1 Introduction

In the era of wireless communication, the sensor network extensively prevailing its dominance and providing chances to the researcher to explore and discover the diversification in this field. In a Wireless Sensor Network (WSN) the sensor nodes are deployed to observe the surroundings events for some phenomenon of interest, process the sensed data and transmit it [1]. These sensor nodes are typically small in size with inbuilt micro-controllers and radio transceivers [2]. The fundamental issue in observing such environments is the area coverage which reflects how well the region is monitored. Coverage is usually defined as a measure of how well and how long the sensors are able to observe the physical space [3].

The quality of coverage in static sensor is significantly affected by the initial deployment location of the sensors. Unfortunately, sensor deployment cannot be performed manually in most applications [4], for instance, the deployment in disaster areas, harsh environments, and toxic regions. Most of the previous studies showed that, sensors were usually deployed by scattering from an aircraft; however, the actual landing position cannot be uniform due to the existence of obstacles for instance, buildings, trees and wind causing some areas of the sensing region to be denser than others. Therefore, even if a large number of redundant nodes are deployed, the desired level of coverage still cannot be achieved. Therefore, it is essential to make use of sensors, which can move iteratively to a better location that can give the required coverage [5]. To address the sensing coverage area, it is important to understand the mobility control attribute [6], of the sensor nodes. Indeed, sensor nodes have two type of mobility control attributes i.e., centralized and distributed [7]. Regarding centralized attribute, the bunch of nodes are centrally monitored by a sink node that overhears the sensing data from neighbouring nodes while in distributed networks, the sensors are self-controlled.

All sensor nodes have limited sensing and communication abilities [8], which make the sensor nodes unable to obtain the entire network information [9]. Due to which sensors are deployed randomly and allowed to move and communicate with their neighbours by exchanging information between them. The miniaturized robotics have overcome some hurdles regarding sensors mobility. Thereby, mobile sensors have the same sensing capability as static sensors and can move freely to correct locations for providing the required coverage. On the other hand, it is not a cost-effective solution.

Keeping all aforementioned challenges, it is motivated to design a sagacious sensor node deployment strategy which should enhance the coverage area by consuming just confine energy metrics. Considering the pattern of a hybrid sensor network [10], which composed of mobile and static sensors we have proposed a Node Redeployment Shrewd Mechanism for Wireless Sensor Network (NRSM). For this purpose, a NRSM algorithm has been designed which focus how to redeploy the sensor nodes to improve network area coverage in hybrid WSNs environment. It is indeed a cost-effective solution towards improving coverage with unevenly deployed sensors.

Initially, algorithm aims to determine where the sensor nodes should be moved while incurring the trivial moving cost. This will result only a confine moving cost including the accumulated moving distance, total number of moves, and communication rounds. The proposed NRSM mechanism ultimately can maintain a balance between coverage with confine resource consumption during node redeployment process.

1.1 Understanding NRSM information flow mechanism

Initially, the nodes are deployed with some random positions [11], with certain velocities to search the shrewd target positions in network coverage area. The minimum distance value and related coordinates are being recorded. After getting best minimum distance value the intended positions are crosschecked otherwise process will be repeat the same step. The further proceedings are explained step by step through Flow chart shown as Fig. 1.

Fig. 1
figure 1

NRSM information flow chart

Step 1: Initialize all the parameters including the group size (n), the maximum number of iterations and the initial positions of sensor node group (Xinitial, Yinitial), step length [12], number of area range points, loudness and pulse rate, minimum and maximum frequency, upper and lower bounds [13]. All these parameters are being calculated through Eqs. (1, 2)

$${X}_{initial}\left(i\right)=LB+\left(UB-LB\right)*Random value$$
(1)
$${Y}_{initial}\left(i\right)=LB+\left(UB-LB\right)*Random value$$
(2)

where i varies from 1 to n, LB and UB is lower and upper bounds, and n is the size of sensor node group.

