Skip to main content
PLOS One logoLink to PLOS One
. 2022 Mar 23;17(3):e0265113. doi: 10.1371/journal.pone.0265113

Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink

Shayesteh Tabatabaei 1,*
Editor: Chakchai So-In2
PMCID: PMC8942282  PMID: 35320290

Abstract

Wireless sensor networks (WSNs) include small sensor nodes with battery and processing power and limited memory units then improving power consumption is a major design challenge for any sensor network. In this paper, a new algorithm for routing in the wireless sensor network is proposed using the ultra-innovative algorithm for bacterial Foraging and mobile sink, which leads to energy efficiency. In the proposed method, the number of sensor nodes is determined according to two criteria: the amount of energy on the battery surface and the distance to the sink ahead, which leads to the formation of regular clusters in the network. Nodes adopt a multi-step routing scheme within the network to communicate with the sink. also, the mobile sink is used to balance the load and help consume uniform energy throughout the network. The simulation results show better performance of the proposed method in terms of energy consumption by 17.99%, throughput rate by 30.04%, end-to-end delay by 46.04%, signal-to-noise ratio by 32.81%, delivery rate successfully Data to the sink is 0.80 times higher than the AFSRP (Artificial Fish Swarm Routing Protocol).

1. Introduction

Wireless sensor networks (WSNs) include small sensor nodes with battery and processing power and limited memory units. There are two important features of WSNs, one is infrastructure-free and the other is self-organizing [1]. These features make sensors a good choice for multiple applications. However, sensor networks have sensor nodes with limited battery power, so how to save node energy while maintaining proper network performance is a challenging issue in designing wireless sensor network protocols.

Deploying WSNs is easier and faster than wired sensor networks or other wireless networks [2] because they have no fixed infrastructure [3]. Because sensor nodes are often used densely, they can withstand network error. Wireless sensor networks do not require a central organization and are configured on their own [2]. There are several types of wireless sensors, such as seismic, low-rate magnetic, thermal, and visual, infrared, acoustic, and radar sensors. These sensor nodes can monitor a variety of environmental conditions. Some of these conditions include temperature, pressure, humidity, soil arrangement, vehicle motion, noise level, lighting conditions, the presence or absence of certain types of objects, and levels of mechanical stress in attached objects [4]. Wireless sensor networks have different types of applications. The main applications of WSN are military, environmental applications, healthcare applications, home applications, and other commercial applications [5].

In wireless sensor networks, each node receives a signal from a limited area. This signal is processed at that sensor node, and post-measurement information is generally transmitted to observers (for example, base stations). Sensor nodes consume energy when receiving information, processing information, and transmitting the information. In most cases, these sensor nodes are equipped with non-rechargeable batteries. Therefore, energy efficiency is a major design goal in wireless sensor networks [6].

Clustering is one of the ways to improve energy consumption. In clustering, nodes can be divided into several small groups (called clusters) to aggregate data through an efficient network organization [6]. In general, each cluster has a cluster head that coordinates the data collection and aggregation process in a particular cluster. Each member of the cluster transmits its data packets to the cluster head. Clustering in wireless sensor networks ensures a fundamental performance achievement even with a large number of sensor nodes [7]. In other words, clustering improves the scalability of wireless sensor networks, thus minimizing the need for a central organization and promoting local decisions. Each sensor network can perform its tasks as long as it is considered live.

This network has a large number of sensor nodes that are responsible for receiving information from the environment and sending information to a base station or sink in a single step or multiple steps. Nodes close to the sink usually drain their battery resources due to the sharing of multi-step paths and the concentration of data towards the sink more than other nodes. It can be disconnected from the network and the data generated by the sensors can no longer be accessed. The use of portable sinks has been suggested as a possible solution to this problem. The dense area(hotspots) around the sink changes with the mobility of the sink, and the increase in excessive energy consumption around the sink spreads throughout the network, which helps to achieve uniform energy consumption.

Accordingly, in this paper, a new energy-efficient clustering algorithm based on the meta-heuristic algorithm of bacterial foraging and mobile sink for wireless sensor networks is presented which can cluster the network nodes based on the energy level of the nodes and the distance to the sink. Although researchers have proposed many clustering algorithms for WSN there are still many shortcomings in the WSNs in terms of CH selection or finding the best trajectory length. In most studies, CHs that are selected in the first round collect data. However, the CH set to be selected for all rounds and the detection of the location of each CH will facilitate the function of the mobile sink node [8]. Also, it will be more reasonable to construct paths that occur when the mobile sink travels CHs in the shortest manner. This paper introduced a novel method with a BFO algorithm and mobile sink which maintains a good balance between the computational and communication demands of a sensor node in the wireless sensor network. We proposed a Homogeneous WSN with a mobile sink in order to minimize energy consumption in WSN that develops a CH selection algorithm based on the bacterial foraging paradigm. CHs are dynamically selected from the advanced nodes according to the proposed algorithm. This method differs from the existing studies. CH selection is made with the greedy approach that is based on the interaction fitness value, energy node degree, and distance to sink. The best trajectories, thanks to intersection edge points of the visited CHs, are obtained. In this way, the mobile sinks entry to transmission range boundaries of the CH will be a sufficient strategy to collect information. in this paper, we have implemented comprehensive simulation analyzes by measuring lots of performance metrics, including energy consumption, throughput rate, end-to-end delay, signal-to-noise ratio, the delivery rate that we introduced.

1.1 Research contribution

The novelty of this paper lies in the following contributions done:

  1. Centralized clustering: Centralized clustering using the bacterial foraging algorithm is executed by the base station i.e. sink. Since the sink is a node equipped with unlimited power so this results in conserving the energy. Moreover, centralized clustering also helps in improving the network scalability as most of the data communication took place inside the clusters.

  2. Node’s fitness calculation is based on multi-criteria: The bacterial foraging algorithm is practised to select the CH node with the highest fitness value, based on two criteria such energy node degree, and distance to sink. The fitness of a node is evaluated to select the best node among the nodes in the cluster.

  3. Head node selection using bacterial foraging optimization approach: The bacterial foraging algorithm is practised to select the CH node for the current round. also in the CH nodes near the sink, data transfer from the CHs to the sink node is done by selecting intermediate nodes as the next-hop. These intermediate nodes are the nodes that are having the least distance from the sink node.

  4. Mobile sink: In the CH nodes farther from the sink, the sink moves toward them to Receive the data then this method could conserve the energy and increase the lifetime of the network.

  5. Multihop communication among sensor nodes: Data transfer from the CHs to the sink node is done by selecting intermediate nodes as the next-hop. These intermediate nodes are the nodes that are having the least distance from the sink node.

  6. Simulation Outcomes: The performance of BFOABMS is investigated by considering different performance metrics like energy consumption, End to End delay, media access delay, packet error rate, throughput, signal to noise rate and delivery rate successfully and it is proved that BFOABMS enhances the energy consumption by 17.99%, throughput rate by 30.04%, end-to-end delay by 46.04%, signal-to-noise ratio by 32.81%, delivery rate successfully Data to the sink by 0.80 in comparison to the AFSRP protocol.

The sections of this article are organized as follows: The second section describes related work on routing protocols on mobile case networks in the third section, the proposed method is stated in the fourth part of the simulation, the proposed method and simulation results in OPNET (Optimized Network Engineering Tools) simulator are given, In the fifth section, the conclusion is stated.

2. Related works

In the paper [9], a reliable routing protocol based on clustering and mobile synchronization in the wireless sensor network was presented, which increases the lifespan of the network by using mobile synchronization and clustering. It also increases the reliability of the network by deciding on the best alternative cluster head in the event of an error, locally and dynamically. The proposed protocol, called DCRRP (Distributed Clustering Reliable Routing Protocol), is distributed and can minimize data report latency. The results of the simulated protocol proposed in OPNET are compared with the NODIC (Novel Distributed Clustering) protocol in error and error-free mode. In general, it was observed that the method proposed by the authors shows better behaviour than the NODIC protocol. The disadvantage of this method is that after moving the sink, several nodes remain as sinks in the original location of the sink, and the nodes must, if present, inform the nodes representing the mobile sink, which in itself will cause energy consumption.

In this paper [10], an evolutionary method based on clustering using an optimized invasive weed algorithm based on fuzzy modelling for WSNs is proposed. Which can select the most suitable node as the cluster head to increase the life of the network and also address the challenge of energy conservation in sensor networks. The authors used a fuzzy inference model to evaluate the fit of each node in the network. The simulation results show a significant reduction in the number of dead nodes in each run and a reduction in energy consumption in the sensors. In addition, their proposed method increases the network stability period by up to 45% compared to the artificial bee protocol and 18% compared to the artificial bee quantum protocol. The advantage of this method is the use of an optimized aggressive weed algorithm that can adapt and be random and can quickly find the global optimal [11], as well as the use of a fuzzy inference model that has high accuracy. The disadvantage of this method is the high processing cost due to the use of fuzzy logic with an aggressive weed algorithm.

The paper [12] presents a centralized method for improving energy efficiency with fuzzy-based clustering and machine learning called ECFU (Energy-based Clustering with Fuzzified Updates) for wireless sensor networks. The proposed method solves the problem of improving the lives of the network and at the same time balancing the energy between the sensor nodes of the network. To achieve greater efficiency in network operations, a clustering technique based on fuzzy updating and machine learning has been used. Clustering is a useful way to improve power consumption to extend the life of wireless sensor networks. Exchanging messages due to repeated recreation burdens the sensor nodes and wastes battery power. This paper presents a modified clustering method that reduces the overhead of clustering and message exchange and thus performs the clustering operation effectively. The network is clustered according to the residual energy of the sensor nodes. To increase the network life, the proposed algorithm calculates the next update cycle using a fuzzy inference system. Fuzzy criteria, i.e. node residual energy, distance from the sink, and average data rate, are used to calculate the cluster update cycle. Nodes apply machine learning clusters at regular intervals to classify data based on their similarity. Classified data is transferred to the cluster head after reducing the number of message transmissions. The proposed method improves the energy consumption of clustering and data transmission. The proposed method reduces clustering overhead, which is considered a major challenge in the implementation of network clustering protocols.

