} \hfill & {d_{2} \ge 0;\,d_{2} \le 400;} \hfill \\ \end{array}$$
(4)
Table 1 Membership functions of energy
Table 2 Membership functions of distance

In above-mentioned Eqs. (1)–(4), the optimization models are illustrated for network lifetime using energy and distance parameters. In these models, decision variables x1 and x2 are used for energy and inversely distance parameters based on two constraints where energy is used “Low” to “Very High” and distance is used “Very High” to “Low” due to contradictory nature of the distance parameter. In these models, a number of sensor nodes are used such as 500, 1500, 2500, and 3500 with difference of 1000 nodes. Each model is evaluated in ten iterations based on same linguistic variation relation of energy and distance parameters. In the proposed model, energy and distance are considered as input parameters and output parameters considered as network lifetime. The different values of each iteration is shown in Tables 3, 4, 5, and 6, and fuzzy relation between input and output parameters is shown in Table 7 as rule-based system.

Table 3 Values of ten iterations for first model based on “Low” energy and “Very High” distance
Table 4 Values of ten iterations for second model based on “Medium” energy and “High” distance
Table 5 Values of ten iterations for third model based on “High” energy and “Medium” distance
Table 6 Values of ten iterations for fourth model based on “Very High” energy and “Low” distance
Table 7 Rule-based system of the proposed method

In Tables 3, 4, 5, and 6, network lifetimes are illustrated based on different rounds and iterations. It shows that when a number of nodes are increased then network lifetime also increases based on rounding of sensor nodes. It indicates, during data transmission, network topology is changed, sometime route is bad, sometime route is good, or sometime route is moderate that varies based on the theorem of the fuzzy logic. Table 7 shows rule-based system including antecedents and consequents that are attached with two input parameters, i.e. energy and distance and output parameter, i.e. network lifetime (NL). In this system, distance parameter is mapped reverse way with energy parameter. Hence, linguistic behaviour of the NL is shown in Table 8 and feasible, and optimal values of each rounds are shown in Tables 9, 10, 11, and 12.

Table 8 Linguistic variable of the output parameter network lifetime
Table 9 Dataset for round 1 under 500 sensor nodes for rule 1
Table 10 Dataset for round 2 under 1500 sensor nodes for rule 6
Table 11 Dataset for round 3 under 2500 sensor nodes for rule 11
Table 12 Dataset for round 4 under 3500 sensor nodes for rule 16

In Table 8, several linguistic variables are shown based on chronological order of their increment behaviour of degree of membership or degree of truth value. It shows rule number 16 is the highest priority, i.e. NL16 having “Very High” energy and “Low” distance associates linguistic variable is “Too Excellent”. In Tables 9, 10, 11, and 12, feasible and optimal values are shown based on round 1–4 based on sensor nodes 500, 1500, 2500, and 3500 using rule numbers 1, 6, 11, and 16. Here, highest value indicates optimal decision, and lowest value indicates feasible value. Hence, optimal route is based on energy having “Very High” and distance having “Low”.

5 Simulation and Analysis

In this section, details of simulation and analysis are illustrated. The proposed method is simulated in LINGO optimization software based on fusion of linear and nonlinear formulations. The proposed method is simulated and verified in four optimization models based on four rounds where each round is repeated ten times based on different data set of same linguistic variable. The parameters details are shown in Table 13.

Table 13 Simulation parameter details

Figures 2, 3, 4, and 5 show feasible solutions of the optimization model based on sensor nodes 500 in round 1, 1500 in round 2, 2500 in round 3, and 3500 in round 4. In each round, data is tested 10 times based on same rule-based system. Data is shown in Tables 3, 4, 5, and 6, and their feasible and optimal data set is shown in Tables 9, 10, 11, and 12 based on rule-based system mentioned in Table 7 with linguistic behaviour mentioned in Table 8. First feasible value of network lifetime is 0.2711497 based on “Low” energy and “Very High” distance. Second feasible value of network lifetime is 7.900281 based on “Medium” energy and “High” distance. Third feasible value of network lifetime is 36.12717 based on “High” energy and “Medium” distance. Fourth feasible value of network lifetime is 161.8230 based on “Very High” energy and “Low” distance. Based on all feasible values, it is observed that when a number of nodes are increased as 500, 1500, 2500, and 3500, then network lifetime is also increased.

Fig. 2
figure 2

Feasible solution for network lifetime in round 1 under 500 nodes

Fig. 3
figure 3

Feasible solution for network lifetime in round 2 under 1500 nodes

Fig. 4
figure 4

Feasible solution for network lifetime in round 3 under 2500 nodes

Fig. 5
figure 5

Feasible solution for network lifetime in round 4 under 3500 nodes

Figures 6, 7, 8, and 9 show optimal solutions of the optimization model based on sensor nodes 500 in round 1, 1500 in round 2, 2500 in round 3, and 3500 in round 4. In each round, data is tested 10 times based same rule-based system. Data is shown in Tables 3, 4, 5, and 6, and their feasible and optimal data set is shown in Tables 9, 10, 11, and 12 based on rule-based system mentioned in Table 7 with linguistic behaviour mentioned in Table 8. First optimal value of network lifetime is 0.2767323 based on “Low” energy and “Very High” distance. Second optimal value of network lifetime is 8.330248 based on “Medium” energy and “High” distance. Third optimal value of network lifetime is 40.34861 based on “High” energy and “Medium” distance. Fourth optimal value of network lifetime is 168.9655 based on “Very High” energy and “Low” distance. Based on all feasible values, it is observed that when a number of nodes are increased as 500, 1500, 2500, and 3500, then network lifetime is also increased.

Fig. 6
figure 6

Optimal solution for network lifetime in round 1 under 500 nodes

Fig. 7
figure 7

Optimal solution for network lifetime in round 2 under 1500 nodes

Fig. 8
figure 8

Optimal solution for network lifetime in round 3 under 2500 nodes

Fig. 9
figure 9

Optimal solution for network lifetime in round 4 under 3500 nodes

6 Conclusions

In this paper, network lifetime is optimized with the help of two basic parameters such as energy and distance. Nature of energy parameter is same as nature of network lifetime, but nature of distance parameter is different from the nature of network lifetime. So, the combination of energy and inverse of distance is used to form rule-based system for analysing route of the network. Fuzzy logic helps to estimate uncertainty of the network using membership function and mapped the imprecise network parameters efficiently. Decision-maker of the proposed model analyses the route of the network from source to destination nodes based on two efficiency terms as feasible and optimal. Feasible route indicates nearby best route which is the second choice of the route selection. Optimal route is the best choice for route selection from source node to the destination node. The optimal route is efficiently used to transmit the data packet within the WSN. This route helps to reduce energy consumption of the nodes and solve the ambiguity of the route selection in the network within several variations of the parameters.