Step 2: The essential parameters of the sensor nodes like positions (xit), velocities (vti) and frequencies for time t are updated as expressed in Eqs. (35), where β is an arbitrary vector whose value is lies between 0 and 1, the fmax represents maximum frequency and x indicate the Shrewd solution.

$${f}_{i}= {f}_{min}+\left({f}_{max}-{f}_{min}\right)\beta $$
(3)
$${V}_{i}^{t}= {V}_{i}^{t-1}+\left({x}_{i}^{t}-{x}^{*}\right){f}_{i}$$
(4)
$${x}_{i}^{t}= {x}_{i}^{t-1}+{v}_{i}^{t}$$
(5)

Step 3: The distance of all the sensor nodes from the current area position (Distn*m) [14], is being computed by the Eq. (6)

$${Dist}_{n*m}=\sqrt{{({X}_{n*m}-{x}_{j})}^{2}+ {({Y}_{n*m}-{y}_{j})}^{2} },$$
(6)

where Xn*m and Yn*m are initial positions of n*m sensor nodes \({x}_{j}\) and \({y}_{j}\) are coordinates of j area range.

Step 4: Any sensor node having minimum distance value to the intended node positions are compared and this moving distance is selected.

Step 5: The lowest distance value and related coordinates are recorded in corpus table.

Step 6: The lowest and shrewd distance value is compared with other distance value during every iteration. If no other shrewd distance value is found then this lowest and shrewd value and its coordinates are updated and sensor node shift its position to the intended target in accordance to the condition defined in NRSM algorithm otherwise, repeats step from 2 to 5.

Step 7: The overall network Coverage Range (CR) has been computed through Eq. (7). The M*N is the network coverage area, m*n represents total summation points of the each sensor node.

$$CR= \frac{{N}_{m*n}}{M*N}$$
(7)

The overall illustration and mechanism have been explained in Sect. 3.

The main contributions have been incorporated into previous finding are listed as below:

  • The proposed NRSM algorithm tends to overcome related issues with the network coverage range by shifting already deployed sensor nodes from previous to new positions.

  • In some cases, it makes substitution of nodes to adjust the coverage hole.

  • The unnecessary sensor movement is also being monitor to reduce the movement distance between nodes which prevents the wastage of the energy resource.

  • The simulation results generated through Matlab has vouched the the succulent performance of NRSM when compared with previous work FOA, JOA and BFA.

  • The proposed NRSM algorithm accomplished the operation in two junctures, during first juncture the intended target positions of the sensor node is computed through Dissimilitude Enhancement Scheme (DES). The second juncture is referred as Depuration, where the moving distance between nodes is sagaciously reduced, thereby the target positions are achieved.

The rest of the manuscript is structured as: The previous work has been rummaged out in Sect. 2, the proposed methodology has been explained in Sect. 3, while Sect. 4 renders the output performance and the result discussion. Finally, overall achievements have been summarized in the form of conclusion in Sect. 5.

2 Literature review

Usually sensor nodes are deployed to cover the area between distinct boundaries. However, selection of most suitable area is ever remained a challenge. To achieve the sufficient coverage area, the distributed deployment strategy is commonly used to improve the area coverage by moving the sensor nodes from one location to another. For this purpose, the distributed movement algorithms are being used wherein the coverage area is allocated in multiple segments. If any sensor node was unable to detect the event happenings within the deployed segment, no other sensor node can detect it. Eventually, the monitoring of each segment area for coverage gape (hole) and calculation of new instance location is the prime liability of the deployed sensor node.

All distributed movement algorithms are facing numerous tribulations regarding new instance calculation within the segment area while relocating the new location. No researcher could ever address to overcome the instance reallocation challenge in hybrid environment. Therefore, no wireless network having coverage holes, can successfully carry out its monitoring operation [15]. The researcher tried to incorporate more iterations in their designed model to address the new allocation issue but it drastically increased the implications and causing higher energy consumption.

To some extent, overcome these issues the numerous researchers have made substantial contributions. For example, the motion capability of sensor nodes with relocating ability and dealing with sensor failure have been identified by Qingguo et al. [16]. They suggested a two-phase sensor relocation solution. The redundant sensors are first identified and then relocated to the target location. They proposed a grid-quorum solution to locate the closest redundant sensor, and proposed to use cascaded movement to relocate the redundant sensor. Their suggested model could not control the exorbitant energy drainage and thereby whole network might die after few transmission rounds. On the other hand, Li Jun et al. [17], tried to address the coverage and load balancing issues by minimizing the moving distance and argued a centralized movement solution, based on the Hungarian method. However, the centralized movement technique revealed those sensor nodes having already appropriate positions when impelled to leave the position creating energy holes.

