VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK

Similar documents
Node Placement for Maximum Coverage Based on Voronoi Diagram Using Genetic Algorithm in Wireless Sensor Networks

OPTIMIZATION OF AVERAGE DISTANCE BASED SELF-RELOCATION ALGORITHM USING AUGMENTED LAGRANGIAN METHOD

Mobility Control for Complete Coverage in Wireless Sensor Networks

Fault-tolerant in wireless sensor networks using fuzzy logic

Non-linear Barrier Coverage using Mobile Wireless Sensors

Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks

Effect Of Grouping Cluster Based on Overlapping FOV In Wireless Multimedia Sensor Network

A REVIEW ON LEACH-BASED HIERARCHICAL ROUTING PROTOCOLS IN WIRELESS SENSOR NETWORK

A Decreasing k-means Algorithm for the Disk Covering Tour Problem in Wireless Sensor Networks

A Binary Model on the Basis of Cuckoo Search Algorithm in Order to Solve the Problem of Knapsack 1-0

A Review: Optimization of Energy in Wireless Sensor Networks

genetic algorithm is proposed for optimizing coverage and network lifetime. Another powerful heuristics is Particle Swarm Optimization (PSO). Both GA

Z-SEP: Zonal-Stable Election Protocol for Wireless Sensor Networks

Optimized Node Deployment using Enhanced Particle Swarm Optimization for WSN

Regression Based Cluster Formation for Enhancement of Lifetime of WSN

USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

An Optimized Lifetime Model using Energy Holes Reduction near Sink's Locality of WSN s

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

Hybrid Ant Colony Optimization and Cuckoo Search Algorithm for Travelling Salesman Problem

AN EFFICIENT APPROACH FOR PROVIDING FULL CONNECTIVITY IN WIRELESS SENSOR NETWORK

Optimized Coverage and Efficient Load Balancing Algorithm for WSNs-A Survey P.Gowtham 1, P.Vivek Karthick 2

Implementation of Energy Efficient Clustering Using Firefly Algorithm in Wireless Sensor Networks

A Study of Open Middleware for Wireless Sensor Networks

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Performance evaluation of node localization techniques in heterogeneous wireless sensor network

A Survey of Deterministic Vs. Non-Deterministic Node Placement Schemes in WSNs

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Improving Connectivity via Relays Deployment in Wireless Sensor Networks

International Journal of Research in Advent Technology Available Online at:

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Energy Efficiency Maximization for Wireless Sensor Networks

Sensor Scheduling for k-coverage in Wireless Sensor Networks

Hole repair algorithm in hybrid sensor networks

A Survey on Coverage Problems in Wireless Sensor Networks

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

The Effect of Neighbor Graph Connectivity on Coverage Redundancy in Wireless Sensor Networks

A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs

Covering a 3D flat surface with autonomous and mobile wireless sensor nodes

Optimization of Ant based Cluster Head Election Algorithm in Wireless Sensor Networks

A Genetic Algorithm-Based Approach for Energy- Efficient Clustering of Wireless Sensor Networks

A review on Coverage factors in Wireless Sensor Networks

Developing Energy-Efficient Topologies and Routing for Wireless Sensor Networks

Minimum Overlapping Layers and Its Variant for Prolonging Network Lifetime in PMRC-based Wireless Sensor Networks

Energy Conservation of Sensor Nodes using LMS based Prediction Model

An Energy-Efficient Hierarchical Routing for Wireless Sensor Networks

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

OA-DVFA: A Distributed Virtual Forces-based Algorithm to Monitor an Area with Unknown Obstacles

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

An improved protocol for Energy efficient communication in Wireless Sensor Network

Mobile Sensor Swapping for Network Lifetime Improvement

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Robots-Assisted Redeployment in Wireless Sensor Networks

Wireless Sensor Networks

A Multi-objective Binary Cuckoo Search for Bicriteria

An Efficient Low Power Transmission Over Long Range in Wireless Sensor Networks for environmental studies

