• Nu S-Au Găsit Rezultate

View of Energy Efficient Bioinspired Whale Optimization Algorithm for Wsn

N/A
N/A
Protected

Academic year: 2022

Share "View of Energy Efficient Bioinspired Whale Optimization Algorithm for Wsn"

Copied!
11
0
0

Text complet

(1)

Energy Efficient Bioinspired Whale Optimization Algorithm for Wsn

Kavitha. V. P 1, Akila. C2, Anuradha. M2, Keerthana. K2, Sharmi. S2 1.Assistant Professor, Dept. of ECE, Velammal Engineering College,

[email protected]

2. UG students, Dept. of ECE, Velammal Engineering College, Chennai

I ABSTRACT

In recent years, Wireless Sensor Network has become a wide area of research and has been recognized as extensive and general approach for emerging applications like real-time traffic monitoring, ecosystem and battlefield surveillance. Transmission of data in WSN causes energy depletion in the sensor nodes. In this paper the energy efficient method of sending data to the neighbouring node is done by the proposed Whale Optimization Algorithm (WOA). The efficiency of WOA is compared with the standard routing protocols and with Particle Swarm Optimization. The nearest neighbour is identified using the fitness function and the WOA considers the energy, throughput, lifetime and stability.

II INTRODUCTION

Wireless Sensor Networks are the set of sensor nodes for observing the physical parameter information. As Wireless Sensor Network is an emerging technology it is used in different places like environmental, surveillance and biosphere observation. The sensor nodes are known as motes. These nodes are capable of sensing the information and transmitting the information to the other nodes in the network.The sensor nodes consumes power to sense,communicate and to process data. The power is stored in either batteries or capacitors.

These batteries are both rechargeable and non-rechargeable. They are deployed in remote areas so the changing of the batteries is not possible all time. So in order to increase the battery lifetime the nodes should use less energy for transmission and gathering the information. In this paper, Whale Optimization Algorithm isused to transmit the information from the source to the sink by identifying the nearest neighbour node which will use less energy for transmission.

IIILITERATURE SURVEY

CONTEMPORARY ROUTING ALGORITHM Flat Routing

Hassan echoukairi(2015),focused on Search parameter by considering each sensor nodes collaborate together to perform the sensing task. It is used in high delay constraints

HierarchicalRouting

MallanagoudaPatil (2012),riveted on transmission of data occur through neighbour node. So, that it reduces energy consumption, balance traffic load and improves scalability.

Location Based routing

(2)

MallanagoudaPatil (2012),riveted on transmission of data occur through neighbour node. So, that it reduces energy consumption, balance traffic load and improves scalability.

Data Aggregation Algorithm(LEACH,TAG,Diffusion)

Madden (2002), developed a tiny aggregation service for ad-hoc sensor networks to identify pattern and trends in the data that would not be immediately visible and help in comply with regulatory requirements.

Q

os

Based R outing

R. Guerin(1998), revived on quality of service based on routing protocols in order to reach the destination quickly, it uses Bellman-Ford algorithm to allows fine control over the route and resources at the cost of additional state and set up time.

METAHEURISTIC ALGORITHM Particle Swarm Optimization Algorithm

Kuila,P(2014), proffer a method which is involved by search of food and birds. It consumes less energy and provide fast convergence while searching optimal solution.

Grey Wolf Optimization Algorithm

AmruthaLipare (2019), It revived on energy efficient load balancing approach for saving network energy and it avoids energy hole problem in WSN by balancing the load on gateways.

Moth Flame Optimization Algorithm

Mittal, N.(2019), Propound on reducing the energy consumption, it organizing the nodes into groups. In Multi-hop communication it is achieved by providing optimal link cost for load balancing of distant neighbouring node .

Chicken Swarm Optimization Algorithm

Libua Zhu (2017), It reduces energy consumption and network life time of neighbouring nodes by avoiding the die of partial node and balances the load on the network.

Cuckoo Search Algorithm :

GandomiA.H.(2013), it is used for solving structural and continuos optimization problem, It fuses the data in wsn

Energy Consumption Optimization with Bat Algorithm[ECO-BAT protocol]:

Mohammed Kaddi(2021), In WSN it provide longer network lifetime effectively by reducing the energy consumption of the network.

Improved social spider optimization algorithm(SSA)

(3)

.Aboul Ella Hassanien (2018), developed a rough sets for solving minimum number of attribute reduction problem, it performs ten times faster than the original SSO algorithm.

IV EXISTING ALGORITHM

PARTICLE SWARM OPTIMIZATION[PSO]:

PSO is a metaheuristic and population-based state-space algorithm which is inspired by the social behavior of birds flocking. Each node in the network is called a splinter and the network is said to be a swarm. PSO is initialized with a group of random splinter and then searches for an optimal solution by updating generations. Splinter move through the solution space and are assay according to some fitness canon after each interval of time. In every repetition of the process, each splinter is updated by following two "finest" values. The first one is the perfect solution it has achieved so far. This value is called “pfinest”. The second finest value can be tracked by the pso and the premier value can be obtained by any splinter in the population. This value is a global finest and called “gfinest”. When a splinter takes part in the population as its topological neighbors, the second finest value is a local finest and is called “lfinest”, Neighborhood bests allow parallel exploration of the search space and reduce the liability of PSO to falling into local minima, but slow down convergence speed.

