Data Collection in Resource-Limited Networks (WSNs, IoT, Sensor Cloud)View this Special Issue
DMTC: Optimize Energy Consumption in Dynamic Wireless Sensor Network Based on Fog Computing and Fuzzy Multiple Attribute Decision-Making
Advances in wireless technologies and small computing devices, wireless sensor networks can be superior technology in many applications. Energy supply constraints are one of the most critical measures because they limit the operation of the sensor network; therefore, the optimal use of node energy has always been one of the biggest challenges in wireless sensor networks. Moreover, due to the limited lifespan of nodes in WSN and energy management, increasing network life is one of the most critical challenges in WSN. In this investigation, two computational distributions are presented for a dynamic wireless sensor network; in this fog-based system, computing load was distributed using the optimistic and blind method between fog networks. The presented method with the main four steps is called Distribution-Map-Transfer-Combination (DMTC) method. Also, Fuzzy Multiple Attribute Decision-Making (Fuzzy MADM) is used for clustering and routing network based on the presented distribution methods. Results show that the optimistic method outperformed the blind one and reduced energy consumption, especially in extensive networks; however, in small WSNs, the blind scheme resulted in an energy efficiency network. Furthermore, network growth leads optimistic WSN to save higher energy in comparison with blinded ones. Based on the results of complexity analysis, the presented optimal and blind methods are improved by 28% and 48%, respectively.
A sensor network consists of many sensor nodes interacting strongly with the physical environment, which receives and responds to environmental information through the sensor. The connection between these nodes is wireless. Each node works independently and has specific capabilities and a certain energy level. To perform the placement operation in some methods, several nodes are equipped with higher capabilities such as higher radio range, more energy, auxiliary equipment for movement, and a GPS receiver . According to the data collection methods, the wireless sensor network can be divided into two categories: homogeneous sensor networks, including base stations and sensor nodes equipped with the same capabilities (e.g., computing power and capacity). They have the same memory. Data collection in these types of networks is based on the data structure. Heterogeneous sensor networks have a base station (complex sensor nodes equipped with advanced processing and communication capabilities) compared to conventional sensor nodes .
Sensor distribution (i.e., the location of sensors in the target area) is one of the leading design issues in wireless sensor networks. The location of a sensor may affect the implementation of system requirements and network performance metrics . Careful placement of the sensors can be an effective optimization tool to achieve the desired design goals. For example, the total coverage is directly related to how the sensors are adequately positioned to cover the desired area on the wireless sensor network. The sensors should not be too close to each other, not overlap, and not be overused. They also should not be too far apart to prevent the formation of coverage gaps in the network. A good distribution makes it possible to perform better in gathering information and communication [3, 4]. Some distribution methods also use stationary sensors to support the sensor location’s dynamic adaptation, making it possible to reconfigure a dynamic distribution and improve network performance to minimize energy consumption . During the design process of the network infrastructure, the creation of routes is affected by the sensors’ energy limit because wireless transmission is directly related to the second (and higher) power of distance . Using multistep delivery methods will result in less power loss, but using this method will cause problems in topology management and access control to the transmission environment . Therefore, because in most networks, the sensors are randomly located in the network, it is not possible to use multipath methods .
Clustering in network routing can significantly affect the overall scalability of the system, lifespan, and energy efficiency . Hierarchical routing is one of the most efficient ways to reduce energy consumption within a cluster and reduce the number of responses sent to the base station [10, 11]. In contrast, a single-level network may overload the gates as traffic congestion increases. In addition, a single-level architecture is not scalable for a large set of nodes because sensors are usually not able to communicate over long distances. In addition, clustering can stabilize network topology along routes and reduce overhead and overall topology maintenance costs. It means that the nodes are protected only when connected to CHs. Furthermore, they are not affected by changes in levels between CHs . CHs can also implement an optimized management strategy that will drive network performance and battery and network life. A CH can schedule intracluster activities so that the nodes switch to sleep mode (low power consumption) and reduce the energy dissipation rate. Nodes can also be used in a rotating order to specify a time for sending and receiving information. As a result, data retrieval is prevented .