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Induced Redundancy based Lossy Data Compression Algorithm

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

A eural etwork approach for Wireless sensor network power management

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

FREE REGIONS OF SENSOR NODES. Howard R. Hughes College of Engineering. University of Nevada, Las Vegas, NV ABSTRACT

Wireless Sensor Networks Localization Methods: Multidimensional Scaling vs. Semidefinite Programming Approach

Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

CHAPTER 3 HIERARCHICAL ENERGY TREE BASED ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORKS

Comparative Study of SWST (Simple Weighted Spanning Tree) and EAST (Energy Aware Spanning Tree)

Sensor Deployment and Target Localization in Distributed Sensor Networks

MESSCH PROTOCOL AN ENERGY EFFICIENT ROUTING PROTOCOL FOR WSN

Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks

A Survey on Energy Efficiency in WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

References. The vision of ambient intelligence. The missing component...

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN

Web Document Clustering Using Cuckoo Search Clustering Algorithm based on Levy Flight

Design and Implementation of detecting the failure of sensor node based on RTT time and RTPs in WSNs

State-Based Synchronization Protocol in Sensor Networks

FACE RECOGNITION BASED ON CUCKOO SEARCH ALGORITHM

Mobile Element Scheduling for Efficient Data Collection in Wireless Sensor Networks: A Survey

Replacing Failed Sensor Nodes by Mobile Robots

Finding Optimal Tour Length of Mobile Agent in WSN by using a hybrid of Minimal Spanning Tree and Midway Range based Method

ISSN: [Krishan Bala* et al., 6(12): December, 2017] Impact Factor: 4.116

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

SPATIAL CORRELATION BASED CLUSTERING ALGORITHM FOR RANDOM AND UNIFORM TOPOLOGY IN WSNs

Analysis of Deployment Strategies in Wireless Sensor Network (WSN)

Directional Sensor Control for Maximizing Information Gain

Energy-Efficient Opportunistic Topology Control in Wireless Sensor Networks

A New Distance Independent Localization Algorithm in Wireless Sensor Network

Lecture 8 Wireless Sensor Networks: Overview

ENERGY OPTIMIZATION IN WIRELESS SENSOR NETWORK USING NSGA-II

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Transcription:

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK Puteri Azwa Ahmad 1, M. Mahmuddin 2, and Mohd Hasbullah Omar 3 1 Politeknik Tuanku Syed Sirajuddin, Malaysia, 1 Universiti Utara Malaysia, Malaysia, puteriazmd@yahoo.com 2 Universiti Utara Malaysia, Malaysia, ady@uum.edu.my 3 Universiti Utara Malaysia, Malaysia, mhomar@uum.edu.my ABSTRACT. Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology. Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications. In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way. The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity. Node placement model is constructed to find the optimal node placement. Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area. INTRODUCTION Keywords: node placement, wireless sensor network, virtual force algorithm, cuckoo search algorithm In recent years, wireless sensor networks (WSNs) have become one of the most promising technologies in sensing application environment. These WSNs provide flexibility in deployment and maintenance, exploiting the ability of wireless networks to be deployed in highly dynamic environments and hence enable sensor networks to be potentially used in a wide range of civilian and military applications, including security surveillance, environmental monitoring, habitat monitoring, hazard and disaster monitoring and relief operations, healthcare applications (Nematy, Rahmani, Teshnelab, & Rahmani, 2010), home applications as smart environments and smart agriculture system (Akyildiz, Su, Sankarasubramaniam, & Cayirci, 2002). The basic goals of a WSN generally depend on the application and has many functions including to determine the value of the parameter at given location, detect the occurrence events and tracking an object. In an environmental network, sensor nodes can be used to measure the temperature of atmospheric pressure, amount of sunlight and humidity. In a military sensor network, sensor nodes are used to track an enemy as it moves through the geographic area covered by the network. WSN environment consists of a number of sensor nodes and one or more base station spreads across a geographical region of interest area. Each sensor has wireless communication capability and some level of intelligence for signal processing and networking of the data (Fan & Jin, 2010). In addition with integration of sensing, computation, and wireless communication the sensor nodes can sense physical information from the environment, process the information, and report them to the base stations. 145