In [13] the authors use a multi-network and distributed network routing scheme to increase network failure tolerance and conserve sensor energy. The simulation results showed that the sub-path detection method represents an efficient method that is well consistent with the properties of the WSN multidimensional communication model. The main idea of this type of routing is to tag messages related to each route along with identifying adjacent routes that send the message.

In [14], the authors proposed an optimal scheduling mechanism and method for sending packets so that information is collected at the cluster heads in wireless sensor networks. The purpose of the method is to investigate real-life process processes for a specific time interval in routing packets with the least probability of losing the packet to the base station. To achieve this, they improved the scheduling algorithm to arrange time slots through which data must be sent by sensor nodes. The scheduling method ensures that all packets are sent in a specified slot and thus the delay is reduced and there is also a possible packing probability for each node.

In [15] the authors provide an analytical model for network longevity and coverage problems in wireless sensor networks using a two-dimensional Gaussian distribution. The probability of coverage in the Gaussian distribution depends on factors such as the standard Gaussian deviation, the distance between the target point and the centre point. By adjusting the various parameters mentioned above, the probability of occurrence of coverage and network life can be increased. Using the timed node deployment algorithm, longer network life and larger coverage are achieved using a limited number of sensor nodes.

In the paper [16], the authors proposed a method called FMSFLA(Fuzzy Multi-hop Frog Leaping Algorithm) to maximize network life and scalability based on the application, which considers the effective parameters for selecting the cluster head and parent node. In the proposed method, the jumping frog algorithm is used to provide a fuzzy multi-step clustering protocol (FMSFLA). SFLA (Shuffled Frog Leaping Algorithm) is used to automatically configure and optimize the base rule table in a fuzzy inference system with five parameters that can be adjusted in two steps, namely cluster head selection (CH) and parent selection, based on application features. The proposed protocol (FMSFLA) takes into account the effective parameters such as energy, distance from the base station (BS), number of adjacent nodes, and actual distance of the node from BS, average path load, latency, overlap, and hotspot problem. The proposed method is expected to have the best performance in each round of execution. In each round, the steps of CH selection, parent selection, cluster formation, and steady-state are performed. In the CH selection step, CH is selected from the candidate nodes based on the fuzzy output and energy threshold (i.e. a control parameter) and according to the overlap rate of adjacent CHs. In the proposed protocol, the parent selection phase begins with determining the level of CHs in the network. At the end of this step, the parents of each CH are determined based on the maximum fuzzy output based on the application. In the cluster formation stage, clusters are formed based on the specified CHS. Finally, the information received by the CHs is sent to the BS through their parents in a stable phase. FMSFLA evaluates received packets based on the number of live node protocols. The proposed Fuzzy Multi-Step Clustering Protocol (FMSFLA) is not only energy efficient but can also manage the energy consumption of nodes based on the FIS (Fuzzy Inference System) rule table and five control parameters using frog jump. The proposed protocol also considers the effective parameters such as energy, distance to BS, number of adjacent nodes, actual distance between a node and BS, average path load, latency, overlap, and hotspot problem to achieve the best. According to the simulation results, FMSFLA performs better than other protocols in all scenarios. The disadvantage of this method is the high processing cost of the jumping frog algorithm and fuzzy logic.

In the paper [17] a grid-based routing algorithm is proposed for the sensor network to conserve energy in the sensor nodes and increase the network life. In addition, routing is done through a network coordinator that applies fuzzy rules to find the optimal path to reduce the number of coordinators in the routing process. In an energy-efficient grid-based routing algorithm, each grid selects its grid using the residual energy of the nodes in the network and separating the nodes from the sink using a fuzzy logic coordinator. Therefore, energy consumption is reduced in sensor nodes. Because the transfer of information from the source to the sink is done by the grid coordinator, which acts as a relay node, it reduces energy consumption in the routing process, which leads to an increase in network life. In this method, the design is done in such a way that the problem of energy consumption in most sensor nodes is used more effectively to prevent energy loss during transmission. To perform effective routing through cluster head nodes, clustering techniques have been used to help save energy consumption in sensor nodes. In addition, fuzzy rules are applied in this work to make effective decisions according to the criteria of node location, energy analysis, cluster formation, cluster selection, and routing through clusters.

In the paper [18] a new concept for mobile sensor nodes called the Cluster-Based Energy-Based Routing Protocol (MEACBM) for routing in a network of hierarchically heterogeneous WSNs is proposed that selects CH based on the proposed probability equation. Selects only the sensor as the cluster head (CH) that has the most energy in the equation among the other sensor nodes. Therefore, in MEACBM, only sensor nodes with the highest energy compared to low-power sensor nodes are selected as CH. Hierarchical clustering is considered hierarchical for the three levels of sensor nodes that are connected by cluster communication and sensor nodes throughout the network area. In MEACBM, after the establishment of sensor nodes and the formation of clusters, the entire network area is divided into sections and inside each section is placed a mobile sensor node which acts as a collector of mobile data to collect data from CH Acts. This method helps to significantly reduce the energy consumption of sensor nodes to transmit information to the base station (BS). The simulation results show the effectiveness of MEACBM(Mobile Energy Aware Cluster Based Multi-hop) routing protocols compared to other new cluster-based routing protocols in terms of network life, stability, throughput, number of CHs, and the number of dead nodes. The problem with the proposed method is that the selection of the cluster-head is done only according to the energy criterion of the sensor nodes, and on the other hand, the mobile node consumes a lot of battery energy than other nodes and may consume its energy faster and the node will shut down.

In the paper [19], a new method for optimal clustering in circular(circular) networks OCCN (Optimal Clustering in Circular Networks) is proposed, which aims to reduce energy consumption and increase the life of wireless sensor networks. In this method, which is presented for a circular area around a sink, a single-step connection between the eaves and the sink is replaced by an optimal multi-step connection. In addition, the optimal number of clusters is calculated and the energy consumption is optimally distributed by dividing the grid approximately equally. In this paper, a multi-step communication protocol is presented that uses optimal parameters. Optimal parameters such as optimization of one-step communications, an optimal number of cluster sizes, and the optimal number of clusters are considered for a circular network in which the sink is located in the centre of the network. During the clustering operation, the selection of the proposed cluster head method significantly improves the life of the network and the energy consumption process is linear and at least 50% of the nodes survive.

In the paper [20], a reliable routing technique using new delay energy is used to transfer data in a heterogeneous sensor environment. In the proposed method, a limited search space is defined to ensure the timely delivery of sensitive delay data. In addition, in the defined search space, an algorithm has been developed to select a balanced path of energy-delay between the source and the sink, which enables fast data delivery through an energy-efficient step. The proposed method also improves the success rate of data packets received in the sink in a large dense network by collecting data and providing a suitable load balance in the network. The proposed method achieves a good balance between energy consumption and end-to-end delay by selecting the minimum energy of the next node in the long-distance data transfer phase. This method not only solves the hotspot problem in mobile hierarchical routing protocols but also reduces end-to-end delivery delays. In addition, proper load balancing across the network significantly improves the percentage of data packets successfully received in the sink by selecting multiple agent nodes-(Agent Node) and accumulating data during the data transfer phase and it also reduces the overall energy consumption of the grid.

In the paper [21], a new approach to address the problem of energy efficiency in wireless sensor networks is presented by an energy-aware routing protocol using a fish swarm optimization algorithm called AFSRP in these networks, which improves energy consumption. The proposed protocol was simulated with ERA(Energy-aware Routing Algorithm) protocol in OPNET11.5 simulator and the simulation results showed that their proposed protocol performed better than ERA protocol in terms of power consumption, end-to-end latency, media access delay, bandwidth, transmission rate, probability of successful sending to the sink, and the signal to noise ratio. The problem of this method is that the optimization of fish is used in static environments and for dynamic environments such as sensor networks, the convergence speed may be reduced.

In the paper [22], a re-evolution of the stable improved LEACH (SILEACH) algorithm was proposed to overcome the problems of the LEACH algorithm. SILEACH has two stages, the setup and the steady stage. In the setup stage, a random number between (0–1) is generated in each node and the threshold value is calculated in each node. To select CH nodes, each node, that has the highest RE and less distance to BS, will get more opportunity to act as CH. the steady stage the nodes sense the environment and send the data to the BS via CH. These operations are repeated for each round. This is performed by assuming the BS inside the network area. The simulation results showed that the SILEACH significantly outperforms the Enhanced LEACH (LEACH) and Improved LEACH (ILEACH) protocols in terms of the stability period and network lifetime.

In the paper [23], to overcome limitations of the lifetime and its energy consumption of sensor nodes enhanced the LEACH (low energy adaptive clustering hierarchy) protocol was extended by identifying a cluster head according to the lowest degree of distance from the sink. The proposed method is the same steps as LEACH but a difference occurs in the setup stage in which, in the setup stage, all the regular nodes select a random number between (0–1), then if that number is less than or equal to the threshold the node becomes a CH; member nodes select a CH according to distances to reach the base station, not a CH that is closest to it. Simulation results showed enhanced LEACH can increase the network lifetime and minimize the consumption of energy. The summary and the highlights and limitations of each algorithm in related work showed in Table 1.

Table 1. The summary of all algorithms in related work.

