This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
In the field of sensor monitoring and communication engineering, the development of wireless sensor network (WSN) technology has become the main driving force of the Internet of Things (IoT) technology [1]. With the development of communication and software technology, sensor networks have become a hot spot in essential application fields such as monitoring the ecological environment [2], agricultural production [3], military battlefield [4], and disasters and accidents [5, 6]. Generally, the hardware equipment used for monitoring is composed of multiple sensors with clear functions, low energy, small shape, and portability. The hardware completes the deployment of wireless sensor networks through sensing and communication functions.
In recent years, many new technologies and methods have been adopted to improve the quality of service (QoS) in wireless sensor networks [7]. The coverage effect of the sensor monitoring area is an essential indicator of network quality of service [8], which can measure the perception ability of the sensor to be monitored area under different deployment structures. Usually, the number of sensors is limited and randomly placed in the target monitoring range, and the deployment of sensor nodes is uneven, resulting in the problem of coverage holes, which ultimately affects the network’s quality of service. The optimal deployment of sensor nodes is the premise to ensure the data acquisition, transmission, processing, and reliable application of sensor networks. It is an enduring conundrum in sensor networks [9]. For sensor deployment, the main goal is to use limited sensor resources to cover the target area as evenly and widely as possible [10]. The coverage effect of the area to be monitored can be divided into point coverage, area coverage, and fence coverage [11]. WSN coverage in this paper is based on the method of point coverage. Most studies assume that the points to be monitored are evenly distributed in two-dimensional (2D) or three-dimensional (3D), and these areas are covered by a circular or spherical monitoring range centered on the sensor.
The research on sensor deployment is mainly divided into two types: deterministic deployment and random deployment [12, 13]. First of all, the deployment method is primarily used under the conditions of a good geographical environment, such as plains, wheat fields, grasslands, and lakes. In [14], sensors are deployed using a regular lattice model that can be full of space, but the actual monitoring environment cannot be an ideal 2D or 3D space. The environment often has flat terrain and is easy to plan and deploy. Random deployment is mainly used when the sensor nodes are difficult to fix quickly or reach the designated position. The first deployment is formed in a complex or harsh natural environment by aircraft throwing [15]. Obviously, this kind of method will cause a large number of sensor coverage redundancy and coverage holes. It will seriously waste sensor network resources and damage the network’s quality of service. In fixed deployment mode, when the sensor does not have mobility, mobile sink can be used to improve the energy consumption and delay of the network [16]. On the other hand, when the sensor is mobile, researchers use the method of moving sensors in a small range to adjust the deployment structure and realize the second deployment of sensors [17]. There are also studies on monitoring target points or target regions by moving sensor nodes with strong mobility [18, 19]. There are also studies that address the deployment reliability of sensors; reference [20] divides sensor coverage methods into centralized and distributed. Wireless sensors are costly to deploy and must be used to maximize coverage for resource-constrained problems [21, 22]. After random deployment of sensor nodes in different scenarios, it is difficult to immediately meet the requirements of network coverage, and it is a hot issue to use the limited mobility of sensors for secondary deployment. However, most methods cannot achieve the expected results, resulting in a waste of resources and energy.
In this paper, we propose a coverage enhancement method for wireless sensor networks based on improved metaheuristic algorithm, which can effectively improve the coverage performance of wireless sensor networks. The main contributions are as follows:
(1) The location model of the area to be monitored and the sensor location model has been established, and the sensor coverage problem was transformed into the solution model of intelligent optimization algorithm
(2) An initial solution construction method is proposed. The quality of the initial solution of the population iteration is improved by an inverse elite solution to further make the location distribution of the random sensors as uniform as possible
(3) According to the fluorescence effect in the firefly intelligent optimization algorithm, the population individual optimization method in order to improve the local binding force during the population iteration and prevent from falling into local optimization is improved
(4) In experimental simulations, on the one hand, a comparison with other metaheuristic algorithms for sensor coverage is made to demonstrate the advantage of the algorithm on high-dimensional multimodal reference functions. On the other hand, it verifies the advantages of deploying coverage in wireless sensor networks
The structure of this paper to enhance the WSN coverage is as follows: Section 2 introduces the current situation of coverage optimization at home and abroad. Section 3 introduces the coverage model in detail. Section 4 discusses the improved sparrow search algorithm. Section 5 presents the performance of the algorithm in the benchmark function and the effect in the application of sensor coverage and analyzes and discusses it. Section 6 gives conclusions and future prospects.
2. Related Work
The approximate solution of the metaheuristic optimization algorithm based on intelligent optimization has strong applicability in practical application compared with an accurate solution, especially in the research of sensor deployment optimization. Intelligent optimization algorithms have become the primary means of research in this direction.
In the deterministic deployment study, when there are few sensor nodes, a grid-based distributed sensor node deployment strategy was used in reference [23] to determine the location of deployed sensor nodes. Xu et al. [24] divided the monitoring area into multiple triangular grids to complete the coverage of the target by adjusting the distance relationship between the nodes and applied it to the underwater sensor network. In reference [25], on the basis of coverage, the connectivity between sensors is considered at the same time, which is able to keep the network connection even if some sensors fail. On the basis of guaranteeing sensor coverage and connectivity, some researchers in the literature [26, 27] further guarantee the connectivity and coverage of deterministic deployment networks by introducing relay nodes. Compared to random deployment, deterministic deployment was aimed at achieving target area coverage mainly with the minimum number of nodes and is closely related to the deployment space structure.
[28] proposed a metaheuristic algorithm based on ant-lion optimization (ALO) for sensor coverage and sensor sensing perception performance. This method transforms coverage into a function maximization problem, which can effectively and quickly achieve reliable deployment of wireless sensors, and proves that the deployment strategy of this algorithm outperforms sensor coverage by genetic algorithm (GA_WSN) and particle swarm optimization (PSO_WSN) algorithm for sensor deployment applications. Reference [29] proposed a sensor random deployment method based on grey wolf optimizer (GWO) to address the problem of low sensor coverage. Liao et al. [30] used the firefly swarm algorithm (FA) [31] to establish two detailed coverage models, central deployment and overlay deployment, for the sensor deployment coverage problem, and compared the coverage efficiency and mobility problems of these two models. These studies are based on the initial random deployment, so before considering the secondary deployment of sensors, the random nodes initially generated are close to the real scene, which is conducive to the implementation of the application. [32] not only generates scientific random deployment nodes of sensor nodes but also proposes the method of generating data packets, which has strong applicability in WSN performance imitation.
