Firefly Optimization in IOT Applications for Wireless Mesh Networks

Article History: Received: 11 January 2021; Accepted: 27 February 2021; Published online: 5 April 2021 Abstract: Internet of Things is an budding focus of technical, social, and economical importance. At the same time, Internet of Things hoist momentous challenges that may perhaps plunk in the way of apprehend its prospective reimbursement. The ‘thing’ in IoT may perhaps be a person with a heart monitor or an automobile in the midst of built-in-sensors, i.e. objects that have subsist dole out an IP address and encompass the capability to accumulate and convey data over a network without manual assistance or intervention. The business processes hosted on the wide-spread geographical distribution of sensors should retort to dissimilar sensing events congregate in the dynamic IoT environment as swift as they could. So to Produce better IoT applications, process optimization is indispensable in the IoT environment. For example, data analytics in energy embarrassed IoT Networks uses Optimization Framework to recuperate the network implementation delay and accuracy. Here we imply firefly Optimization Algorithm Framework, wherever the nodes make a decision where their data analytic tasks will be executed, in order to jointly optimize their average execution delay and accuracy, while respecting power consumption constraints compared to previous other techniques. Our new fire fly optimization techniques shows 81% better results compared to previous techniques such as Genetic and ant colony etc...


Introduction
WMN are optimistic inclination in panorama of wireless networks. The crucial assistance of WMN slouch in its native gaffe restraint alongside network failures, unfussiness to milieu affirmative a network and a broadband competence. WMN rigging elevated mobility appraise to erstwhile wireless networks since WMN has superior energy storage and power storage. The features of WMN are self configuring and self healing technique all the way in the course of which the node malfunction or path malfunction is slickly enhanced since in WMN a node can be full of zip as client as well as a server depending on the request. [1] [2][4] [5]. When we go for sophisticated there are manifold nodes in each cluster and hence when we want to convey data from initial place towards target we have near recognize shortest path for broadcast. In this concurrence we have realize a new technique of setting IoT sensor to each nodes and make the navigate fast using Jaya Optimization.
IOT IoT sermon provides basic and advanced concepts of IoT. Our Internet of Things tutorial is intended for beginners and professionals. IoT stands for Internet of Things, which resources admittance and conniving daily functional equipments and devices using Internet. Our IoT tutorial includes all topics of IoT such as prologue, features, advantage and disadvantage, ecosystem, resolution framework, architecture and domains, biometric, security camera and door unlock system, devices, etc.
What is an Internet of Things (IoT) The mechanism have their own individual features, but what regarding if these all communicate with each other to provide a better environment? For example, the phone brightness is accustomed based on my GPS location or my direction. Connecting everyday things embedded with electronics, software, and sensors to internet enabling to collect and exchange data without human interaction called as the Internet of Things (IoT). The term "Things" in the Internet of Things refers to anything and everything in day to day life which is accessed or connected through the internet.

IoT Architecture
There is not such a unique or standard consensus on the Internet of Things (IoT) architecture which is universally defined. The IoT architecture differs from their functional area and their solutions. However, the IoT architecture technology mainly consists of four major components: IoT Data Link Communication Protocol The IoT Data Link communication protocol provides service to the Network Layer. There are various protocols and standard technologies specified by the different organization for data link protocols.
Bluetooth Bluetooth is a short-range wireless communication network over a radio frequency. Bluetooth is mostly integrated into smartphones and mobile devices. The Bluetooth communication network works within 2.4 ISM band frequencies with data rate up to 3Mbps.

Firefly Optimization
Idealize some of the flashing characteristics of fireflies so as to develop firefly-inspired algorithms. For simplicity in describing our new Fireflire Algorithm (FA), we now use the following three idealized rules: 1) all fireflies are unisex so that one firefly will be attracted to other fireflies regardless of their sex; 2) Attractiveness is proportional to their brightness, thus for any two flashing fireflies, the less brighter one will move towards the brighter one. The attractiveness is proportional to the brightness and they both decrease as their distance increases. If there is no brighter one than a particular firefly, it will move randomly; 3) The brightness of a firefly is affected or determined by the landscape of the objective function. For a maximization problem, the brightness can simply be proportional to the value of the objective function. Other forms of brightness can be defined in a similar way to the fitness function in genetic algorithms.
Firefly Algorithm Objective function f(x), x = (x1, ..., xd)T Generate initial population of fireflies xi (i = 1, 2, ..., n) Light intensity Ii at xi is determined by f(xi) 2. Use Firefly algorithm to obtain the optimal Dthr value. Output: Shortest path results in C.
Step 1: Apply Fire fly algorithm to select the best Dthr value of ECM according to the input data.
Step 2: Apply firefly algorithm on the shortest path parameters.
Step 3: Establish the first cluster C1 by taking the first entered data point X1 as the first cluster center (Cc1) with an initial cluster radius (Ru1) value of 0.
Step 4: If all the sample data in the data streaming have been disposed, then, the method is terminated, otherwise, proceed to calculate the distance between current entered data xi and all the existing cluster centers Ccj using the formula Dij = ||xi -Ccj||, j = 1, 2, …, k; where k stands for the number of existing clusters. xi Step 5: If Dij ≤ Ruj, j = 1, 2, …, k; this indicates that the current input Dim Cc j data ) xi belongs to an existing cluster Cm, , k( xi min1 , 2, j Ccm and, in this case, xi ∈Cm. if no new cluster is created and no existing cluster center or radius is updated, go back to step 2, otherwise, proceed to the next step Step 6: Determine the sum of Dij of the current input data xi and all existing cluster centers Cc j and the corresponding cluster radius Ruj, that is, Sij= Dij+ Ruj, j=1, 2, …, k. Select a cluster center Ca (the corresponding cluster center is Cca and the radius is Rua) and make it meet Sia = Dia + Rua = min(Sij), j = 1, 2, …, k. Step7: If Sia > 2 × Dthr, then, xi does not belong to any existing cluster. Employ the method in Step 1 to create a new cluster, then, go back to Step 2. Step8: If Sia≤2×Dthr, then xi∈Ca and Ca is updated by removing its Cca and adding its Rua. The new cluster radius Runewa = Sia/2; remove the new cluster center Ccnewa to the ligature of xi and Cca and make it satisfy the condition ||Ccnewa -xi||=Runewa; then, revert to Step 2.

Proposed Model Diagram
The proposed channel assignment has three 3 process.

Result analysis
The WMN supports large number of nodes but for the implementation of testing we compare 20,40,60, 80 and 100 nodes at different times at the area of 2500m * 2500m We decided to perform the simulation in Ns-2 ver. 2.31. Although Network Simulator 2 (NS2) has been the dominant network simulation tool, it does not provide native support for multi-channel simulation. Modifications are carried out both on TCL and on C++ codes. In TCL level ns-mobile node.tcl and ns-lib.tcl are modified to assemble the multi-channel components and to make TCL scripts to support multi-channel configuration. In C++ level MAC and Physical layer related files are modified to add the cross-layer based channel selection algorithm and to manage the multi-channel node lists.  Energy level determines the lifetime of a node in the network. The JAYA when compared with EMTX and NGA shows 85 % increase with EMTX and 77% increase with NGA.

Conclusion
The proposed technique shows higher stability of energy comparison when compared with previous techniques. The Jaya optimization algorithm can be slightly modified and updated for QOS parameters such as throughput , error rate, jitter, scalability etc..