Abstract
The peculiar factor of coverage called target coverage in an energy-constrained wireless sensor network is a fierce challenge nowadays. Genetic algorithm-based meta-heuristic has proven methodology while aiming to prolong the achievable network lifetime. There is a plethora of research works where maximizing the total network lifetime issue is classified as an optimization problem. In the literature, evolutionary techniques like meta-heuristics are best to use while solving an optimization problem. The task becomes more challenging due to the dense deployment of sensor nodes in the given pre-decided network. In this paper, the target coverage problem is addressed with the primary objective of maximizing the coverage of a specified set of targets with sensors with limited energy. The proposed genetic algorithm-based heuristic with modified mutation operation prolongs the network lifetime. The experimental results clearly depict that the proposed meta-heuristic performs considerably better while computing network lifetime. Besides, the performance of the proposed methodology is also compared with existing works, and it is observed that proposed algorithms perform better.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
1.1 Background and Motivation
A wireless sensor network (WSN) is comprised of sensors with the perceptual ability and self-organizing capability. The prime necessity of such a network is to provide data collection via monitoring and transmission together. There is a wide range of sensor networks applications, including environmental protection, battlefield surveillance, smart home furnishing, and many more [1,2,3,4,5,6]. Due to the fierce competition among manufacturing industries to manage cost and volume, sensor nodes are equipped with a limited-capacity battery to provide energy. Based on the necessity of application severity level, sensors’ energy cannot be replaced or recharged. Therefore, coverage and battery life both are prominent research problems in WSNs.
At present, eminent scholars have done great work to optimize the battery usages in the energy scared wireless sensor networks. Remarkably, the problem of maximizing the coverage duration of targets of interest in a given region is defined as the target coverage problem. In order to solve it, the conventional approach is to first explain the target coverage problem as MLP (maximum network lifetime problem). In literature, over the last two decades, there are various heuristic approaches addressed to solve this MLP [7,8,9,10]. The very similar approach that is progressively adapted by most of the existing heuristics is to find maximum possible cover sets so that each independent cover set solely covers all the targets deployed in the given region. By doing this until there is no scope of a new cover set, one can promisingly enhance network life cycle. Further, every cover set is assigneda pre-defined time duration (activation duration). The network lifetime is defined as the summation of this activation duration of all these cover sets.
1.2 My Contribution
In this manuscript, a novel meta-heuristic is proposed which is based on a modified mutation approach where sensors are selected for coverage in a peculiar way, which in turn maximizes the network lifetime. The overall contribution of this manuscript is as follows:
-
a.
Formulated a linear program (LP) for the node’s activation duration scheduling in a wireless sensor network.
-
b.
Creation and representation of a valid chromosome after crossover and mutation operations.
-
c.
An energy-efficient fitness function is derived for increasing the achievable network lifetime.
-
d.
A novel mutation strategy is devised to optimize the usages of such sensors thatprovide coverage to critical targets (i.e., least covered targets).
-
e.
Extensive simulation is carried out to prove the superiority of the designed meta-heuristic.
1.3 Organization of the Paper
This manuscript is organized as follows: Sect. 2 discusses the previous works done so far on the target coverage problem. In Sect. 3, the author defines the target coverage problem and models it as an optimization problem. Afterward, this paper discusses the proposed heuristic in Sect. 4, and in Sect. 5, various simulation results are discussed. Finally, Sect. 6 concludes the work and gives future directions to extend this work.
2 Work Done
There are many factors such as energy-efficiency [7], data integrity [6], and confidentially of networks [9], which are mainly judged while checking the quality of a WSNs. There are certain constraints of WSNs, which include multi-hop communication, routing in a densenetwork, coverage withscarce resources, optimal usages of energy consumption and many more need close attention [1,2,3]. Among all of these, energy consumption optimization is the prime research issuein WSNs [11,12,13,14,15]. Consequently, effective energy optimization techniques are the main concern where the far most objective is to minimize the energy consumption [16,17,18,19,20,21,22].
In order to deal with target coverage in heterogeneous sensor networks, a plethora of research outcomes based methodologies is addressed in the literature [7,8,9,10,11,12,13,14,15,16,17,18].All of these works mainly focused on achieving a network lifetime near to optimal upper bound.