In terms of algorithm performance, although the intelligent optimization algorithm has strong optimization ability, few design parameters, and fast running speed, it still has some shortcomings. Compared with other traditional algorithms, SSA proposed by Xue and Shen [33] has certain advantages in parameter design and solution accuracy. However, there are still problems of poor population diversity and individual populations easy to fall into local optimization. Sensor network coverage itself is a multidimensional problem. In this paper, the objective function of coverage is established in the high-dimensional mathematical model. Therefore, it is essential to solve poor population diversity and make it easy to fall into local optimization. This paper uses elite reverse strategy and firefly algorithm to solve this problem, and an improved sparrow search algorithm based on firefly (EFSSA) is proposed. [34] studied the optimization ability of population diversity of elite reverse strategy in particle swarm optimization algorithm. Sengathir et al. [35] combined the firefly algorithm with the artificial bee colony algorithm to extend the lifetime of the clustering problem of wireless sensor networks. Some researchers have also used BSA algorithm [36] combined with SSA algorithm to extend the lifetime of wireless sensor networks [37]. For the robot path planning problem, Ref. [38] proposed three different improved methods in SSA. Based on sparrow search, this paper combines elite reverse strategy and firefly so that the intelligent optimization algorithm can have a better performance effect on the problem of sensor coverage.
In recent years, some new evolutionary algorithms have been proposed and have good performance in common test functions. For example, the bald eagle search (BES) algorithm [39] simulates the hunting strategy and intelligent information interaction behavior of condor when looking for prey. Ahmadianfar et al. [40] proposed Runge Kutta (RK) optimizer algorithm, which proposed the global optimization search mechanism in the feature space and enhanced solution quality (ESQ) to avoid the local optimization mechanism.
3. Problem Definition
Suppose that the sensor nodes of the wireless sensor networks are distributed in the two-dimensional space of
Assuming that the sensing model is a Boolean model, the sensor node
In the ideal state, the optimal structure for isomorphic sensor node deployment is the coverage model [43] with the sensor node as the center, the sensing distance as the radius of the circumscribed circle of the positive hexagon, and the tiled area to be monitored (e.g., in Figure 1(a)).The sensor equipment will be disturbed by noise and the physical environment in the actual scene, following a specific regular probability distribution [40]. At this time, the relationship between probability and distance is (see Figure 1(b))
[figure(s) omitted; refer to PDF]
In the equation,
The same point
Then, the calculation equation for the total coverage
At the same time, in order to better reflect the redundancy, utilization, and distribution uniformity of sensor network coverage, the ratio
4. Proposed Method
4.1. Overview of Sparrow Search Algorithm
In 2020, a metaheuristic method SSA based on large-scale bird foraging and early warning was proposed [33]. In this algorithm, the whole sparrow group can be abstracted into two groups: entrants and finders, and a reconnaissance and early warning mechanism is added to the search. The finder usually has a high energy reserve. When areas with more food are found, they are able to provide flight directions for the joiners. Joiners always have access to good food sources from the information of the finder. At the same time, in SSA algorithm, the population has the strategy to realize the threat and to adopt antipredatory behavior.
4.1.1. Update Method of the Finder
Firstly, the definition of the population is given. Assuming that each population size is
where
It should be noted that when the condition
In Equation (9), as the search algorithm is computed, the iteration around
4.1.2. Update Method of Joiners
In the sparrow population, after removing the finder, the rest is the joiner, and the joiner will follow the finder. Joiners will also monitor the finders. Once they find a better foraging location, they will abandon their current foraging area and fly to an area with more food based on the information. The equation for updating the position of joiners is expressed as [33]
In Equation (10),
4.1.3. Update Methods of Reconnaissance and Early Warning
In the simulation experiment, sparrows with conscious danger signals did not exceed 20% of the total number and their selection was randomized. The update formula for these individuals is as follows [33]:
Similar to Equation (9),
4.2. Improvement Strategy
In the previous studies, the SSA algorithm has been proved to have good convergence and robustness [33], but there are still some deficiencies. For the convergence speed and local optimum problem of SSA algorithm, this paper will improve the SSA algorithm through elite reverse learning and firefly algorithm and propose a sparrow search algorithm (EFSSA) with elite reverse and firefly crossover. These two strategies are introduced in detail below.
4.2.1. Elite Reverse Strategy
The initial solution of the traditional sparrow search algorithm is initialized in a random way, and the population diversity is poor. Therefore, in this paper, the elite inverse method is added to the position initialization process. The elite individuals are constructed to reverse the sparrow individuals so that the algorithm has a better initial solution. In 2005, Professor Tizhoosh first proposed the concept of reverse learning (OBL) [44]. This paper points out that the initial values of most intelligent algorithms are mainly based on guessing and then finding or close to the optimal solution after many iterations. Randomly generating the initial solution will greatly impact the solution results. Suppose the random value at the beginning of each iteration is far from the optimal solution or even the opposite. In that case, it will greatly impact the algorithm and consume a lot of update time [45].
Therefore, this paper introduces the reverse solution, which can expand the search area of the algorithm. However, the original solution is higher than the reverse solution for those sparrows with high fitness values. If the reverse solution space is searched, it will be a waste of time, and the original domain search should be strengthened. The value of reverse region search is higher for sparrows whose reverse solution is higher than the original solution. The definition of the inverse solution is given below:
(1) Definition of elite solution: suppose
(2) Definition of inverse solution: assuming that
4.2.2. Firefly Disturbance Strategy
SSA algorithm is easy to fall into local optimization in the later stage of iteration, which is usually caused by sparrow individuals falling into local optimization in a specific dimension in the calculation process. The firefly algorithm is introduced into the algorithm. All sparrows and the optimal sparrow are disturbed by the algorithm to update the position to improve its search performance. The sparrow after disturbance is compared with the sparrow before disturbance. If it is better, the sparrow position is updated. The main parameters disturbed by the firefly intelligent optimization algorithm include the fluorescence brightness, attraction, and update position of the firefly. The equations are as follows:
Firstly, the expression equation of fluorescence brightness principle based on firefly strategy [35] is
where
Therefore, in the firefly strategy, the attraction equation of firefly [35] is
It can be concluded that the attraction refers to the principle of the fluorescence brightness equation;
Suppose the position of firefly
where
4.2.3. Sensor Deployment Based on Metaheuristic Algorithm
This section gives the flow of EFSSA algorithm (see Algorithm 1 for the specific implementation process).