Designer’s name Methodology Advantages Disadvantages
[9] A reliable routing protocol based on clustering and mobile synchronization It can increase the lifespan of the network and minimize data report latency After moving the sink, several nodes remain as sinks in the original location of the sink, and the nodes must, if present, inform the nodes representing the mobile sink, which in itself will cause energy consumption.
[10] Clustering WSN using an optimized invasive weed algorithm based on fuzzy modelling Results showed a significant reduction in the number of dead nodes in each run and a reduction in energy consumption in the sensors High processing cost due to the use of fuzzy logic with an aggressive weed algorithm.
[12] A centralized method for improving energy efficiency with fuzzy-based clustering and machine learning The proposed method improves the energy consumption of clustering and data transmission and reduces clustering overhead High processing cost due to the use of fuzzy logic
[13] multi-network and distributed network routing methods are used to tag messages related to each route along with identifying adjacent routes It can increase network failure tolerance and conserve sensor energy. Decentralized networks are more expensive and time-consuming to deploy because need to install and configure multiple servers with load balancing and failover capabilities.
[14] A scheduling mechanism to arrange time slots through which data must be sent by sensor nodes It ensures that all packets are sent in a specified slot and thus the delay is reduced and there is also a possible packing probability for each node. If time slots are not correctly diagnosed it causes loss of data
[15] An analytical model for network longevity and coverage problems using a two-dimensional Gaussian distribution It has longer network life and larger coverage High processing cost due to the use of two-dimensional Gaussian distribution
[16] The shuffled Frog Leaping Algorithm with fuzzy multi-step clustering protocol It improves energy consumption This method is the high processing cost of the jumping frog algorithm and fuzzy logic.
[17] A grid-based routing algorithm, that is done through a network coordinator that applies fuzzy rules to find the optimal path. It can reduce the energy consumption is in sensor nodes. High processing cost due to the use of fuzzy logic
[18] offer the clustering-based Routing Protocol in a network of hierarchically heterogeneous WSNs based on the energy of nodes It can improve network life, stability, throughput, number of CHs, and the number of dead nodes. It selection of the cluster-head is done only according to the energy criterion of the sensor nodes, and on the other hand, the mobile node consumes a lot of battery energy than other nodes and may consume its energy faster and the node will shut down
[19] A new method for optimal clustering in circular networks It can reduce energy consumption and increase the life of wireless sensor networks. This method is performed only for a circular area around a sink, and It is not performed for all nodes in WSN network.
[20] A reliable routing technique using new delay energy is used to transfer data in a heterogeneous sensor environment The proposed method can improve the success rate of data packets received in the sink in a large dense network by collecting data and providing a suitable load balance in the network also this method not only solves the hotspot problem in mobile hierarchical routing protocols but also reduces end-to-end delivery delays and it can reduce the overall energy consumption of the grid. It is can only perform in heterogeneous sensor environments but in a real environment the most of the time the sensor nodes are homogenous
[21] An energy-aware routing protocol using a fish swarm optimization algorithm The proposed protocol can improve power consumption, end-to-end latency, media access delay, bandwidth, transmission rate, probability of successful sending to the sink, and the signal to noise ratio. Using the fish swarm optimization algorithm can reduce the convergence speed.
[22] Re-evolution of the stable improved LEACH algorithm based on two criteria energy remaining and distance to sink The simulation results showed that the proposed method significantly outperforms in terms of the stability period and network lifetime. It has considered only two criteria (energy remaining and distance to sink) to enhance the leach protocol but maybe other important criteria such as processing cost have existed
[23] Enhanced the LEACH protocol, using the cluster head selection according to the lowest degree of distance from the sink. Simulation results showed enhanced LEACH can increase the network lifetime and minimize the consumption of energy. It has considered only one criterion (lowest degree of distance from the sink) to enhance the leach protocol but maybe other important criteria such as energy remaining have existed

3. Suggested method

The BIFOA(Bacterial foraging Optimization Algorithm) developed by Passino in 2002 is inspired by the social feeding behaviour of Escherichia coli [24]. Bacteria find food in a way that maximizes the energy produced per unit of time. Bacteria also communicate with other bacteria by sending signals. The process in which bacteria look for food by taking small steps is called chemotaxis, and the main idea of the bacterial foraging optimization algorithm is the chemotaxis movement of artificial bacteria into the problem space. Bacteria move during feeding through a set of expandable flagella. The flagella help E.coli to swim or hang. These are the two main actions when foraging bacteria. When the bacteria have eaten enough food, they increase in length and split in two at the right temperature to form a capsule just like themselves. Passino used the same idea for the reproduction process in the bacterial foraging optimization algorithm. Due to sudden environmental changes or seizures, the chemotactic process may be disrupted and some bacteria may be transferred to other areas this condition in a population of true bacteria can cause all bacteria to be killed or spread to a new part of the environment. Now suppose we want to find the minimum J(θ) to θ = R ^ p (i.e. θ is the vector P after real numbers) and we have a criterion for measuring or describing the gradient ∇J(θ) does not have. The bacterial foraging optimization algorithm follows four mechanisms in the real bacterial system to solve non-gradient problems: chemotaxis mass movement, reproduction, and Elimination and dispersal(Elimination and Dispersal). Symptoms of the four mechanisms listed are:

  • θ: the vector P after real numbers

  • J: stage indicator of chemotaxis

  • K: Reproductive stages index

  • L: Elimination and Dispersal Event Index

  • P: Dimensions of the search space

  • S: The total number of bacteria in a population

  • Nc: number of chemotactic steps

  • Ns: swimming length

  • Nre: number of reproductive stages

  • Ned: Number of Elimination and dispersal events

  • Ped: possibility of Elimination and dispersal

  • C (i): The size of the steps in the random directions determined by the suspension and p(j, k, l) = {θi (j, k, l)\i = 1, 2, ….., s} indicates the position of each member in the bacterial S population at jth chemotactic stage, kth reproductive stage And ith is the deletion-scattering event. Here J(I, j, K, l) specifies the cost position of the bacterium ithθi(j, k, l) ∈ R ^ p. Note that J is used here as a cost. In a population of real bacteria, s can be very large (e.g. s = 109), but P = 3. In simulations performed to solve search problems, a much smaller and fixed population size is used. However, in the bacterial nutrition optimization algorithm, there is a possibility of p> 3, which is used for optimization problems with higher dimensions. In the following, the steps of the bacterial foraging optimization algorithm are described.

Chemotaxis

This process mimics the movement of E. coli cells in swimming and hanging through the flagella. A biological E. coli bacterium can move in two ways. It can swim in the same direction for a while or stay suspended. And throughout his life, he alternates between the two. Presume θi(j, k, l) indicates the location of ith bacterium in jth chemotactic, kth productivity and ith Elimination and dispersal stage. c(i) the size of the steps in the random directions determined by the suspension (units of swimming length). In this case, the movement of bacteria can be shown according to Eq 1 [24]:

θi(j+1,k,l)=θi(j,k,l)+c(i)Δ(i)ΔT(i)Δ(i) (1)

Which Δ represents a vector in a random direction whose elements are between [–1, 1].

  • Group movement: One of the interesting behaviours observed in some bacterial species including E. coli and S. Typhimurium is the group movement of coaxial patterns with high bacterial density. Eq 2 [24] represents the intercellular signalling in the E. coli swarm:
    Jcc(θ,p(j,k,l))=i=1sJcc(θ,θi(j,k,l))=i=1s[dattractantexp(wattractantm=1p(θmθmi)2)]+i=1s[hrepllantexp(wrepllantm=1p(θmθmi)2)] (2)
    Jcc (θ, p(j, k, l)) is the value of the objective function, which is subtracted from the real objective function (to maximize) to show changes in the objective function over time. S is the total number of bacteria, P is the number of optimization variables in each bacterium and θ = ([θ1, θ2, θ3, ….. θp])T is in the next P search domain. In this regard, wrepllant, wattractant, hrepllant, dattractant are different coefficients that must be selected correctly. (Usually the values wrepllant = 10, wattractant = 0.2, dattractant = 0.1, hrepllant = 0.1 are considered for these coefficients). Paying attention to Eq 2 shows that it is desirable for bacteria to better explore the search space. In other words, the closer one bacterium gets to other bacteria, the more it will strengthen its final fit. (A contractile interest occurs in the bacterial population.) And the farther a bacterium is from other bacteria, the stronger the second part of the upper relation of the final fit of the bacterium (there is an expansionary interest in the bacterial population). However, because the wattractant value is always considered less than the wrepllant [24], there is a contractile interest in all bacteria, so that eventually the algorithm converges.
  • Reproduction: Weaker bacteria are eventually killed (those for which less fit is calculated by the objective function), and better bacteria are broken down into two bacteria, which are replaced on the spot, which keeps the population size constant.

  • Elimination and dispersal: Gradual or sudden changes in the environment in which bacteria live may occur for a variety of reasons, such as a sudden rise in temperature that kills a group of bacteria. Another thing that can happen is that the bacteria move to another area. To simulate such a phenomenon, in a bacterial foraging optimization algorithm, some bacteria are less likely to be killed and a new number to be randomly assigned to new locations [24]. The flowchart of this algorithm is shown in Fig 1.

Fig 1. The flowchart of the algorithm.

Fig 1

In the following, we will explain the details of the clustering of wireless sensor networks using the bacterial foraging algorithm. In the proposed method, each sensor node is considered a bacterium. Also, to simplify data routing, a virtual backbone is created from the cluster heads, which are rooted in the sink node, which is the main source of food. This algorithm consists of two phases, the clustering phase, and the data transmission phase.

Phase 1 Clustering: In the clustering phase, the sensors or bacteria are grouped into separate clusters. This phase includes the following steps.

Step 1: The sink first sends a route request message to all sensor nodes (60 sensor nodes) that include the sink ID and physical position of the sink. Each sensor node that receives this message obtains its position via GPS and calculates its distance to the sink according to Eq 3.