Wang et al. [18], proposed three different distributed movement assisted sensor deployment algorithms, VEC, VOR, and Minimax, to improve the total area coverage. Thereby they used the Voronoi diagram to partition the monitoring area into n convex polygons where every polygon enclosed one sensor node only. This method utilizes the local polygon information to calculate the new instance location to move sensor node. The VEC approach uses virtual force between two nodes to push them away from each other at a certain distance. Minimax and VOR algorithms are greedy, and try to fix the largest coverage hole by moving sensor node towards the farthest polygon vertex. The nodes approaching to the polygon do not need to move towards the farthest vertex. As a result, this movement may not reduce coverage hole, but might increases the complications.

The identification of new instance location and its relative computation has been calculated through four local displacement conditions by the H. Mahboubi et al. [19], taking into account the circles having centered position within the respective polygons. Some centers might lie out of the polygon and thereby sensor nodes locating around those circles may not have movement. Consequently, this issue demands more rounds to overcome the coverage tribulation. The more the rounds it demands, the more the resources are being consumed; As a result, the sensor nodes will cause the network to confine the lifespan before the specified time.

To increase the coverage rate of sensor nodes, various researchers have proposed different optimization techniques. A sensing and perception based Fruit Fly Optimization Algorithm (FOA) was applied by Wen-Tsao Pan [20], to address the position issue of the sensor node which aims to enhance the coverage matter in ideal and obstacle environment. As the fruit flies can reach the food source using their smell and vision organs. Initially, they use osphresis organs to find all kinds of scents in the air. Then they fly toward to food. When they get close to the food, they use their vision organs to get closer. Similar action is adopted for relocating the sensors positions. Despite its advantages, there are critical issues for instance, the first pointing location remains poor. Further, the algorithm significantly traps into local optimum and the update strategy is limited.

An Edge Based Centroid (EBC) algorithm is proposed by Muhammad Sirajo et al. [21], and author claims about enhanced area coverage of monitoring field with minimal energy consumption. This algorithm is based on Voronoi diagram that partitions the sensing field into polygons with one sensor node each to monitor any event in its respective subregion. The sensor node moves to new location at the center of each polygon from location, which improves area coverage. This algorithm depends on certain group of rules that ensures about the center of each polygon before the movement and thereupon the ratio of energy consumption can be lowered. Though this algorithm works smooth but no control over the uncouth movement of the node is addressed due to that sometime a node can make unusual and large displacement which might cause the energy wastage.

Y. Sun et al. [22], presented the idea of an ant based service aware routing mechanism called ASAR. It’s a quality service based approach referred as RDS where (i) R defines deals the delay and error related issues which requires short bandwidth and high Signal to Noise Ratio (SNR). While (ii) D, controls the congestion issue in high SNR. The last (iii) S, address the stream query service where low SNR and trivial data traffic-related problems are handled. There are generic shortcomings such as no any central mechanism is given to maintain the optimum and alternate path during overloading. Further, it is a cluster-based approach which deals only routing issues between cluster head and the sink node and efficiency is dependent on service quality which does not remain same.

In pursuit of a better coverage technique, a majority of scholars have tried to use intelligent algorithms like, Genetic Algorithm (GA) [23], and Particle Swarm Optimization (PSO) [24], to solve the issue. Though, fruit fly algorithm is simple and practicable than GA and PSO but due to unavoidable limitations the researcher is still exerting their efforts to develop shrewder algorithm. Table 1, exhibits various comparison among such algorithms and shows a significant improvement by the proposed algorithm.