Algorithm 1: EFSSA.
/
The Number of Population:
Maximum Iterations:
Initial Finder Number:
Initial Detection and Early Warning Ratio:
Initial Warning Value : 0.8
Firefly Parameter:
/
while (
According to Equation (12) and (13), the elite reverse strategy is implemented for the initial population (2
Rank the individuals in the population according to fitness values;
Select the optimal
for
Based on the results of the last iteration of the finder, update the position according to Equation (8);
end for
for
The position of the joiner is disturbed according to the Equation (10);
end for
for
Based on the results of the last iteration of the detection and early warning, update the position according to equation (11) and (17);
end for
end while
return the best solution.
In Algorithm 1,
The optimization performance of SSA algorithm has been proved in literature [33]. This paper will further explore the computational time complexity. Compared with the original SSA algorithm, the time complexity of EFSSA is acceptable. The time complexity of the algorithm is denoted as
EFSSA adopts elite reverse strategy, so it increases the size of sorting. When sorting, the time complexity of EFSSA is
Then, the coverage optimization framework is established according to the sensor deployment model (Algorithm 2). Input parameters related to the sparrow search algorithm and coverage are initialized, and the number of sensor nodes and deployment area is set. Then, the coordinates of the sensor nodes are used as the individuals of the population. Under the calculation of the number of iterations
Algorithm 2: WSNs deployment based on EFSSA.
/
Initialization EFSSA parameters are consistent with Algorithm 1
Set the number of sensor nodes
Initialize the sensor node position
Set the sensor deployment scope
/
while (
The elite reverse strategy is implemented for the initial sensor position array;
Rank the individuals in the population according to fitness values;
Select the optimal
for
Update the position of finder;
end for
for
Update the position of joiner;
end for
for
Update the detection and early warning with firefly strategy;
end for
Obtain the current sensor node deployment results by calculating node coverage in Equation (6);
If the new overlay mode is better than the last overlay result, update it;
end while
return Optimal WSNs deployment results.
[figure(s) omitted; refer to PDF]
5. Experimental Analysis
5.1. Benchmark Function Test
In this section, in order to test the optimization performance of EFSSA algorithm, first compare the algorithm with four related evolutionary optimization algorithms on the benchmark function (shown in Table 1), including ALO [28] algorithm, GWO algorithm [29], BES algorithm [39], RK algorithm [40], and SSA algorithm [33]. The experiment was carried out in the test environment of Intel (R) core i7-8750h CPU, 2.20 GHz, 16 GB memory, and windows10 64 bit and was written with MATLAB 2020b software. Table 1 gives the names, equations, dimensions, independent variable ranges, and optimal global values of 15 classical benchmark functions on cec2008, cec2017, and cec2020.
Table 1
Reference function.
Name | Functions | Domain | ||
Sphere | 30 | [-100,100] | 0 | |
Schwefel-1 | 30 | [-10,10] | 0 | |
Schwefel-2 | 30 | [-100,100] | 0 | |
Tablet | 30 | [-100,100] | 0 | |
Rosenbrock | 30 | [-30,30] | 0 | |
Step | 30 | [-100,100] | 0 | |
Quadric | 30 | [-1.28,1.28] | 0 | |
Schwefel | 30 | [-500,500] | 0 | |
Rastrigrin | 30 | [-5.12,5.12] | 0 | |
Ackley | 30 | [-32,32] | 0 | |
Griewank | 30 | [-600,600] | 0 | |
Penalized | 2 | [-5,5] | 0 | |
Foxholes | 2 | [-65,65] | 0 | |
Kowalik | 4 | [-5,5] | 0 | |
Hartman | 3 | [0,1] | 0 |
F1~F7 are unimodal high-dimensional test functions, F8~F11 (see Figure 2) are multimodal test functions, and F12~F15 are fixed low-dimensional test functions. In order to avoid errors in the computation of all the given algorithms due to different parameters, the size of the population was set to 50 and all the experiments were repeated 30 times having 500 iterations independently. Through the benchmark function experiment, the optimal value and standard deviation of each algorithm on the same benchmark function are obtained, so as to evaluate their optimization and stability.
As shown in Table 2, the average value of the optimal optimization of the current function is marked in bold in each row of data. The optimization ability of EFSSA algorithm is better than that of other functions in most test functions. Among the 15 test functions, EFSSA algorithm outperforms others in 9 of them. The high-dimensional unimodal test EFSSA has the best optimization effect in F4 and F5 functions. The mean values of F1~F3 and F7 are second only to those of RK algorithm. This is because RK algorithm calls Runge Kutta method for the function to calculate the logic of slope change, so it is better in single-peak function.
Table 2
Benchmark function test results.