Initially, work in [8] addressed a heuristic which generates disjoint cover sets. A disjoint cover set does not allow the participation of any sensor across the cover sets. Due to such restricted participation of nodes, the achieved lifetime is quite lower than the upper bound on network lifetime. Further, in the same work, another greedy heuristic is addressed where cover sets are non-disjoint, which let sensors participate in multiple cover sets. To form cover set, the addressed greedy methodology prioritizes sensors based on the coverage of uncovered targets. The network lifetime achieved by this greedy method is considerably higher when compared with the previous method.
Manju et al. [9] discussed High-Energy-Small-Lifetime (HESL) heuristic, which aimed for maximizing network lifetime by constructing a cover set where a sensor with high remaining energy is chosen first to participate in the current cover set. This process iterates until the cover set is not formed. HESL performs significantly better than the work addressed in [8].
Authors in [13] presented another heuristic for solving target coverage and aiming to prolong the achievable network lifetime. The addressed method is based on a genetic paradigm where the major intension is to provide partial coverage instead of full coverage to make the network functional for extended duration.
Chand et al. [14] addressed another heuristic for full target coverage where authors calculated a fitness function based on coverage and the remaining battery life of sensors.While constituting the cover set, sensors that maximize the fitness functions are chosen as part of the current cover set.
Gupta et al. [15] addressed one more heuristic where the objective function is threefold, which includes least required sensor selection; ensures K-Coverage over targets, and provides M-Connectivity. To make it work for full target coverage issue, if I set K = 1, M = 1, the methodology has a single criterion while prioritizing sensors for the cover set.
Raiconi et al. [17] also addressed another meta-heuristic based on a genetic algorithm where the prime objective is to maximize the network lifetime and ensure connectivity with the base station. To form a fitness function to decide the candidacy of participating sensors in the current cover set, the sensor with maximum coverage is chosen, which maintains connectivity with the base station directly or via relay nodes.
Further, work in [18] also discussed genetic algorithm based meta-heuristic for maximizing the total network lifetime. The addressed work designed a meta-heuristic where they customized the mutation operation of genetic paradigm by not activating those sensors in a chromosome which are neither part of coverage nor of connectivity.
In this paper, the author devised a modified mutation operation for genetic algorithm-based meta-heuristic for maximizing the total network lifetime while finding solution for target coverage problem. Generally, the genetic algorithm based heuristic goes through mutation operation after cross over where any random gene value flips from 0 to 1so that the newly produced child chromosome in crossover operation becomes a valid chromosome. Instead of flipping any random gene from 0 to 1, the proposed modified mutation operationflip only that gene value (sensor) which does not cover critical target. By doing so, one can keep alive those sensors, which cover the critical targets. As discussed in the earlier section, the network is functional until the first target gets uncovered; thus, the proposed modified mutation operation tries to keep alive such sensors that provide coverage to the critical targets.
The proposed heuristic has the below advantages in contrast to the above-discussed algorithms [8, 9, 13,14,15, 17, 18].
-
a.
The proposed meta-heuristic has considered residual energy while driving fitness function, which is proven to be useful for the long run of the network to be functional. There are works [13, 15, 16] in contrast that do not take residual energy into account.
-
b.
The proposed algorithm is applicable to all kinds of networks, be a grid-based or regular network. Works in [23,24,25,26] only applicable to grid-based networks.
-
c.
Though chromosomes are created randomly, the proposed meta-heuristic also ensures that the offspring are also valid.
-
d.
The proposed meta-heuristic does not follow regular mutation; instead devised its own modified mutation operation, which ensures the prolonged coverage of critical targets.
3 Problem Statement
3.1 Network Assumptions and Problem Statement
I assume a deployed network WSN = {S, T}, where S = {s1,…,sp}, p number of sensors and T = {t1,…,tq}, be the set of q number of targets. Here, a homogenous network with respect to energy and sensing range is considered. In the given sensing proximity, sensors are assigned with energy (ei) and sensing range ri. A sensor sm(1 ≤ m ≤ p) can monitor target tn(1 ≤ n ≤ q) if tn falling within the sensing range of sm. Formally, S_C = {sm|for each tn there is a sm€S_C such that sm completely covers tn}.The activation duration of a sensor cover S_C is defined as x(S_C). Further, the target is called covered if it is covered by at least one sensor in each cover set.