There are several constraints in WSN environment especially in random deployment strategy. Due to the random deployment, the sensor nodes are deployed randomly in noninvasive way and will cause a problem such as coverage hole, overlapping and also a connectivity failure (Aziz, Aziz, & Ismail, 2009). Hence, node placement is the fundamentals issue that will affect the performance of the WSN applications and operations and closely related to the coverage area and connectivity (Xiangyu, Weipeng, Junjian, & Xin, 2012). In this research, the node placement technique of Virtual Force Algorithm and Cuckoo Search algorithm is analysed for improving the network coverage area and connectivity in random deployment scheme. The paper is organised in a few sections. The next section is explaining the node placement technique in WSN using VFA and the modification of the CS algorithm to fit with the node placement. Then, the result is presented and discussions with the conclusion are justified at the end of the paper. THE NODE PLACEMENT TECHNIQUE IN WSN Move-assisted deployment node placement technique could be the best adoption in a large region of interest. However, this causes the sensor nodes are not uniformly distributed over the region of interest. In this case, a move-assisted deployment is considered to overcome the problem of the coverage gap, overlapping and connectivity failure in random deployment. Thus, the effectiveness of node placement technique can provide a maximum coverage and continues connectivity in deployment of sensor nodes. Virtual Force Algorithm Virtual Force Algorithm (VFA) is a popular approach for a dynamic node placement. VFA uses a force-directed approach to achieve a redeployment of sensor network after an initial random deployment (Wang, Cao, & Porta, 2004; Zou & Chakrabarty, 2003).Jin, Chang, & Jia (2010) also proposed a VFA as a sensor deployment algorithm attempts to maximize the sensor field coverage. Sensor nodes can move towards the required placement using a virtual exerted force. The repulsive and attractive forces of the sensor nodes depend on a threshold distance, D th. When two nodes are close enough, the force is in repulsive pattern which intent to separate them but when two nodes are far from each other, the force become attractive which draws them closer. The repulsive pattern can avoid the redundant coverage or overlapping while the attractive pattern can avoid the coverage holes. The exerted on node i by node j in the network (denoted by F ij ) as the equation below: { ( ) (1) where d ij is the Euclidean distance between sensor node i and j, D th is the threshold on the distance between i and j, α ij is the orientation (angle) of a line segment from i and j. Virtual forces allowed sensor nodes to coordinate their movements without the need of any central controller using a distributed algorithm for self-deployment and event-based relocation in dynamic deployment (Jin, et al., 2010). Cuckoo Search Algorithm The Cuckoo Search (CS) algorithm is a nature-inspired meta heuristic for solving an optimization problem. This algorithm is inspired by the obligate brood parasitism of some 146

