Meta-heuristic Black Widow Optimization Algorithm for Solving M Connected Coverage in Internet of Things
Keywords:
Internet of Things, black widow optimization algorithm, m connected target coverage, meta heuristic algorithmAbstract
Merely addressing the coverage issue in isolation is insufficient within the context of IoT, since the transmission of data to the base station is also a critical factor to consider. This necessitates the search for an energy-efficient approach to address the issue of linked coverage. This research study focuses on the topic of m- connected target coverage in IoT. In this problem, each sensor node is needed to have at least m additional sensor nodes within its communication range. The amount of necessary connection and coverage might vary, ranging from high to low based on specific requirements. In this study, we provide a heuristic approach to address the issue of m- connected target coverage. The proposed method involves determining an initial cover and then verifying its m- connectivity. This work primarily focuses on the concept of m- connectivity in relation to simple coverage. In this study, we use a model influenced by the meta heuristic algorithm namely Black Widow Optimization algorithm. In this model, a cluster is defined as a group of sensor nodes that meet the criteria of m- connectivity and the desired amount of coverage. Sufficiency is achieved when at least one of these nodes communicates the monitored information to the base station. The simulation results demonstrate that the suggested strategy outperforms existing state-of-the-art algorithms.
Downloads
References
C.-W. Tsai, C.-F. Lai, A.V. Vasilakos, Future internet of things: open issues and challenges, Wirel. Netw. 20 (8) (2014) 2201–2217, http://dx.doi.org/10.1007/s11276-014-0731-0.
M. Serror, S. Hack, M. Henze, M. Schuba, K. Wehrle, Challenges and opportunities in securing the industrial internet of things, IEEE Trans. Ind. Inf. 17 (5) (2020) 2985–2996, http://dx.doi.org/10.48550/arXiv.2111.11714.
F. Allhoff, A. Henschke, The internet of things: Foundational ethical issues, Internet Things 1 (2018) 55–66, http://dx.doi.org/10.1016/j.iot.2018.08.005.
Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
Costa, D. G., & Guedes, L. A. (2010). The coverage problem in video-based wireless sensor networks: A survey. Sensors, 10(9), 8215-8247.
J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6–28, 2004
W. Liu, S. Yang, S. Sun, and S. Wei, “A node deployment optimization method of WSN based on ant-lion optimization algorithm,” in Proceeding of IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACSSWS), pp. 88–92, Lviv, Ukraine, 2018.
A. Shahraki, A. Taherkordi, Ø. Haugen, and F. Eliassen, “Node coverage optimization algorithm for wireless sensor networks based on improved grey wolf optimizer,” Journal of Algorithms & Computational Technology, vol. 13, 2019.
W. H. Liao, Y. Kao, and Y. S. Li, “A sensor deployment approach using glowworm swarm optimization algorithm in wireless sensor networks,” Expert Systems with Applications, vol. 38, no. 10, pp. 12180–12188, 2011.
X. S. Yang, “Firefly algorithms for multimodal optimization,” International symposium on stochastic algorithms, Springer, Berlin, Heidelberg, 2009.
D. K. Sah, K. Cengiz, P. K. Donta, V. N. Inukollu, and T. Amgoth, “EDGF: empirical dataset generation framework for wireless sensor networks,” Computer Communications, vol. 180, pp. 48–56, 2021.
J. K. Xue and B. Shen, “A novel swarm intelligence optimization approach: sparrow search algorithm,” Systems Science & Control Engineering, vol. 8, no. 1, pp. 22–34, 2020.
H. Zhang and Z. Li, “Energy-aware data gathering mechanism for mobile sink in wireless sensor networks using particle swarm optimization,” IEEE Access, vol. 8, pp. 177219–177227, 2020.
J. Sengathir, A. Rajesh, G. Dhiman, S. Vimal, C. A. Yogaraja, and W. Viriyasitavat, “A novel cluster head selection using hybrid artificial bee colony and firefly algorithm for network lifetime and stability in WSNs,” Connection Science, vol. 34, no. 1, pp. 387–408, 2022.
X. Wang, Y. Deng, and H. Duan, “Edge-based target detection for unmanned aerial vehicles using competitive bird swarm algorithm,” Aerospace Science and Technology, vol. 78, pp. 708–720, 2018.
C. Li, Y. Yue, and Y. Zhang, “A data collection strategy for heterogeneous wireless sensor networks based on energy efficiency and collaborative optimization,” Computational Intelligence and Neuroscience, vol. 2021, Article ID 9808449, 13 pages, 2021.
C. Ouyang, D. Zhu, and F. Wang, “A learning sparrow search algorithm,” Computational Intelligence and Neuroscience, vol. 2021, Article ID 3946958, 23 pages, 2021.
I. Zhou, I. Makhdoom, N. Shariati, M.A. Raza, R. Keshavarz, J. Lipman, M. Abolhasan, A. Jamalipour, Internet of things 2.0: Concepts, applications, and future directions, IEEE Access 9 (2021) 70961–71012, http://dx.doi.org/10.1109/ACCESS.2021.3078549.
I. Khan, F. Belqasmi, R. Glitho, N. Crespi, M. Morrow, P. Polakos, Wireless sensor network virtualization: A survey, IEEE Commun. Surv. Tutor. 18 (1) (2015) 553–576, http://dx.doi.org/10.1109/COMST.2015.2412971.
H.Y. Shi, W.L. Wang, N.M. Kwok, S.Y. Chen, Game theory for wireless sensor networks: a survey, Sensors 12 (7) (2012) 9055–9097, http://dx.doi.org/10.3390/s120709055.
R. Bhardwaj, D. Kumar, MOFPL: Multi-objective fractional particle lion algorithm for the energy aware routing in the WSN, Pervasive Mob. Comput. 58 (2019) 101029, http://dx.doi.org/10.1016/j.pmcj.2019.05.010.
L.J. Liu, D.Y. Liu, T.T. Liu, Application of improved Sine-cosine optimization algorithm in WSN coverage, Math. Pract. Theory 51 (11) (2021) 9.
Y.J. Yang, X.G. Fan, Y. Gan, Z.F. Zhuo, S.D. Wang, Z. Peng, Coverage optimization of sensor network based on improved particle swarm optimization, Syst. Eng. Electron. 39 (2) 6.
T.W. Sung, C.S. Yang, Voronoi-based coverage improvement approach for wireless directional sensor networks, J. Netw. Comput. Appl. 39 (2014) 202–213, http://dx.doi.org/10.1016/j.jnca.2013.07.003.
Y. Zhang, Coverage optimization and simulation of wireless sensor networks based on particle swarm optimization, Int. J. Wirel. Inf. Netw. 27 (2) (2020) 307–316, http://dx.doi.org/10.1007/s10776-019-00446-7.
[M. Toloueiashtian, M. Golsorkhtabaramiri, S.Y.B. Rad, An improved whale optimization algorithm solving the point coverage problem in wireless sensor networks, Telecommun. Syst. (2022) 1–20, http://dx.doi.org/10.1007/s11235-021-00866-y.
A.K. Idrees, R. Couturier, Energy-saving distributed monitoring-based firefly algorithm in wireless sensors networks, J. Supercomput. 78 (2) (2022) 2072–2097, http://dx.doi.org/10.1007/s11227-021-03944-9.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Sumit Kumar, Sangeeta Ranjan, Jyoti Kanjalkar, Yogesh Misra, Bhupati, Mani Dublish

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.