<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Energy Efficient Routing in Wireless Sensor Network Using Ant Colony Optimization and Firefly Algorithm</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>M. Okwori, M.E. Bima</institution>
          ,
          <addr-line>O.C. Inalegwu, M. Saidu, W.M. Audu</addr-line>
          ,
          <institution>U. Abdullahi Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>236</fpage>
      <lpage>242</lpage>
      <abstract>
        <p>-Energy conservation in Wireless Sensor Networks (WSN) is a crucial venture as their miniaturize nature limits their power capabilities. An effective way of energy conservation is the adoption of efficient routing of data from source to sink. This work investigates the performance of two meta-heuristic algorithms, Ant Colony Optimization (ACO) and Firefly Algorithm (FA) on optimal route detection in a WSN routing management system. An adapted ACO was used to search for optimal routes between selected source and sink nodes, after which a developed Discrete FA ran same search. Performance of both were tested on sensor networks deployed randomly, in a clustered pattern and finally randomly-clustered. Evaluators used were energy budget of reported routes. Results show that FA was able detect routes with less cost than those detected by ACO for short routes while ACO performed better with longer routes. Considering the enhanced speed of performance of ACO in comparison to FA and the local search nature of FA, it would be beneficial for future work to explore a hybridized FA-ACO algorithm.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Wireless Sensor Networks (WSN) are a collection of small
devices working together to capture/monitor a particular
phenomenon of interest. They find useful applications in
home automation, disasters and environmental monitoring,
military operations, multiple target tracking, security
surveillance, health services and other commercial purposes [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Energy management in WSN is crucial as their usefulness is
dependent on how long they are alive and replacement is
difficult as deployment area usually is not easily accessible.
As such a lot of techniques are employed to prolong their
lifespan, these include topology management schemes (can
be location-driven or connection driven), power management
(sleep/wakeup protocols and MAC protocols), data
reduction schemes (data compression and in-network
processing), energy efficient data acquisition and sending (adaptive
sampling, hierarchical sampling and efficient routing) and
mobility based schemes (such as mobile sink and mobile
relay) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. This work presents an investigation of efficient
routing in WSN.
      </p>
      <p>
        Routing in WSN is handled differently from what is
obtainable in traditional wireless networks. This is because
of the limited resources available in sensors, and as such any
routing technique deployed in WSNs should minimize energy
consumption and ultimately maximize network lifetime [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
Generally the many WSN efficient routing schemes can be
categorized into network structure, communication models,
topology based and reliable routing schemes. The network
structure protocols on which this paper is based takes into
consideration how the nodes are interconnected and routes
used to send data to destination from source. They are
further classed into flat protocols, hierarchical protocols and
location based protocols [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This paper investigates energy
optimization of a location based routing protocol using
metaheuristic algorithms.
      </p>
      <p>Meta-heuristic algorithms are designed to mimic natural
phenomena as they randomly search through a space for
the optimum solution subject to preconfigured constraints. In
this paper we use two of such algorithms, Firefly algorithm
and the Ant Colony algorithm, to find the optimal path that
minimizes the total energy expended in sending a data packet
from source to sink. First, a review of related works is
presented in section II. A description of the optimization
problem and detailed report of two methods of route
optimization based on each algorithm is outlined in section III.
A Vehicle Routing Problem with Time Windows (VRPTW)
dataset was used to test and evaluate the performance of the
algorithms, after which comparison is made between the two
algorithms in section IV. Section V presents the conclusions
of the investigation</p>
    </sec>
    <sec id="sec-2">
      <title>II. RELATED WORKS</title>
      <p>A. Related Work on Routing Protocol in WSN</p>
      <p>
        A wireless sensor network (WSN) consists of sensor nodes
which are distributed around a given location. These sensors
have limited energy capability to stay alive for a long period
of time [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Although, over the years, sensors have improved
in their computational capabilities, the batteries are still
highly inefficient in comparison. Consequently, in an effort
to extend the life of a sensor node, research has been pointed
towards reducing the energy demand of the nodes. This same discrete algorithm was also applied by the authors to
is obviously because the core design aspects in a WSN are solve the manufacturing cell formation problem [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
Energy Efficiency and Reliability [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Energy Efficient (EE) Firefly algorithm was used for routing optimization in
Routing has been mentioned in the literature as a means WSN in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. A novel fitness function depending on residual
of extending the life of a sensor node[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Since energy is energy, node degree and distance was proposed, and then
expended during transmission, the most energyefficient route optimized. Results showed superior performance to some
during transmission will consume the least energy. This has stated existing routing algorithms.