cuckoo species and enhanced with a new solution generated by Levy flight to speed up the local search (Yang & Deb, 2009). In CS algorithm, each egg in the nest represents a solution and each cuckoo can lay only one egg (thus representing one solution). The aim of this algorithm is to find a new and potential better solution to replace a not so good solution in the nests. The CS algorithm is used as an optimization algorithm to search a maximum coverage area in random deployment. The sensor network is assumed deployed using a homogeneous sensor node with a same sensing and communication range. The rules of Cuckoo Search algorithm in order search the maximum coverage area in sensor random deployment is as below: a) Each cuckoo lays one egg at a time, and dumps its egg in randomly chosen nest. The rule can be interpreted as a set of solution is randomly generated within the range of solutions. b) The best nest with high quality of eggs will carry over to the next generations. The CS algorithm will find the maximum coverage area and minimum overlapping compare with the fitness value c) The number of available host nests is fixed. The maximum coverage area and minimum overlapping between nodes is identify and will be abandon if the rule is not fulfill. SIMULATION SETUP The simulation experiment is used to stimulate the WSN environment with random node deployment. The simulation was run using MATLAB with dimension 100m x 100m area of deployment. The total sensor nodes was N = 25. This simulation is conducting based on the following assumption parameter: a) A dynamic sensor nodes are consist of homogeneous node with a same sensing and communication range with a limited movement b) A dynamic sensor nodes are randomly deployed over an open space area and no obstacle against all nodes. In each simulation scenario, the sensor nodes are set in a difference group of number nodes: 5 nodes, 10 nodes, 15 nodes, 20 nodes and 25 nodes. The simulation was run in 5 replications for each group of sensor nodes. Table 1, summarize the parameter used in a simulation run of VFA and CS. Table 1. Simulation Parameter for Virtual Force and Cuckoo Search Algorithm Parameter VFA Values Cuckoo Search Initial threshold distance, D th R s R s Sensing range, R s 10m 10m Communication range, R c 20m 20m Number of nodes, N 5-25 5-25 Sensor deployment area, xm x ym 100m x 100m 100m x 100m Lower bound, L b, Upper bound, U b - 100,300 Cuckoo step size - 0.01 Maximum iteration - 1000 147

SIMULATION RESULTS This section discuss the analysis and result of the simulation run in Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor networks. The following metrics are used as the performance evaluation of the VFA and CS algorithm: a) Coverage area: The coverage area is defined as a covered area in a region of interest b) Connectivity: The connectivity is referring to the probability of sensor nodes in the network communicate between nodes based on the distance and communication range. Virtual Force Algorithm In this research the performance of Virtual Force Algorithm (VFA) is analysed in term of coverage area and connectivity after relocation of sensor nodes in random deployment using a repulsive and attractive pattern. The threshold distance value is set to R s where it is assumed as an ideal distance from each distance of sensor nodes in WSN environment (Li, Zhang, Cui, & Chai, 2012). Figure 1 illustrates the relocation of sensor nodes using VFA approach in random deployment using 25 nodes in area of 100 m x 100 m. Coverage Area a) Initial random deployment b) Relocation using VFA Figure 1. Node placement scenario using VFA approach VFA approach is proposed to maximize the coverage area and in addition to minimize the coverage hole and overlapping area. The coverage performance in VFA approach is analysed after the relocation of sensor nodes due to the random deployment. In this research, the covered area of each sensor nodes is defined as a disk area with sensing range, R s. The value of coverage area is as (2) where Acvrd i is the area covered by the sensor nodes i, N is the total number of sensor nodes, A is the total area of region of interest (ROI) and Ovl is the overlapping area. Table 2 shows the average results of coverage area using VFA approach with a different number of sensor nodes. Table 2. Results of coverage area in VFA approach Number of nodes 5 10 15 20 25 1374.2 2895.9 3938.5 4735.4 5653.9 148