Test function | Statistical value | ALO | GWO | BES | RK | SSA | EFSSA |
F1 | Mean | 8.050E-05 | 1.286E-33 | 1.187E-37 | 7.230E-201 | 8.262E-51 | 6.636E-90 |
Std | 2.736E-05 | 1.835E-33 | 3.498E-37 | 0.000E+00 | 2.493E-50 | 2.003E-89 | |
F2 | Mean | 3.113E+01 | 5.521E-20 | 2.608E-27 | 1.364E-109 | 9.793E-47 | 2.308E-48 |
Std | 3.903E+01 | 4.386E-20 | 3.441E-27 | 4.081E-109 | 3.703E-46 | 7.015E-48 | |
F3 | Mean | 2.062E+03 | 1.210E-08 | 3.702E-05 | 4.726E-165 | 7.054E-33 | 2.650E-80 |
Std | 7.633E+02 | 1.384E-08 | 1.126E-04 | 0.000E+00 | 1.496E-32 | 1.436E-79 | |
F4 | Mean | 1.542E+01 | 1.044E-09 | 2.864E-01 | 1.707E-34 | 7.898E-17 | 1.073E-35 |
Std | 4.745E+00 | 2.270E-03 | 2.460E-01 | 5.185E-34 | 1.875E-16 | 5.879E-35 | |
F5 | Mean | 9.807E+01 | 2.658E+01 | 1.780E+01 | 2.290E+01 | 5.913E-04 | 1.132E-06 |
Std | 1.228E+02 | 5.720E-01 | 4.735E+00 | 1.034E+00 | 1.100E-03 | 2.742E-06 | |
F6 | Mean | 1.511E-04 | 4.501E-01 | 7.296E-29 | 1.191E-09 | 2.089E-06 | 1.483E-11 |
Std | 1.694E-08 | 2.843E-01 | 1.955E-28 | 4.113E-10 | 4.154E-06 | 7.506E-12 | |
F7 | Mean | 1.514E-01 | 1.620E-03 | 1.900E-03 | 1.278E-04 | 3.634E-04 | 1.490E-03 |
Std | 4.370E-02 | 8.694E-04 | 1.350E-03 | 6.935E-05 | 3.110E-04 | 7.961E-04 | |
F8 | Mean | -5.519E+03 | -6.609E+03 | -4.994E+03 | -8.222E+03 | -1.048E+04 | -8.915E+03 |
Std | 7.357E+02 | 5.895E+02 | 4.588E+02 | 7.791E+02 | 2.096E+03 | 1.286E+03 | |
F9 | Mean | 8.453E+01 | 7.981E-01 | 1.344E+01 | 0.000E+00 | 0.000E+00 | 0.000E+00 |
Std | 1.469E+01 | 1.644E+00 | 2.464E+01 | 0.000E+00 | 0.000E+00 | 0.000E+00 | |
F10 | Mean | 2.179E+00 | 4.233E-14 | 4.440E-15 | 8.880E-16 | 8.880E-16 | 8.882E-16 |
Std | 6.775E-01 | 1.678E-15 | 0.000E+00 | 0.000E+00 | 0.000E+00 | 0.000E+00 | |
F11 | Mean | 2.162E-02 | 0.000E+00 | 0.000E+00 | 0.000E+00 | 0.000E+00 | 0.000E+00 |
Std | 1.270E-02 | 0.000E+00 | 0.000E+00 | 0.000E+00 | 0.000E+00 | 0.000E+00 | |
F12 | Mean | 1.151E+01 | 2.836E-02 | 8.881E-26 | 4.664E-10 | 3.319E-07 | 2.184E-13 |
Std | 3.072E+00 | 1.233E-02 | 2.696E-25 | 1.462E-10 | 6.935E-07 | 1.330E-13 | |
F13 | Mean | 4.504E+00 | 3.196E-01 | 3.467E-02 | 4.310E-03 | 2.741E-06 | 4.144E-12 |
Std | 1.133E+01 | 1.558E-01 | 3.895E-02 | 7.170E-03 | 3.240E-06 | 1.397E-12 | |
F14 | Mean | 1.989E+00 | 2.562E+00 | 9.980E-01 | 1.591E+00 | 4.220E+00 | 9.980E-01 |
Std | 7.847E-01 | 2.921E+00 | 1.312E-02 | 9.286E-01 | 4.552E+00 | 1.312E-02 | |
F15 | Mean | 2.740E-03 | 2.310E-03 | 2.340E-03 | 6.112E-04 | 3.270E-04 | 3.073E-04 |
Std | 5.980E-03 | 6.120E-03 | 6.110E-03 | 4.378E-04 | 4.029E-05 | 4.498E-07 |
Because the F6 function is a concave canyon function with a strong locality, the variation range in the valley is small, and the optimal value is in the only local region, so the effect of the BES algorithm is better. Among the high-dimensional multimodal test functions, EFSSA algorithm has obvious optimization and stability superior to other algorithms. This is because the multimodal function is easy to make the traditional algorithm fall into local solutions and needs a dispersed and uniform population distribution. Here, the applicability of EFSSA algorithm can be obviously reflected. Finally, for low-dimensional functions F12~F15, EFSSA algorithm can basically maintain the superiority of the algorithm, although the performance of F12 is worse than that of BES, it is still superior to other algorithms.
Because functions F8~F11 and sensor network coverage are similar high-dimensional multimodal function problems, we further analyze the testing effect of EFSSA algorithm in this kind of problem. Figures 3 and 4 show the objective function curves and the function graph of benchmark functions Schwefel, Rastrigrin, Ackley, and Griewank with the number of iterations.
[figure(s) omitted; refer to PDF]
As shown from the Figure 4, the EFSSA algorithm has better convergence with the increase of iteration times compared with ALO, GWO, BES, RK, and SSA algorithms. Its optimization performance is also the best. In general, EFSSA performs better than other algorithms in testing functions, especially in high-dimensional multimodal function problems. In the next section, this paper will further verify the effect of EFSSA algorithm in the sensor coverage deployment experiment.
5.2. Simulation Experiment of Sensor Network Coverage
In this section, in order to test the optimization performance of EFSSA algorithm, firstly, the critical parameters of EFSSA algorithm and five related evolutionary optimization algorithms are given. In the experiment, the wireless network perception model uses Boolean model and probability model. Then, the simultaneous interpreting of the two deployment effects of sensors with different monitoring areas and different sensor numbers is compared.
5.2.1. Parameter Setting
In this section, the ability of EFSSA algorithm to solve the coverage problem of wireless sensor networks will be evaluated through a series of simulation experiments. The software and physical platforms tested by the above benchmark algorithm are still used, and the MATLAB experimental environment is used to simulate sensor the coverage effect of sensor deployment. The critical parameters used in the experiment of ALO [28] algorithm, GWO algorithm [29], BES algorithm [39], RK algorithm [40], and SSA algorithm [33] are set by default. For example, the parameters in SSA and FA algorithm come from literature [33, 35]. The parameters of monitoring area parameters and the EFSSA algorithm are shown in Table 3.
Table 3
Simulation parameters.
Parameters | Value |
Monitoring area size | |
Iterations | |
Perceived radius ( | |
Probability perception ( | 0.5 |
Single-step moving distance | |
The population size | |
Repetitions | |
Finders ratio | |
Reconnaissance ratio | |
Early warning value |
The monitoring area for sensor deployment is divided into
5.2.2. Boolean Coverage Experiment
For Boolean coverage model in Equation (2), through the test results of the ALO, GWO, BES, RK, SSA, and EFSSA algorithms, this paper verifies the coverage efficiency of these six different algorithms in a sensor network monitoring environment.
Firstly, the monitoring area is completely covered without considering the boundary effect, and the optimal deployment strategy of a regular hexagon is used to calculate the sensor nodes that need to be evenly deployed within different monitoring area. When all sensor nodes are randomly deployed in a two-dimensional plane, the initial input positions are the same for all algorithms. It can be seen from Table 4 that when 9 nodes are deployed within
Table 4
Coverage of different nodes and monitoring areas.
