key: cord-276178-0hrs1w7r authors: Bangotra, Deep Kumar; Singh, Yashwant; Selwal, Arvind; Kumar, Nagesh; Singh, Pradeep Kumar; Hong, Wei-Chiang title: An Intelligent Opportunistic Routing Algorithm for Wireless Sensor Networks and Its Application Towards e-Healthcare date: 2020-07-13 journal: Sensors (Basel) DOI: 10.3390/s20143887 sha: doc_id: 276178 cord_uid: 0hrs1w7r The lifetime of a node in wireless sensor networks (WSN) is directly responsible for the longevity of the wireless network. The routing of packets is the most energy-consuming activity for a sensor node. Thus, finding an energy-efficient routing strategy for transmission of packets becomes of utmost importance. The opportunistic routing (OR) protocol is one of the new routing protocol that promises reliability and energy efficiency during transmission of packets in wireless sensor networks (WSN). In this paper, we propose an intelligent opportunistic routing protocol (IOP) using a machine learning technique, to select a relay node from the list of potential forwarder nodes to achieve energy efficiency and reliability in the network. The proposed approach might have applications including e-healthcare services. As the proposed method might achieve reliability in the network because it can connect several healthcare network devices in a better way and good healthcare services might be offered. In addition to this, the proposed method saves energy, therefore, it helps the remote patient to connect with healthcare services for a longer duration with the integration of IoT services. . Sensor node architecture with application in e-healthcare. With the ever-increasing use of term green computing, the energy efficiency of WSN has seen a considerable rise. Recently, an approach for green computing towards IoT for energy efficiency has been proposed, which enhances the energy efficiency of WSN [4] . Different types of methods and techniques were proposed and developed in the past to address the issue of energy optimization in WSN. Another approach that regulates the challenge of energy optimization in sensor-enabled IoT with the use of quantum-based green computing, makes routing efficient and reliable [5] . The problem of energy efficiency during the routing of data packets from source to target in case of IoToriented WSN is significantly addressed by another network-based routing protocol known as GreeDi [6] . It is imperative to mention here that IoT is composed of energy-hungry sensor devices. The constraint of energy in sensor nodes has affected the transmission of data from one node to another and therefore, requires boundless methods, policies, and strategies to overcome this challenge [7] . With the ever-increasing use of term green computing, the energy efficiency of WSN has seen a considerable rise. Recently, an approach for green computing towards IoT for energy efficiency has been proposed, which enhances the energy efficiency of WSN [4] . Different types of methods and techniques were proposed and developed in the past to address the issue of energy optimization in WSN. Another approach that regulates the challenge of energy optimization in sensor-enabled IoT with the use of quantum-based green computing, makes routing efficient and reliable [5] . The problem of energy efficiency during the routing of data packets from source to target in case of IoT-oriented WSN is significantly addressed by another network-based routing protocol known as GreeDi [6] . It is imperative to mention here that IoT is composed of energy-hungry sensor devices. The constraint of energy in sensor nodes has affected the transmission of data from one node to another and therefore, requires boundless methods, policies, and strategies to overcome this challenge [7] . The focus of this paper was to put forward an intelligent opportunistic routing protocol so that the consumption of resources particularly during communication could be optimized, because the Sensors 2020, 20, 3887 3 of 21 alleyway taken to transmit a data packet from a source node to the target node is determined by the routing protocol. Routing is a complex task in WSN because it is different from designing a routing protocol in traditional networks. In WSN, the important concern is to create an energy-efficient routing strategy to route packet from source to destination, because the nodes in the WSN are always energy-constrained. The problem of energy consumption while routing is managed with the use of a special type of routing protocol known as the Opportunistic Routing Protocol. The opportunistic routing (OR) is also known as any path routing that has gained huge importance in the recent years of research in WSN [8] . This protocol exploits the basic feature of wireless networks, i.e., broadcast transmission of data. The earlier routing strategies consider this property of broadcasting as a disadvantage, as it induces interference. The focal notion behind OR is to take the benefit of spreading the behavior of the wireless networks such that broadcast from one node can be listened by numerous nodes. Rather than selecting the next forwarder node in advance, the OR chooses the next forwarder node robustly at the time of data transmission. It was shown that OR gives better performance results than traditional routing. In OR, the best opportunities are searched to transmit the data packets from source to destination [9] . The hop-by-hop communication pattern is used in the OR even when there is no source-to-destination linked route. The OR protocols proposed in recent times by different researchers are still belligerent with concerns pertaining to energy efficiency and the reliable delivery of data packets. The proposed OR routing protocol given in this paper was specifically meant for WSN, by taking into account the problems that surface during the selection of relay candidates and execution of coordination protocol. The proposed protocol intelligently selects the relay candidates from the forwarder list by using a machine learning technique to achieve energy efficiency. The potential relay node selection is a multi-class with multiple feature-based probabilistic problems, where the inherent selection of relay node is dependent upon each node's characteristics. The selection of a node with various characteristics for a node is a supervised multiclass non-linearly separable problem. In this paper, the relay node selection algorithm is given using Naïve Baye's machine learning model. The organization of this paper is as follows. Section 2 presents the related work in the literature regarding OR and protocols. The various types of routing protocols are given in Section 3. Section 4 describes OR with examples, followed by the proposed intelligent OR algorithm for forwarder node selection in Section 5. Section 6 depicts the simulation results of the proposed protocol by showing latency, network lifetime, throughput, and energy efficiency. Section 7 presents a proposed framework for integration IoT with WSN for e-healthcare. This architecture can be useful in many e-healthcare