3.2 Linear Programming Formulation (LP)
The above-defined system model completely represents the target coverage problem. Now the same can be formulated in the form of linear programming. To depict this, the constraint matrix, C_M can be written as below.
Now, the target coverage problem in the form of a linear program formulation can be represented as follows.
The constraint matrix is explicitly beforehand if the number of cover sets is known in advance. Since the deployed network is dense, the total number of the generated cover set is prohibitively large. Therefore, conventional approaches available for solving LP cannot be applied here to solve the above stated LP. In order to solve it, various column generation heuristics are addressed by researchers [7,8,9,10,11,12,13,14,15]. All the addressed heuristics so far [7,8,9,10,11,12,13,14,15] in the literature tries to reach the achievable upper bound calculated for the network lifetime.
3.3 Optimal Upper Bound
The upper bound of a deployed network is dependent on the target which is covered by the least number of sensors in a homogenous network where each sensor is assigned with the same battery life. Such poorly covered targets are called critical targets. In the case of a heterogeneous network, a critical target is the one whose summation of batteries of covering sensors is least among the rest of the network targets.
3.3.1 Illustration 1
Let us consider 4 sensors, namely s1, s2, s3, and s4, and 3 targets, t1, t2, and t3. The sensors’ coverage relationship with targets is depicted in the following matrix, where entry 0 shows that a sensor does not cover the respective target, whereas entry 1 represents that the corresponding sensor covers the particular target. Further, it is assume that each sensor is assigned a unit battery.
As depicted in the above coverage relationship matrix, target t2 is covered by only two sensors (s2 and s4) with a unit battery each. Therefore, the upper bound on this network is 2 units. None of the heuristics can achieve a total network lifetime of more than 2 units for this particular network scenario.
The upper bound calculation discussed in Illustration 1 is completely effected by how these critical targets are covered. Therefore, the network lifetime is prolonged if one can ensure prolonged coverage of these identified special targets (critical targets). None of the above-discussed methodologies [13,14,15,16,17,18] concern about the critical target’s coverage.The next section discusses the proposed heuristic, which is GA inspired where cover set generation operationis performed with extra caution by keeping the critical target alive for maximum possible duration.A modified mutation operation for the proposed genetic algorithm is introducedto perform this strategy where the critical target’s longevity is on the highest priority while mutation operation takes place.
4 Proposed Meta-Heuristic
The three major steps, namely selection, crossover, and mutation, will be discussed in genetically inspired meta-heuristic. The following flowchart depicts all the steps involved in the proposed meta-heuristic.
4.1 Evolutionary Technique: Genetic Algorithm (GA)
Forthe last decade, Genetic Algorithm (GA) based meta-heuristics are proven to be an appropriate methodology for the optimization problems. The genetic algorithm starts with the initial population, which consists of random solutions called chromosomes. The chromosome is a binary string where elements are called genes. The size of the chromosome (i.e., number of elements/genes) is decided by the number of sensors deployed in the network. The absolute quality of the chromosome is dependent on the fitness function. In the case of target coverage, a cover set is represented by a chromosome. So, one can say that the gene value i, 1 ≤ i ≤ p, equal to 1 only when sensor si participates in the corresponding cover set, and 0 otherwise.
In general, a genetic algorithm comprises of three vital phases; first selection, second crossover, and finally, mutation. Before performing any of the phases, GA initiates the initial population (pool), which is consists of randomly generated chromosomes. While performing selection, two-parent chromosomes are randomly selected from the pool and are further responsible for producing child chromosomes. Once the selection of parent chromosomes is made, the crossover operation happens where two-parent chromosomes produce child chromosomes after exchanging their genetic information with each other. Finally, mutation operation undergoes to which helps in generating a better solution when compared withthe parent. After performing these major steps, the child chromosome’s quality is further examined by recalculating the fitness function’s value. To provide the efficient methodology for the target coverage issue with the help of genetic algorithm based methodologies, all the GA based heuristics differs in the way how they calculate the value of the fitness function so that the network lifetime can be prolonged. Several GA-based heuristics [13,14,15,16,17,18] in Sect. 2 are focused on the number of sensors in a cover set to evaluate fitness function (Fig. 1).