Area | Nodes | Initial | ALO | GWO | BES | RK | SSA | EFSSA |
7 | 0.52222 | 0.90667 | 0.91556 | 0.88667 | 0.91222 | 0.85333 | 0.92444 | |
9 | 0.67889 | 0.96778 | 0.99667 | 0.96556 | 0.99889 | 0.91000 | 1.00000 | |
11 | 0.75111 | 0.99778 | 1.00000 | 0.99333 | 1.00000 | 0.93444 | 1.00000 | |
20 | 0.58480 | 0.86080 | 0.94280 | 0.84160 | 0.93640 | 0.83280 | 0.96120 | |
25 | 0.68280 | 0.96778 | 0.98000 | 0.88600 | 0.96800 | 0.84240 | 0.99600 | |
30 | 0.72720 | 0.97680 | 0.99640 | 0.94640 | 0.99000 | 0.92800 | 1.00000 | |
40 | 0.64041 | 0.87490 | 0.90673 | 0.79163 | 0.87551 | 0.87490 | 0.95224 | |
50 | 0.71429 | 0.90330 | 0.80600 | 0.81050 | 0.90070 | 0.80890 | 0.96920 | |
60 | 0.76714 | 0.95959 | 0.97755 | 0.91347 | 0.98750 | 0.97000 | 0.99980 | |
64 | 0.65321 | 0.84543 | 0.75370 | 0.76407 | 0.86753 | 0.77210 | 0.92136 | |
80 | 0.71568 | 0.88100 | 0.79490 | 0.80500 | 0.78990 | 0.80040 | 0.94460 | |
96 | 0.78309 | 0.96346 | 0.86185 | 0.88642 | 0.94543 | 0.87099 | 0.99284 |
In Figure 5, the effect of regional balanced deployment is shown. The uniformity of EFSSA with high coverage is obviously better than that of SSA and BES with low coverage. In Figure 5(f), the EFSSA sensor deployments are nearly universal, but some overlying voids can still be seen. After the optimization of these algorithms for second deployment, which is due to the fact that the experiments in this paper divide the space into two-dimensional pixel points and the noninteger coordinates are not included in the detection area.
[figure(s) omitted; refer to PDF]
In Figure 6, the variation of coverage of different algorithms with the number of iterations in the balanced deployment mode is statistically analyzed. As the monitoring area becomes larger, the convergence speed of each algorithm is affected, because the increase of dimension leads to the difficulty of solving. However, EFSSA algorithm can maintain the superiority of the algorithm and can always be quickly to complete convergence in the case of different monitoring area sizes. Other algorithms, such as GWO algorithm, increase the monitoring range from 900m2 to 8100m2, the number of iterations approaching the optimal solution increases from 50 to 90 times, and the final coverage is still less than EFSSA algorithm. All SSA algorithms without improved strategy fall into local optimal solution after less than 10 iterations.
[figure(s) omitted; refer to PDF]
This paper analyzes the coverage effect with the number of iterations under these three different monitoring scales (sparse, balanced, and dense). Assuming that the number of sensor nodes is changed, set the sensors to
Table 5 shows the percentage of average coverage improvements for these algorithms at different deployment densities. With the increase of node deployment density, the coverage improvement effect of the six algorithms decreases. The reason is the increase in the number of sensor nodes makes the coverage of the initial immediate deployment of sensors larger, so the improvement effect of reoptimization decreases. From another perspective, with the number of sensor nodes increases, the complexity of optimization increases, but the optimization effect decreases. EFSSA algorithm can still maintain a coverage improvement effect of more than 30% in dense mode, which fully demonstrates the applicability of this algorithm. In Figure 7, the data of specific coverage improvement is described, from which we can see the improvement effect of different nodes under different algorithms; EFSSA is superior to other methods.
Table 5
Average rate of increase in coverage of Boolean coverage model.
Nodes | ALO (%) | GWO (%) | BES (%) | RK (%) | SSA (%) | EFSSA (%) |
Sparse (-20%) | 46.714 | 48.377 | 38.571 | 51.081 | 40.157 | 57.782 |
Balance (9/25/50/80) | 33.463 | 28.561 | 24.484 | 31.343 | 20.625 | 40.211 |
Dense (+20%) | 28.821 | 26.910 | 23.665 | 29.683 | 22.422 | 31.941 |
[figure(s) omitted; refer to PDF]
In terms of node utilization, Table 6 shows the results of performance metrics
Table 6
Real coverage rate
Area | Nodes | Initial | ALO | GWO | BES | RK | SSA | EFSSA |
7 | 0.43617 | 0.75726 | 0.76469 | 0.74056 | 0.76190 | 0.71271 | 0.77211 | |
9 | 0.44102 | 0.62868 | 0.64745 | 0.62724 | 0.64889 | 0.59115 | 0.64961 | |
11 | 0.39922 | 0.53032 | 0.53150 | 0.52796 | 0.53150 | 0.49666 | 0.53150 | |
20 | 0.47487 | 0.69898 | 0.76557 | 0.68339 | 0.76037 | 0.67625 | 0.78051 | |
25 | 0.44356 | 0.62868 | 0.63662 | 0.57556 | 0.62882 | 0.54723 | 0.64701 | |
30 | 0.39366 | 0.52878 | 0.53939 | 0.51233 | 0.53593 | 0.50237 | 0.54134 | |
40 | 0.50962 | 0.69622 | 0.72155 | 0.62996 | 0.69671 | 0.69622 | 0.75777 | |
50 | 0.45473 | 0.57506 | 0.51312 | 0.51598 | 0.57340 | 0.51496 | 0.61701 | |
60 | 0.40698 | 0.50908 | 0.51861 | 0.48461 | 0.52389 | 0.51460 | 0.53041 | |
64 | 0.53705 | 0.69508 | 0.61967 | 0.62819 | 0.71325 | 0.63479 | 0.75751 | |
80 | 0.47073 | 0.57946 | 0.52283 | 0.52947 | 0.51954 | 0.52645 | 0.62129 | |
96 | 0.42922 | 0.52808 | 0.47239 | 0.48586 | 0.51820 | 0.47740 | 0.54419 |
[figure(s) omitted; refer to PDF]
5.2.3. Probability Coverage Experiment
According to Equation (3), this section further analyzes the sensor coverage effects of different optimization methods under the probabilistic coverage model (see Table 7).