applications. Section 8 presents the conclusion and future. Achieving reliable delivery of data and energy efficiency are two crucial tasks in WSNs. As the sensor nodes are mostly deployed in an unattended environment and the likelihood of any node going out of order is high, the maintenance and management of topology is a rigorous task. Therefore, the routing protocol should accommodate the dynamic nature of the WSNs. Opportunistic routing protocols developed in the recent past years provided trustworthy data delivery but they are still deficient in providing energy-efficient data transmission between the sensor nodes. Some latest research on OR, experimented by using the formerly suggested routing metrics and they concentrated on mutual cooperation among nodes. GeRaF [10] (Geographic Random Forwarding) described a novel forwarding technique based on the geographical location of the nodes involved and random selection of the relaying node via contention among receivers. Exclusive Opportunistic multi-hop routing for wireless networks [11] (ExOR) is an integrated routing and MAC protocol for multi-hop wireless networks, in which the best of multiple receivers forwards each packet. This protocol is based on the Expected Transmission Count (ETX) metric. The ETX was measured by hop count from the source to the destination and the data packet traveled through the minimum number of hops. ExOR achieves higher throughput than traditional Sensors 2020, 20, 3887 4 of 21 routing algorithms but it still has few limitations. ExOR contemplates the information accessible at the period of transmission only, and any unfitting information because of recent updates could worsen its performance and could lead to packet duplication. Other than this, there is another limitation with ExOR, as it always seeks coordination among nodes that causes overhead, in case of large networks. Minimum Transmission Scheme-Optimal Forwarder List Selection in Opportunistic Routing [12] (MTS) is another routing protocol that uses MTS instead of ETX as in ExOR. The MTS-based algorithm gives fewer transmissions as compared to ETX-based ExOR. Simple, practical, and effective opportunistic routing for short-haul multi-hop wireless networks [13] . In this protocol, the packet duplication rate was decreased. This is a simple algorithm and can be combined with other opportunistic routing algorithms. Spectrum Aware Opportunistic Routing [14] (SAOR) is another routing protocol for the cognitive radio network. It uses optimal link transmission (OLT) as a cost metric for positioning the nodes in the forwarder list. SAOR gives better QoS, reduced end-to-end delay, and improved throughput. Energy-Efficient Opportunistic Routing [15] (EEOR) calculates the cost for each node to transfer the data packets. The EEOR takes less time than ExOR for sending and receiving the data packets. Trusted opportunistic routing algorithm for Vanet [16] (TMCOR) gives a trust mechanism for opportunistic routing algorithm. It also defines the trade-off between the cost metric and the safety factor. A novel socially aware opportunistic routing algorithm in mobile social networks [17] considered three parameters, namely social profile matching, social connectivity matching, and social interaction. This gives a high probability of packet delivery and routing efficiency. ENSOR-opportunistic routing algorithm for relay node selection in WSNs is another algorithm where the concept of an energy-efficient node is implemented [18] . The packet delivery rate of ENSOR is better than GeRaF. Economy-a duplicate free [19] is the only OR protocol that uses token-based coordination. This algorithm ensures the absence of duplicate packet transmissions. With the advent of the latest network technologies, the virtualization of networks along with its related resources has made networks more reliable and efficient. The virtual network functions are used to solve the problems related to service function chains in cloud-fog computing [20] . Further, IoT works with multiple network domains, and the possibility of compromising the security and confidentiality of data is always inevitable. Therefore, the use of virtual networks for service function chains in cloud-fog computing under multiple network domains, leads to saving network resources [21] . In recent times, the cloud of things (CoT) has gained immense popularity, due to its ability to offer an enormous amount of resources to wireless networks and heterogeneous mobile edge computing systems. The CoT makes the opportunistic decision-making during the online processing of tasks for load sharing, and makes the overall network reliable and efficient [22] . The cloud of things framework can significantly improve communication gaps between cloud resources and other mobile devices. In this paper, the author(s) proposed a methodology for offloading computation in mobile devices, which might reduce failure rates. This algorithm reduces failure rates by improving the control policy. In recent times, WSN used virtualization techniques to offer energy-efficient and fault-tolerant data communication to the immensely growing service domain for IoT [23] . With the application of WSN in e-healthcare, the wireless body area network (WBAN) gained a huge response in the healthcare domain. The WBAN is used to monitor patient data by using body sensors, and transmits the acquired data, based on the severity of the patients' symptoms, by allocating a channel without contention or with contention [24] . EEOR [15] is an energy-efficient protocol that works on transmission power as a major parameter. This protocol discussed two cases that involved constant and dynamic power consumption models. These models are known as non-adjustable and adjustable power models. In the first model, the algorithm calculated the expected cost at each node and made a forwarder list on the source node based on this cost. The forwarder list was sorted in increasing order of expected cost and the first node on the list became the next-hop forwarder. As EEOR is an opportunistic routing protocol, broadcasting is utilized and the packets transmitted might be received by each node on the forwarder list. In this, the authors propose algorithms for fixed-power calculation, adjustable power calculation, Sensors 2020, 20, 3887 5 of 21 and opportunistic power calculation. This algorithm was compared with ExOR [11] by simulation in the TOSSIM simulator. The results showed that EEOR always calculated the end-to-end cost based on links from the source to destination. EEOR followed distance vector routing for storing the routing information inside each sensor node. The expected energy consumption cost was updated inside each node, after each round of packet transmission. Data delivery was guaranteed in this protocol. Additionally, according to the simulation results, packet duplication was significantly decreased. The MDOR [25, 26] protocol worked on the distance between the source to relay nodes. In this, the authors proposed an algorithm that calculated the distance