Di=(xsxi)2+(ysyi)2+(zszi)2 (3)

Di is the distance to the sink, (xs, ys, zs) the position of the sink, and (xi, yi, zi) the physical position of the ith sensor.

The distance sensor to the sink then sends the amount of remaining battery power and its ID to the sink in response to the sink request in the form of a response to the route request. The sink, after receiving this information, registers them in its table and the centralized process of selecting the best nodes as in-sink cluster heads is performed using a bacterial foraging algorithm. The initial population of sensor node IDs is randomly selected as the cluster head, so that since we want to specify five cluster head nodes for 60 nodes, it creates ten arrays of five that inside each house of arrays is the sensor node IDs that Candidates are randomly inserted, so in each solution, up to five bacteria are inserted. Each sensor acts as a bacterium. Fig 2 shows an example of a solution that randomly selects sensor nodes (bacteria) with identifiers 60, 4, 56, 34, and 45 as cluster head candidates.

Fig 2. An example of a solution in the proposed method.

Fig 2

The initial population containing up to 10 solutions is randomly generated.

Step 2. Chemotaxis is performed at this stage. Chemotaxis is the motor behaviour of bacteria, which is called the life cycle of bacteria. This behaviour involves repetitive Ns (lifetime) in which the bacteria take steps to search for brain material. The values of wrepllant = 10, wattractant = 0.2, dattractant = 0.1, hrepllant = 0.1 are considered and also initializes the values of the variables Ned, Nre, Ns, Nc to 10, 100, 10, and 10, respectively. And θi(j, k, l) is also considered the position of the jth sensor. If the first round is clustering, the movement of each bacterium is calculated according to Eq 1 and the position of the bacterium is updated.

Since bacteria in certain conditions secrete adsorbents that attract other bacteria to a specific area. According to this relation, concerning updating the cost function of each bacterium, after moving it according to Eq 2, the value of Jcc (θ, p(j, k, l)) should be added to it, which represents the amount of absorbing and repelling forces between bacteria in the population. Therefore, for the second round, according to Eq 2, the bacterial movement is calculated, which is Eq 2 (θmθmi) considers the distance of each bacterium or sensor to the sink and updates the position of the bacterium, i.e after calculating the bacterial movement, the position The new result is checked according to the position of which sensor node. The ID of that sensor is placed in the bacterium and the bacterium is updated.

Step 3. At this stage, reproduction takes place. At this stage, after the life cycle of the bacteria to move is over, the health of the bacteria, which is proportional to the number of nutrients accumulated during the life cycle, is calculated based on fitness for all bacteria. Then some of the bacteria with the least fitness function die (are removed) and the same number of the best bacteria multiply. (They become two bacteria.) For each bacterium inside the array, the solution in the initial population calculates the fitness value according to Formula 4.

Fit=REi+1Di (4)

As Fit is the fitness, RE is the remaining energy of the ith sensor node and D is the distance of the ith sensor node to the sink. Organizes the bacteria according to their suitability and selects fifty per cent of the bacteria with high suitability and inserts them in the initial population [24].

Step 4. The Elimination and dispersal step is done. In a real swarm of bacteria, the effect of environmental changes such as rising temperatures may kill many bacteria or move them to other areas. Inspired by this behaviour, after a certain number of repetitions of the reproductive stage, each of the bacteria is likely to be removed by Ped and thrown to another place (it becomes another bacterium). For each bacterium selected from the population in step 3, a random number is generated if this number is less than 0.8 of the Elimination and dispersal value (Ped = 0.8). A sensor with a random ID generates and replaces the sensor ID in the solution.

Step 5. The population is evaluated according to Eq 5 and sorted according to the fitness function. Selects the best solution from the population that has the highest fitness as the cluster head.

Fit=i=15(REi+1Di)/5 (5)

Step 6. The sink sends a notification message of being cluster head, indicating the nodes within the array of the best solution, informing them that they are cluster heads. Each cluster head then generates an Advertisement message that contains information about its physical location and ID and distributes it in its range. They are connected to the nearest cluster head by sending a connection message which contains the ID of the member node and the amount of energy remaining and the physical position of the member node and thus clusters are formed.

The second phase of data transmission: In sensor networks, in cases where the data transmitter is not able to send with one step, it uses multi-step relationships. One way to reduce energy consumption is to use multi-step relationships, to use routes that require less energy to send data for routing. On the other hand, increasing the number of steps causes more nodes to buffer along the closed path, which will have high processing and overhead. Therefore, it is very important to use an asynchronous port that helps to reduce the number of steps in multiple routings in the network. After the data collection is completed by the cluster heads, the cluster head nodes send a message to the sink, informing the sink of their residual energy after a period of message exchange and telling the sink that they have data to send. The sink will make a decision based on the residual energy of the sprigs in its table. If the residual energy of the sprigs is more than 70% of their total initial energy, the sink moves to a randomly installed location, but if it is less than 70%, the sink moves to a denser area and places a node as its representative in its embedded location to be responsible for collecting data from the cluster head [9]. The cluster heads will now be notified by the sink of both specified coordinates to receive the data, and send the data to the nearest one using several steps or a single step. The pseudo-code of the proposed method is presented in Fig 3 and the platform configuration of the proposed method is presented in Fig 4. The proposed method energy consumption model is evaluated according to eruption 6 [25].

EC=argmaxREimaxREiDi (6)

As Ec is the energy consumption, RE is the remaining energy of the ith sensor node and D is the distance of the ith sensor node to the sink.

Fig 3. Pseudo-code of the proposed method [26].

Fig 3

Fig 4. Platform configuration of the proposed method.

Fig 4

4. Simulation of the proposed method

4 1 Simulation environment

In this paper, we use Contiki operating system that uses standard C and follows an event-driven programming model and OPNET(Optimized Network Engineering Tool) [27] Modeler version 11.5 simulation software is used to simulate the proposed method and compare it with the AFSRP protocol. The simulation parameters are shown in Table 2. According to Fig 5 in the proposed method, we have considered the network correlation of 60 nodes, of which two scenarios, the first scenario of the sensor nodes are randomly distributed in the environment according to the AFSRP protocol and in the second scenario, the nodes are randomly distributed in the environment that is clustered by the proposed method (bacterial foraging algorithm). The proposed algorithm is named BFOABMS (Bacterial Foraging Optimization Algorithm Based Mobile Sink).

Table 2. Simulation parameters [21].

Parameter Value
Distributing nodes in the environment Random
The mobility models of Sink Random
Number of sink 1
Number of nodes 60
Simulation environment 100*100 *100 m3
Transmitted type CBR
Radio transmission board 250m
Packet size 1024 bit
Simulation time 250 Sec
Mac layer protocol IEEE 802.15.4
initial energy level 200–450 Jul
Ned Number of elimination and dispersal events 10
Nre Number of productivity 100
Nc chemotaxis in slipping or hanging 10
dattractant Swimming length 0.1
Probability of elimination and dispersal 0.8
Searching space dimensions 3D
hrepllant 0.1
wrepellant 10
wattractant 0.2

Fig 5. View of the simulated model network topology.

Fig 5

We have assumed the same correlation for both scenarios. The following are the simulation results of the proposed protocol based on the scenarios.

4.2 Performance criteria in the proposed method

To evaluate the efficiency of the proposed method, the following criteria are used.

  • Energy Consumption: The energy consumption is equal to the sum of the energy used by the nodes within the network, where the energy used for a node is equal to the sum of the energy used for communication, including transmission and transmission, and waiting.

  • End-to-End delay: The time it takes for a data packet to be transmitted from sender to receiver. To calculate the average end-to-end latency, the end-to-end latency of all packets received by the receivers is calculated and their average is calculated.

  • Media access delay: Equals the time between receiving the packet by the MAC layer until it is fully loaded on the wireless media. The reason for checking media access latency is that many multimedia applications have latency constraints and the data is no longer usable after this time.

  • Packet error rate: is equal to the average number of bit errors in packets.

  • Throughput: Defined as the total number of packets received by the receiver divided by the time between the receipt of the first packet and the last packet. It is equal to dividing the file size at that time, in megabits per second.

  • Signal to Noise Rate: The signal-to-noise ratio is a measure of the amount of useful signal versus annoying signal or noise. This number represents the amount of noise imposed on a signal versus the strength of the signal itself. The higher the index, the better and more useful the signal.

  • Data packet loss rate: The number of data packets lost due to noise, congestion, or error.

4 3 Simulation results

Fig 6 compares the average battery power consumption of network nodes for the proposed BFOABMS algorithm scenario and the AFSRP protocol. The vertical axis shows the energy consumption and the horizontal axis shows the simulation time. The energy consumed is equal to the sum of the energy used by the sensor nodes for communication. As can be seen, the AFSRP protocol consumes more energy. In the AFSRP protocol, if the network switches to selecting a cluster head based on the location of the node, a node that is less distant from the sink and the residual energy are not less than the threshold is cluster head, otherwise if a node with this feature is not available. This algorithm does not perform clustering, so the selected cluster heads may have less energy in the next cycles, so select them cluster head, and due to high energy consumption in the cluster heads, these nodes lose their energy quickly, and the network topology Also in this protocol, the node cluster heads send the collected data directly to the sink node. And nodes that are far away from the sink inform the sink if it has a lot of data to move to the denser area. If in the proposed method BFOABMS uses clustering and tracking of the sink by the algorithm, the node bacterium feeding optimization algorithm is used as a clue to send and transfer data that have more energy and less distance to the sink. On the other hand, since member nodes also join the cluster head node due to their distance, so it is not necessary to spend a lot of energy to send data from the node to the cluster head. In the proposed method, the use of clustering and mobile sink causes data to be sent from a short path and thus improves energy consumption.

Fig 6. Average energy consumption.

