Skip to main content

Advertisement

Log in

A Meta-Heuristic Based Approach with Modified Mutation Operation For Heterogeneous Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The peculiar factor of coverage called target coverage in an energy-constrained wireless sensor network is a fierce challenge nowadays. Genetic algorithm-based meta-heuristic has proven methodology while aiming to prolong the achievable network lifetime. There is a plethora of research works where maximizing the total network lifetime issue is classified as an optimization problem. In the literature, evolutionary techniques like meta-heuristics are best to use while solving an optimization problem. The task becomes more challenging due to the dense deployment of sensor nodes in the given pre-decided network. In this paper, the target coverage problem is addressed with the primary objective of maximizing the coverage of a specified set of targets with sensors with limited energy. The proposed genetic algorithm-based heuristic with modified mutation operation prolongs the network lifetime. The experimental results clearly depict that the proposed meta-heuristic performs considerably better while computing network lifetime. Besides, the performance of the proposed methodology is also compared with existing works, and it is observed that proposed algorithms perform better.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Availability of data and material (data transparency)

Yes.

Code availability (software application or custom code)

Yes.

References

  1. Mehra, P. S., Doja, M. N., & Alam, B. (2019). Enhanced clustering algorithm based on fuzzy logic (E-CAFL) for WSN. Scalable Computing: Practice and Experience, 20(1), 41–54.

    Google Scholar 

  2. Mahfoudh, S., Minet, P., Laouiti, A., & Khoufi, I. (2017). Survey of deployment algorithms in wireless sensor networks: Coverage and connectivity issues and challenges. International Journal of Autonomous and Adaptive Communications Systems, 10(4), 341.

    Article  Google Scholar 

  3. Manju, S. Chand, & B. Kumar. (2016). Maximizingnetworklifetimefortargetcoverage problem in wireless sensor networks. IET Wireless Sensor System, 6 (6), 192–197.

    Article  Google Scholar 

  4. Singh, S., Chand, S., Kumar, R., Kumar, B., & Malik, A. (2016). NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wireless Sensor System, 6(5), 151–157.

    Article  Google Scholar 

  5. Manju, Samayveer Singh, Sandeep Kumar, Anand Nayyar, Fadi Al-Turjman, & Leonardo Mostarda. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315–74325.

  6. Mehra, P. S., Doja, M. N., & Alam, B. (2019). Zonal based approach for clustering in heterogeneous WSN. International Journal of Information Technology, 11(3), 507–515.

    Article  Google Scholar 

  7. Özdäg, R. (2018). Optimization of target Q-Coverage problem for QoS requirement in wireless sensor networks. Journal of Computing, 13 (4), 480–489.

    Google Scholar 

  8. Cardei, M., Thai, M. T., Li, Y., & Wu, W. (2005). Energy-efficient target coverage in wireless sensor networks. In Proceedings of IEEE 24th Annual Joint Conference on Computer Communcation Societies, pp. 1976–1984.

  9. Chaudhary,M., & Pujari, A. K. (2009). Q-Coverage Problem in Wireless Sensor Networks. In International Conference on Distributed Computing and Networking ICDCN in (Lecture Notes in Computer Science), vol. 5408. Berlin, Springer-Verlag, pp. 325–330.

  10. Singh, D., Kumar, B., & Singh, S. (2020). Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network. Wireless PersCommunication **.

  11. Alia, O. M., & Al-Ajouri, A. (2017). Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm. IEEE Sensors Journal, 17, 882–896.

    Article  Google Scholar 

  12. Deepti Singh, Bijendra Kumar, Samayveer Singh & Satish Chand (2019). SMAC-AS: MAC based secure authentication scheme for wireless sensor network. Wireless Personal Communications, 107, 1289–1308

  13. Carrabs, F., Cerulli, R., D’Ambrosio, C., & Raiconi, A. (2015). A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints. Journal of Network and Computer Applications, 58, 12–22.

    Article  Google Scholar 

  14. Manju, Chand, S., & Kumar, B. (2018). Geneticalgorithm-basedmeta-heuristic for target coverage problem. IET Wireless Sensor System, 8 (4), 170–175.

    Article  Google Scholar 

  15. Gupta, S. K., Kuila, P., & Jana, P. K. (2016). Genetic algorithm approach for K coverage and M-connected node placement in target based wireless sensor networks. Computers & Electrical Engineering., 56, 544–556.

    Article  Google Scholar 

  16. Kebir, S., Borne, I., & Meslati, D. (2017). A genetic algorithm-based approach for automated refactoring of component-based software. Information and Software Technology, 88, 17–36.