One of the main goals of wireless sensor network designs is to make data transmission work to extend the network’s lifespan and prevent connections from failing through power management methods. Routing protocols in such networks are affected by some challenging factors. Tolerance against error and the ability to organize and expand have been the reasons for the success of wireless sensor networks in applications . Creating an efficient architecture in distributing information between nodes can meet the time lost in the abnormal data filter. These wireless sensor networks can be created within fog computing, distributing the computational load between several nodes  effectively. The sensor node is first used to identify the data, and CHs should evaluate it. The tendency toward the adoption of wireless sensor networks has intensified in recent years due to its extensive applications in a variety of industries. A wireless sensor network  is formed by linking a large number of sensor nodes. Prior to its actual application, the designed methodology must be tested. Having a live sensor network environment, on the other hand, is not always feasible. In that case, simulation is the only way to test the study before moving on with real-world implementation. To date, a wide range of modeling tools for WSN networks are accessible, some of which are dedicated to wireless sensor networks and others which are applicable to both wireless and wired networks . The distance between the data center and the data source is the fundamental downside of cloud computing. Fog computing is a cloud computing technology that addresses these issues. It is one of the paradigms for distributed service computing. It makes full use of terminal devices’ diverse computational features. It has paravirtualized architecture as well . With strict energy and processing resource constraints, distributed detection is a critical challenge for WSNs. The appropriate threshold in most detection cases is determined by the noise power, which is subject to considerable variability in practice . Fog computing adds to the power and benefits of cloud computing and services by extending data generation and analysis to the network edge . Real-time location-based services and applications with mobility assistance are feasible because of the physical proximity of users and a high-speed internet connection to the cloud. To promote fog computing, load balancing approaches are utilized which may be done in two forms, static load balancing and dynamic load balancing .
Because most WSNs operate in unattended locations where human access and monitoring are nearly impossible, lifetime improvement has always been a critical concern. Clustering is one of the most effective approaches for organizing system operations in a coordinated manner to improve network scalability, reduce energy consumption, and extend network lifetime. During cluster creation, however, most of the prior techniques overload the cluster leader. To address this issue, various academics devised the concept of fuzzy logic, which is used in WSN decision-making . The clustering hierarchy technique is another approach for data transfer in WSNs. This algorithm is one of the most potent ways for increasing the energy efficiency of WSNs and for maximizing the lifetime of WSNs. WSNs conserve energy by using hierarchical protocols centered on clustering hierarchy. Data might be collected and transmitted to a base station by nodes having more remaining energy. Nevertheless, earlier clustering hierarchy approaches  did not account for duplicated data acquired by nearby nodes or nodes that overlapped. Currently used clustering strategies include selecting cluster heads with higher leftover energy and rotating cluster heads on a regular basis to spread energy consumption across nodes in each cluster and lengthen network lifetime. Most earlier algorithms, on the other hand, did not take into account the predicted residual energy, which is then used to predict the remaining energy for selecting a cluster head and performing a round .
This study is aimed at working in a computational network of fog with a set of inhomogeneous wireless devices. The objective is to provide a computational distribution method that reduces energy consumption in the nodes and satisfies the limitations of the edge delay. These nodes are dynamic and can both examine nodes and measure their communication links. The network can be used in smart cities or intelligent buildings that take information from sensors such as (traffic density or temperature) from the environment and use fog computing. Other works include network clustering and routing to reduce energy consumption and extend network life. For this purpose, fuzzy MADM algorithms are used to select optimal CHs. Therefore, the main aims are summarized as the following points: (i)Provide computational distribution method in Dynamic WSN(ii)Network routing using fuzzy MADM algorithms
The paper includes Introduction to present the main problem statement, and all need to be satisfied based on fog computing and routing WSN. Related Works provides a brief description of the literature review regarding fog computing. Methods and Materials represents the presented model and governing equations for both computation distribution and routing protocol. In Results and Discussion, the final findings and analysis results are illustrated. Finally, Conclusion summarizes the results and provides the future scope and direction of the study.