engendered EE routing protocol for WSNs. Another interesting work combined firefly algorithm with
      </p>
      <p>
        Basically, routing protocols for WSN are classified into flat the gossip algorithm and applied it to WSN to investigate
protocol, hierarchical protocol and location based Protocol time of sensor synchronization and data convergence rate
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In Flat protocol routing scheme, nodes are distributed [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. The impact of hybrid algorithm was investigated on
uniformly; with none performing a leading role; to transmit a live network to find out how simulation results correlate
data in a cooperative manner i.e. transmitting to the next with live field applications. Conclusion drawn from results
neighbor. In the case of the hierarchical scheme, nodes are obtained indicate that assumptions such as fireflies
commugiven varying roles and groups known as clusters [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Each nicating at the speed of light and the low latency due to fast
cluster must have a Cluster Head (CH) which is a node that processing speed is not applicable in a live networks where
has higher capabilities than other nodes and is used to relay much higher latency is expected. A wide range of application
data to the sink node. Within a distribution of nodes, there in diverse fields are presented in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
may be many possible routes to get to a particular destination.
      </p>
      <p>
        Mathematical models were developed in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] to determine the C. Review of Ant Colony Optimization Related Work
most energy efficient route to use in a WSN under resource An Adaptive Ant Colony Optimization (ACO) algorithm
restriction. The task of determining the most energy efficient is proposed in [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] for clustering based dynamic routing in a
route is a hard optimization problem [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Consequently, WSN. This was designed to take into consideration the
unpremany meta-heuristic techniques have been developed to find dictable nature of a Wireless Sensor Network. Sensors nodes
the most optimal energy efficient route. can be deployed in either a sparse or dense nature. The ACO
      </p>
      <p>
        Artificial Bee Colony meta-heuristics algorithm [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and finds the optimal network setting in order to improve data
improved harmony search algorithm [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] were used to de- aggregation thereby reducing data redundancy. An adaptive
termine the optimal energy efficient route in a WSN. An routing scheme based on ACO was also developed in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
Improved Genetic Algorithm was developed to eliminate the Route selection is based on the residue energy inn the nodes
possibility of choosing an invalid note for routing in a WSN as well as the location of nodes. In this case, clusters were
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Parameters used in the node selection include nodes not used in the grouping of nodes.
position in relation to sink, neighboring nodes, remaining Fuzzy logic was used in addition to ACO in [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] in a
crossenergy and energy requirement. Since this research work layer WSN protocol stack to optimize routing in a WSN. To
was based on using Firefly and Ant Colony optimization improve EE of the routing protocol, a multilayer approach
algorithms for route optimization, the literature will be based was adopted. Nodes were grouped into clusters with cluster
on them. heads which are closest to the sink. Fuzzy logic was used
in the cluster head selection using metrics such as residual
B. Review of Firefly Related Work energy, number of neighbors and quality of communication
link for the selection. However, ACO was used for reliable
and energy efficient inter-cluster routing from cluster heads
to sinks.
      </p>
      <p>
        ACO was further used to determine a multi-objective
optimization i.e. energy efficiency and security of transmitted
data [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] in a WSN. The factors used to carry out this include
the time delay, bandwidth and the energy consumption.
      </p>
      <p>
        Neural Network was used together with ACO to for the
purpose of routing in [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. The neural network is used to
select the cluster head while ACO was used to determine
best route. An ACO was used to develop an enhanced routing
protocol for WSN [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] with mobility as the metric.
      </p>
      <p>
        Firefly optimization algorithm, which is presented in more
detail in section III have been used to solve several research
optimizations in literature. These work include, but not
limited to a wide range of issues in the field of engineering
design problems, image processing, identification and
clustering, and software testing [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. A review of some of its
application is hereby presented.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], the authors modified the original firefly algorithm
by discretizing it and applying several novel route operators
to solve the Vehicle Routing Problem with Time Windows
(VRPTW). Results presented showed that the developed
Evolutionary Discrete Firefly Algorithm (EDFA) is promising
compared to other versions of EDFAs. Another discrete
firefly algorithm, using the sigmoidal logistic function is
presented in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], is used to find the optimal solution to
permutation flow shop minimizing the makespan. The problem
is NP-hard and formulated as a mixed integer programming.