Table 1 Comparative analysis among various algorithm with proposed NRSM

3 Coverage model

A coverage model explains the possible coverage range by the sensor nodes in coverage area. All sensor nodes have various coverage range characterized by area where these sensors are being deployed, the accuracy, the environment factors and resolution. The coverage area depends on various factors such as the signal strength generated from the source, distance between the sensor node and source and the rate of attenuation in propagation. For example, an acoustic sensor network establishing the coverage range to detect the mobile vehicles, the sensor nearer to a vehicle can detect higher acoustic signal strength than the one farther away from the vehicle due to signal attenuation, and as a result there is higher confidence of detecting vehicles.

3.1 Problem formulation

For proposed coverage model, a two-dimensional coverage area has been considered. Further, the coverage area is divided into various segments each having unit size. When n number of sensor nodes have been deployed in targeted area m, thereby a full couplet of sensor node can be defined as given in Eq. (8):

$$ S = \left\{ {S_{1} ,S_{2} , \ldots ..S_{n} } \right\} $$
(8)

The position of ith node is defined as Si = (xi, yi) where i = (1, 2,…n). The coverage range of sensor Si can be expressed as a circle centered at its coordinates (xi, yi) with the radius of the sensing range Rs. Let Ei, being a random variable for an event that a sensor node Si covers an area of segment A(xA, yA). The Presage factor for event Ei can be written as P{Ei} which is equal to the coverage presage i.e., P(Si, xA, yA). Thereupon, the happening of an event presage can be defined by the discrete coverage model expressed in Eq. (9)

$$\mathrm{P}(Si, xA, yA)= \left\{\begin{array}{c}1,{d(Si, xA, yA)}\le {R}_{s}\\ 0,\, {\text{other case}}\end{array}\right.$$
(9)

The Euclidean distance [25], of ith sensor node from segment area A(x,y) can be computed by Eq. (10).

$$\mathrm{P}(Si, xA, yA)=\sqrt{{(x-{x}_{i})}^{2}+ {(y-{y}_{i})}^{2}}$$
(10)

All coverage pints within the coverage range are measured as unity covered by the particular sensor whereas, the points outside of this coverage range is regarded as 0. The shrewd objective of coverage optimization issue is to provide sufficient Coverage Range (CR) [26], using less number of sensor nodes. The CR is used to estimate the performance of sensor network. Generally, It is assumed that segment area point can be covered by any sensor node only once.

3.2 The proposed NRSM model

At present, among all optimization algorithms the DES [27], is considered as a fasted optimization scheme therefore we found it sagacious and motivated to take full advantage for our proposed NRSM algorithm. Thus, the coverage range tribulations in WSN is being resolved by redeployment of sensor nodes through DES strategies and therefore the stages of NRSM design model are being explained one by one.

3.2.1 Stage 1. Locating intended target positions of the instance

The bodacious-instance coverage mechanism (NRSM) is an investigative search technique that utilizes the shrewd coverage mechanism. It exploits the instance of potential solutions, individuals, to probe the search range. It initialize the parameters while addressing the coverage area issue as depicted in Eq. (11),

$${X}_{i}=({x}_{i1},\dots ,{x}_{ii},\dots , {x}_{iD})$$
(11)

considering 1 ≤ i, as the area range and ∈ \({x}_{ii}\)[ai, bi], where ai and bi denotes the lower and upper bound of the ith node, respectively and D represents the diameter of the sensor range accompanied with surrounding positions. After every transmission round t, the corresponding re-allocation round presages the new expected position of the bodacious instance node which is expressed as Eq. (12)

$${V}_{i} (t + 1) = {X}_{bodacious} + F({X}_{r2} (t) - {X}_{r3} (t)) + F({X}_{r4} (t) - {X}_{r5} (t))$$
(12)

.

The \({X}_{shrewd}\) indicates the appropriate position of the node while r represents the transmission round and F points a scaling factor that is a distance control parameter between initial and the new instance position. To increase the sensing range, the position parameter \({V}_{i} (t + 1)\) is incorporate the value of predicted instance \({X}_{i}(t)\), thereby yields a temporal position \({Q}_{i} (t + 1)\) as expressed in Eq. (13)

$$\begin{aligned} & {Q}_{i,j} \left(t + 1\right)= \left\{{V}_{i,j}\left(t+1\right), if\left(rand\left[\mathrm{0,1}\right]<FCR orj={J}_{rand}\right)\right.\\ &{X}_{i},j\left(t\right), \,{\text{for other case}}\end{aligned} $$
(13)

The rand(0,1) represents a uniformly distributed random positions, while jrand exhibits randomly predicted positions within the range [1, D]. The FCR came up as a Fractional Control Parameter ∈ [0, 1], which shows the inherited characters of previous instance position.