2. Related Works
Various methods have been proposed to analyze the spatial and temporal density of routing data; for example, the NMAST method  uses the ability of neighboring dynamics to measure the spatial and temporal density of data. k pathways can be utilized for visual investigation in applications such as traffic monitoring, public transit planning, and location selection as dynamic networks, unlike typical clustering algorithms that need several data-dependent hyperparameters . Research of fog computing defined a new generation of support of WSN used in any aspect of smart cities, for example, using the system in the emergency system of fireman , traffic light control , agricultural system , and health monitoring system . One of the challenges of WSN is data privacy. Gathering information and transferring to the base station needs some proper affords like designing security systems. For overcoming this challenge, the fog system is one efficient framework. In this case, an aggregator may be disconnected from the fog server and unable to send data directly. It can, nevertheless, share the encrypted data with an adjacent aggregator in order to send data to the fog server by adding its current collected data to the encrypted data. The relevant data values may be extracted by the fog server and saved in a local repository, which may then be updated in cloud repositories . Storage, communication, transmission ratio, energy consumption, and resilience are all improved by the fog system . As a result, job allocation and secure deduplication are two of the system’s tasks. It detects data and protects against security risks. Sharma and Saini  proposed a Multi-Objective based Whale Optimization method for the modeling of a fog layer system for safe data deduplication. Average latency, customer happiness, network longevity, energy usage, and security strength all increased as a result of their work . Szynkiewicz et al.  developed an energy-aware, secure sensing and computing system centered on static and dynamic clusters and edge and fog computing paradigms. The aggregated data stored at edges were transferred to the base station to analyze by gateways. The results of the implementation enhanced security and offload of data analysis .
The following are some examples of effective fuzzy algorithm applications in WSN. To model noisy power uncertainty, Mohammadi et al.  employed the fuzzy hypothesis test (FHT). Furthermore, using the Neyman–Pearson lemma on the FHT, they presented an optimum censoring strategy. It is demonstrated that the best censoring strategy may be found by comparing the energy of observed data to a threshold. The threshold would be determined by the local communication limitation and the noise uncertainty limitation, according to the findings . Mohammadi et al.  looked at a decentralized detection problem for a WSN and utilized FHT to characterize the noise power uncertainty from a Bayesian perspective. The suggested method was assessed in terms of detection and false alarm probability. In the presence of noisy power uncertainty, simulations indicate that the suggested detector outperforms both the Anderson–Darling approach and the standard energy detector. Nayak and Vathasavai  looked into the pros and cons of a variety of clustering techniques. These algorithms are focused on CH efficiency, which might be adaptable, adaptable, and intelligent enough to transfer load across sensor nodes, extending the network lifetime. Menaria et al.  introduced an FT technique in WSN to manage faults that happen during data transmission from the sensor to the sink or base station due to link or node failure. An enhanced quadratic minimum spanning tree technique was used in the model. To increase fault tolerance in WSN, the revised technique introduced a unique approach to discover an alternate edge in the spanning tree in place of the broken or failed edge.
In a chapter, Kaur et al.  discussed the various aspects of cloud and fog computing platforms. In addition, both platforms’ full architectures were provided, along with a comparison study. All application management techniques were examined, including resource coordination, distributed application deployment, and distributed data flow. Different load balancing algorithms were described by Singh et al. . In fog computing settings, round robin load balancing is the simplest and most straightforward load balancing solution. The Source IP Hash load-balancing technique has a critical flaw in that each change might redirect to anybody with a different server, making it unsuitable for fog networks . El Alami and Najid  developed an improved clustering hierarchy methodology for overlapping and nearby nodes based on the sleeping-waking process. As a result, data redundancy was reduced to a minimum, and network lifespan was increased. Unlike earlier hierarchical routing algorithms, which needed all nodes to gather and send data, the suggested technique just needed the waking nodes to do so. They use the method in both homogeneous and heterogeneous networks. Lee and Cheng  suggested a fuzzy-logic-based clustering methodology with an energy prediction extension to extend the lifetime of WSNs. The suggested methodology was found to be more efficient than previous distributed algorithms in simulations. Because edge devices have restricted computing and energy resources, efficient sensor deployment and power management are critical design concerns that must be addressed in order to carry out a significant amount of computation and extend the lifespan of a sensing system to guarantee high-quality monitoring. One of the challenges of the edge-based system is data volume in edge devices. Regarding the exponential increment of data in edges, reducing this congestion can extend the WSN lifespan and improve power consumption. For overcoming this problem, Deng et al.  presented a compression method base of fog computing approaches. Their autoregressive analysis method reduced data congestion significantly in conjunction with improvement in power consumption. In some ways, mobile sinks work as fog nodes to connect WSNs and cloud systems. Data are received from sensor nodes and sent to the cloud system through fog nodes(sinks) . Summary of some methods and research about the use of fog computing in WSN are provided in Table 1.