to each neighbor from the source node and found out the average distance node. The average distance node was used by the source as a next-hop forwarder. The authors also stated that, to increase the speed and reliability of transmission, the strength of the signal was very important. The signal power depended on the distance between the sender and receiver. If a node sent a packet to the nearest node, then it might take more hops and this would decrease the lifetime of the network. Another problem addressed in this protocol was to reduce energy consumption at each node through the dynamic energy consumption model. This model consumed energy according to the packet size and transmitted the packet by amplifying it according to the distance between the source and the relay nodes. MDOR always chose the middle position node to optimize energy consumption in amplifying the packets. The MDOR simulation results showed that the energy consumption was optimized and it was suitable for certain applications of WSN like environment monitoring, forest fire detection, etc. Opportunistic routing introduced the concept of reducing the number of retransmissions to save energy and taking advantage of the broadcasting nature of the wireless networks. With broadcasting, the routing protocol could discover as many paths in the network as possible. The data transmission would take place on any of these paths. If a particular path failed, the transmission could be completed by using some other path, using the forwarder list that had the nodes with the same data packet. The protocols that were responsible for data transmission in WSN were broadly ordered into two sets [2] , namely, (i) old-fashioned routing, and (ii) opportunistic routing. In the traditional routing, also known as old-fashioned routing techniques, the focus was on finding the route with a minimum number of intermediate nodes from the source to the destination, without taking into consideration some of the important factors like throughput, quality of links, reliability, etc. A small comparison [27] of the routing categories is shown in Table 1 . As it is clear from the literature that energy consumption of a sensor node had a considerable impact on the lifetime and quality of the wireless sensor network, therefore, it becomes vital to design energy-efficient opportunistic routing protocols to maximize the overall lifetime of the network and also to enhance the quality of the sensor network. There are few methods in the literature listed below that might be useful to save the life of the sensor network. Scheduling of duty cycle • Energy-efficient medium access control (EE-MAC) • Energy-efficient routing • Node replacements (not possible in unattended environments) Of the above-mentioned methods for energy saving, energy-efficient routing is the most central method for the vitality of the WSN. As this method involved the transmission of signals, i.e., receiving and sending, it took about 66.66 percent of the total energy of the network [28] . Therefore, it became relevant that an opportunistic routing protocol that enhanced the vitality of the sensor network might be designed for enhancing the overall life span of the sensor network. OR broadcasts a data packet to a set of relay candidates that is overheard by the neighboring nodes, whereas in traditional routing a node is (pre)-selected for each transmission. Then, relay candidates that are part of the forwarders list and who have successfully acknowledged the data packet, run a protocol called coordination protocol between themselves, to choose the best relay candidate to onward the data packet. In other words, OR is abstractly comprised of these three steps: Step 1: Broadcast a data packet to the relay candidates (this will prepare the forwarder list). Step 2: Select the best relay by using a coordination protocol among the nodes in the forwarder list. Step 3: Forward the data packet to the selected relay node. Considering an example shown in Figure 2 , where the source node S sends a packet to the destination node D, through nodes R1, R2, R3, R4, and R5. First, S broadcasts a packet. The relay nodes R1, R2, and R3 might become the forwarder nodes. Further, if R2 is chosen as a potential forwarder, then R4 and R5 might become relay nodes. Similarly, if R5 is the forwarder node, then it forwards the data packets to the destination node D. Energy balance Of the above-mentioned methods for energy saving, energy-efficient routing is the most central method for the vitality of the WSN. As this method involved the transmission of signals, i.e., receiving and sending, it took about 66.66 percent of the total energy of the network [28] . Therefore, it became relevant that an opportunistic routing protocol that enhanced the vitality of the sensor network might be designed for enhancing the overall life span of the sensor network. OR broadcasts a data packet to a set of relay candidates that is overheard by the neighboring nodes, whereas in traditional routing a node is (pre)-selected for each transmission. Then, relay candidates that are part of the forwarders list and who have successfully acknowledged the data packet, run a protocol called coordination protocol between themselves, to choose the best relay candidate to onward the data packet. In other words, OR is abstractly comprised of these three steps: Step 1: Broadcast a data packet to the relay candidates (this will prepare the forwarder list). Step 2: Select the best relay by using a coordination protocol among the nodes in the forwarder list. Step 3: Forward the data packet to the selected relay node. Considering an example shown in Figure 2 , where the source node S sends a packet to the destination node D, through nodes R1, R2, R3, R4, and R5. First, S broadcasts a packet. The relay nodes R1, R2, and R3 might become the forwarder nodes. Further, if R2 is chosen as a potential forwarder, then R4 and R5 might become relay nodes. Similarly, if R5 is the forwarder node, then it forwards the data packets to the destination node D. Opportunistic Routing Derived the Following Rewards: • The escalation in reliability. By using this routing strategy, the reliability of WSN increased significantly, as this protocol transmitted the data packet through any possible link rather than any pre-decided link. Therefore, this routing protocol provided additional links that could act as back up links and thus reduced the chances of transmission failure. The escalation in transmission range. With this routing protocol, the broadcast nature of the wireless medium provided an upsurge in the transmission range, as all links irrespective of their location and quality of data packets were received. Hence, the data transmission could reach the farthest relay node successfully. Opportunistic Routing Derived the Following Rewards: • The escalation in reliability. By using this routing strategy, the reliability of WSN increased significantly, as this protocol transmitted the data packet through any possible link rather than any pre-decided link. Therefore, this