Table 7
Coverage of different nodes and monitoring areas.
Area | Nodes | Initial | ALO | GWO | BES | RK | SSA | EFSSA |
7 | 0.54471 | 0.94119 | 0.95447 | 0.93452 | 0.9427 | 0.86135 | 0.95785 | |
9 | 0.71403 | 0.98971 | 0.99860 | 0.99970 | 0.99707 | 0.92022 | 1.00000 | |
11 | 0.77412 | 0.99986 | 1.00000 | 0.99995 | 0.99995 | 0.97898 | 1.00000 | |
20 | 0.61927 | 0.89713 | 0.95495 | 0.85740 | 0.94564 | 0.86233 | 0.98819 | |
25 | 0.69384 | 0.98028 | 0.98480 | 0.91030 | 0.99061 | 0.87222 | 0.99845 | |
30 | 0.78252 | 0.99571 | 0.93871 | 0.95022 | 0.99581 | 0.93016 | 1.00000 | |
40 | 0.67723 | 0.90482 | 0.92735 | 0.83029 | 0.91366 | 0.80171 | 0.97860 | |
50 | 0.72356 | 0.94383 | 0.96897 | 0.88245 | 0.95941 | 0.88160 | 0.99971 | |
60 | 0.79525 | 0.97713 | 0.98469 | 0.94323 | 0.98750 | 0.94301 | 0.99992 | |
64 | 0.68236 | 0.89391 | 0.79155 | 0.78534 | 0.88172 | 0.81118 | 0.95985 | |
80 | 0.74505 | 0.94384 | 0.94525 | 0.86679 | 0.94197 | 0.87512 | 0.98739 | |
96 | 0.80732 | 0.98012 | 0.89001 | 0.92053 | 0.96962 | 0.89005 | 0.99814 |
In the probabilistic perception model structure, the coverage of the sensor edge is strongly influenced by
In Figure 9, the final distribution result graphs of the six algorithms, ALO, GWO, BES, RK, SSA and EFSSA, are shown when 25 nodes are deployed in a
[figure(s) omitted; refer to PDF]
Similar to the Boolean model experiment, the coverage improvement effect of different algorithms under different density deployment under probability model is also given in Table 8. Although the probabilistic perception model is not completely aware of some perception regions, the perception range is increased by 0.5 m. Therefore, the initial random coverage was increased, and the improvement rate of EFSSA algorithm in dense areas was decreased compared with that of Boolean model. In Figure 10, the percentage improvement of these six algorithms compared to the initial coverage is shown. It can be obtained in the figure that the percentage improvement of the optimization algorithm is relatively high in the region with sparse number of nodes. And EFSSA algorithm has the highest coverage improvement compared to the other five algorithms.
Table 8
Average rate of increase in coverage of probability coverage model.
Nodes | ALO (%) | GWO (%) | BES (%) | RK (%) | SSA (%) | EFSSA (%) |
Sparse | 45.566 | 45.591 | 36.927 | 47.474 | 33.660 | 55.146 |
Balance | 34.254 | 35.644 | 27.376 | 35.360 | 23.471 | 38.661 |
Dense | 25.577 | 20.754 | 20.602 | 25.334 | 18.784 | 27.373 |
[figure(s) omitted; refer to PDF]
In the probability model experiment, the evaluation index results
Table 9
Real coverage rate
Area | Nodes | Initial | ALO | GWO | BES | RK | SSA | EFSSA |
7 | 0.45495 | 0.78610 | 0.79719 | 0.78053 | 0.78736 | 0.71941 | 0.80001 | |
9 | 0.46384 | 0.64293 | 0.64870 | 0.64942 | 0.64771 | 0.59779 | 0.64961 | |
11 | 0.41145 | 0.53143 | 0.53150 | 0.53147 | 0.53147 | 0.52033 | 0.53150 | |
20 | 0.50286 | 0.72848 | 0.77543 | 0.69622 | 0.76787 | 0.70022 | 0.80243 | |
25 | 0.45073 | 0.63680 | 0.63974 | 0.59134 | 0.64351 | 0.56660 | 0.64861 | |
30 | 0.42361 | 0.53902 | 0.50816 | 0.51440 | 0.53908 | 0.50354 | 0.54134 | |
40 | 0.53892 | 0.72003 | 0.73796 | 0.66072 | 0.72707 | 0.63798 | 0.77875 | |
50 | 0.46063 | 0.60086 | 0.61687 | 0.56179 | 0.61078 | 0.56124 | 0.63644 | |
60 | 0.42189 | 0.51838 | 0.52239 | 0.50040 | 0.52389 | 0.50028 | 0.53047 | |
64 | 0.56101 | 0.73494 | 0.65078 | 0.64568 | 0.72492 | 0.66692 | 0.78916 | |
80 | 0.49004 | 0.62079 | 0.62172 | 0.57012 | 0.61956 | 0.57559 | 0.64944 | |
96 | 0.44250 | 0.53721 | 0.48782 | 0.50455 | 0.53146 | 0.48785 | 0.54709 |
[figure(s) omitted; refer to PDF]
6. Conclusions
An improved metaheuristic algorithm EFSSA has been proposed and successfully applied to solve the node coverage problem of two-dimensional wireless sensor networks. Based on the original sparrow search algorithm, the elite reverse strategy and firefly strategy were combined to improve the generalization ability of the initial population and the global search ability of the population. The original sparrow search algorithm is prone to the stagnation of local optimization in the problem of high-dimensional and multilocal extremum of sensor deployment. The fluorescence effect of the firefly strategy can change the defect that the sparrow algorithm falls into local optimization. Simulation and experimental results show that the EFSSA algorithm can effectively accelerate the convergence speed of solving the optimal coverage and avoid local optima in high-dimensional problems. In Boolean model and probabilistic model experiments, the EFSSA algorithm is more effective and feasible in applying second sensor deployment than other algorithms.
However, the method proposed in this paper has some limitations. In the experiment of sensor deployment index, the value of
Acknowledgments
This research was supported in part by the China National Key Research and Development (No. 2018YFC0808306), Hebei Key Research and Development Program (No. 19270318D), Hebei Internet of Things Engineering and Technology Research Center (No. 3142018055), and Qinghai Internet of Things Key Laboratory (No. 2017-ZJ-Y21).