Fig 6

Fig 7 compares the end-to-end latencies for the proposed BFOABMS method scenarios and the AFSRP protocol scenario. The vertical axis is the end-to-end delay and the horizontal axis is the simulation time. End-to-End delay is the time it takes for a data packet to be transmitted from sender to receiver. As can be seen in the AFSRP protocol in the same initial cycles, the energy of the threaded nodes may decrease and it may not be able to transmit the sensed information to the thread before the sink reaches it, so the delay is long. However, in the proposed BFOABMS method, because in clustering the clusters are selected from the nodes with more energy and less distance to the moving sink and the cluster members also join the cluster in terms of distance, so the end-to-end delay is reduced. Using the mobile sink, which travels between sensor nodes that have connection problems, can improve the connectivity between sensor nodes and base station, and reduce the end to end delay in data transfer.

Fig 7. End-to-end delay.

Fig 7

Fig 8 shows the throughput rates for the two scenarios. The horizontal axis represents the simulation time and the vertical axis the number of data bits delivered at the time or throughput rate. The throughput is equal to the total packets received by the receivers divided by the time between receiving the first packet and the last packet. According to Fig 8 of the AFSRP protocol, compared to the proposed BFOABMS method, the number of packets successfully delivered to the sink is lower than the total packets transmitted by the sensor nodes due to congestion and possible node shutdown. However, in the proposed BFOABMS method, due to the use of a moving sink and sending data through cluster head to the sink with a shorter distance, the throughput rate increases. Therefore, the path found to the sink does not change until the end of the data transfer phase. Therefore, the number of packets delivered to the sink node will be higher in the proposed method. The proposed method can find optimal visiting points and data gathering paths for a mobile sink within clusters and define an optimal clustering and data gathering path, then it can improve the data collection and throughput performance.

Fig 8. Throughput rate.

Fig 8

Fig 9 shows the signal-to-noise ratio for the proposed BFOABMS method scenarios and the AFSRP protocol scenario. The horizontal axis shows the simulation time and the vertical axis the signal-to-noise ratio. The signal-to-noise ratio is used to indicate the amount of useful signal against the annoying signal or noise. The higher this criterion, the more useful the signal. According to Fig 9, the AFSRP protocol has a lower signal-to-noise ratio than the proposed BFOABMS method because the AFSRP protocol may increase the number of erroneous bits when sending and reduce the signal-to-noise ratio. Also, the information signal sent by the AFSRP protocol may be lost due to congestion and disturbance, and the possibility of noise may increase, thus reducing the quality of the transmitted data. In the proposed BFOABMS method, data is sent through the cluster head close to the moving sink, thus reducing the likelihood of disturbance and increasing the signal-to-noise ratio. signal-to-noise ratio is used to determine the quality of network connections, and the higher value indicates that the node has higher signal power. The larger the signal-to-noise ratio is, the higher probability of continuing bonding for a longer time. in the proposed method using the mobile sink and clustering improves network lifetime, signal-to-noise ratio, and channel capacity.

Fig 9. Signal to noise ratio.

Fig 9

Fig 10 compares the probability of successfully sending data to the sink node for the proposed BFOABMS method and the AFSRP protocol scenario. In a wireless sensor network, it is a simple way to route a single step and send data directly to the base station, which is very costly because nodes that are far from the sink may drain their energy storage faster. Therefore, severely limit the life of the network. According to Fig 10, as seen in the AFSRP protocol, the transmission success rate is low because some network nodes may be shut down due to a hardware error or battery drain and the data transfer to the sink node may not be completed, but in the proposed BFOABMS method Due to the choice of high stability path that contains high energy nodes and on the other hand due to the mobility of the sink, the probability of sending data to the sink increases. The sensor nodes close to the sink have more traffic loads, then they will quickly deplete their energy. using the mobile sink can improve energy consumption for WSNs. The mobile sink will sojourn at some fixed points to collect raw data from relevant areas then it can increase data transfer of WSNs.

Fig 10. Delivery rate successfully closes data to the sink.

Fig 10

5. Conclusion

In this paper, a new algorithm is proposed that clusters sensor nodes in wireless sensor networks using the bacterial foraging optimization algorithm to improve the energy consumption problem. This method identifies several nodes as cluster heads, which leads to the formation of suitable clusters in the network. in clusters, nodes adopt a one-step routing scheme to communicate with the cluster head, which, when receiving data packets from all members of the cluster, transmits the collected data to the mobile sink node in a pre-calculated path. In inter-cluster communication, the neighboring node is selected with the maximum residual energy. The proposed method prevents the transfer of data to the sink over long distances, thus minimizing the network energy consumption. On the other hand, in sensor networks with fixed sink, because the nodes close to the sink due to excessive use of their battery energy to send data, other sensor nodes in the network are more likely than other nodes to drain their battery resources which this leads to topological failure and reduced sensory coverage, thus increasing the data loss. Accordingly, the use of a moving sink can solve this problem. The proposed method and AFSRP [21] in the OPNET simulator simulate and the results show that the proposed method for network features such as improved power consumption, packet loss rate Data, throughput rates, end-to-end latency works better.

Supporting information

S1 Dataset

(RAR)

Data Availability

All relevant data are within the manuscript and its Supporting information files. Public data set: https://figshare.com/articles/dataset/Data_sets_rar/17430710 Public DOI for Data set:10.6084/m9.figshare.17430710.

Funding Statement

The authors received no specific funding for this work.

References

  • 1.Akl, A., Gayraud, T., & Berthou, P. (2011, April). An investigation of self-organization in ad-hoc networks. In 2011 International Conference on Networking, Sensing and Control (pp. 1–6). IEEE.
  • 2.Ibriq, J. (2004). Cluster-based routing in wireless sensor networks: issues and challenges. In Proceedings of the 2004 Symposium on Performance Evaluation of Computer Telecommunication Systems (SPECTS).
  • 3.Yu J. Y., & Chong P. H. J. (2005). A survey of clustering schemes for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 7(1), 32–48. [Google Scholar]
  • 4.Estrin, D., Govindan, R., Heidemann, J., & Kumar, S. (1999, August). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking (pp. 263–270). ACM.
  • 5.Akyildiz I. F., Su W., Sankarasubramaniam Y., & Cayirci E. (2002). Wireless sensor networks: a survey. Computer networks, 38(4), 393–422. [Google Scholar]
  • 6.Younis O., Krunz M., & Ramasubramanian S. (2006). Node clustering in wireless sensor networks: recent developments and deployment challenges. IEEE Network, 20(3), 20–25. [Google Scholar]
  • 7.Belding-Royer E. M. (2002). Hierarchical routing in ad hoc mobile networks. Wireless Communications and Mobile Computing, 2(5), 515–532. [Google Scholar]
  • 8.Yalçın S., & Erdem E. (2019). Bacteria interactive cost and balanced-compromised approach to clustering and transmission boundary-range cognitive routing in mobile heterogeneous wireless sensor networks. Sensors, 19(4), 867. doi: 10.3390/s19040867 [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9.Tabatabaei S., & Rigi A. M. (2019). Reliable Routing Algorithm Based on Clustering and Mobile Sink in Wireless Sensor Networks. Wireless Personal Communications, 108(4), 2541–2558. [Google Scholar]
  • 10.Sharma R., Vashisht V., & Singh U. (2019). Fuzzy modelling-based energy aware clustering in wireless sensor networks using modified invasive weed optimization. Journal of King Saud University-Computer and Information Sciences. [Google Scholar]
  • 11.Misaghi M., & Yaghoobi M. (2019). Improved invasive weed optimization algorithm (IWO) based on chaos theory for optimal design of PID controller. Journal of Computational Design and Engineering, 6(3), 284–295. [Google Scholar]
  • 12.Radhika S., & Rangarajan P. (2019). On improving the lifespan of wireless sensor networks with fuzzy based clustering and machine learning based data reduction. Applied Soft Computing, 83, 105610. [Google Scholar]
  • 13.Challal Y., Ouadjaout A., Lasla N., Bagaa M., & Hadjidj A. (2011). Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks. Journal of network and computer applications, 34(4), 1380–1397. [Google Scholar]
  • 14.Fyffe, M., Sun, M. T., & Ma, X. (2007, March). Traffic-adapted load balancing in sensor networks employing geographic routing. In Wireless Communications and Networking Conference, 2007. WCNC 2007. IEEE (pp. 4389–4394). IEEE.
  • 15.Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • 16.Fanian F., & Rafsanjani M. K. (2020). A new fuzzy multi-hop clustering protocol with automatic rule tuning for wireless sensor networks. Applied Soft Computing, 89, 106115. [Google Scholar]
  • 17.Logambigai R., Ganapathy S., & Kannan A. (2018). Energy–efficient grid-based routing algorithm using intelligent fuzzy rules for wireless sensor networks. Computers & Electrical Engineering, 68, 62–75. [Google Scholar]
  • 18.Toor A. S., & Jain A. K. (2019). Energy-Aware Cluster Based Multi-hop Energy Efficient Routing Protocol using Multiple Mobile Nodes (MEACBM) in Wireless Sensor Networks. AEU-International Journal of Electronics and Communications, 102, 41–53. [Google Scholar]
  • 19.Arghavani M., Esmaeili M., Esmaeili M., Mohseni F., & Arghavani A. (2017). Optimal energy-aware clustering in circular wireless sensor networks. Ad Hoc Networks, 65, 91–98. [Google Scholar]
  • 20.Maurya S., Jain V. K., & Chowdhury D. R. (2019). Delay aware energy-efficient reliable routing for data transmission in heterogeneous mobile sink wireless sensor network. Journal of Network and Computer Applications, 144, 118–137. [Google Scholar]
  • 21.Gorgich S. and Tabatabaei S., "Proposing an Energy-Aware Routing Protocol by Using Fish Swarm Optimization Algorithm in WSN (Wireless Sensor Networks)," Wireless Personal Communications, pp. 1–21, 2021. [Google Scholar]
  • 22.Al-Zubaidi, A. S., Mahmmod, B. M., Abdulhussain, S. H., & Al-Jumaeily, D. (2019, April). Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network. In Proceedings of the International Conference on Information and Communication Technology, 96–101.
  • 23.Salem A. O. A., & Shudifat N. (2019). Enhanced LEACH protocol for increasing a lifetime of WSNs. Personal and Ubiquitous Computing, 23(5), 901–907. [Google Scholar]
  • 24.Passino K. M. (2002). Biomimicry of bacterial foraging for distributed optimization and control. IEEE control systems magazine, 22(3), 52–67. [Google Scholar]
  • 25.Nguyen L., & Nguyen H. T. (2020). Mobility based network lifetime in wireless sensor networks: A review. Computer Networks, 174, 107236. [Google Scholar]
  • 26.Sahib M. A., Abdulnabi A. R., & Mohammed M. A. (2018). Improving bacterial foraging algorithm using non-uniform elimination-dispersal probability distribution. Alexandria engineering journal, 57(4), 3341–3349. [Google Scholar]
  • 27.http://www.opnet.com.