4.2 Chromosome Generation
Chromosomes are strings of 0 s and 1 s and can be defined as {cgi| cgi € (0,1), ∀i, 1 ≤ i ≤ p}. Here, the chromosome’s length is equivalent to the size of the sensor network (i.e., |S|) in the network. Fortarget coverage, the chromosome represents a cover set. Thus, the gene value 1 and 0 represents the active and sleep status of sensor nodes in that particular cover set.
4.2.1 Illustration 2
To explain the chromosome representation, consider a network of 7 sensors and 4 targets whose coverage relationship is depicted in the following table (Fig. 2).
By following simple greedy rule, consider S1, S3, and S7 as part of a cover set as collectively; these three sensors are covering all the targets. Thus, to depict this cover set in the form of a chromosome, it can be shown as below in Fig. 3.
Here, one can see that the gene value corresponding to S1, S3, and S7 are 1 showing these three sensors are active in the given cover set, and the rest of the genes are 0 depicting that they are inactive in the same cover set.
4.3 Early Population Generation
The initial pool of chromosomes is formed by randomly generating these strings of 0 s and 1 s. As discussed in the previous section, the size of chromosomes depends on the number of sensors in the network. The following algorithm is used to generate the initial population to start with GA based solution for the target coverage.
4.3.1 Proposed Fitness Function
The quality of some newly generated chromosome is primarily dependents on the fitness function which has been used. The fitness function comprises of certain objectives which are collectively met while performing a certain operation of the selected procedure. In the proposed meta-heuristic, the following objectives are aimed to meet in order to prolong the network lifetime.
4.4 Objective 1: (Selection of minimal critical sensors in a cover set)
A critical sensor is a sensor that covers poorly covered (critical) target(s) in the designated network of sensors. Sincethe networks’ achievable lifetime proportionally depends on the coverage of critical targets, intense care for coverage of such targets is a must. Therefore, in this work, the prime concern is to minimize the usages of critical sensors. Consider S, number of total sensors in the network, and Sr, number of critical sensors out of these S sensors. Hence the foremost objective is defined as below.
4.5 Objective 2: (Selection of minimum sensors in total within a cover set)
After covering critical targets, this objective encourages us to minimize the usages of sensors for the rest of the target’s coverage. Consider, K sensors are minimally required to cover remaining targets, and then another objective function is defined as
Thus, this work has two objectives to be fulfilled at once in every iteration of the cover set. In order to construct the fitness function, which comprises of multiple objectives, the weight sum approach (WSA) [22] is addressed. While following WSA methodology, every objective is first multiplied by a weighted value, say Wi. Finally, the fitness function is calculated by adding these individual values to get a single scalar objective function. This objective function is known as the fitness function. Here, in this work, the fitness value of these two objective functionsF1, F2, respectively is represented as follows:
The proposed meta-heuristic consider W1 + W2 = 1, where 0 ≤ Wi ≤ 1, ∀i, 1 ≤ i ≤ 2 with the prime concern of maximizing the fitness function defined in (3).Here the quality of the chromosome is measured by the fitness function results. One can try various combinations of W1 and W2 values and check the fitness value.
4.6 Selection
After generating the initial population pool, there are various methods; rank selection, Roulette-wheel selection, and tournament selectionto choose valid chromosome. A valid chromosome is the one that represents a complete cover set. Further, the fitness function is applied to choose chromosomes that is valid and has a better fitness value. Once this selection procedure is over, new chromosomes are generated with the help of crossover operation and call themchild chromosomes. Next, this work discusses the crossover operation in detail.
4.7 Crossover
To generate new chromosomes, two of them are selected randomly, and then crossover operation is performed. So far, in the literature, many crossover operations are addressed where few of them are listed as two-point crossover, one-point crossover, and uniform crossover [22]. Here, the proposed meta-heuristic in this work applies one-point crossover where a single crossover point is applied. After choosing the cross over point, two-parent chromosomes are selected to interchange their gene values after cross point onwards, as depicted in Fig. 4.