      </p>
      <p>Results revealed superior performance to the ant colony. This</p>
    </sec>
    <sec id="sec-3">
      <title>III. METHODOLOGY</title>
      <p>
        This section presents details about how the Firefly
algorithm (FA) and Ant Colony optimization (ACO)
algorithms are used to optimize the selection of energy efficient
route between two nodes. The objective function used for
optimization was derived from [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. It requires finding the
route with the least energy consumption and maintaining
the energy limitation of the nodes. Consequently, the next
section provides details about the input parameters for the
developed algorithm i.e. the objective function and defined
constraints. When a node wants to transmit, it searches for
the most optimal route to use for the transmission. Fig. 1
shows an overview of the link between source and sink nodes.
Subsequent sections provide details on the FA and the ACO
techniques adopted.
      </p>
      <p>The model considers multi-period transmissions from
nodes and aims at prolonging the lifetime of the WSN. It
is assumed that there are n number of nodes distributed
randomly around an area with each node having a limited
energy with an initial value of ei0. The equation for the
optimization process is represented in equation 1 where ej
is the energy at the next hop node.</p>
      <p>min(X ei0</p>
      <p>X ej )</p>
      <p>Equation 2 is used to determine the amount of energy
consumed during transmission from source to destination
node. Where cw is the energy used to wake nodes for
transmission and ct is the energy expended by a node to
transmit to the next hop node i.e. a node directly linked.
This direct transmission is constrained by a a linking distance
which is a maximum distance (ld) within which nodes can
transmit. Therefore, two nodes i and j that are dij distance
away from each other can only communicate directly if
dij&lt;ld. Such nodes will be considered to be linked where Xij
represents the connect between node i and j. Xij= 1 means
there is a link between i and j otherwise, Xij = 0 this is shown
in equations 3 and 4.</p>
      <p>Eit</p>
      <p>Eit 1 + cw X</p>
      <p>Xijt + ct X dij Xijt = 0
dij = p(Dx[i]</p>
      <p>Dx[j])2
(Dy[i]</p>
      <p>Dy[j])2
where Dx is the x coordinate of the node (i or j) while Dy
is the y coordinate of the node (i or j).</p>
      <p>Xij =
(1
0
dij &lt; ld</p>
      <p>Otherwise</p>
      <p>Furthermore, nodes are required to have enough energy for
transmission to the next hop neighbor Ei &lt; Eij where Ei is
the remaining energy in node i and Eij is the energy required
to transmit from node i to next hop node j.
(1)
(2)
(3)
(4)</p>
      <sec id="sec-3-1">
        <title>B. Ant Colony Optimization Algorithm</title>
        <p>In this section, we present the use of ant colony
optimization (ACO) algorithm for the selection of the optimal energy
efficient route. The pheromone secreted along the selected
path is based on the equation (5) which shows the inverse
relationship between the deposited pheromone and the cost.
'(i; j) = '(i; j) +</p>
        <p>Q
cost(k)</p>
        <p>Where ' is the deposited pheromone, i= source node, j
= destination node, k = selected ant and Q is a constant.
Subsequent ants are most likely going to select the path with
the most pheromone along its trail. This is represented in the
equation (6)</p>
        <p>P (i; j) =</p>
        <p>['(i;j)]
['(i;j)] + ['(i;k)]
A colony of ants (P) is generated to find possible solutions
subject to the condition of least energy consumption along
a selected path. The decision at each node on which path to
select next is made using a Roulette Wheel Selection
algorithm. The pseudocode for the ACO is shown in Algorithm
1.</p>
        <p>Algorithm 1 Ant Colony Optimization Algorithm
While termination condition is not met</p>
        <p>For each ant k=1 to P,</p>
        <p>Move ant(k) until it gets to destination</p>
        <p>Compute the cost of the route using the objective
function</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Compare cost with best route</title>
      <p>If lower,</p>
      <p>overwrite best route with new route,
Else</p>
      <p>maintain best route
End If
(5)
(6)</p>
      <p>End For
Use best route to transmit data
Update pheromone trail
Perform evaporation
End While</p>
      <sec id="sec-4-1">
        <title>C. Firefly Related Algorithm</title>
        <p>
          The firefly algorithm is a highly efficient algorithm that
mimics the social behavior of fireflies and was introduced
in 2009 [
          <xref ref-type="bibr" rid="ref25">25</xref>
          ]. The original algorithm was formulated to
solve continuous optimization problems and works based on
three assumptions of the behaviors of the fireflies stated in
[
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. A population of fireflies is randomly generated and
each generation evaluates its fitness based on a set objective
function. The fitter fireflies attract other less fit in close
proximity to it. The movement of each firefly towards the
fitter fly is guided by equation 7.