Decision Letter 0

Ping He

21 Jul 2021

PONE-D-21-15940

Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink

PLOS ONE

Dear Dr. Tabatabaei,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Sep 04 2021 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: http://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Ping He, Ph.D.

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at 

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and 

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Thank you for stating the following financial disclosure: 

"The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript." 

At this time, please address the following queries:

a) Please clarify the sources of funding (financial or material support) for your study. List the grants or organizations that supported your study, including funding received from your institution. 

b) State what role the funders took in the study. If the funders had no role in your study, please state: “The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.”

c) If any authors received a salary from any of your funders, please state which authors and which funders.

d) If you did not receive any funding for this study, please state: “The authors received no specific funding for this work.”

Please include your amended statements within your cover letter; we will change the online submission form on your behalf.

3. In your Data Availability statement, you have not specified where the minimal data set underlying the results described in your manuscript can be found. PLOS defines a study's minimal data set as the underlying data used to reach the conclusions drawn in the manuscript and any additional data required to replicate the reported study findings in their entirety. All PLOS journals require that the minimal data set be made fully available. For more information about our data policy, please see http://journals.plos.org/plosone/s/data-availability.

Upon re-submitting your revised manuscript, please upload your study’s minimal underlying data set as either Supporting Information files or to a stable, public repository and include the relevant URLs, DOIs, or accession numbers within your revised cover letter. For a list of acceptable repositories, please see http://journals.plos.org/plosone/s/data-availability#loc-recommended-repositories. Any potentially identifying patient information must be fully anonymized.

Important: If there are ethical or legal restrictions to sharing your data publicly, please explain these restrictions in detail. Please see our guidelines for more information on what we consider unacceptable restrictions to publicly sharing data: http://journals.plos.org/plosone/s/data-availability#loc-unacceptable-data-access-restrictions. Note that it is not acceptable for the authors to be the sole named individuals responsible for ensuring data access.

We will update your Data Availability statement to reflect the information you provide in your cover letter

4. We note that you have stated that you will provide repository information for your data at acceptance. Should your manuscript be accepted for publication, we will hold it until you provide the relevant accession numbers or DOIs necessary to access your data. If you wish to make changes to your Data Availability statement, please describe these changes in your cover letter and we will update your Data Availability statement to reflect the information you provide

5. Your abstract cannot contain citations. Please only include citations in the body text of the manuscript, and ensure that they remain in ascending numerical order on first mention.

Additional Editor Comments (if provided):

The quality of this manuscript is terrible. Seriously hindered my judgment of the manuscript work. Please read the comments carefully, polish your manuscript in an all-round way, and then submit it again.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Yes

Reviewer #2: No

Reviewer #3: Partly

Reviewer #4: Partly

Reviewer #5: Yes

Reviewer #6: No

Reviewer #7: Partly

Reviewer #8: Yes

Reviewer #9: Partly

Reviewer #10: Yes

**********

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #2: No

Reviewer #3: No

Reviewer #4: I Don't Know

Reviewer #5: Yes

Reviewer #6: N/A

Reviewer #7: N/A

Reviewer #8: N/A

Reviewer #9: N/A

Reviewer #10: Yes

**********

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: No

Reviewer #6: No

Reviewer #7: No

Reviewer #8: Yes

Reviewer #9: Yes

Reviewer #10: Yes

**********

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #2: No

Reviewer #3: Yes

Reviewer #4: No

Reviewer #5: Yes

Reviewer #6: No

Reviewer #7: Yes

Reviewer #8: Yes

Reviewer #9: No

Reviewer #10: Yes

**********

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: Improve on the following:

Problem statement

Theoretical background/framework

Use more studies in the literature review

PARTICULARLY, IMPLICATIONS ARE NOT ADEQUATELY DISCUSSED. THIS IS THE WEAKEST POINT.

Reviewer #2: Suggestions for improvement:

1) The Introduction and related works need to be revised and should emphasize the challenges and corresponding techniques.

2) Proposed implementation method lacks detailed information and proper explanation.

3) Fig. 3 needs to be written as an algorithm and explained step by step.

4) Results section can be further improved. Authors are recommended to evaluate their proposed method with the latest existing and add more performance evaluation metrics too.

Reviewer #3: Comments and Suggestions for Authors

The article describes a new algorithm is proposed that clusters sensor nodes in wireless sensor

networks using the bacterial foraging optimization algorithm to improve the energy consumption

problem.

Major comments:

It seems there is much room for improvement before the publication. I list my major comments on

the manuscript in the attached file.

Reviewer #4: The ID of the manuscript : PONE-21-15940

The title of the manuscript : Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink

Manuscript Summary :

In this work, a wireless sensor network routing algorithm is proposed. The proposed algorithm utilizes the ultra-innovative algorithm for bacterial Foraging and mobile sink, which leads to energy efficiency. In this work, two criteria are used to determine the number of sensor nodes, which are: the amount of energy on the battery surface and the distance to the sink as a head, which leads to the formation of regular clusters in the network. Within the network, nodes adopt a multi-step routing scheme to communicate with the sink. On WSNs with fixed sinks, nodes close to the sink are more likely than other nodes to share multi-step paths and focus data toward the sink and they drain their energy grid. Shutting down nodes leads to topology failure and disrupts the reporting of sensor data. To deal with this problem, the use of mobile sinks is used to be able to balance the load and help to consume uniform energy throughout the network. The proposed protocol operates in a distributed manner and can reduce energy consumption.

The manuscript is interesting; however, the following comment need to be addressed :

1 – Check the English grammar mistakes and correct them .

2 – The introduction section is a single paragraph, which makes it difficult to read. Try to divide it into several paragraphs .

3 – At the end of the introduction section, the contribution list should be included and stated clearly .

4 – In the related work section, recent algorithm need to be included such as:

[I] A. S. Al-Zubaidi, B. M. Mahmmod, S. H. Abdulhussain, and D. Al-Jumaeily, “Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network,” in Proceedings of the International Conference on Information and Communication Technology - ICICT ’19, 2019, pp. 96–101.

[II] Salem, Amer O. Abu, and Noor Shudifat. "Enhanced LEACH protocol for increasing a lifetime of WSNs." Personal and Ubiquitous Computing 23.5 (2019): 901-907.

5 – The paragraphs need to be divided into several paragraph for more readability .

6 – A table need to be included at the end of the related work section. The table summarizes the algorithm in the section as well as includes the highlights and limitations of each algorithm .

7 – symbol should be included in math mode not in regular text mode .

8 – soe equation are bold and not aligned correctly . please correct them .

9 – each variable in the manuscript need to be defined clearly .

10 – Try not to use “_”, the subscript can be used.

11 – Figures 1 need to be enlarged. In addition, the text is not clear inside the blue color, try to select clear colors .

12 – Figure 3 should be replaced by algorithm style. In addition, the algorithm is not clear and not given in a professional manner .

13 – more discussion about the results should be included .

14 – missing state of the art algorithm in the comparison . Try to include some .

Reviewer #5: May limit the length of the abstract.

'Related work' chapter is vast.

BFO is poor convergence behaviour - It is required to describe with respect your problem. What is the remedy you have taken etc..

What happened if you make it your algorithm as self adaptive. Though you are not implemented it, just describe what happened if it is incorporated. (Since it is crucial parameters in SFO)

Pictorial view of your problem may be included. (this will attract more viewers)

elimination is non-uniform or uniform?

How the test run is performed?

statistical tests need to be performed to determine the stability of the algorithm and identify the best value of the parameter.

Is it this is metaheuristic?

Your algo. is seems to be Multiobjective .....energy, distance etc - justify.

What is the strategy of E.coli in your algo.

BFO has advantages, such as parallel distributed processing, insensitivity to initial value, and global optimization. How these are helping your algorithm.

Reviewer #6: This paper suggests the use of heuristic optimization to select routes of data from sensor nodes to a sink node in a WSN with the goal of improving the energy efficiency of routing.

Major concerns:

The write up and presentation of the paper are poor; sometimes very poor to the extent that the description is incomprehensible.

The validation of the work is not sound. It is based entirely on comparing simulation results with a single work that was published just this year by one of the authors ignoring all other established works and results. It is also based on a single scenario and topology with no justification of parameter selection.

There are also several questionable points about the simulation setup and evaluation criteria. For example, how can sensor nodes transfer MB sized files and why is there a test for multimedia content as found in multimedia applications (when measuring media access delay). What type of sensor nodes are we talking about?