Proceeding towards final position, the temporal position \({Q}_{i} (t + 1)\) is being compared with predicted instance \({X}_{i}\left(t\right)\). The newly generated position that possessed greater fitness metric among rest of the positions is our intended position of the instance given in Eq. (14)

$${X}_{i} \left(t + 1\right)=\left\{\begin{array}{c}{Q}_{i}(t+1),if\left(f{(Q}_{i}\left(t+1\right)\right)\ge f{(X}_{i}\left(t\right))),\\ {X}_{i}\left(t\right), \, {\text{other case}}\end{array}\right.$$
(14)

here \(f{(X)}\) represnets the intended target position of the instance. The sensor network performs the virtual movement and as long it achieves the intended position of the instance sensor in accordance to the Eq. 14, physical displacement has been performed accordingly.

3.2.2 Stage 2. Depuration process

The depuration process is performed to reduce the moving distance of the instance. This will reduce the number of sensor nodes that need to move, as well as reduce the average moving distance; however, it does not affect the network coverage. The moving distance reduction strategy can be understand as: Consider the initial positions of an ith instance node si is \({P}_{i0} ({x}_{i0} ,{y}_{i0})\) and the jth instance node sj have\({P}_{j0} ({x}_{j0} ,{y}_{j0})\). The length of the distance is defined as \({d}_{1} = \stackrel{-}{\left|{p}_{i0}{p}_{i1}\right|}\) and \({d}_{2} = \stackrel{-}{\left|{p}_{j0}{p}_{j1}\right|}\) and so on. The NRSM algorithm searches the new intended positions of all instance node in the coverage area and systematically reduce the number of instance node that are needed to be moved. The sensing range may even be fully overlap by other nodes, these nodes are called redundant nodes as illustrated in Fig. 2, The sensor node si displace from \({p}_{i0}\) to \({p}_{i1}\), thereby coverage range Rarea (S) shows no substantial change has been recorded which ratifies that no movement is required by the si node. Therefore, the substantial nodes can be removed from the queue which eventually decreases the distance.

Fig. 2
figure 2

NRSM network topology

In Fig. 3, the positions of sensor node are being updated thereby at initial state, the moving distance of si and sj is d1 + d2 and after the displacement, it will be updated to d3 + d4 as depicted in Fig. 4. It is worth mentioning that d1 + d2 > d3 + d4, therefore achieving the intended positions, the moving distance of si and sj can be confined but no change will be occurred in coverage area but the area coverage distance rate will be extended.

Fig. 3
figure 3

Sensor nodes intended positions

Fig. 4
figure 4

Sensor node achieving final positions

The sensor nodes that eager to update their moving position will be substitute with the moving position of the nodes which are stationary and does not require to move further. This step can prevent the nodes to make unnecessary and longer movement. In case the node does not possess sufficient energy while reaching at intended position, the other surrounding node will surrogate the liability. Consider Fig. 5, initially, the node si does not plan to leave its position while at the same time node sj wish to shift its position from Pj0 to Pj1 thereupon it established a vacillated link (marked by dotted green color). This node tried to displace from Pj0 to Pj1 but remains hiatus because the distance from node sj to pj is greater than the distance between si to Pj i.e., d3 < d2 therefore instead of node sj, the algorithm shrewdly shifts node si to the intended new position of node pj by keeping the sj node stationary at Pj0. This change will not affect the coverage range of the network and does not impel the rest of the instance nodes to move in the queue. Eventually, an average moving distance of the instance node are reduced which enhance the coverage area distance rate.