3. Methods and Materials
3.1. The Fog Computing
The devices in fog computing are known as nodes. Each device with a network connection, computing, and storage can be a node that can be placed anywhere with a network connection. A variety of devices, from controllers to switches, routers, and cameras, can act as a fog in WSN. These nodes can be used in target areas such as the office or a vehicle. Each node in WSN is designated as a fog node and computed the primary services.
3.2. Architecture and Working
The conceptual diagram of the proposed fog computing for WSN is illustrated in Figures 1 and 2. In the presented fog computing, WSN is related to four stages of computation. Before starting the computation, data should be distributed to each node without any intersection (distribution stage). Then, in the second stage, each node of WSN computes other nodes’ intermediate value from data received from the access point (map stage). In the third stage, each value transfers to other nodes (transfer stage). The node’s value is incorporated with other values generated by other nodes in the combination stage. In the presented diagram, red arrow shows the first stage of the computation. At this level, data is divided into node computation memory. The nodes now act as fog computation systems. Then, each node calculated all other nodes’ intermediate values at the same time. This stage (map) is depicted in green, blue, and yellow colors. Now each value should be exchanged by other node-related results. In order to achieve this goal, data is exchanged among nodes by the access point (transfer stage). In the final stage of combination, the values of the nodes are combined to reach their exact value.
The presented method with the main four steps is called Distribution-Map-Transfer-Combination (DMTC) method. The presented techniques are based on fog computing, and the main aim is to decrease the computational complexity and dead nodes as well as increase energy efficiency.
There are several reasons or objectives for using fog computing in WSN. These reasons ultimately increase organizational productivity. First is the reduction of latency in the WSN. One of the most significant benefits of fog computing is reducing latency. It is no longer necessary to send data for processing to cloud data centers or base stations, and eliminating this problem makes data analysis and processing much better and more efficient . The second is increasing performance. Not sending data to cloud computing data centers and saving time can also reduce the amount of bandwidth required to do so. In contrast, this amount of bandwidth can be used to communicate with sensors and data centers or base stations . Third is extensive geographical distribution. The use of fog computing with the network’s decentralization allows for wider geographical distribution than traditional networking or cloud computing. It will lead to better quality service for the end user [48–51]. Fourth is analysis instantaneously. In many environments, the ability to analyze data immediately is essential. Eliminating inefficiencies and delays in cloud services means that the user can have an accurate and instantaneous data analysis [49, 52].
3.3. Governing Formulation
In this paper, linear mathematical programming is used to optimize energy consumption in the presented DMTC system. The objective function for computing is presented as Eq. (1):
where , , and are energy consumption for mapping, transfer, and combination stages, respectively. Also, is the node number. Energy consumed in mapping level is defined as follows:
such that is the number of CPU cores for processing single bit and is the energy required for the process. Therefore, is the amount of energy for processing a single node. is the number of nodes, is distributed data, and is the size of the distributed file.
Moreover, in transfer level, the energy consumption is equal by Eq. (3).
In this equation, is the number of bits for computation. shows shuffle level energy consumption is the WSN. It equals by Eq. (4):
where , , , and are the power of radiofrequency of node , wireless channel, bandwidth, SNP gap, and noise power, respectively. The following constraints are exerted to the computation:
where is the number of CPU process per second in node and is defined as the latency of node . According to mathematical programming, we should obtain the minimum value of energy consumption in the WSN system.
3.4. Clustering and Routing Protocol
In WSN routing, only a small number of nodes must be connected to the base station to increase network lifespan and decrease energy consumption. These nodes are cluster heads (CHs). Because the nodes are dynamic, the most appropriate nodes should be selected as the CHs. In this section of the study, the Fuzzy Multiple Attribute Decision-Making (MADM) method was used to select the CHs. The Fuzzy MADM method uses three criteria: concentration, the energy level in each node, and the node’s centrality. The properties of the network are as follows: (i)The base station must be away from the sensor nodes and immobile(ii)All network nodes are heterogeneous and have energy limitations(iii)Nodes have spatial information sent to the base station with the corresponding energy level in the phase adjustment phase(iv)Nodes are dynamic
In this research, however, routing is based on clustering. However, the choice of CHs based on a method depends on multiple parameters. Therefore, in this study, unlike previous methods where the selection of CHs was mainly based on one criterion or a one-sided approach, in the proposed method of selection protocols, the CHs are chosen based on multicriteria.