        </p>
        <p>xt+1 = xit + 0e
i
2
rij (xtj
xit) +
t
i
(7)</p>
        <p>
          The first term is the position of the firefly in the subsequent
round, the second term (due to attraction) is the movement
towards a better firefly dependent on the distance, rij , of
firefly xi to xj, the coefficient of absorption, b0 and the
attraction coefficient g. The last term is the randomization
parameter which determines the degree of exploitation of
the search space. Detailed explanation of each parameter and
setting is presented in [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ].
        </p>
        <p>In this work, the Firefly Algorithm was modified to handle
the discrete problem of route selection. First, the fireflies
search for feasible routes by using incremental dimensions
(d) until a feasible route is found. This is then used to
generate three initial population C1, C2, and C3 shown in
equations 8, 9 and 10.</p>
        <p>0 Pij
C1 = BBB@ Pij...+1</p>
        <p>Pin
0 Pij
C2 = BB@B Pij...+1</p>
        <p>Pin
0 Pij
C3 = BB@B Pij...+1</p>
        <p>Pin</p>
        <p>j
Pi+1
Pij++11
.
.</p>
        <p>.</p>
        <p>Pin+1</p>
        <p>j
Pi+1
Pij++11
.
.</p>
        <p>.</p>
        <p>Pin+1</p>
        <p>j
Pi+1
Pij++11
.
.</p>
        <p>.</p>
        <p>Pin+1</p>
        <p>P j 1
Pdj+21
d 2 C
... ACC
P n</p>
        <p>d 2
P j 1
Pdj+11
d 1 C
... CAC
P n
d 1</p>
        <p>Pdj 1
Pdj...+1 CCCA
P n
d</p>
        <p>In the matrices, n i s the number of fireflied, each value
P2f1,2......Ng and N is the number of sensors. Luster C1
and C2 search for routes shorter and longer than the feasible
route while C3 searches for route of same length. The three
clusters were the fed to the firefly algorithm for final test, with
a retest of teh C1 and C2 for a feasible route. Two fitness
functions were then used to initiate movement in fireflies and
perform the search for the best firefly, ffg n(x) and g(x). See
equations 11and 12.</p>
        <p>fi(x) = E(Pi ! Pi+1)
g(x) =
d 1
X E(Pi ! Pi+1)
i=1
where i=1,2,......No. of iterations and is set not less than
the dimension of each population</p>
        <p>f i(x) is the energy expended by Pi in sending data to Pi+1 for
iteration i. and
g(x) is the total energy expended along a route.</p>
        <p>The pseudocode of the modified firefly and parameter
setting is shown in Algorithm 2.
(8)
(9)
(10)
(11)
(12)</p>
        <p>Algorithm 2 Pseudocode for Firefly Algorithm
Initial population of n fireflies x(t)=[x 1,x 2. . . . . . ..x d]
Divide population into 3 clusters
Generate objective function fn(x),
Generate objective function g(x)
Light intensity Ii determined by g(x)
Define light absorption coefficient
For k=1:n</p>
        <p>While (t&lt;MaxGeneration),</p>
        <p>If g(k ) = inf</p>
        <p>Mutate k to new k using b0=0, and b0=1,
for invalid and valid nodes for each x (i ) respectively.</p>
        <p>Each x (i )moves probabilistically towards the valid
nodes closest to it.</p>
        <p>If g(new k) &lt; g(best k)
best k = new k</p>
        <p>End If</p>
        <p>End If</p>
        <p>End While
End for k
Report best k as final route
Post process results and visualization</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>IV. RESULTS AND DISCUSSION</title>
      <p>The developed algorithms were tested using VRPTW
dataset with 100 nodes being considered. Source and sink
nodes were selected at random and the algorithms are tasked
with finding a route with the least possible energy
consumption i.e. Cost. The number of iterations for the algorithm were
set at 200, 150, 100 and 50. The results were observed to
determine which algorithm performed best as the number of
iterations increased. Furthermore, 1000 individuals were
considered for both Algorithms and 3 different VRPTW datasets
were considered namely: the Random (R1), Clustered (C1)
and Random-Clustered (RC1). The values for the constraints
of the objective function are shown in Table I. The results
obtained are shown in Tables II, III and IV.</p>
      <p>For the randomly distributed sensors, the results show that
as the number of iterations increased, the performance of Ant
Colony Optimization (ACO) increased while that of Firefly
Algorithm (FA) remained same (See Table II). FA performed
better than ACO in finding routes under the random dataset.