Fig. 5
figure 5

NRSM movement and distance control mechanism to avail new positions

4 Simulation results and discussion

To validate the efficiency of node deployment based on NRSM, the simulation trials are conducted using MATALAB R2016a [12]. The performance among NRSM, FOA, JOA and BFA are carried out using simulation setup parameters given in Table 2. To observe the performance of aforementioned algorithms, near about 60 sensor nodes were deployed randomly in the monitoring area of size 60 × 60 m2. To demonstrate the performances of proposed NRSM FOA, JOA and BFA (for energy case only) the initial and final sensor node deployment is illustrated in Figs. 6 and 7.

Table 2 Simulation parameters for NRSM
Fig. 6
figure 6

a The initial and b final FOA sensor node deployment are kept constant to 0.9, 0.2 and 5

Fig. 7
figure 7

a The initial and b final deployment of sensor nodes by NRSM

As the transmission begins, it can be clearly understanding that node deployment based on (NRSM) has minimum redundancy and is utmost uniform as compared to node deployment by the FOA mechanism. Table 3 signifies the influence of pulse emission rate (r) on coverage of sensor nodes. The value of r changes from 0.1 to 1 whereas value of other instance mechanism parameters such as loudness, maximum frequency and sensing radius is kept constant to 0.5, 2 and 5 respectively. To beat the effect of arbitrariness, instance mechanism is simulated 50 times and greatest value of coverage is picked every time. The maximum value of coverage after performing NRSM is attained 93.54% at pulse emission rate of 0.9. As instances move towards respective target they emit a greater number of pulses, therefore, the pulse emission rate will be high when sensor nodes move close to the range points [13]. Thereupon, value of pulse emission rate is kept to 0.9.

Table 3 Influence of pulse emission rate on coverage rate

Further to analyze the effect of loudness parameter of instance mechanism on the coverage rate of sensor nodes, the value of loudness (Ao) is varied from 0.1 to 1 while pulse emission rate (r) is set to 0.9 and value of other parameters such as is 0.5, sensing radius (rs) is fixed to 5 m. Table 4, shows the variations of loudness, initial and final coverage rate of nodes after implementing NRSM. The NRSM is run 50 times and best value of initial and final coverage rate is selected. The coverage rate after executing NRSM is obtained highest about 93.1% at 0.2 value of loudness. When sensor nodes getting near to the range point the intensity of emitted pulses is low, therefore loudness parameter should be kept low. Thereupon, the value of loudness parameter is fixed to 0.2.

Table 4 Effect of loudness on coverage rate

In addition to this Table 5, demonstrates the effect of maximum frequency (fmax) [28], on coverage; its value has been changed from 0.1 to 2. The constraints of instance mechanism for instance pulse emission rate, loudness and sensing radius are kept constant to 0.9, 0.2 and 5 respectively. For each variation of maximum frequency the proposed mechanism has been executed 50 times and supreme values of coverage before and after execution of instance mechanism has been chosen. The best value of coverage after implementing NRSM is 93.31% when fmax is 1.3. Thus, the value of fmax is set to 1.3.

Table 5 Effect of fmax on coverage range

To observe the impact of range points on coverage rate of nodes, Value of range point has varied from 0.1*0.1 m to 1*1 m. The various simulation factors such as pulse emission rate, maximum frequency, sensing radius and loudness are kept constant to 0.9, 1.3, 5 and 0.2 respectively. In Table 6 for every value of coverage point NRSM runs 50 time and uppermost values of coverage rate has been taken. The highest value of coverage rate of nodes is obtained after running NRSM is 93.41% when range points are set to 0.6 m*0.6 m. Consequently, the range points have been kept constant to 0.6 m*0.6 m. Further, the sensing radius is varied from 1 to 10 m.

Table 6 Influence of range points on network coverage

Figure 8, signifies the variations of coverage range after applying NRSM w.r.t. changes in the sensing radius of node. The parameters of NRSM for example range points, loudness, pulse emission rate and maximum frequency are set as 0.6*0.6 m, 0.2, 0.9 and 1.3 respectively. It is clear from Fig. 8, as the sensing radius has increased, thereby coverage rate of sensor nodes is also increased and its value is 100% when the sensing radius is increased beyond 7 m. But there is trade-off between the sensing radius and cost, while sensing radius of node is increased the cost of sensor nodes also increased.