The novelty of the work is not clear at all. To the contrary, the same ideas have been presented many times even by at least one of the authors. I have noticed a common theme in the publications by the team where a series of the same ideas are presented using various metaheuristic algorithms and always benchmarking with a single work using the same simulation setup. This adds nothing more than noise to the body of knowledge.

There is no clear justification or analysis for the use of yet another bio-inspired optimization algorithm to select the paths from sensor nodes to sink nodes or to form clusters. The modeling part is not clear and incomprehensible: the cost function and parameter selection are not well-explained and not clearly justified. Parameters are given values that seem (off-the-shelf) with no explanation. In fact, the core optimization algorithm that is described as the proposed method is listed in figure 3 as a snapshot from a printed book!

The related work section has almost no value mainly because of the poor write up and lack of analysis or at least proper description that can be understood by the reader without referring to the original work. All the listed related work and their results have been ignored later on except one paper co-authored by one of the authors and used as the sole benchmark to validate and evaluate the simulation.

Reviewer #7: 1. The authors should select better algorithms in recent paper for the comparison of results.

2. Include the references from reputed journals for the past three years

3. The author should do the simulation with various number of nodes and areas.

Reviewer #8: The manuscript proposes an algorithm based on bacterial foraging for energy efficiency in wireless sensor network routing.

The method proposed is explained in detail and the simulation results are given. The results are compared to AFSRP method and they are superior.

There are few minor problems with the manuscript: Equations 3 and 4 have to be reorganized, they are misplaced; I guess Figure 2 has missing parts and it looks as Table rather than Figure: Figure 3 could be given as Table; The numbering of sections 4.3 and 5 are wrong. Section 2 is too long it can be shortened and a table could be given to ease the follow up of the literature.

Reviewer #9: Comments to the Author

In this paper Authors have discussed about a new algorithm to improve the energy

consumption problem by forming suitable clusters in the network. They use BFOA in their work. I am presenting my critical view of the work with the hope that the authors will appreciate the angle from which I am viewing the work and I am hoping that my view would help them in strengthening their work further.

1. Abstract needs to be compact and clearly describe the work.

2. In the introduction part the WSN must be explained using suitable pictures. It is also required to describe about the cluster design by using pictures.

3. The section-2 (Related work) must be re-written. In that section authors must describe only the published previous work without comparing their work. They can use a comparison table to compare their work with these published articles in a separate place. It will increase the readability of their work.

4. Some the abbreviation used without their full name anywhere in the paper. E.g. DCRRP.

5. Reference [8] is not cited in the text.

6. Figure -3 in the current form is not acceptable.

7. Authors may use the same font throughout their paper. e.g reference [18] is written in a different font.

Reviewer #10: In the manuscript the algorithm for routing in the wireless sensor network is proposed using the ultra- innovative algorithm for bacterial Foraging and mobile sink, which leads to energy efficiency, the number of sensor nodes is determined according to two criteria: the amount of energy on the battery surface and the distance to the sink.

The paper is well written. Here are few observations.

Include a separate subsection to highlight how your work differs from the available literature.

The block diagram has to be explained.

The simulation scenario such placing of nodes should be explained.

Practical applicability of the proposed optimization set up should be explored.

How do you compare with the state of art optimization methodologies.

Are the parameters given in Table 1 chosen randomly or experimentally, if so how does the choice effects the throughput performance.

The pseudocode is poorly represented.

The pseudocode should be explained, since there is lack of cordination between the methodology section and the pseudocode.

Proper citations to the equations should be given.

The paper must be corrected for typo and grammatical errors.

**********

6. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #2: No

Reviewer #3: Yes: HOSAM ALRAHHAL

Reviewer #4: No

Reviewer #5: No

Reviewer #6: Yes: Ahmed Al-Haiqi

Reviewer #7: Yes: Kalpana Murugan

Reviewer #8: No

Reviewer #9: Yes: Om Prakash Acharya

Reviewer #10: No

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

Attachment

Submitted filename: Comments and Suggestions for Authors _PONE.pdf

PLoS One. 2022 Mar 23;17(3):e0265113. doi: 10.1371/journal.pone.0265113.r002

Author response to Decision Letter 0


10 Sep 2021

September 02, 2021

Dear Dr. Ping He,

Re your email, I am writing to submit the revised version of the manuscript entitled “Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink ” (ID: PONE-D-21-15940 ).

I would like to take this opportunity to express my appreciation for the invaluable comments and suggestions which you and the reviewer kindly provided. I tried my best to revise the manuscript in accordance with the comments. Detailed corrections are listed below point by point. Also, I have highlighted the changes I made in the manuscript. I hope the revised form of the manuscript meets the expectation of the reviewers and is suitable for publication in “PLOS ONE.”

Thank you again for your consideration.

I am looking forward to reading from you.

Sincerely yours,

Dr. Sh.Tabatabaei

………………………………………………………………………………………………………

Responses to Comments

Reviewer

# Comment Response

Reviewer #1

1 The innovation and the motivation behind this work are not clearly highlighted. Please work on this and prove to us why this work is valuable. And the novelty of the proposed model is questionable. Correction was made and added innovation and the motivation this work in introduction.

2 The contributions and novelty of this paper are not listed in the introduction section Correction was made.

3 On page 8, the claim (Wireless sensor networks (WSNs) include small sensor nodes with battery and processing power and limited memory units. There are two important features of WSNs, one is infrastructure-free and the other is self-organizing.) need to be supported by references. Correction was made and the reference is added in the text.

4 The authors used a number of abbreviations without clarification the original words of these abbreviations, for example, but not limited to “DCRRP”, “OPNET”, “SFLA”, and “FIS” The original words of abbreviations“DCRRP”, “OPNET”, “SFLA”, and “FIS” are added.

5 On page 9, the claim (The advantage of this method is the use of an optimized aggressive weed algorithm that can adapt and be random and can quickly find the global optimal, as well as the use of a fuzzy inference model that has high accuracy. The disadvantage of this

method is the high processing cost due to the use of fuzzy logic with an aggressive weed algorithm.) need to be supported by references. Correction was made and the reference is added in the text.

6 The reference [8] is missed in the text. The reference [8] is added in the text.

7 OPNET 11.5 Simulator and BIFOA need references. Correction was made and the reference [24] is added for OPNET 11.5 also the reference [22] is added for BIFOA.

8 In general, The values of parameters (for example, s, p, Wattractant, dattractant , wrepllant, drepllant, the number of sensor nodes is 60, and the values in table 1 ) were selected arbitrarily. The authors provide no guidance on how and why to select these values, no references supported that. The simulation result of the proposed protocol is compared with the AFSRP (Artificial Fish Swarm Routing Protocol) then all parameter is similar with the reference [21]. Also, the reference [21] is added for the parameter in table 1.

9 Correct the writing ith, jth, and kth. Also, correct hrepllant -> hrepllant and Wreplant -> Wrepllant. Correction was made.

10 Equations1 and 2 need references. Correction was made and Equations 1 and 2 are referenced with [22].

11 In this sentence (In this regard, Wrepllant, Wattractant, Wattractant, dattractant are different coefficients that must be selected correctly.) Wattractant is repeated, maybe it must change to hrepllant . Correction was made and Wattractant changed to hrepllant .

12 On page 14, where is Equation 3-2? Correction was made and Equation 3-2 changed to Equation 2.

13 On page 14, the claim (However, because the Wattractant value is always considered less than the Wrepllant.) why? And needs to be supported by references. Correction was made and the reference is added.

14 In Figure 1, the direction of the arrow in the loop is needed. The direction of the arrow in the loop is added in Figure 1.

15 Adjust Equations 3 and 4. Also, adjust the format of Table 1. Correction was made.

16 On page 16, step 2, ie -> i.e. Correction was made.

17 On page 16, step 3, selects fifty percent, why? It needs a reference Because in the bacterial foraging optimization algorithm selects fifty percent of the bacteria, then we selects fifty percent in step 3, reference is added.

18 On page 17, step 4, ped -> Ped. Correction was made.

19 In step 6, if there is a malicious node, and participated in the process, what the effect on the proposed method, and how it treats this issue? With consideration, that the sink has a table content of IDs of all sensor nodes and the sink sends a notification message of being cluster head to cluster head sensors, then if malicious node want to participate in the process, sink detected it, and sends IDs of malicious node for all selected cluster head to not accept join request from this malicious node.

20 On page 17, (If the residual energy of the sprigs is more than 70% of their total initial energy,). Why you selected this value? This claim needs to support by references. Correction was made and the reference [9] is added. This sentence" If the residual energy of the sprigs is more than 70% of their total initial energy "is in reference [9].

21 On page 21, 3-4 Simulation results -> 4-3 Simulation results. Correction was made.

22 On page 21, simulation results subsection, on line 8, there is a comma (,) it must remove it. Correction was made and comma (,) removed.

23 What are the mobility and energy consumption models used in this paper? The mobility model is random, it is added to table 1 and energy consumption equation number 6 is added in the text.

24 Platform configuration and operating system are used to test run are also not stated very well. Platform configuration is show in fig 4 and we use Contiki operating system that it uses standard C and follows an event-driven programming model that added in the text.

25 In Figure 5, the values of the two methods are approximately similar, is that mean the proposed method not efficient when the value of pause time is high? The proposed method is efficient for all constant time or all simulation, also it is efficient when the value of time is high in figure 5 (energy consumption) shows only one pause time may the proposed method and the AFSRP method is maybe similar.

26 In Figures 5, and 6, the horizontal axis shows the simulation time or the pause time? In Figures 5, and 6, the horizontal axis shows the pause time.

27 In Figure 6, the values of end-to-end delay are approximately similar for all pause time values, is that mean end-to-end delay not affected by pause time? If yes, why you study it? Attention in Figure 6, for the proposed method the values of end-to-end delay for all pause time and all simulation time value is efficient and better than the AFSRP method.

