Deployment of Context-Aware Sensor in Wireless Sensor Network Based on the Variants of Genetic Algorithm

2018 ◽  
Vol 8 (2) ◽  
pp. 1-24
Author(s):  
Puri Vishal ◽  
Ramesh Babu A.

Wireless sensor networks (WSNs) are generally a group of spatially scattered and devoted sensors to record and monitor the physical environmental condition, and the collected data is grouped at a central location. In fact, the environmental conditions such as sound, humidity, temperature, wind, pollution levels, etc., can be clearly determined by WSNs. The principal objective of WSNs is to organize the whole sensor nodes in their related positions, thereby developing an effective network. In WSNs, target COVerage (TCOV) and Network CONnectivity (NCON) are the main concern of the sensor deployment problem. Many research works aspire the evolvement of smart context awareness algorithm for sensor deployment issues in WSN. Here the TCOV and NCON process are deployed as the minimization problem. This article makes an analysis of different GA variations in attaining the objective. The GA variations are as follows: self-adaptive genetic algorithm (SAGA), deterministic-adaptive genetic algorithm (DAGA), Individual- Adaptive Genetic Algorithm (IAGA). Finally, the methods are compared to one another in terms of connectivity and coverage performance.

2019 ◽  
Vol 28 (06) ◽  
pp. 1950094 ◽  
Author(s):  
Puri Vishal ◽  
A. Ramesh Babu

Wireless sensor networks (WSNs) provide acceptable low cost and efficient deployable solutions to execute the target tracking, checking and identification of substantial measures. The primary step necessary for WSN is to organize all the sensor nodes in their positions to build up an effective network. In the sensor deployment model, Target COVerage (TCOV) and Network CONnectivity (NCON) are the basic issues in WSNs that have obtained significant consideration in sensor deployment. This paper intends to develop an intelligent context awareness algorithm for sensor deployment process in WSN. Accordingly, the process is divided into two phases. In the first phase, the TCOV process is performed, whereas the second phase of the algorithm establishes NCON among the sensors. An objective model to meet both TCOV and NCON is formulated as a minimization problem. The problem is solved using FireFly (FF) optimization to determine the optimal locations for sensors. It leads to an intelligent sensor deployment model that can determine the optimal locations for the sensors in the WSN. Further, the proposed FF-TCOV and FF-NCON models are compared against the conventional algorithms, namely, genetic algorithm, particle swarm optimization, artificial bee colony, differential evolution and evolutionary algorithm-based TCOV and NCON models. The results achieved from the simulation show the improved performance of the proposed technique.


Author(s):  
Kapil Keswani ◽  
Dr. Anand Bhaskar

Wireless sensor network (WSN) most popular area of research where lots of work done in this field. Energy efficiency is one of the most focusing areas because life time of network is most common issue. In the WSN, the node placement is very essential part for the proper communication between the sensor nodes and base station (BS). For better communication nodes should be aware about their own or neighbor node’s location. Better optimization of resources and performance improvement are the main concern for the WSN. Optimal techniques should be utilized to place the nodes at the best possible locations for achieving the desired goal. For node placement, flower pollination optimization and genetic algorithm are useful to generate better result. BS is responsible for the communication of nodes with each other and it should be reachable to nodes. For this Region of Interest (RoI) is helpful to choose the best location. Placement of BS in the middle is suitable place for the static nodes deployment and there should be other strategy for the dynamic environment. Nodes should be connected to each other for the transmission of data from the source to BS properly. From the MATLAB simulation, it has been shown that the proposed methodology improves the network performance in terms of dead nodes, energy remaining and various packets sent to BS.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Khalid Mahmood ◽  
Muhammad Amir Khan ◽  
Mahmood ul Hassan ◽  
Ansar Munir Shah ◽  
Shahzad Ali ◽  
...  

Wireless sensor networks are envisioned to play a very important role in the Internet of Things in near future and therefore the challenges associated with wireless sensor networks have attracted researchers from all around the globe. A common issue which is well studied is how to restore network connectivity in case of failure of single or multiple nodes. Energy being a scarce resource in sensor networks drives all the proposed solutions to connectivity restoration to be energy efficient. In this paper we introduce an intelligent on-demand connectivity restoration technique for wireless sensor networks to address the connectivity restoration problem, where nodes utilize their transmission range to ensure the connectivity and the replacement of failed nodes with their redundant nodes. The proposed technique helps us to keep track of system topology and can respond to node failures effectively. Thus our system can better handle the issue of node failure by introducing less overhead on sensor node, more efficient energy utilization, better coverage, and connectivity without moving the sensor nodes.


2021 ◽  
Author(s):  
Ramin Danehchin

Abstract Data collection on Wireless Sensor Networks (WSNs) is a significant challenge to satisfy the requirements of various applications. Providing an energy-efficient routing technique is the primary step in data collection over WSNs. The existing data collection techniques in the WSNs field struggle with the imbalance load distribution and the short lifetime of the network. This paper proposes a novel mechanism to select cluster-heads, cluster the wireless sensor nodes, and determine the optimal route from source nodes to the sink. We employ the genetic algorithm to solve the routing problem considering the hop-count of the cluster-heads to the sink, the number of each cluster member, residual energy of cluster-heads, and the number of cluster-heads connected to the sink as the fitness criteria. Our proposed mechanism uses a greedy approach to calculate the hop-count of each cluster-head to the sink for integrating the clustering and routing process on WSNs. The simulation results demonstrate that our proposed mechanism improves the energy consumption, the number of live nodes, and the lifetime of the network compared to other data collection approaches on WSNs.