4.8 Modified Mutation
The crossover operation produces new chromosomes and calls them child chromosomes. Further, one has to test the fitness function value of these new chromosomes to check their candidacy for the chromosome population pool. In this process, those child chromosomes with higher fitness value than the parent chromosome then applied a genetic paradigm to replace the parent chromosome and consider this newly produced child chromosome as part of the population. However, there are chances that the child chromosome is invalid. A chromosome is called invalid when it is not representing a cover set. In order to make it a valid chromosome, there is another operation (called a mutation) that has to be performed. In general, while performing the mutation operation, there is a flip of a gene value from 0 to 1 to make it a valid chromosome. To do so, the gene values which are going to be flipped are selected randomly.
4.8.1 Illustration 3
The following example depicts the functionality ofthe mutation operation. For this scenario, I consider 5 sensors and 4 targets, and each sensor has 1 unit battery.The Table 1 entries would be 1 if a sensor that covers the corresponding target, otherwise 0.
Suppose during crossover operation; there are two parent chromosomes (cover sets) chosen as given below:
As one can observe in Fig. 5, there are two child chromosomes (cover sets) that are produced after crossover operation. As it is known that the chromosome represents a sensor cover, but as shown in the above Fig. 5, the Child-2 is somehow not representing a cover set because all the targets are not covered by the selected sensor (S5). Since Child-2 is not a valid sensor cover, mutation operation is used to make it valid cover set by turning on one of the sensors (s1 or s2 or s3 or s4) by flipping one bit from 0 to 1. Thus, the mutation operation is needed in such situations while generating valid chromosomes.
The proposed heuristic do not turn on random sensors; instead, activate that sensor that does not cover the critical target. As shown in Table 1, target T2 is critical because it is covered by only two sensors (s1 and s5). Thus in order to make Child-2 valid chromosome (i. e. cover set), and avoid activating s1 (by flipping gene value from 0 to 1). By doing so, the proposed modified mutation strategy can extend the coverage of critical targets by keeping alive critical sensors for a longer period, which further prolongs the total achievable network lifetime.
5 Simulation Result
5.1 Simulation Setup
This section discusses the network scenario and various parameters considered in order to evaluate the performance of the proposed heuristic. Here, two square sensing areas, each of size 300 × 300 M2and 200 × 200 M2 are taken into consideration for simulation. In both the networks, a heterogeneous sensor network is considered in which sensors may have different initial energy level. In this experimentation, sensors are carrying the same sensing range (100 M). This work considered random deployment of sensors as well as targets. Every simulation value is an average of 50 problem instances. The complete simulation is performed on MATLAB (R2016). In Table 2, all the simulation parameters are mentioned. For the proposed meta-heuristic, the initial population of 60 chromosomes are considered, and the mutation rate as 3%.The termination criteria for the proposed meta-heuristic are fixed to 150 iterations.
5.2 Selected Energy Model
Energy optimization is the prime considerations while designing and deploying sensor nodes in the WSNs. As discussed earlier, the energy in the network is limited and non-rechargeable also. Therefore, it becomes a vital need to design a sensor node such that its battery life can be maximized [27]. Most of the node’s energy is consumed through data sensing, information processing, and power units [28]. It has been discussed in many works that the power unit has three different modes, namely sleep, active, and idle. The consumption of power is primarily depends on the state [29]. For the last few decades, many energy conservation models have been designed and addressed for WSNs. Few of them include the probabilistic model [30], a hybrid model [31], and an energy conservation model based on a simulator [32] in WSNs.
All the aforesaid methods are based on the communication protocol model that consists of the application layer, transport layer, network layer, data link layer, and physical layer. The detailed energy consumption models which are being used by the physical layer are mainly discussed in [33,34,35]. The energy model in [36] gives details of the physical layer energy usages per bit data processing are as follows:
The energy required to receive (Erx) and transmit (Etx) a packet of size P-bit is given below.
Here, εfsand Eamp are the transmission/reception circuitry parameters, and n is the path-loss exponent.
The LEACH protocol clearly observed that energy consumption increases while increasing the distances between nodes [37]. The energy required in transmitting and receiving k-bit of data is defined in Eq. 6 as below.