routing protocol provided additional links that could act as back up links and thus reduced the chances of transmission failure. The escalation in transmission range. With this routing protocol, the broadcast nature of the wireless medium provided an upsurge in the transmission range, as all links irrespective of their location and quality of data packets were received. Hence, the data transmission could reach the farthest relay node successfully. In WSN, the sensor nodes could be deployed in two ways, randomly or manually. Most applications require the random deployment of nodes in the area under consideration. Initially, each node is loaded with the same amount of battery power. As soon as the network starts functioning, the nodes start consuming energy. To make the network energy efficient, the protocol used for transmitting data packets must consume less battery power and the calculation of the energy consumption network model and energy model should be formulated. In the upcoming subsection, these two models are discussed and these are depicted as assumptions, to carry out smooth working of the protocol. The N sensors are distributed in a square area of size 500 * 500 square meters. This network formed a graph G = (N, M), with the following possessions: . . , N n } is the set of vertices representing sensor nodes. • M is considered to be a set of edges representing the node-to-node links. The neighboring list NBL(N i ) consists of nodes that are in the direct link to the N i . The data traffic is assumed to be traveling from the sensor nodes toward the base station. If a packet delivery is successful, then the acknowledgment (ACK) for the same is considered to travel the same path back to the source. The lifespan of a WSN depends on the endurance of each node, while performing network operations. The sensor nodes rely on the battery life to perform network operations. The energy cost model considered here is the first-order energy model for WSN [25] . Various terms used in Equations (1)-(3) are defined in Table 2 . Combined vitality cost of radio board of a sensor for communication of a data packets Energy Consumed in the transmission of n-bit packet up to l distance: Energy Consumed in the transmission of n-bit packet: Sensors 2020, 20, 3887 8 of 21 Sensor Board-full operation, radio board-full operation, CPU board-sleep, wakeup for creating messages only. The proposed protocol uses these assumptions as preliminaries. A new algorithm is proposed in the next section, for solving the issue of energy efficiency and the reliability of opportunistic routing in WSN. Let there be N nodes in the WSN, where each node has K neighbors, i.e., N 1 , N 2 , . . . , N K and each neighbor nodes are represented by X 1 , X 2 , . . . , X n attributes. In this case, the number of neighbors (k) might vary for the different nodes at a particular instance. Additionally, it was assumed that the wireless sensor network is spread over an area of 500 × 500 square meters. Let us assume that a node A ∈ N and had neighbors as NA 1 , NA 2 , . . . , NA K , with respective features like Node Id, Location, PRR (Packet Reception Ratio), Residual Energy (RE) of nodes, and Distance (D), which are represented by X 1 , X 2 , . . . , X n , respectively. The goal was to intelligently find a potential relay node A, say AR, such that AR ∈ {NA 1 , NA 2 , . . . , NA K }. In the proposed machine learning-based protocol for the selection of potential forwarder, the packet reception ratio, distance, and outstanding energy of node was taken into consideration. The Packet Reception Ratio (PRR) [29] is also sometimes referred to as PSR (packet success ratio). The PSR was computed as the ratio of the successfully received packets to the sent packets. A similar metric to the PRR was the PER (packet error ratio), which could be computed as (1-PRR). A node loses a particular amount of energy during transmission and reception of packets. Accordingly, the residual energy in a node gets decreased [30] . The distance (D) was the distance between the source node and the respective distance of each sensor node in the forwarder list. The potential relay node selection was multi-class, with multiple features-based probabilistic problems, where the inherent selection of the relay node was dependent upon each node feature. The underlying probabilistic-based relay node selection problem could be addressed intelligently by building a machine learning model. The selection of a node with 'n' characteristics for a given node 'A' could be considered a supervised multiclass non-linearly separable problem. In this algorithm, the Naïve Baye's classifier was used to find the probability of node A to reach one of its neighbors, i.e., {N 1 , N 2 , . . . , N K }. We computed the probability, P(N 1 , N 2 , . . . , N K |A). The node with maximum probability, i.e., P(N 1 , N 2 , . . . , N K |A) was selected. The probability P of selecting an individual relay node of the given node A could be computed individually for each node, as shown respectively for each node in Equation (4). where P(NA K |A) denotes the probability of node A to node K. Furthermore, the probability computation of node A to NA 1 is such that NA 1 is represented by the corresponding characteristics X 1 , X 2 , . . . , Xn, which means to find the probability to select the relay node NA 1 , given that feature X 1 , NA 1 given that feature X 2 , NA 1 given that feature X 3 , and so on. The individual probability of relay node selection, given that the node characteristics might be computed by using Naïve Bayes conditional probability, is shown in Equation (5). Sensors 2020, 20, 3887 9 of 21 where i = 1, 2, 3, . . . , n and P(Xi|A) is called likelihood, P(A) is called the prior probability of the event, and P(Xi) is the prior probability of the consequence. The underlying problem is to find the relay node A that has the maximum probability, as shown in Equation (6). Table 3a-x represent the neighbor sets {NA 1 , NA 2 , . . . , NA K } along with their feature attributes as {X 1 , X 2 , X 3 , . . . , X n } of Node A. The working of IOP is comprised of two phases, i.e., Phase I (Forwarder_Set_Selection) and Phase II (Forwarder_Node_Selection). In Phase I, the authors used Algorithm 1 for the forwarder set selection. In this step, the information collection task was initiated after the nodes were randomly deployed in the area of interest, with specific dimensions. The beginning of the phase started with a broadcast of "Hello Packet" which contained the address and the location of the sending node. If any node received this packet, it sent an acknowledgment to the source and was added to the neighbor list. This process was repeated again and again, but not more than the threshold, to calculate the PRR of each node and the neighbor list was formed using this procedure repeatedly. From the neighbor list and the value of PRR, the forwarder set was extracted. The pre-requisite for the working of the second phase was the output of the first phase. The forwarder set generated from Algorithm 