Connectivity Figure 1 illustrated the initial random deployment and VFA approach based 25 nodes deployed in the region of interest with 100m x 100m. The line in Figure 1 represented the connectivity between sensor nodes. The relocation of sensor nodes shows a better result where the overlapping and coverage hole area can be minimize. Thus, the relocation of sensor nodes can improve the connectivity edge where the connectivity intersection between sensor nodes area avoided. From the simulation results, implementation of movement force in range of threshold distance and communication range between sensor nodes in VFA guaranteed the continues connectivity and prevent from the node stacking. Cuckoo Search Algorithm In CS algorithm, the metric performance of coverage and connectivity are evaluated based on random deployment of sensor nodes in a group of sensor nodes for a difference number of iteration. In the simulation run, CS algorithm finds the best coverage area for every group number of sensor node in a different number of iterations. Coverage Area A fix number of iterations were undertaken and the average result is extracted as depicted in Table 3. The performance of coverage area is gradually increased when the numbers of sensor nodes are increase. Table 3 also shows that the coverage area is static when 5 and 10 sensor nodes are applied regardless total number of iteration. Table 3. Average coverage area using CS approach Connectivity Number of iterations Number of nodes 5 10 15 20 25 10 1570.8 3141.6 4288.5 5089.4 5456.9 20 1570.8 3114.5 4318.5 5216.9 5692.7 50 1570.8 3141.6 4438.7 5197.6 5800.3 100 1570.8 3141.6 4485.6 5365.4 5848.0 500 1570.8 3141.6 4487.8 5497.3 6096.7 1000 1570.8 3141.6 4556.1 5532.8 6275.4 Due to the random deployment of sensor nodes in CS algorithm, connectivity is not guaranteed due to the coverage hole and overlapping in area in the region of interest. There are still some areas with an intersection of connectivity. In this case, it is wasting the energy consumption for transmitting the data between sensor nodes. CONCLUSION In this research, the performance of Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm is evaluated based on the metric performance of coverage area and connectivity. A performance evaluation and analysis of the algorithm has been carried out using MATLAB for a 5 replication of simulation runs using a different number of sensor nodes for both VFA and CS algorithm. In CS algorithm the replication of simulation runs is conducted based on the number of iteration. The results presented in previous sections shows that VFA with a repulsive and attractive force pattern can relocate the position of sensor nodes after the initial random deployment. The algorithm shows the improvement of coverage 149

area with a minimum overlapping and coverage hole area. The CS algorithm provide more coverage area in random deployment but there are lot of overlapping and coverage hole area. Thus, the solution provided by CS is not practical and inefficient because of the large overlapping area that will waste a number of sensors. In term of connectivity, the VFA approach exhibits a guaranteed connectivity and the intersection of connectivity is avoided better than CS algorithm. It has been proved that VFA achieve a significant improvement in coverage area and connectivity compared to CS algorithm. Thus, the effectiveness of node placement technique can provide a maximum coverage and continues connectivity in deployment of sensor nodes. ACKNOWLEDGMENTS This work has been supported by Ministry of Higher Education, Malaysia and Politeknik Tuanku Syed Sirajuddin, Malaysia REFERENCES Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38, 393 422. Aziz, N. A. A., Aziz, K. A., & Ismail, W. Z. W. (2009). Coverage strategies for wireless sensor networks. World Academy of Science, Engineering and Technology, 50. Fan, G., & Jin, S. (2010). Coverage problem in wireless sensor network: a survey. Journal of Networks, 5(9), 1033-1040. Jin, L., Chang, G., & Jia, J. (2010, 29-31 July 2010). Mobile sensor networks node distribution optimization based on minimum redundant coverage. Paper presented at the 29th Chinese Control Conference (CCC), 2010 Li, J., Zhang, B., Cui, L., & Chai, S. (2012). An extended virtual force-based approach to distributed self-deployment in mobile sensor networks. International Journal of Distributed Sensor Networks, 2012, 1-14. Nematy, F., Rahmani, A. M., Teshnelab, M., & Rahmani, N. (2010, 26-28 Nov. 2010). Ant colony based node deployment and search in wireless sensor networks. Paper presented at the 2010 International Conference on Computational Intelligence and Communication Networks (CICN). Wang, G., Cao, G., & Porta, T. L. (2004). Movement-assisted sensor deployment. Paper presented at the INFOCOM 2004. Xiangyu, Y., Weipeng, H., Junjian, L., & Xin, Q. (2012, 16-18 May 2012). A novel virtual force approach for node deployment in wireless sensor network. Paper presented at the 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (DCOSS). Yang, X.-S., & Deb, S. (2009). Cuckoo search via levy flights. Paper presented at the Proceedings of World Congress on Nature & Biologically Inspired Computing, New Delhi. Zou, Y., & Chakrabarty, K. (2003). Sensor deployment and target localization based on virtual forces. Paper presented at the Twenty-Second Annual Joint Conference of the IEEE Computer and Communication. 150