It therefore can be inferred that for problems where the
solutions are randomly distributed in a search space, FA
would be the recommended algorithm to use.</p>
      <p>In the clustered scenario, it was observed that as the
number of iterations increased, FA quickly converged towards
the best observed route while ACO converges slowly towards
the same route. This is shown in Table III. The performance
of FA was therefore, better than ACO in finding routes in the
clustered dataset.</p>
      <p>The performance of ACO improved in the
RandomClustered dataset and even performed better than FA in
finding long routes. It can also be seen from Table IV that
both ACO and FA have improved performance as the number
of iteration increases.</p>
      <p>Furthermore, it should be noted that both ACO and FA
algorithms are statistical in nature thus they often provide
different results after a number of runs. Therefore, the
algorithms were subjected to multiple iterations. Even though FA
performed generally better than ACO, it should be noted that
there were also numerous instances where ACO performed
better than FA in discovering an energy efficient route.</p>
    </sec>
    <sec id="sec-6">
      <title>V. CONCLUSION</title>
      <p>In this paper, an investigation into the performance of two
meta-heuristic algorithms for energy efficient route discovery
was presented. These algorithms are the Firefly Algorithm
(FA) and the Ant Colony Optimization (ACO) Algorithm.
VRPTW dataset was used to generate nodes to be deployed in
a Wireless Sensor Network (WSN) setting and the algorithms
are to find the best route that costs the least amount of energy
to transmit data. It can be seen from the results presented that
FA performed better than ACO in discovering short routes
while ACO performed better than FA in discovering long
routes. Furthermore, it was observed that ACO was faster
at detecting the routes in comparison to FA. This speed
can be attributed to the local search nature of FA which is
not applicable in the applied ACO algorithm. Consequently,
it is suggested that future works should explore equipping
ACO with local search functionality in order to enhance
its performance. Therefore, applying a hybridized FA-ACO
algorithm with a WSN deployment is proposed.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>A.-B. Garc</surname>
          </string-name>
          <article-title>´ıa-</article-title>
          <string-name>
            <surname>Hernando</surname>
            ,
            <given-names>J.-F.</given-names>
          </string-name>
          <string-name>
            <surname>Mart</surname>
          </string-name>
          <article-title>´ınez-</article-title>
          <string-name>
            <surname>Ortega</surname>
          </string-name>
          , J.
          <string-name>
            <surname>-M. Lo</surname>
          </string-name>
          <article-title>´pez-</article-title>
          <string-name>
            <surname>Navarro</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Prayati</surname>
            , and
            <given-names>L.</given-names>
          </string-name>
          <article-title>Redondo-Lo´pez, Problem Solving for Wireless Sensor Networks</article-title>
          , vol.
          <volume>58</volume>
          of Computer Communications and Networks. London: Springer London, dec
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Saidu</surname>
          </string-name>
          , E. Onwuka,
          <string-name>
            <given-names>M.</given-names>
            <surname>Okwori</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Umar</surname>
          </string-name>
          , “
          <article-title>An Enhanced LEACH Routing Algorithm for Energy Conservation in A Wireless Sensor Network</article-title>
          ,”
          <source>International Journal of Wireless and Microwave Technologies</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>59</fpage>
          -
          <lpage>71</lpage>
          , jul
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>G.</given-names>
            <surname>Anastasi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Conti</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Di Francesco, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Passarella</surname>
          </string-name>
          , “
          <article-title>Energy conservation in wireless sensor networks: A survey,” Ad Hoc Networks</article-title>
          , vol.
          <volume>7</volume>
          , pp.