1 was the set of all nodes that had the potential to forward the data packets. However, all nodes in the set could not be picked for transmission, as this would lead to duplication of packets in the network. To tackle this situation, only one node from the forwarder list should be selected to transmit the packet to the next-hop toward the destination. This was accomplished using Algorithm 2, which took a forwarder node list as input and selected a single node as a forwarder. Algorithm 2 used a machine-learning technique called naïve Baye's Classifier, to select the forwarder node intelligently. The proposed method of relay node selection using IOP could be understood by considering an example of WSN shown in Figure 2 and using the naïve Baye's algorithm on the generic data available in Table 4 , to find the optimal path in terms of energy efficiency and reliability from source node S to destination node D. Therefore, by using the proposed naïve Baye's classifier method, the probability of selection of a relay node R1, R2, or R3 from source node S was denoted by P(R1, R2, R3|S), which could be calculated using Equation (7). where, Putting the values in the above equations from Table 4 Again, inputting the values in the above Equations (12) Declare three float variables X 1 , X 2 , and X 3 to represent the properties of Ri, i.e., PRR (Packet Reception Ratio), RE (Residual Energy), and D (distance), respectively. For each node Ri∈ FL(S) repeat Compute P(Ri|S)//Probability of selection of Ri given S, i.e., P k = P(R i |S) for i = 1, 2 . . . , n and Assign k←i 4. Compute the probability of P(R i |S) by computing the probability of each parameter separately, given S. Make an unsorted array of probability values of n nodes, i.e., R1, R2, . . . , Rn from step 6. For i = 1 to n and k = i, ArrProb[Ri]←P k //To find the node with maximum probability. 6. Select the first node of the array ArrProb[0] as the node with maximum value Pmax i.e., Pmax←ArrProb[0] 7. Go through the rest of the elements of the array, i.e., from the 2nd element to the last (n − 1) element, for i = 1 to n − 1. For When the end of the array is reached, then the current value of the Pmax is the greatest value in the array, Pmax←ArrProb[i]. 10. The node Ri with Pmax value is selected as a relay node from the forwarder list, as the node with the highest probability. The node with the next highest probability acts as a relay node in case the first selected relay node fails to broadcast. 11. Broadcast transmission of the data packet as {Ri, coordinates, data} 12. Destination node D is reached, if Yes, go to step 15. Else, apply Algorithm 1 on Ri S←Ri and go to step 2. 13. END Output: A potential forwarder node is selected from the list of forwarder nodes. Again, putting the values in the above Equations Finally using the proposed method of relay node selection using naïve Baye's algorithm, we could compute probability P(R1, R2, R3 S) , using Equation (26) . P(R1, R2, R3 S) = max(P(R1 S), P(R2 S), P(R3 S) = max(0.001, 0.002, 0.001) (26) Thus, node R2 would be selected as the relay node in the forwarder list of R1, R2, and R3 for source node S. Similarly, the process was followed again for the neighbors of S, which consequently would check the neighbors of R1, R2, and R3. The Tables 5-7 describe the features of neighboring nodes of R1, R2, and R3, respectively. After the execution of Phase I and Phase II on the above said example, the final route was intelligently selected for the onward transmission of the data packet from source node S to destination node D, using the naïve Baye's algorithm shown in Figure 3 . Node_Id Location PRR (J) (m) R5 R20005 (49,79) 0.6 0.7 11 D After the execution of Phase I and Phase II on the above said example, the final route was intelligently selected for the onward transmission of the data packet from source node S to destination node D, using the naïve Baye's algorithm shown in Figure 3 . Figure 3 gives the details about the route selected using the IOP. The source node S broadcasts the data packet among its neighboring nodes, using Algorithm 1 to create a forwarders list. The node R1, R2, and R3 in the figure, were selected as the nodes in the forwarders list. These were the potential nodes that would be used for the selection of a potential forwarder node. Here, R2 was selected as the potential node using Algorithm 2. The same procedure was adopted again and until the data reached its final destination. The final route was selected intelligently using IOP is S→R2→R5→D. With the end goal of examination and comparison of the proposed OR protocol, the simulation was performed in MATLAB. The simulation used the environment provided by the MATLAB to simulate the computer networks and other networks. MATLAB provides a good scenario to design a network of sensor nodes and also to define a sensor node and its characteristics. The simulation results were compared with the results of the EEOR [25] and the MDOR [26] protocols. Table 8 below shows the parameter setting of the network. Figure 3 gives the details about the route selected using the IOP. The source node S broadcasts the data packet among its neighboring nodes, using Algorithm 1 to create a forwarders list. The node R1, R2, and R3 in the figure, were selected as the nodes in the forwarders list. These were the potential nodes that would be used for the selection of a potential forwarder node. Here, R2 was selected as the potential node using Algorithm 2. The same procedure was adopted again and until the data reached its final destination. The final route was selected intelligently using IOP is S→R2→R5→D. With the end goal of examination and comparison of the proposed OR protocol, the simulation was performed in MATLAB. The simulation used the environment provided by the MATLAB to simulate the computer networks and other networks. MATLAB provides a good scenario to design a network of sensor nodes and also to define a sensor node and its characteristics. The simulation results were compared with the results of the EEOR [25] and the MDOR [26] protocols. Table 8 below shows the parameter setting of the network. The motes are haphazardly deployed in 500 × 500 m field. The nodes are deployed in such a way that these can approximately cover the whole application area. The base station position is 250 × 250 m in the field. The field area was considered a physical world environment. The proposed OR protocol started working immediately after the deployment process was complete. Figure 4 below represents the unplanned deployment of the nodes in the area of consideration. The motes are haphazardly deployed in 500 × 500 m field. The nodes are deployed in such a way that these can approximately cover the whole application area. The base station position is 250 × 250 m in the field. The field area was considered a physical world environment. The proposed OR protocol started working immediately after the deployment process was complete. Figure 4 below represents the unplanned deployment of the nodes in the area of consideration. Energy efficiency