According to the flowchart of Figure 3, first, the data is randomly distributed between the nodes. Then, the initial connection between the nodes and the sinks is established to load the data of each node in the system. The criteria should be identified using the existing constraints, and the values based on them should be calculated. In the next step, in order to update the data, the connection between the user and the sink is disconnected, and the criteria will be updated and measured in the new phase so that the final selection can be made based on the Fuzzy MADM method by modifying the existing data and taken from the nodes. In general, the space considered in the flowchart can be described in the following sections. (i)In the first stage, the establishment of nodes in the field begins so that the mechanism of neighbor detection to discover the general network and create an initial routing tree begins(ii)In the second stage, the best route from the relay node to the sink is identified(iii)The final step involves the operation stage, these criteria are monitored, and the value is dynamically changed in response to changes in the status of the network
This method optimizes the lifespan and reduces the error in the network by presenting new constraints and different assumptions. Adding node power consumption as a new constraint can have different challenges in the simulation of the proposed model.
4. Results and Discussion
4.1. Architectural Properties of the WSN
As shown in Figure 4, the first sensor network is a square network with dimensions of m, with the base station (BS) placed away from the sensors. In addition, all sensor nodes are provided 0.1 J of starting energy. As a result, the network’s total starting energy is 10 J. The energy parameters and are 10 pJ/bit/m2 and 0.0013 pJ/bit/m2, respectively. and parameters have values of 5.5 nJ/bit and 5.5 nJ/bit, respectively. Simulation tests for 100 WSN installations were conducted to guarantee the correctness of the results. To offer a comparative description of the procedures, the average of the collected findings was employed. Experiment has numerous clusters ranging from ten to twenty to find the ideal value of a cluster. For each value of , the average energy consumption per cycle is determined. Moreover, the efficiency of optimum computing is studied through mathematical operations. The presented DMTC computing system includes regularly sharing among the nodes, without considering the nodes’ computing capacities and the power of channel to access point. The used parameters for the simulation are illustrated in Table 2.
4.2. Results of Presented Distribution Analysis
Regarding Figure 4, the presented problem in the initial condition consists of 100 dynamic nodes of fogs with an access point. The solution area is m the access point is located 50 m upper than the problem area. Before processing the network, the process is equally divided by each node based on the architecture of Figure 1. The presented method is implemented on the different number of nodes . Two methods of computing are considered as optimistic and blind schemes.
The highest point of computational load for both of the schemes is calculated as the following equation.
If we consider each node’s capacity as random values, computational load also is random. In this condition, interruption probability is shown in Figure 5(a) in different latency values in 10 and 20 nodes. Findings show that the optimistic distribution among nodes has a lower interruption in comparison with the blind model. In the optimistic method, the computing load is calculated as the sum of the process of each node. However, in the blind method, the load value is equal to times the minimum value of the nodes process. The results of the distribution method in Figure 5(a) show that the rising number of the total system interruption is decreased that is one of the advantages of this method. Another advantage is the remarkedly low energy consumption of the optimistic approach shown in Figure 5(b) compared to the blind one. The process is done for 100 number nodes with one-second latency.
Regarding Eq. (1), total energy consumption in the presented system is constructed by three , , and as energy consumption for mapping, transfer, and combination stages, respectively. The results of total energy decomposition on the three factors of Figure 5(b) are depicted in Figure 5(c). Based on the results, high percentage of energy belongs to and for mapping and composition, respectively. With an increasing number of nodes, mapping energy decreased. Regarding Figure 5(d), with rising latency, energy consumption for mapping stage is reduced. Another advantage of the presented method is that a slower process leads to reduced energy used. We used the Fuzzy MADM method for routing the wireless sensor network based on the presented distribution algorithm in the other parts of the paper.