          <fpage>537</fpage>
          -
          <lpage>568</lpage>
          , may
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Pantazis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Nikolidakis</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D. D.</given-names>
            <surname>Vergados</surname>
          </string-name>
          , “
          <article-title>EnergyEfficient Routing Protocols in Wireless Sensor Networks: A Survey,”</article-title>
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          , vol.
          <volume>15</volume>
          , pp.
          <fpage>551</fpage>
          -
          <lpage>591</lpage>
          , jan
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V. K.</given-names>
            <surname>Arora</surname>
          </string-name>
          (Research Scholar),
          <string-name>
            <given-names>V.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Sachdeva</surname>
          </string-name>
          , “
          <article-title>A survey on LEACH and other's routing protocols in wireless sensor network</article-title>
          ,” Optik - International
          <source>Journal for Light and Electron Optics</source>
          , vol.
          <volume>127</volume>
          , pp.
          <fpage>6590</fpage>
          -
          <lpage>6600</lpage>
          , aug
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N. Z.</given-names>
            <surname>Zenia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Aseeri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. I.</given-names>
            <surname>Chowdhury</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Shamim Kaiser</surname>
          </string-name>
          , “
          <article-title>Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey</article-title>
          ,
          <source>” Journal of Network and Computer Applications</source>
          , vol.
          <volume>71</volume>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>85</lpage>
          , aug
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>A Survey on Energy Efficient Routing in Wireless Sensor Networks</article-title>
          ,”
          <source>International Journal of Advanced Research in Computer Science and Software Engineering Research</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>7</issue>
          , pp.
          <fpage>184</fpage>
          -
          <lpage>189</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cui</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Gao</surname>
          </string-name>
          , “
          <article-title>A Cluster-Based Algorithm for Energy-Efficient Routing in Wireless Sensor Networks</article-title>
          ,” in
          <source>2010 International Forum on Information Technology and Applications</source>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>103</lpage>
          , IEEE, jul
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.-h.</given-names>
            <surname>Lee</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Moon</surname>
          </string-name>
          , “
          <article-title>Modeling and optimization of energy efficient routing in wireless sensor networks</article-title>
          ,
          <source>” Applied Mathematical Modelling</source>
          , vol.
          <volume>38</volume>
          , pp.
          <fpage>2280</fpage>
          -
          <lpage>2289</lpage>
          , apr
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Xiong</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pan</surname>
          </string-name>
          , “
          <article-title>Ant Colony OptimizationBased Location-Aware Routing for Wireless Sensor Networks,” in Wireless Algorithms</article-title>
          , Systems, and Applications, pp.
          <fpage>109</fpage>
          -
          <lpage>120</lpage>
          , Berlin, Heidelberg: Springer Berlin Heidelberg,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. A. A.</given-names>
            <surname>Ari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. O.</given-names>
            <surname>Yenke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Labraoui</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Damakoa, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gueroui</surname>
          </string-name>
          , “
          <article-title>A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach</article-title>
          ,
          <source>” Journal of Network and Computer Applications</source>
          , vol.
          <volume>69</volume>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>97</lpage>
          , jul
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zeng</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dong</surname>
          </string-name>
          , “
          <article-title>An improved harmony search based energyefficient routing algorithm for wireless sensor networks</article-title>
          ,
          <source>” Applied Soft Computing</source>
          , vol.
          <volume>41</volume>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>147</lpage>
          , apr
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Yao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Dong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wen</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ren</surname>
          </string-name>
          , “
          <article-title>A Routing Optimization Strategy for Wireless Sensor Networks Based on Improved Genetic Algorithm,”</article-title>
          <source>Journal of Applied Science and Engineering</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>221</fpage>
          -
          <lpage>228</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>X.-S.</given-names>
            <surname>Yang</surname>
          </string-name>
          , “Firefly Algorithms,” in Nature-Inspired
          <source>Optimization Algorithms</source>
          , pp.
          <fpage>111</fpage>
          -
          <lpage>127</lpage>
          , Elsevier,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>E.</given-names>
            <surname>Osaba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Carballedo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.-S.</given-names>
            <surname>Yang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Diaz</surname>
          </string-name>
          , “
          <article-title>An Evolutionary Discrete Firefly Algorithm with Novel Operators for Solving the Vehicle Routing Problem with Time Windows,” in Studies in Computational Intelligence</article-title>
          , vol.