28 The results in Figures 6 and 7 are questionable because when the value of pause time is small that means the mobility of the nodes in the network is high, so the probability to break the links between nodes will increase. As a result, the throughput will decrease and the delay will increase in proposed method all nodes is fixed and no mobility for the nodes only sink is mobiled in the network, other wise the sink will make a decision based on the residual energy of the sprigs in its table, If the residual energy of the sprigs is less than 70%, the sink moves to a denser area then the cluthe probability to break the links between nodes will decrease. As a result, the throughput will increase. also with the moves of sink toward denser area the cluster heads can send data with the nearest way to sink then decrease delay.

………………………………………………………………………………………………………

Attachment

Submitted filename: Response to Reviewers_tabataabei.doc

Decision Letter 1

Ping He

29 Nov 2021

PONE-D-21-15940R1Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sinkPLOS ONE

Dear Dr. Tabatabaei,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Jan 13 2022 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org. When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols. Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols.

We look forward to receiving your revised manuscript.

Kind regards,

Ping He, Ph.D.

Academic Editor

PLOS ONE

Additional Editor Comments:

The authors did not address any of the comments raised in previous round; thus, there are remains unsolved. Give the author one last chance to revise. If the author cannot complete the revision as required, the manuscript will be rejected for publication. This will be the final decision.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #3: (No Response)

Reviewer #4: (No Response)

Reviewer #5: All comments have been addressed

Reviewer #7: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #3: Partly

Reviewer #4: Partly

Reviewer #5: Partly

Reviewer #7: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: (No Response)

Reviewer #3: N/A

Reviewer #4: Yes

Reviewer #5: N/A

Reviewer #7: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #3: Yes

Reviewer #4: No

Reviewer #5: Yes

Reviewer #7: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #3: Yes

Reviewer #4: No

Reviewer #5: Yes

Reviewer #7: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The manuscript has improved and my comments are addressed particularly in terms of novelty, and purpose statement.

Reviewer #3: Minor comments:

1- The contributions and novelty of this paper are not listed in the introduction section.

2- Review the paper to be sure the font is the same for all the paper.

3- Adjust Equations1 and 2, also put their references in a suitable place. Also, for Equation 6.

4- Adjust Equations 3 and 4.

Reviewer #4: The ID of the manuscript : PONE-21-15940R1

The title of the manuscript : Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink

Manuscript Summary :

In this work, a wireless sensor network routing algorithm is proposed. The proposed algorithm utilizes the ultra-innovative algorithm for bacterial Foraging and mobile sink, which leads to energy efficiency. In this work, two criteria are used to determine the number of sensor nodes, which are: the amount of energy on the battery surface and the distance to the sink as a head, which leads to the formation of regular clusters in the network. Within the network, nodes adopt a multi-step routing scheme to communicate with the sink. On WSNs with fixed sinks, nodes close to the sink are more likely than other nodes to share multi-step paths and focus data toward the sink and they drain their energy grid. Shutting down nodes leads to topology failure and disrupts the reporting of sensor data. To deal with this problem, the use of mobile sinks is used to be able to balance the load and help to consume uniform energy throughout the network. The proposed protocol operates in a distributed manner and can reduce energy consumption.

The author misses to address the comments raised from the previous round.

The manuscript is interesting; however, the following comment need to be addressed :

1 – Check the English grammar mistakes and correct them .

2 – The introduction section is a single paragraph, which makes it difficult to read. Try to divide it into several paragraphs .

3 – At the end of the introduction section, the contribution list should be included and stated clearly .

4 – In the related work section, recent algorithm need to be included such as:

[I] A. S. Al-Zubaidi, et al. “Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network,” in Proceedings of the International Conference on Information and Communication Technology - ICICT ’19, 2019, pp. 96–101.

[II] Salem, Amer O. Abu, and Noor Shudifat. "Enhanced LEACH protocol for increasing a lifetime of WSNs." Personal and Ubiquitous Computing 23.5 (2019): 901-907.

5 – The paragraphs need to be divided into several paragraph for more readability .

6 – A table need to be included at the end of the related work section. The table summarizes the algorithm in the section as well as includes the highlights and limitations of each algorithm .

7 – symbol should be included in math mode not in regular text mode .

8 – some equation are bold and not aligned correctly . please correct them .

9 – each variable in the manuscript need to be defined clearly .

10 – Try not to use “_”, the subscript can be used.

11 – Figures 1 need to be enlarged. In addition, the text is not clear inside the blue color, try to select clear colors .

12 – Figure 3 should be replaced by algorithm style. In addition, the algorithm is not clear and not given in a professional manner .

13 – more discussion about the results should be included .

14 – missing state of the art algorithm in the comparison . Try to include some .

Reviewer #5: Too lengthy abstract. too many introduction. Check with Journal policy.

Check the literature After 2019.

Introduction section may split two or three paragraphs.

Introduction must summarize the existing method's limitations. and then your highlighted contributions.

Figure 2 is similar to table?

Equations should be properly edited. (i.e) 3, 4 etc

Figure 3 should be typed version. Not In the present format.

Since the energy is major focus of your work

- Analyse should include energy vs no of nodes /Analyse should include energy vs no of sensors

- Analyse should include energy vs distance

- Analyse should include energy vs simulation time

Illustration of your work or general block diagram of your approach must be given

Reviewer #7: 1. The innovation and the motivation behind this work are clearly highlighted.

2. The manuscript technically sound piece of scientific research with data that supports the conclusions.

3. Methodology was clearly mentioned with appropriate technique.

4. The author changed the manuscript in response to the reviewer's suggestions.

5. The flow of the concept in an understandable manner.

6. Hence, the paper can be accepted.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: Yes: Mansour Amini ( Universiti Sains Malaysia)

Reviewer #3: Yes: HOSAM ALRAHHAL

Reviewer #4: No

Reviewer #5: No

Reviewer #7: Yes: Kalpana Murugan

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/. PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org. Please note that Supporting Information files do not need this step.

PLoS One. 2022 Mar 23;17(3):e0265113. doi: 10.1371/journal.pone.0265113.r004

Author response to Decision Letter 1


23 Dec 2021

Dear Dr. Ping He,

Re your email, I am writing to submit the revised version of the manuscript entitled “Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink ” (ID: PONE-D-21-15940R1 ).

I would like to take this opportunity to express my appreciation for the invaluable comments and suggestions which you and the reviewer kindly provided. I tried my best to revise the manuscript in accordance with the comments. Detailed corrections are listed below point by point. Also, I have highlighted the changes I made in the manuscript. I hope the revised form of the manuscript meets the expectation of the reviewers and is suitable for publication in “PLOS ONE.”

Thank you again for your consideration.

I am looking forward to reading from you.

Sincerely yours,

Dr. Sh.Tabatabaei

Attachment

Submitted filename: Response to Reviewers_tabataabei2.doc

Decision Letter 2

Chakchai So-In

24 Feb 2022

Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink

PONE-D-21-15940R2

Dear Dr. Tabatabaei,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/, click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Chakchai So-In, Ph.D.

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: All comments have been addressed

Reviewer #3: All comments have been addressed

Reviewer #4: All comments have been addressed

Reviewer #5: All comments have been addressed

**********

2. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: Yes

**********

3. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: Yes

Reviewer #3: N/A

Reviewer #4: Yes

Reviewer #5: Yes

**********

4. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: Yes

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: Yes

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

Reviewer #3: Yes

Reviewer #4: Yes

Reviewer #5: Yes

**********

6. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: The title needs to be revised, especially the word "provide" at the beginning of the title. Most of my previous comments have been addressed by the author.

Reviewer #3: Comments to the Author

1)I suggest thinking -optionally- about the title as "Energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink ".

2) Equations 3, 4 are not aligned correctly.

Reviewer #4: The ID of the manuscript : PONE-21-15940 – R2

The title of the manuscript : Provide energy-aware routing protocol in wireless sensor networks using bacterial foraging optimization algorithm and mobile sink

Manuscript Summary :

In this work, a wireless sensor network routing algorithm is proposed. The proposed algorithm utilizes the ultra-innovative algorithm for bacterial Foraging and mobile sink, which leads to energy efficiency. In this work, two criteria are used to determine the number of sensor nodes, which are: the amount of energy on the battery surface and the distance to the sink as a head, which leads to the formation of regular clusters in the network. Within the network, nodes adopt a multi-step routing scheme to communicate with the sink. On WSNs with fixed sinks, nodes close to the sink are more likely than other nodes to share multi-step paths and focus data toward the sink and they drain their energy grid. Shutting down nodes leads to topology failure and disrupts the reporting of sensor data. To deal with this problem, the use of mobile sinks is used to be able to balance the load and help to consume uniform energy throughout the network. The proposed protocol operates in a distributed manner and can reduce energy consumption.

The authors have addressed all the raised comments. The manuscript can be accepted .

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Reviewer #5: Contributions can be highlighted.

Differences between the suggested method and existing method can be tabulated.

**********

7. PLOS authors have the option to publish the peer review history of their article (what does this mean?). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy.

Reviewer #1: No

Reviewer #3: Yes: HOSAM ALRAHHAL

Reviewer #4: No

Reviewer #5: No

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Dataset

    (RAR)

    Attachment

    Submitted filename: Comments and Suggestions for Authors _PONE.pdf

    Attachment

    Submitted filename: Response to Reviewers_tabataabei.doc

    Attachment

    Submitted filename: Response to Reviewers_tabataabei2.doc

    Data Availability Statement

    All relevant data are within the manuscript and its Supporting information files. Public data set: https://figshare.com/articles/dataset/Data_sets_rar/17430710 Public DOI for Data set:10.6084/m9.figshare.17430710.


    Articles from PLoS ONE are provided here courtesy of PLOS

    RESOURCES