4.3. Results of the Clustering Process
Regarding Figure 4, the initial network consists of 100 fog nodes and one access point for connection. The computing load is randomly distributed between nodes based on the methods mentioned above. These processes are performed in any iteration of the presented routing method. (i)Checking the equipment remaining energy and determining to inactivate equipment due to the depletion of energy(ii)Determining cluster heads (CHs) based on the Fuzzy MADM methods(iii)Clustering of the remaining nodes (except CHs) according to the shortest distance to one of the CHs(iv)Transfer of information from nodes to CHs and then to access points based on radio transmission relationships that lead to energy consumption in nodes(v)If termination is not done, return the mentioned loop, i.e., check the remaining energy in the nodes and determine the inactive nodes
For determining CHs based on Fuzzy MADM, first, a decision matrix is constructed. The number of rows of the matrix is the number of nodes , and columns are equal to three numerical criteria of decision as follows:
: distance between each node and access point.
: number of nodes in the adjacency of nodes.
: remaining energy of each node.
In the next step, the matrix is standardized to be ranged between 0 and 1. We used five values of very low, low, media, high, and very high for fuzzification of the matrix based on the adaptive Neuro fuzzy system. The fuzzified standardized criteria of using triangular and using second-order Gaussian function are depicted in Figure 6. The equations for the energy required to transmit information on WSNs comply with wireless communication laws as follows:
The last steps are determining the CHs, calculating the energy consumption to send information from nodes to CHs and from the CHs to the access point, and implementing the node allocation to the clusters based on the minimum node’s distance to the CHs. Total energy consumption is calculated as the amount of energy consumed in data transmission, mapping, and composition by each node with network execution.
The routing is done using two methods of optimistic and blind, and the results are illustrated in Figure 7. Figure 7(a) shows total energy consumption for the network with the optimistic scheme for computational load distribution for the number of nodes , 40, 60, 80, and 100. For all the process of optimistic scheme, computational load (see Eq. (6)) is identical. Energy consumption until all the nodes are dead shows that a network with many nodes is lower energy consumption. However, a network with 20 nodes used a higher value of energy.
Due to the optimal formation of clusters using fuzzy logic and selection of fuzzy CHs, long-distance transmission in the network is further reduced, which CHs show low energy consumption in each sensor node. It is one of the advantages of the optimistic method that has been aforementioned in the previous process. When the remaining energy of a sensor node in a network hits zero, it is called dead. The operational capacity of the network diminishes as the number of dead nodes in the network grows. As a result, sensor node mortality has a direct impact on network operation. Therefore, optimistic method endurance is reduced with the increasing number of nodes based on Figure 7(b). While 40, 60, 80, and 100 nodes are dead, only 20% of the node of 20 cases is dead. Also, the number of packed sent to access point is decreased Figure 7(c) with the increasing number of nodes. On the other hand, in the blind method, according to Figure 7(d), the increasing number of node energy consumption also has risen. Moreover, maximum energy consumption is belonging to the 100 node cases.
In this case, nodes’ death is completed in almost the same round and with an identical percentage. Also, sent packages are the same approximately. The comparison between previous research is shown in Table 3. Based on the results, the mortality rate of the Fuzzy MADM method is higher than the other methods, which means that the percentage of death has lately occurred. It shows the reliability of networks based on the high lifespan of the network between the presented distributions. The optimistic scheme enhanced network endurance and led it to be competitive with other protocols. Based on the results of complexity analysis, the presented method is processed in a lower time than the other methods. Considering the SPIN method as a baseline, the presented optimal method and blind methods were 28% and 48%, respectively.
Practical engineering in data distribution between nodes in a wireless sensor network can meet the time lost in the irregular information channel. These wireless sensor systems can be made inside the structure of figuring appropriating the computational fog between a few nodes successfully. This investigation is aimed at working in the field of a computational system of fog with a lot of inhomogeneous wireless nodes. The goal is to give a computational distribution strategy that outcomes in diminished energy utilization in the network and fulfills the constraints of the edge latency. The nodes are dynamic and can both look at nodes and measure their correspondence joins. In this paper, we presented the DMTC distribution method for a dynamic wireless sensor network. In this system, one access point plays the base station roles in the system, and nodes are considered fog computing subsystems. The computational load is divided by fog nodes with two optimistic and blind models in the distribution methods. In the optimistic scheme, the computing load is distributed randomly on each node, and the total load is the sum of each node process. On the other hand, in the blind model, the load value equals times the minimum value of fog node computation. Findings show that the optimistic distribution among nodes has a lower interruption in comparison with the blind model. Also, with the number of nodes, the total system interruption is dropped, which is one of the benefits of the presented approach. Another efficiency is the low energy consumption of the optimistic method. In addition, the high contribution of energy belongs to the mapping and composition stages of energy. Also, with the rising of fog nodes, mapping energy reduced. Moreover, with the growth of latency, energy consumption for the mapping stage is dropped and a slower process consumes a low value of energy. In the next step, the distribution system was implemented on a routing and clustering technique using Fuzzy MADM. Choosing suitable cluster heads can also significantly reduce energy consumption and increase the lifespan of the WSN. The implementation of the routing method on optimistic and blind schemes revealed that large networks consume lower energy in an optimistic approach than small ones. Also, energy consumption is dropped with clustering and choosing cluster heads. Because nodes’ mortality rate influences WSN efficiency, increasing nodes’ number network endurance is decremented; however, in the blind method, the efficiency of the network with an increasing number of nodes reduced. To be concluded, the optimistic scheme is proper for an extensive network. However, the blind method is better for a small network.