          <volume>637</volume>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>41</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>M. K. Sayadi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Ramezanian</surname>
            , and
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Ghaffari-Nasab</surname>
          </string-name>
          ,
          <article-title>“A discrete firefly meta-heuristic with local search for makespan minimization in permutation flow shop scheduling problems</article-title>
          ,”
          <source>International Journal of Industrial Engineering Computations</source>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          , jul
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. K. Sayadi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Hafezalkotob</surname>
            , and
            <given-names>S. G. J.</given-names>
          </string-name>
          <string-name>
            <surname>Naini</surname>
          </string-name>
          , “
          <article-title>Firefly-inspired algorithm for discrete optimization problems: An application to manufacturing cell formation</article-title>
          ,
          <source>” Journal of Manufacturing Systems</source>
          , vol.
          <volume>32</volume>
          , pp.
          <fpage>78</fpage>
          -
          <lpage>84</lpage>
          , jan
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lalwani</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Ganguli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Banka</surname>
          </string-name>
          , “FARW :
          <article-title>Firefly Algorithm for Routing in Wireless Sensor Networks</article-title>
          ,” pp.
          <fpage>248</fpage>
          -
          <lpage>252</lpage>
          , IEEE,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.</given-names>
            <surname>Fister</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X. S.</given-names>
            <surname>Yang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Brest</surname>
          </string-name>
          , “
          <article-title>A comprehensive review of firefly algorithms</article-title>
          ,
          <source>” Swarm and Evolutionary Computation</source>
          , vol.
          <volume>13</volume>
          , pp.
          <fpage>34</fpage>
          -
          <lpage>46</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ye</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Mohamadian</surname>
          </string-name>
          , “
          <article-title>Adaptive Clustering based Dynamic Routing of Wireless Sensor Networks via Generalized Ant Colony Optimization,” IERI Procedia</article-title>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>2</fpage>
          -
          <lpage>10</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gajjar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sarkar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Dasgupta</surname>
          </string-name>
          , “FAMACRO:
          <article-title>Fuzzy and Ant Colony Optimization Based MAC/Routing Cross-layer Protocol for Wireless Sensor Networks,” Procedia Computer Science</article-title>
          , vol.
          <volume>46</volume>
          , no.
          <source>Icict</source>
          <year>2014</year>
          , pp.
          <fpage>1014</fpage>
          -
          <lpage>1021</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Zhong</surname>
            <given-names>Luo</given-names>
          </string-name>
          , Liuzheng Lu, Jianqun Xie, and Jinrong He, “
          <article-title>An ant colony optimization-based trustful routing algorithm for wireless sensor networks</article-title>
          ,
          <source>” in 2015 4th International Conference on Computer Science and Network Technology (ICCSNT)</source>
          , pp.
          <fpage>1128</fpage>
          -
          <lpage>1131</lpage>
          , IEEE, dec
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>T.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ruan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and J.-U. Kim, “
          <article-title>An Improved PEGASIS Protocol for Wireless Sensor Network,”</article-title>
          <source>in 2015 3rd International Conference on Computer and Computing Science (COMCOMS)</source>
          , pp.
          <fpage>16</fpage>
          -
          <lpage>19</lpage>
          , IEEE, oct
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Umadevi</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Devapriya</surname>
          </string-name>
          , “
          <article-title>An Enhanced Ant Colony Based Approach to Optimize the Usage of Critical Node in Wireless Sensor Networks,” Procedia Computer Science</article-title>
          , vol.
          <volume>47</volume>
          , no. C, pp.
          <fpage>452</fpage>
          -
          <lpage>459</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>X.-S.</given-names>
            <surname>Yang</surname>
          </string-name>
          , “Firefly Algorithms for Multimodal Optimization,
          <source>” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          , vol.
          <volume>5792</volume>
          LNCS, pp.
          <fpage>169</fpage>
          -
          <lpage>178</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Arora</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          , “
          <article-title>The Firefly Optimization Algorithm : Convergence Analysis</article-title>
          and
          <string-name>
            <given-names>Parameter</given-names>
            <surname>Selection</surname>
          </string-name>
          ,”
          <source>International Journal of Computer Applications</source>
          , vol.
          <volume>69</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>48</fpage>
          -
          <lpage>52</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>