Author(s):  
Jyothi R. ◽  
Nagaraj G. Cholli

Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a days, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 990 ◽  
Author(s):  
Feng Chen ◽  
Shouzhi Xu ◽  
Ying Zhao ◽  
Hui Zhang

Portable meteorological stations are widely applied in environment monitoring systems, but they are always limited in power-supplying due to no cable power, especially in long-term monitoring scenarios. Reducing power consumption by adjusting a suitable frequency of sensor acquisition is very important for wireless sensor nodes. The regularity of historical environment data from a monitoring system is analyzed, and then an optimization model of an adaptive genetic algorithm for environment monitoring data acquisition strategies is proposed to lessen sampling frequency. According to the historical characteristics, the algorithm dynamically changes the recent data acquisition frequency so as to collect data with a smaller acquisition frequency, which will reduce the energy consumption of the sensor. Experiment results in a practical environment show that the algorithm can greatly reduce the acquisition frequency, and can obtain the environment monitoring data changing curve with less error compared with the high-frequency acquisition of fixed frequency.


2012 ◽  
Vol 04 (01) ◽  
pp. 1250010 ◽  
Author(s):  
DEYING LI ◽  
ZHENG LI ◽  
WENKAI MA ◽  
WENPING CHEN

An underwater acoustic wireless sensor network (UA-WSN) consists of many resource-constrained underwater sensor nodes (USNs), which are deployed to perform collaborative monitoring tasks over a given region. One way to preserve network connectivity while guaranteeing other network QoS is to deploy some relay nodes (RNs) in the networks. Although RNs' function is more powerful than USNs, but they can lead to more interference and their cost is more expensive. This paper addresses constrained low-interference relay node deployment problem for 3-D UA-WSNs in which the RNs are placed at a subset of candidate locations to ensure connectivity between the USNs such that the number of RNs deployed and the value of total incremental interference are minimized. We first prove that it is NP-hard, then propose a general approximation algorithm framework. Based on the framework, we get two polynomial time O(1)-approximation algorithms.


2010 ◽  
Vol 34-35 ◽  
pp. 1019-1023
Author(s):  
Zhao Feng Yang ◽  
Ai Wan Fan

Wireless sensor networks consist of hundreds or thousands of sensor nodes that involve numerous restrictions including computation capability and battery capacity. In this paper we propose an optimal algorithm with genetic algorithm taken into consideration, and compare it with three well known and widely used approaches, i.e., LEACH and LEACH-C, in performance evaluation. Experimental results show that the proposed approach increases the overall network lifetime, and data delivery at the base station than the other routing protocols. Key words: Wireless sensor networks, base station, heuristic optimized genetic algorithm, low energy adaptive clustering hierarchy


Wireless Sensor Networks (WSN ) provides virtual layer where knowledge regarding actual world can be retrieved by any computational arrangement as these operate as digital skin. These are irreplaceable possessions used for comprehending ideas of IoT as they are used to gather information about physical phenomenon. IoT offers virtual interpretation through Internet Protocol towards a huge variation of real-life objects from buses to saucer, from building to trees in woods. Its appeal is the universal widespread access to the status and location of anything we may be interested in. The Internet of Things (IoT) is the network of physical objects, devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. WSNs are combined into the “IoT”, where sensor nodes join the Internet vigorously and use it to collaborate and carry out their tasks. Wireless sensor networks (WSN) are well suited for longterm environmental data acquisition for IoT representation. Weather conditions monitoring is made by gathering quantifiable information regarding prevailing condition of atmospheric procedure to venture how will it progress in that location


In recent years, several applications are found to be exploiting under Wireless Sensor Networks (WSNs), and more particularly civil and military applications. However, Target Coverage (TCOV) and Network Connectivity (NCON) are found to be the most crucial issues that have to be resolved to attain effective robust data communication and environmental sensing in WSN. This paper has made an attempt to propose a new effective sensor deployment model in the application of the irrigation management system in agriculture sector. The data logger (data collector) IoT devices are typically placed over the field, which does the communication one another. The main point of this design is the IoT device TCOV and NCON, and the real-time issue related to this design is the device mobility that consumes more power thereby minimizes the lifetime of network. The proposed model intends to solve the comprised NCON and TCOV with the aid of Euclidean Spanning Tree Model (ECST). Further, this paper introduces a new Fitness Interrelated Whale Optimization Algorithm (FI-WOA) that insisted in the minimum movement of mobile sensors over the network. This novel characteristic of sensor deployment model would create the effectual impacts in the irrigation management system. Further, the adopted ECST-WOA model is compared with conventional models and the results attained from the execution demonstrate the enhanced performance of the implemented technique.


Sign in / Sign up

Export Citation Format

Share Document