was the main objective of the proposed algorithm. It could be calculated as the overall energy consumption in the network for the accomplishment of diverse network operations. In MATLAB, the simulation worked based on simulation rounds. The simulation round was termed as packets transmission from a single source to a single destination. In MATLAB, when the simulation starts, a random source is chosen to start transmission and this node makes a forwarder list and starts executing the proposed protocol. One round of simulation represents successful or unsuccessful transmissions of packets from one source in the network. For each round, different source and relay nodes are selected. This process continues until at least one node is out of its energy. The energy efficiency was calculated as the total energy consumption after each round in the network. After the operation of the network starts, the sensor's energy starts decaying. This energy reduction was due to network operations like setting up the network, transmission, reception, and acknowledging the data packets, processing of data, and sensing of data. As the nodes decayed, their energy consumption kept increasing per round, as can be seen in Figure 5 below. It can be seen in the figure that energy consumption for the proposed OR protocol was less, as compared to the other two algorithms. This was because the proposed OR protocol distributed energy consumption equally to Energy efficiency was the main objective of the proposed algorithm. It could be calculated as the overall energy consumption in the network for the accomplishment of diverse network operations. In MATLAB, the simulation worked based on simulation rounds. The simulation round was termed as packets transmission from a single source to a single destination. In MATLAB, when the simulation starts, a random source is chosen to start transmission and this node makes a forwarder list and starts executing the proposed protocol. One round of simulation represents successful or unsuccessful transmissions of packets from one source in the network. For each round, different source and relay nodes are selected. This process continues until at least one node is out of its energy. The energy efficiency was calculated as the total energy consumption after each round in the network. After the operation of the network starts, the sensor's energy starts decaying. This energy reduction was due to network operations like setting up the network, transmission, reception, and acknowledging the data packets, processing of data, and sensing of data. As the nodes decayed, their energy consumption kept increasing per round, as can be seen in Figure 5 below. It can be seen in the figure that energy consumption for the proposed OR protocol was less, as compared to the other two algorithms. This was because the proposed OR protocol distributed energy consumption equally to all nodes, so that every node could survive up to their maximum lifetime. Hence, the proposed OR protocol was more energy-efficient than MDOR and EEOR. Sensors 2020, 20, x FOR PEER REVIEW 18 of 24 all nodes, so that every node could survive up to their maximum lifetime. Hence, the proposed OR protocol was more energy-efficient than MDOR and EEOR. Latency can be measured as the time elapsed between sending the packet and receiving the same at the base station. This is also called as end-to-end delay for the packets to be reached at the destination. The communication in wireless sensor networks is always from source nodes to the sink station. Latency can be measured as the time elapsed between sending the packet and receiving the same at the base station. This is also called as end-to-end delay for the packets to be reached at the destination. The communication in wireless sensor networks is always from source nodes to the sink station. In the random deployment of nodes, some nodes are able to communicate directly with the base station. While some nodes follow multi-hop communication, i.e., source nodes have to go through relay nodes to forward the data packet toward the base station. Hence, in some cases, the network delay can be very low and in some cases, it can be high. Hence in Figure 6 , the values of end-to-end delay after each communication in each round are plotted. It can be seen that the proposed OR protocol has a good latency, as compared to the other two protocols. Latency can be measured as the time elapsed between sending the packet and receiving the same at the base station. This is also called as end-to-end delay for the packets to be reached at the destination. The communication in wireless sensor networks is always from source nodes to the sink station. In the random deployment of nodes, some nodes are able to communicate directly with the base station. While some nodes follow multi-hop communication, i.e., source nodes have to go through relay nodes to forward the data packet toward the base station. Hence, in some cases, the network delay can be very low and in some cases, it can be high. Hence in Figure 6 , the values of end-to-end delay after each communication in each round are plotted. It can be seen that the proposed OR protocol has a good latency, as compared to the other two protocols. The throughput of a network can be measured in different ways. Throughput is calculated as the average number of packets received successfully at the base station per second in each round. Figure 7 represents the throughput for each round. The proposed OR protocol has good throughput, as compared to the other two. As the proposed OR protocol is efficient in energy consumption, the sensor nodes are able to survive and communicate for a long time in the network. As long as the communication goes on, the base station would continue to receive the packets. Sensors 2020, 20, x FOR PEER REVIEW 19 of 24 The throughput of a network can be measured in different ways. Throughput is calculated as the average number of packets received successfully at the base station per second in each round. Figure 7 represents the throughput for each round. The proposed OR protocol has good throughput, as compared to the other two. As the proposed OR protocol is efficient in energy consumption, the sensor nodes are able to survive and communicate for a long time in the network. As long as the communication goes on, the base station would continue to receive the packets. Network lifetime for wireless sensor networks is dependent upon the energy consumption in the network. When the energy of the network is 100 percent, the network lifetime would also be 100 percent. However, as the nodes start operating in the network, the network lifespan would start to reduce. Figure 8 represents the percentage of lifetime remaining after each round of simulation. Proposed OR protocol has a good network lifetime due to the lower energy consumption in the network. Network lifetime for wireless sensor networks is dependent upon the energy consumption in the network. When the energy of the network is 100 percent, the network lifetime would also be 100 