The tuned values of various constraints of NRSM such as loudness, maximum frequency, sensing radius, pulse emission rate and range points are 0.2, 1.3, 6, 0.9 and 0.6*0.6 m respectively. To validate the performance of node deployment based on NRSM after setting above constraints values, the initial and final node deployment after executing (NRSM) are shown in Fig. 9. Thereupon, it can be obviously seen that node deployment based on NRSM has lowest redundancy than NRSM and FOA. To further demonstrates the effectives of coverage range curve for NRSM compare to FOA for various iterations as shown in Fig. 10. The iterations are varied from 0 to 500. The convergence speed of NRSM is exorbitant as compared to FOA. The NRSM converged arounds are 150 iterations whereas FOA converges around reached 350 iterations due to exploitation characteristics of the sensor nodes.

Fig. 8
figure 8

Coverage range for varying sensing radius of sensor nodes by NRSM

Fig. 9
figure 9

a Initial deployment of sensor nodes for NRSM. b Final deployment of sensor nodes by NRSM

Fig. 10
figure 10

Coverage range comparative analysis for NRSM, JOA and FOA. a For various iterations, b for varying number of sensor nodes

The NRSM has achieved more coverage rate about 99.46% as compared to 93.37%, 88.33% of JOA and FOA. To overwhelm the effect of randomness NRSM, instance mechanism optimization and fruit fly algorithms are run 15 times respectively. The deployment results in terms of average coverage rate, standard deviation, best and worst coverage values for NRSM, JOA and FOA are represented in Table 7. It can be obviously seen from Table 7, that NRSM has achieved the average coverage range about 98.29% as compared to 91.91%, 85.16% of JOA and fruit fly algorithm. Further the standard deviation for node deployment based on NRSM is lowest, therefore NRSM is more stable as compared to FOA and JOA. The best and worst coverage values for NRSM are 99.46% and 97.31% as compared to 94.30% and 90.02%, 87.49% and 78.20% for JOA and FOA based on node deployment.

Table 7 Deployment results for NRSM, JOA and FOA

Further the comparison of NRSM, JOA and FOA in terms of computation time is represented in Table 8. The computation time for NRSM is less i.e. 0.016 s as compared to 0.019 s, 0.28 s for JOA and FOA. The NRSM and JOA converges at 25 iterations whereas FOA converged at 500 iterations, therefore the speed of NRSM and JOA is more and converges faster at earlier stage because of its exploitation feature as compared to fruit fly algorithm.

Table 8 Comparison of computation time of NRSM, JOA and FOA

During each transmission round, the overall energy diminution analysis is illustrated in Fig. 11. It can be seen that between 20 and 32 nodes all algorithms going to die. The proposed NRSM has consumed only 100 to 150 J of energy approaching to relative position as compare to JOA, FOA and BFA. The consumed energy increases when the coverage degrees required increase, since the sensor nodes require more energy to cover target positions and therefore it takes more energy for sensing and communication tasks.

Fig. 11
figure 11

Coverage range for varying sensing radius of sensor nodes by NRSM

5 Conclusion

Wireless sensor networks are severely facing the coverage issues therefore a shrewd coverage mechanism is presented in this study. The proposed algorithm Node Redeployment Shrewd Mechanism (NRSM) has been designed to overcome the tribulations occurred due to the uncouth deployment of the sensor node which ultimately has great impact over network coverage range. The NRSM functions in two phases, in first phase it searches the new intended node positions through Dissimilitude Enhancement Scheme (DES) and moves the node to new position. For second phase, the distance measurement between moving sensor node and the intended position is reduced and number of sensor movements are also being controlled sagaciously. This process is called Depuration.

The analysis of various factors of NRSM such as loudness, range points, emission rate and radius of nodes, and frequency have also been identified. The performance metrics of NRSM has been obtained by conducting simulation test through MATLAB and meticulously compared with previous well-known algorithms FOA, JOA and BFA. The simulation results vouched that NRSM has attained mean coverage rate about 98.29% which is higher as compared to rest of the algorithms. The proposed NRSM algorithm has appeared with higher coverage range and less computation time compared to all. In future the various evolutionary optimization algorithms can be applied to solve the node deployment issues to enhance the coverage range phenomenon.