[1] A. Shahraki, A. Taherkordi, Ø. Haugen, F. Eliassen, "A survey and future directions on clustering: from WSNs to IoT and modern networking paradigms," IEEE Transactions on Network and Service Management, vol. 18 no. 2, pp. 2242-2274, DOI: 10.1109/TNSM.2020.3035315, 2021.
[2] Z. A. A. Aiziz, S. Y. A. Ameen, "Air pollution monitoring using wireless sensor networks," Journal of Information Technology and Informatics, vol. 1 no. 1, pp. 20-25, 2021.
[3] Q. Yu, F. Xiong, Y. R. Wang, "Integration of wireless sensor network and IoT for smart environment monitoring system," Journal of Interconnection Networks, vol. 2021, article 2143010,DOI: 10.1142/S0219265921430106, 2021.
[4] I. Ahmad, K. Shah, S. Ullah, "Military applications using wireless sensor networks: a survey," International Journal of Engineering Science and Computing, vol. 6 no. 6, article 2143010, 2016.
[5] M. Erdelj, M. Król, E. Natalizio, "Wireless sensor networks and multi-UAV systems for natural disaster management," Computer Networks, vol. 124, pp. 72-86, 2017.
[6] G. J. Han, X. Yang, L. Liu, W. B. Zhang, M. Guizani, "A disaster management-oriented path planning for mobile anchor node-based localization in wireless sensor networks," IEEE Transactions on Emerging Topics in Computing, vol. 8 no. 1, pp. 115-125, DOI: 10.1109/TETC.2017.2687319, 2020.
[7] P. K. Donta, T. Amgoth, C. S. R. Annavarapu, "Machine learning algorithms for wireless sensor networks: a survey," Information Fusion, vol. 49, 2019.
[8] K. Xu, Z. Zhao, Y. Luo, G. Hui, L. Hu, "An energy-efficient clustering routing protocol based on a high-QoS node deployment with an inter-cluster routing mechanism in WSNs," Sensors, vol. 19 no. 12,DOI: 10.3390/s19122752, 2019.
[9] A. N. Njoya, A. A. A. Ari, M. N. Awa, C. Titouna, N. Labraoui, J. Y. Effa, W. Abdou, A. Gueroui, "Hybrid wireless sensors deployment scheme with connectivity and coverage maintaining in wireless sensor networks," Wireless Personal Communications, vol. 112 no. 3, pp. 1893-1917, DOI: 10.1007/s11277-020-07132-5, 2020.
[10] R. Priyadarshi, B. Gupta, A. Anurag, "Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues," The Journal of Supercomputing, vol. 76 no. 9, pp. 7333-7373, DOI: 10.1007/s11227-020-03166-5, 2020.
[11] B. Chen, K. Jamieson, H. Balakrishnan, R. Morris, "Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks," Wireless Networks, vol. 8 no. 5, pp. 481-494, 2020.
[12] F. Aznoli, N. J. Navimipour, "Deployment strategies in the wireless sensor networks: systematic literature review, classification, and current trends," Wireless Personal Communications, vol. 95 no. 2, pp. 819-846, DOI: 10.1007/s11277-016-3800-0, 2017.
[13] M. Rout, R. Rajarshi, "Dynamic deployment of randomly deployed mobile sensor nodes in the presence of obstacles," Ad Hoc Networks, vol. 46, pp. 12-22, DOI: 10.1016/j.adhoc.2016.03.004, 2016.
[14] Z. Wang, L. Tian, L. Lin, Y. Tong, "Lattice-based 3-dimensional wireless sensor deployment," Journal of Sensors, vol. 2021,DOI: 10.1155/2021/2441122, 2021.
[15] M. Kumar, V. Gupta, "A review paper on sensor deployment techniques for target coverage in wireless sensor networks," 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), pp. 452-456, .
[16] P. K. Donta, T. Amgoth, C. S. R. Annavarapu, "ACO-based mobile sink path determination for wireless sensor networks under non-uniform data constraints," Applied Soft Computing, vol. 69, pp. 528-540, DOI: 10.1016/j.asoc.2018.05.008, 2018.
[17] M. R. Senouci, A. Mellouk, A. Aissani, "Random deployment of wireless sensor networks: a survey and approach," International Journal of Ad Hoc and Ubiquitous Computing, vol. 15 no. 1/2/3, pp. 133-146, DOI: 10.1504/IJAHUC.2014.059905, 2014.
[18] M. Srinivas, P. K. Donta, T. Amgoth, "Efficient algorithms for point and area sweep–coverage in wireless sensor networks," 2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 315-320, .
[19] C. Liu, H. Du, "t,K-Sweep coverage with mobile sensor nodes in wireless sensor networks," IEEE Internet of Things Journal, vol. 8 no. 18, pp. 13888-13899, DOI: 10.1109/JIOT.2021.3070062, 2021.
[20] D. Kandris, A. Alexandridis, T. Dagiuklas, E. Panaousis, D. Vergados, "A survey and future directions on clustering: From WSNs to IoT and modern networking paradigms," Wireless Communications and Mobile Computing, vol. 2020, 2020.
[21] K. Tarnaris, I. Preka, D. Kandris, A. Alexandridis, "Coverage and k-coverage optimization in wireless sensor networks using computational intelligence methods: a comparative study," Electronics, vol. 9 no. 4,DOI: 10.3390/electronics9040675, 2020.
[22] A. Sangwan, R. P. Singh, "Survey on coverage problems in wireless sensor networks," Wireless Personal Communications, vol. 80 no. 4, pp. 1475-1500, DOI: 10.1007/s11277-014-2094-3, 2015.
[23] S. S. Dhillon, K. Chakrabarty, "Sensor placement for effective coverage and surveillance in distributed sensor networks," Wireless Communications and Networking, WCNC, vol. 3, pp. 1609-1614, 2003.
[24] K. Xu, G. Takahara, H. Hassanein, "On the robustness of grid-based deployment in wireless sensor networks, " Proceedings of the 2006 international conference on Wireless communications and mobile computings, pp. 1183-1188, .
[25] S. Miini, S. K. Udgata, S. L. Sabat, "Sensor deployment and scheduling for target coverage problem in wireless sensor networks," IEEE Sensors Journal, vol. 14 no. 3, pp. 636-644, DOI: 10.1109/JSEN.2013.2286332, 2014.
[26] N. T. Hanh, P. L. Nguyen, P. T. Tuyen, H. Binh, Y. Ji, "Node placement for target coverage and network connectivity in WSNs with multiple sinks," 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC), .