    Article  Google Scholar 

  17. Raiconi, A., & Gentili, M. (2011). Exact and metaheuristic approaches to extend lifetime and maintain connectivity in wireless sensors networks Lecture notes in computer science’ (Vol. 6701, pp. 607–619). Springer.

  18. Harizan, S., & Kuila, P. (2019). Coverage and connectivity aware energy efficient scheduling in target based wireless sensor networks: An improved genetic algorithm based approach. Wireless Networks, 25, 1995–2011.

    Article  Google Scholar 

  19. Zhou, P., Wang, C., & Yang, Y. (2019). Static and mobile target–Coverage in wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing, 18(10), 2430–2445.

    Article  Google Scholar 

  20. Samayveer Singh (2019). A proficient node deployment mechanism using adjustable sensing range in wireless sensor networks. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, pp. 1–9.

  21. Deepti Singh, Samayveer Singh, Bijendra Kumar, & Satish Chand. (2019). A Secure IoT based mutual authentication for Wireless sensor networks using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI), IGI Global.**

  22. Konak, A., Coit, D. W., & Smith, A. E. (2006). Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering & System Safety, 91(9), 992–1007.

    Article  Google Scholar 

  23. Liu, X., & He, D. (2014). Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks. Journal of Network and Computer Applications, 39, 310–318.

    Article  Google Scholar 

  24. Moro, G., & Monti, G. (2012). W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks. Journal of Network and Computer Applications, 35(4), 1218–1234.

    Article  Google Scholar 

  25. Yang, C., & Chin, K.-W. (2017). On nodes placement in energy harvesting wireless sensor networks for coverage and connectivity. IEEE Transactions on Industrial Informatics, 13(1), 27–36.

    Article  Google Scholar 

  26. Yang, C., & Chin, K.-W. (2014). Novel algorithms for complete targets coverage in energy harvesting wireless sensor networks. IEEE Communications Letters, 18(1), 118–121.

    Article  Google Scholar 

  27. Sunil Kr. Jha, & Egbe Michael Eyong. (2018). An energy optimization in wireless sensor networks by using genetic algorithm. Telecommunication System, 67 , 113–121.

  28. Han, G., Xu, H., Duong, T. Q., Jiang, J., & Hara, T. (2013). Localization algorithms of wireless sensor networks: A survey. Telecommunication Systems, 54(4), 2419–2436.

    Article  Google Scholar 

  29. Catarinucci, L., Colella, R., Del Fiore, G., Mainetti, L., Mighali, V., & Patrono, L. (2014). A cross-layer approach to minimize the energy consumption in wireless sensor networks. International Journal of Distributed Sensor Networks, 10(1), 268–284.

    Article  Google Scholar 

  30. Shareef, A., & Zhu, Y. (2010). Energy modeling of wireless sensor nodes based on Petri nets. In Proceedings of ICPP, 2010, pp. 101–110.

  31. Abdul-Salaam, G., Abdullah, A. H., Anisi, M. H., Gani, A., & Alelaiwi, A. (2016). A comparative analysis of energy conservation approaches in hybrid wireless sensor networks data collection protocols. Telecommunication Systems, 61(1), 159–179.

    Article  Google Scholar 

  32. Du, W., Mieyeville, F., & Navarro, D. (2010). Modeling energy consumption of wireless sensor networks by system. In Proceedings of ICSNC, 2010, pp. 94–98.

  33. Keskin, M. E., Altınel, ˙I. K., Aras, N., & Ersoy, C. (2014). Wireless sensor network lifetime maximization by optimal sensor deployment, activity scheduling, data routing and sink mobility. Ad Hoc Networks, 17, 18–36.

    Article  Google Scholar 

  34. He, S., Chen, J., Yau, D. K., & Sun, Y. (2012). Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Transactions on Mobile Computing, 11(11), 1678–1691.

    Article  Google Scholar 

  35. Liu, H., Chu, X., Leung, Y. W., & Du, R. (2013). Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1783–1796.

    Article  Google Scholar 

  36. Manju, N., Chand. s. & Kumar B. (2016). Improved-coverage preserving clustering protocol in wireless sensor networks. International Journal of Engineering and Technology Innovation, 6(1), 16–29.

    Google Scholar 

  37. Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.

    Article  Google Scholar 

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manju.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manju A Meta-Heuristic Based Approach with Modified Mutation Operation For Heterogeneous Networks. Wireless Pers Commun 122, 963–979 (2022). https://doi.org/10.1007/s11277-021-08935-w

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08935-w

Keywords

Navigation