percent. However, as the nodes start operating in the network, the network lifespan would start to reduce. Network lifetime for wireless sensor networks is dependent upon the energy consumption in the network. When the energy of the network is 100 percent, the network lifetime would also be 100 percent. However, as the nodes start operating in the network, the network lifespan would start to reduce. Figure 8 represents the percentage of lifetime remaining after each round of simulation. Proposed OR protocol has a good network lifetime due to the lower energy consumption in the network. The packet loss is referred to as the number of packets that are not received at the destination. To calculate the number of packets lost during each round of the simulation, packet sequence numbers are used. Whenever a source tries to send packets to a destination, it inserts a sequence number. Later, on packet reception, these packet sequence numbers are checked for continuity. If a certain sequence number is missing then it is referred to as packet loss. Packet loss recorded per round of simulation and presented in Figure 9 . It can be depicted from the figure that packet loss for the proposed protocol is less, as compared to EEOR and MDOR. This is because the forwarder node selection algorithm runs on each relay and source node. This algorithm calculates the probability of successful transmission through a neighbor node. This also increases the reliability of the protocol and provides accurate transmissions. Sensors 2020, 20, x FOR PEER REVIEW 20 of 24 The packet loss is referred to as the number of packets that are not received at the destination. To calculate the number of packets lost during each round of the simulation, packet sequence numbers are used. Whenever a source tries to send packets to a destination, it inserts a sequence number. Later, on packet reception, these packet sequence numbers are checked for continuity. If a certain sequence number is missing then it is referred to as packet loss. Packet loss recorded per round of simulation and presented in Figure 9 . It can be depicted from the figure that packet loss for the proposed protocol is less, as compared to EEOR and MDOR. This is because the forwarder node selection algorithm runs on each relay and source node. This algorithm calculates the probability of successful transmission through a neighbor node. This also increases the reliability of the protocol and provides accurate transmissions. A significant improvement could be seen in the graphs after the simulation is complete. Figure 5 shows the total energy consumption after each round of packet transmission is complete. Here, the round was termed as packet transmissions in between single source and destination. MDOR showed the highest energy consumption, followed by EEOR and the proposed protocol. This was because MDOR wasted more energy in the initial setup. However, the dynamic energy consumption considerations led the network to survive for a long time, as shown in Figure 8 . In the case of EEOR in Figure 5 , it consumed lesser energy in transmission and the initial setup for opportunistic selection of relay nodes was based on the power level. However, when it comes to lifetime, EEOR failed to perform better, as it considered the network to be dead when any one of the nodes ran out of its energy. EEOR chose one node as a source and continued transmissions opportunistically, which resulted in a significant reduction in the power level of a single node. The proposed protocol gave the best results, as in each round, the source node was based on the intelligent model to change the next-hop relay node. Figure 6 presents the average end-to-end delay per round, generated by the simulation, and the proposed protocol worked significantly better as the next-hop selection was based on an intelligent algorithm. The proposed algorithm helped to significantly reduce average A significant improvement could be seen in the graphs after the simulation is complete. Figure 5 shows the total energy consumption after each round of packet transmission is complete. Here, the round was termed as packet transmissions in between single source and destination. MDOR showed the highest energy consumption, followed by EEOR and the proposed protocol. This was because MDOR wasted more energy in the initial setup. However, the dynamic energy consumption considerations led the network to survive for a long time, as shown in Figure 8 . In the case of EEOR in Figure 5 , it consumed lesser energy in transmission and the initial setup for opportunistic selection of relay nodes was based on the power level. However, when it comes to lifetime, EEOR failed to perform better, as it considered the network to be dead when any one of the nodes ran out of its energy. EEOR chose one node as a source and continued transmissions opportunistically, which resulted in a significant reduction in the power level of a single node. The proposed protocol gave the best results, as in each round, the source node was based on the intelligent model to change the next-hop relay node. Figure 6 presents the average end-to-end delay per round, generated by the simulation, and the proposed protocol worked significantly better as the next-hop selection was based on an intelligent algorithm. The proposed algorithm helped to significantly reduce average end-to-end delays. Figures 7 and 9 showed the reliability and availability performances of all protocols, including the proposed protocol that showed significantly better performance. This meant that the proposed protocol was a new generation protocol that has potential in many applications of WSN. In recent years, WSN saw its applications growing exponentially with the integration of IoT. This gave a new purpose to the overall utility of data acquisition and transmission. With the integration of WSN with IoT, the IoT is making a big impact in diverse areas of life, i.e., e-healthcare, smart farming, traffic monitoring and regulation, weather forecast, automobiles, smart city, etc. All these applications are hugely dependent on the availability of real-time accurate data. Healthcare with IoT is one such area that involves critical decision making [31] [32] [33] . The proposed approach makes use of intelligent routing and, therefore, would help in making reliable and accurate delivery of data to the integrated healthcare infrastructure, for proper care of the patients. The proposed framework for e-healthcare is shown in Figure 10 . As the proposed algorithm saves energy, the healthcare devices that are sensor-enabled can work for longer duration, and easy deployment and data analysis is possible due to IoT integration [34] [35] [36] [37] [38] . According to the proposed architecture, there can be any different kind of sensor nodes, such as smart wearables, sensors collecting health data like temperature, heartbeat, number of steps taken every day, sleep patterns, etc. These factors have a correlation with different existing diseases. The best part of the integration of IoT and WSN