Here, Eelec denotes the circuitry depletion of the sender/receiver, εfs is amplifier coefficients of free-space, and Eda is the amount of energy consumption while compressing unit data [37]. The proposed meta-heuristic in this work is also based on the above-stated energy model in Eq. (8–11) to obtain the optimal conditions to minimize the consumption of energy.
5.3 Performance Analysis
Here, an extensive simulation is discussed, which further claims the superiority of the proposed meta-heuristic with modified mutation operation. In order to calculate the fitness function value, one has to decide on the values of weights W1 and W2 so that both the objective functions can be evaluated.
5.4 Experiment-1
In this experiment, random values of W1 and W2 (between 0 and 1) are taken.Then, based on these values, the network lifetime is calculated with the help of the proposed fitness function. Here, there are fixed 50 targets with varying sensors between 50 and 250. The network is considered to be heterogeneous, and their batteries are varying between 1 and 2 units. This experiment is carried out on two different network scenarios which include 200*200M2, and 300*300M2 as shown in Tables 3 and 4, respectively. The researchers [22] clearly mentioned that accurately finding these weightswith precise values, even one is quite familiar with the problem domain and its necessity.Thus, the proposed meta-heuristic experiments with almost 30 combinations of both the weights (i.e.W1 and W2).Out of these combinations, only promising five weights values combinations have been selected after complete exercise.
As depicted in Tables 3 and 4, with the weight W1 = 0.6 and W2 = 0.4, the proposed algorithm achieves a reasonable better network lifetime when it is further compared with other weights combinations.Therefore, the rest of the experiments in this work will be carried out with weight values W1 = 0.6 and W2 = 0.4.
5.5 Experiment-2
Here, this section examines the performance of the proposed meta-heuristic in terms of achieved network lifetime. Further, the outcome of the proposed heuristic is compared with few existing works [15, 18, 27] which have addressed the same target coverage problem in the heterogeneous sensor network for maximizing network lifetime. In order to do that, a simulation was done on two scenarios. In the first one, sensors were varying between 50 and 250 and fixed 50 targets in the sensing area of 200 × 200 M2 (Fig. 6a) and 300 × 300 M2 (Fig. 6b), respectively whereas in the second case, sensors were fixed (250) and varying targets between 50 and 200 in the sensing area of 200 × 200 M2 (Fig. 7a) and 300 × 300 M2 (Fig. 7b) respectively. All the experiments were performed with the same sensing range (100 m), and different battery levels are chosen randomly within the range between 1 and 2 units. As demonstrated in Tables 3 and 4, the values of weights W1 = 0.6 and W2 = 0.4 are chosen for the best results for both the scenarios. The rest of the simulation parameters are as shown in Table 2.
As depicted in Fig. 6a and b, it can be easily observed that the performance of the proposed heuristic is comparatively better when compared to the other works [15, 18, 27]. The primary reason behind this improvement is due to the proposed modified mutation operation while validating the newly created chromosomes. The proposed mutation operation ensures not to activate that sensor set, which is covering critical targets. This way of restricting the participation of these specific sensors will help in extending the coverage duration of such poorly covered targets. It has been discussed earlier that network is called operational until the first target becomes uncovered. As the critical target set will be uncovered first in the deployed sensor network. This extended coverage of such critical targets results in increased network lifetime. None of these existing works [15, 18, 27] takes this fact of extending critical target coverage into consideration.
Once again it is clearly depicted in the Fig. 7a and b that the proposed meta-heuristic performs exceptionally well as compared to the other research contributions in terms of network lifetime. Besides, it is evident from Fig. 7a and b that the lifetime of the network sharply decreases while increasing targets in the fixed sensing area. Since an increasing number of targets with the same set of fixed sensors, more sensors are needed in the cover set, which in turn decreases the achieved network lifetime.
Thus, Figs. 6a–b and 7a–b, shows that the proposed meta-heuristic performance is exceptionally better than existing research contributions [15, 18, 27].