[27] J. Wang, Y. Gao, C. Zhou, R. S. Sherratt, L. Wang, "Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs," Materials and Continua, vol. 62 no. 2, pp. 695-711, DOI: 10.32604/cmc.2020.08674, 2020.
[28] W. Liu, S. Yang, S. Sun, S. Wei, "A node deployment optimization method of WSN based on ant-lion optimization algorithm," Proceeding of IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACSSWS), pp. 88-92, .
[29] A. Shahraki, A. Taherkordi, Ø. Haugen, F. Eliassen, "Node coverage optimization algorithm for wireless sensor networks based on improved grey wolf optimizer," Journal of Algorithms & Computational Technology, vol. 13, 2019.
[30] W. H. Liao, Y. Kao, Y. S. Li, "A sensor deployment approach using glowworm swarm optimization algorithm in wireless sensor networks," Expert Systems with Applications, vol. 38 no. 10, pp. 12180-12188, DOI: 10.1016/j.eswa.2011.03.053, 2011.
[31] X. S. Yang, "Firefly algorithms for multimodal optimization," International symposium on stochastic algorithms, 2009.
[32] D. K. Sah, K. Cengiz, P. K. Donta, V. N. Inukollu, T. Amgoth, "EDGF: empirical dataset generation framework for wireless sensor networks," Computer Communications, vol. 180, pp. 48-56, DOI: 10.1016/j.comcom.2021.08.017, 2021.
[33] J. K. Xue, B. Shen, "A novel swarm intelligence optimization approach: sparrow search algorithm," Systems Science & Control Engineering, vol. 8 no. 1, pp. 22-34, DOI: 10.1080/21642583.2019.1708830, 2020.
[34] H. Zhang, Z. Li, "Energy-aware data gathering mechanism for mobile sink in wireless sensor networks using particle swarm optimization," IEEE Access, vol. 8, pp. 177219-177227, DOI: 10.1109/ACCESS.2020.3026113, 2020.
[35] J. Sengathir, A. Rajesh, G. Dhiman, S. Vimal, C. A. Yogaraja, W. Viriyasitavat, "A novel cluster head selection using hybrid artificial bee colony and firefly algorithm for network lifetime and stability in WSNs," Connection Science, vol. 34 no. 1, pp. 387-408, DOI: 10.1080/09540091.2021.2004997, 2022.
[36] X. Wang, Y. Deng, H. Duan, "Edge-based target detection for unmanned aerial vehicles using competitive bird swarm algorithm," Aerospace Science and Technology, vol. 78, pp. 708-720, DOI: 10.1016/j.ast.2018.04.047, 2018.
[37] C. Li, Y. Yue, Y. Zhang, "A data collection strategy for heterogeneous wireless sensor networks based on energy efficiency and collaborative optimization," Computational Intelligence and Neuroscience, vol. 2021,DOI: 10.1155/2021/9808449, 2021.
[38] C. Ouyang, D. Zhu, F. Wang, "A learning sparrow search algorithm," Computational Intelligence and Neuroscience, vol. 2021,DOI: 10.1155/2021/3946958, 2021.
[39] K. Kapileswa, P. Phani Kumar, "Energy efficient routing in IOT based UWSN using bald eagle search algorithm," Transactions on Emerging Telecommunications Technologies, vol. 33 no. 1,DOI: 10.1002/ett.4399, 2022.
[40] I. Ahmadianfar, A. A. Heidari, A. H. Gandomi, X. Chu, H. Chen, "RUN beyond the metaphor: an efficient optimization algorithm based on Runge Kutta method," Expert Systems with Applications, vol. 181, article 115079,DOI: 10.1016/j.eswa.2021.115079, 2021.
[41] R. Elhabyan, W. Shi, M. St-Hilaire, "Coverage protocols for wireless sensor networks: review and future directions," Journal of Communications and Networks, vol. 21 no. 1, pp. 45-60, DOI: 10.1109/JCN.2019.000005, 2019.
[42] H. M. Ammari, "Connected k-coverage in two-dimensional wireless sensor networks using hexagonal slicing and area stretching," Journal of Parallel and Distributed Computing, vol. 153, pp. 89-109, 2021.
[43] S. Oktug, A. Khalilov, H. Tezcan, "3D coverage analysis under heterogeneous deployment strategies in wireless sensor networks," In 2008 Fourth Advanced International Conference on Telecommunications, pp. 119-204, .
[44] H. R. Tizhoosh, "A survey and future directions on clustering: from WSNs to IoT and modern networking paradigms," International conference on computational intelligence for modelling, control and automation and international conference on intelligent agents, web technologies and internet commerce (CIMCA-IAWTIC'06), pp. 675-701, .
[45] X. Wu, X. Shen, J. Zhang, Y. Zhang, "A wind energy prediction scheme combining Cauchy variation and reverse learning strategy," Advances in Electrical and Computer Engineering, vol. 21 no. 4,DOI: 10.4316/AECE.2021.04001, 2021.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Zhigang Wang et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
When wireless sensors are randomly deployed in natural environments such as ecological monitoring, military monitoring, and disaster monitoring, the initial position of sensors is generally formed through deployment methods such as air-drop, and then, the second deployment is carried out through the existing optimization methods, but these methods will still lead to serious coverage holes. In order to solve this problem, this paper proposes an algorithm to improve the coverage rate for wireless sensor networks based on an improved metaheuristic algorithm. The sensor deployment coverage model was firstly established, and the sensor network coverage problem was transformed into a high-dimensional multimodal function optimization problem. Secondly, the global searching ability and searching range of the algorithm are enhanced by the reverse expansion of the initial populations. Finally, the firefly principle is introduced to reduce the local binding force of sparrows and avoid the local optimization problem of the population in the search process. The experimental results showed that compared with ALO, GWO, BES, RK, and SSA algorithms, the EFSSA algorithm is better than other algorithms in benchmark function tests, especially in the test of high-dimensional multimodal function. In the tests of different monitoring ranges and number of nodes, the coverage of EFSSA algorithm is higher than other algorithms. The result can tell that EFSSA algorithm can effectively enhance the coverage of sensor deployment.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details






1 School of Computer, Qinghai Normal University, Xining 810000, China
2 School of Computer, Qinghai Normal University, Xining 810000, China; School of Computer, North China Institute of Science and Technology, Beijing 101601, China
3 School of Computer, North China Institute of Science and Technology, Beijing 101601, China