is that, with the help of sensors, data are collected and the same is stored in the cloud due to IoT integration. Once the health data is stored in the cloud, this cloud is a health-record cloud that belongs to a specific hospital or a public domain cloud. These cloud data can be accessed by healthcare professionals in a different way, to analyze the data and also provide feedback to a specific patient and group of patients. In recent years, WSN saw its applications growing exponentially with the integration of IoT. This gave a new purpose to the overall utility of data acquisition and transmission. With the integration of WSN with IoT, the IoT is making a big impact in diverse areas of life, i.e., e-healthcare, smart farming, traffic monitoring and regulation, weather forecast, automobiles, smart city, etc. All these applications are hugely dependent on the availability of real-time accurate data. Healthcare with IoT is one such area that involves critical decision making [31] [32] [33] . The proposed approach makes use of intelligent routing and, therefore, would help in making reliable and accurate delivery of data to the integrated healthcare infrastructure, for proper care of the patients. The proposed framework for e-healthcare is shown in Figure 10 . As the proposed algorithm saves energy, the healthcare devices that are sensor-enabled can work for longer duration, and easy deployment and data analysis is possible due to IoT integration [34] [35] [36] [37] [38] . According to the proposed architecture, there can be any different kind of sensor nodes, such as smart wearables, sensors collecting health data like temperature, heartbeat, number of steps taken every day, sleep patterns, etc. These factors have a correlation with different existing diseases. The best part of the integration of IoT and WSN is that, with the help of sensors, data are collected and the same is stored in the cloud due to IoT integration. Once the health data is stored in the cloud, this cloud is a health-record cloud that belongs to a specific hospital or a public domain cloud. These cloud data can be accessed by healthcare professionals in a different way, to analyze the data and also provide feedback to a specific patient and group of patients. In the recent epidemic of COVID-19, telemedicine had become one of the most popular uses of this platform. Doctors also started e-consulation to the patients and getting access to their health records, using the smart wearables of patients. Sill, there are many challenges, and lot of improvements are required. The proposed work add towards better energy efficiency of sensors, so that they can work for longer durations. Thereafter these sensor data can be integrated using IoT and cloud, as per the proposed approach shown in Figure 10 . In the recent epidemic of COVID-19, telemedicine had become one of the most popular uses of this platform. Doctors also started e-consulation to the patients and getting access to their health records, using the smart wearables of patients. Sill, there are many challenges, and lot of improvements are required. The proposed work add towards better energy efficiency of sensors, so that they can work for longer durations. Thereafter these sensor data can be integrated using IoT and cloud, as per the proposed approach shown in Figure 10 . In this paper, we proposed a new routing protocol (IOP) for intelligently selecting the potential relay node using naïve Baye's classifier to achieve energy efficiency and reliability among sensor nodes. Residual energy and distance were used to find the probability of a node to become a next-hop forwarder. Simulation results showed that the proposed IOP improved the network lifetime, stability, and throughput of the sensor networks. The proposed protocol ensured that nodes that are far away from the base station become relay nodes, only when they have sufficient energy for performing this duty. Additionally, a node in the middle of the source and destination has the highest probability to become a forwarder in a round. The simulation result showed that the proposed OR scheme was better than MDOR and EEOR in energy efficiency and network lifetime. Future work will examine the possibility of ensuring secure data transmission intelligently over the network. The authors declare no conflict of interest. An overview of evaluation metrics for routing protocols in wireless sensor networks Comparative study of opportunistic routing in wireless sensor networks Opportunistic routing protocols in wireless sensor networks Towards green computing for Internet of things: Energy oriented path and message scheduling approach. Sustain Toward energy-oriented optimization for green communication in sensor enabled IoT environments GreeDi: An energy efficient routing algorithm for big data on cloud. Ad Hoc Netw An investigation on energy saving practices for 2020 and beyond Opportunistic routing-A review and the challenges ahead A revised review on opportunistic routing protocol Geographic Random Forwarding (GeRaF) for ad hoc and sensor networks: Multihop performance Opportunistic multi-hop routing for wireless networks Optimal forwarder list selection in opportunistic routing Simple, practical, and effective opportunistic routing for short-haul multi-hop wireless networks Spectrum aware opportunistic routing in cognitive radio networks Energy-efficient opportunistic routing in wireless sensor networks A trusted opportunistic routing algorithm for VANET A novel socially-aware opportunistic routing algorithm in mobile social networks Opportunistic routing algorithm for relay node selection in wireless sensor networks Economy: A duplicate free opportunistic routing Mobile-aware service function chain migration in cloud-fog computing Service function chain orchestration across multiple domains: A full mesh aggregation approach Online learning offloading framework for heterogeneous mobile edge computing system Virtualization in wireless sensor networks: Fault tolerant embedding for internet of things Traffic priority aware medium access control protocol for wireless body area network An energy efficient opportunistic routing metric for wireless sensor networks Middle position dynamic energy opportunistic routing for wireless sensor networks An intelligent opportunistic routing protocol for big data in WSNs Recent advances in energy-efficient routing protocols for wireless sensor networks: A review Radio link quality estimation in wireless sensor networks: A survey Futuristic Trends in Network and Communication Technologies Futuristic Trends in Networks and Computing Technologies Communications in Computer and Information Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's Lecture Notes in Networks and Systems 121 Proceedings of ICRIC 2019 Introduction on Wireless Sensor Networks Issues and Challenges in Current Era. In Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's Congestion Control for Named Data Networking-Based Wireless Ad Hoc Network Deployment and Coverage in Wireless Sensor Networks: A Perspective