6 Conclusion
In this research work, the author has proposeda novel genetic algorithm inspired heuristic for prolonging the lifetime of the network for target coverage problems inWSNs. The research works [15, 18, 27] done so far on the addressed issue to extend the achievable network lifetime is also based on the genetic algorithm paradigm. The proposed meta-heuristic is based on a modified mutation operation instead of a conventional mutation. In conventional mutation, any random gene value is flipping from 0 to 1 in order to make the newly created chromosome valid. The modified operation does not flip the random gene value from 0 to 1; instead it first checks the critical target coverage and then decides which gene value should be flipped. To do so, the modified mutation operation flips only that gene’s value for which the corresponding sensor does not cover critical targets. By applying a mutation operation this way (modified mutation), one can extend the coverage of critical targets, which in turn extend the achievable network lifetime.
In the future, the author wants to extend this work for various other variants of target coverage which includes, target Q-Coverage, Target Connected Coverage, Partial Coverage, Connected K-Coverage, and many more.
Availability of data and material (data transparency)
Yes.
Code availability (software application or custom code)
Yes.
References
Mehra, P. S., Doja, M. N., & Alam, B. (2019). Enhanced clustering algorithm based on fuzzy logic (E-CAFL) for WSN. Scalable Computing: Practice and Experience, 20(1), 41–54.
Mahfoudh, S., Minet, P., Laouiti, A., & Khoufi, I. (2017). Survey of deployment algorithms in wireless sensor networks: Coverage and connectivity issues and challenges. International Journal of Autonomous and Adaptive Communications Systems, 10(4), 341.
Manju, S. Chand, & B. Kumar. (2016). Maximizingnetworklifetimefortargetcoverage problem in wireless sensor networks. IET Wireless Sensor System, 6 (6), 192–197.
Singh, S., Chand, S., Kumar, R., Kumar, B., & Malik, A. (2016). NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wireless Sensor System, 6(5), 151–157.
Manju, Samayveer Singh, Sandeep Kumar, Anand Nayyar, Fadi Al-Turjman, & Leonardo Mostarda. (2020). Proficient QoS-based target coverage problem in wireless sensor networks. IEEE Access, 8, 74315–74325.
Mehra, P. S., Doja, M. N., & Alam, B. (2019). Zonal based approach for clustering in heterogeneous WSN. International Journal of Information Technology, 11(3), 507–515.
Özdäg, R. (2018). Optimization of target Q-Coverage problem for QoS requirement in wireless sensor networks. Journal of Computing, 13 (4), 480–489.
Cardei, M., Thai, M. T., Li, Y., & Wu, W. (2005). Energy-efficient target coverage in wireless sensor networks. In Proceedings of IEEE 24th Annual Joint Conference on Computer Communcation Societies, pp. 1976–1984.
Chaudhary,M., & Pujari, A. K. (2009). Q-Coverage Problem in Wireless Sensor Networks. In International Conference on Distributed Computing and Networking ICDCN in (Lecture Notes in Computer Science), vol. 5408. Berlin, Springer-Verlag, pp. 325–330.
Singh, D., Kumar, B., & Singh, S. (2020). Evaluating Authentication Schemes for Real-Time Data in Wireless Sensor Network. Wireless PersCommunication **.
Alia, O. M., & Al-Ajouri, A. (2017). Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm. IEEE Sensors Journal, 17, 882–896.
Deepti Singh, Bijendra Kumar, Samayveer Singh & Satish Chand (2019). SMAC-AS: MAC based secure authentication scheme for wireless sensor network. Wireless Personal Communications, 107, 1289–1308
Carrabs, F., Cerulli, R., D’Ambrosio, C., & Raiconi, A. (2015). A hybrid exact approach for maximizing lifetime in sensor networks with complete and partial coverage constraints. Journal of Network and Computer Applications, 58, 12–22.
Manju, Chand, S., & Kumar, B. (2018). Geneticalgorithm-basedmeta-heuristic for target coverage problem. IET Wireless Sensor System, 8 (4), 170–175.
Gupta, S. K., Kuila, P., & Jana, P. K. (2016). Genetic algorithm approach for K coverage and M-connected node placement in target based wireless sensor networks. Computers & Electrical Engineering., 56, 544–556.
Kebir, S., Borne, I., & Meslati, D. (2017). A genetic algorithm-based approach for automated refactoring of component-based software. Information and Software Technology, 88, 17–36.