Fog node resources may be virtualized and distributed to several users. Multitenant support in fog resources and scheduling compute jobs based on their QoS needs have not been thoroughly addressed in the available literature. Future study can be directed toward addressing this gap in the literature. The development of a real-world testbed for testing the operation of fog-based rules is typically quite highly priced and not scalable in many circumstances. As a result, many academics are looking for an effective toolbox for fog simulation to conduct preliminary evaluations of fog computing systems. Nevertheless, there are just a few fog simulators on the market right now. Future research might include the construction of a more efficient simulator for fog computing.
In this paper, a random dataset is used. And the parameters’ values are extracted from articles.
The funding sources had no involvement in the study design, collection, analysis, or interpretation of data, writing of the manuscript, or in the decision to submit the manuscript for publication.
Conflicts of Interest
We declare no conflict of interest.
S. H. Thimmaiah and G. Mahadevan, “Analysis of improved DV-distance algorithm for distributed localization in Wsns,” International Journal of Engineering Research and Development, vol. 14, no. 2, pp. 16–20, 2018.View at: Google Scholar
E. Pietrosemoli, “Long-distance, low-cost wireless data transmission,” URSI Radio Science Bulletin, vol. 339, no. 339, pp. 23–31, 2011.View at: Google Scholar
B. Song, W. Xiao, and Z. Zhang, “Multi-step sensor scheduling for energy-efficient high-accuracy collaborative target tracking in wireless sensor networks,” in Proceedings -2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, pp. 1341–1345, Beijing, China, 2013.View at: Publisher Site | Google Scholar
M. A. Siddiqi, A. A. Mugheri, and M. Khoso, “Analysis on security methods of wireless sensor network,” Sukkur IBA Journal of Computing and Mathematical Sciences, vol. 2, no. 1, pp. 52–60, 2018.View at: Google Scholar
A. Nayyar and R. Singh, “A comprehensive review of simulation tools for wireless sensor networks (WSNs),” Journal of Wireless Networking and Communications, vol. 5, no. 1, pp. 19–47, 2015.View at: Google Scholar
A. Kaur, P. Singh, and A. Nayyar, “Fog Computing: Building a Road to IoT with Fog Analytics,” in Fog Data Analytics for IoT Applications, pp. 59–78, Springer, 2020.View at: Google Scholar
S. Rani and P. Saini, “Fog Computing: Applications and Secure Data Aggregation,” in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 475–492, Springer, 2019.View at: Google Scholar
V. Mihai, C. E. Hanganu, G. Stamatescu, and D. Popescu, “WSN and fog computing integration for intelligent data processing,” in Proceedings of the 10th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2018, pp. 1–4, Iasi, Romania, 2019.View at: Publisher Site | Google Scholar
K. Bhargava, S. Ivanov, C. Kulatunga, and W. Donnelly, “Fog-enabled WSN system for animal behavior analysis in precision dairy,” in 2017 International Conference on Computing, Networking and Communications, ICNC 2017, pp. 504–510, Silicon Valley, CA, USA, 2017.View at: Publisher Site | Google Scholar
K. Intharawijitr, K. Iida, and H. Koga, “Analysis of fog model considering computing and communication latency in 5G cellular networks,” in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops, pp. 1–4, Sydney, NSW, Australia, 2016.View at: Google Scholar