Raiconi, A., & Gentili, M. (2011). Exact and metaheuristic approaches to extend lifetime and maintain connectivity in wireless sensors networks Lecture notes in computer science’ (Vol. 6701, pp. 607–619). Springer.
Harizan, S., & Kuila, P. (2019). Coverage and connectivity aware energy efficient scheduling in target based wireless sensor networks: An improved genetic algorithm based approach. Wireless Networks, 25, 1995–2011.
Zhou, P., Wang, C., & Yang, Y. (2019). Static and mobile target–Coverage in wireless rechargeable sensor networks. IEEE Transactions on Mobile Computing, 18(10), 2430–2445.
Samayveer Singh (2019). A proficient node deployment mechanism using adjustable sensing range in wireless sensor networks. Iranian Journal of Science and Technology, Transactions of Electrical Engineering, pp. 1–9.
Deepti Singh, Samayveer Singh, Bijendra Kumar, & Satish Chand. (2019). A Secure IoT based mutual authentication for Wireless sensor networks using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI), IGI Global.**
Konak, A., Coit, D. W., & Smith, A. E. (2006). Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering & System Safety, 91(9), 992–1007.
Liu, X., & He, D. (2014). Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks. Journal of Network and Computer Applications, 39, 310–318.
Moro, G., & Monti, G. (2012). W-Grid: A scalable and efficient self-organizing infrastructure for multi-dimensional data management, querying and routing in wireless data-centric sensor networks. Journal of Network and Computer Applications, 35(4), 1218–1234.
Yang, C., & Chin, K.-W. (2017). On nodes placement in energy harvesting wireless sensor networks for coverage and connectivity. IEEE Transactions on Industrial Informatics, 13(1), 27–36.
Yang, C., & Chin, K.-W. (2014). Novel algorithms for complete targets coverage in energy harvesting wireless sensor networks. IEEE Communications Letters, 18(1), 118–121.
Sunil Kr. Jha, & Egbe Michael Eyong. (2018). An energy optimization in wireless sensor networks by using genetic algorithm. Telecommunication System, 67 , 113–121.
Han, G., Xu, H., Duong, T. Q., Jiang, J., & Hara, T. (2013). Localization algorithms of wireless sensor networks: A survey. Telecommunication Systems, 54(4), 2419–2436.
Catarinucci, L., Colella, R., Del Fiore, G., Mainetti, L., Mighali, V., & Patrono, L. (2014). A cross-layer approach to minimize the energy consumption in wireless sensor networks. International Journal of Distributed Sensor Networks, 10(1), 268–284.
Shareef, A., & Zhu, Y. (2010). Energy modeling of wireless sensor nodes based on Petri nets. In Proceedings of ICPP, 2010, pp. 101–110.
Abdul-Salaam, G., Abdullah, A. H., Anisi, M. H., Gani, A., & Alelaiwi, A. (2016). A comparative analysis of energy conservation approaches in hybrid wireless sensor networks data collection protocols. Telecommunication Systems, 61(1), 159–179.
Du, W., Mieyeville, F., & Navarro, D. (2010). Modeling energy consumption of wireless sensor networks by system. In Proceedings of ICSNC, 2010, pp. 94–98.
Keskin, M. E., Altınel, ˙I. K., Aras, N., & Ersoy, C. (2014). Wireless sensor network lifetime maximization by optimal sensor deployment, activity scheduling, data routing and sink mobility. Ad Hoc Networks, 17, 18–36.
He, S., Chen, J., Yau, D. K., & Sun, Y. (2012). Cross-layer optimization of correlated data gathering in wireless sensor networks. IEEE Transactions on Mobile Computing, 11(11), 1678–1691.
Liu, H., Chu, X., Leung, Y. W., & Du, R. (2013). Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks. IEEE Transactions on Parallel and Distributed Systems, 24(9), 1783–1796.
Manju, N., Chand. s. & Kumar B. (2016). Improved-coverage preserving clustering protocol in wireless sensor networks. International Journal of Engineering and Technology Innovation, 6(1), 16–29.
Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660–670.
Funding
Not applicable.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Manju A Meta-Heuristic Based Approach with Modified Mutation Operation For Heterogeneous Networks. Wireless Pers Commun 122, 963–979 (2022). https://doi.org/10.1007/s11277-021-08935-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08935-w