Splinter Swarm Optimization each splinter tries to modify its current position and velocity according to the distance between its present locus and pfinest and the distance between its present locus and gfinest.

ALGORITHM

 The group of nodes is randomly deployed and search for its destination node in a given area.

 Only one destination path can be provided at the time.

 All the node does not know where the destination is but each router node will know how far it will be in each iterate.

 Best searching strategy can be found by following the nearest sensor node to the source node.

 Node does not know the best position but, if any member of the node member can find the desirable path to go then remaining node will follow quickly.

MATHEMATICAL MODEL

𝑣𝐽𝑚 = 𝑤𝑣𝐽𝑚 + 𝐶1𝑟1 𝑝𝑓𝑖𝑡𝑛𝑒𝑠𝑠𝐽𝑚 − 𝑥𝐽𝑚 + 𝐶2𝑟2 𝑔𝑓𝑖𝑡𝑛𝑒𝑠𝑠𝑚 − 𝑥𝐽𝑚 𝑥𝐽𝑚 +1 = 𝑥𝐽𝑚 + 𝑉𝐽𝑚 +1

𝑣𝐽𝑚 represent the velocity of the jth particle at the mth iteration.

𝐶1𝐶2represent positive constants.

𝑟1𝑟2are two random variables with uniform distribution between 0 and 1.

𝑤 is the inertia weight.

(4)

V PROPOSED ALGORITHM Whale Optimization Algorithm

WOA is a bio inspired metaheuristic algorithm that was introduced by Mirjalili[15]. This algorithm was inspired from the hunting and the survival habits of the humpback whale. They hunt by creating the bubbles and encircles the prey. The Humpback whales hunting behaviour can be explained in three phases that are: searching, encircling and attacking the prey.

Encircling of Prey

During optimization, in WOA positions are updated by encircling the current best solution similar to the process of encircling behaviour of whales. This process can be mathematically modelled as the following equations:

𝐸 = 𝐷 ⋅ 𝑦 ∗ 𝑡 − 𝐷 𝑡 (1) 𝑦 𝑢 + 1 = 𝑦 𝑢 − 𝐵 (2)

Where urepresent the current iteration, D and B is the coefficient vectors and y represent the position vector.

The best solution position vector of the best solution that is obtained so far is represented as y* . If a better solution is obtained in a iteration then the value of y* is updated.

Eq. 3 is used to calculate the coefficient vectors AB.

𝐵 = 2𝑏 ⋅ 𝑟 − 𝑏 (3) The coefficient vector D is given by Eq. 4:

𝐷 = 2 ⋅ 𝑟 (4)

In the iteration the vector b linearly decreases from 2 to 0 . 𝑟 represents a random vector which varies between [0, 1].

Attacking of Prey (Exploitation Phase)

The bubble net hunting can be done in two different approaches and only one can be used at the time . They are spiral updating position approach and shrinking encircling position approach. Let q be the random variable that varies between[0,1]. B is also a random value between [-b,b] where b is linearly decreased during each iterations. Exploitation is to examine a constrained region of the search space in order to enhance a good solution 'S'. This process is then carried out to refine the search in the nearby region of the solution „S‟. The value of B is between [-1, 1] and so when |B| < 1, the exploitation process is started and all the search agents merge to get the best solution. For updating Eq. 5. is used.

𝑦 𝑢 + 1 = 𝑦 ∗ 𝑢 − 𝐵 ⋅ 𝐸 𝑖𝑓𝒒 < 0.5

𝐸 ⋅ 𝑓𝑏𝑙cos 2𝜋𝑙 + 𝑦 ∗ 𝑢 𝑖𝑓𝒒 ≥ 0.5(5)

(5)

Searching of Prey (Exploration Phase)

It is a global search where the search agents are moved for searching the better solutions .The value of |B| is set to >1 that makes the search agent to go far away in the search space. In exploitation phase the search agent is compared to best solution whereas here it is compared with a randomly selected search agent. The mechanism can be modelled by Eq. 6 and Eq. 7.

𝐸 = 𝐷 ⋅ 𝑦 − 𝑦 (6) 𝑟 𝑦 𝑢 + 1 = 𝑦 − 𝐵𝑟 ⋅ 𝐸 (7)

Here the WOA algorithm is used to select the next node from neighbour node Neighbour node selection

The operation of the algorithm is based on the routing of the data from the source to the sink through the neighbour nodes. Initially, in all setup phase all nodes send the data considering their current energy status and location to the source. With these data, the source node calculate the mean excess energy and then the node with the more excess energy compared to mean energy value would be selected as the neighbour node. The best node is determined using the optimal fitness value.

The WOA performance is on the randomly deployed stationary nodes in the sensor network.

Let m nodes represent the best neighbour node (NN= NN1, NN2, …, NNm). The search agent position is represented by NN j representing the node‟s position in the 2D space. To select the optimal neighbour node the best search agent position is used.

Algorithm

WOA-BASED NN SELECTION

while s<s

max

do [For each round s]

while u<u

max

do [for each Whale (search agent) NNj]

do:

Clone the nearest node to NNj Compute fitness according to Eq. 8

Calculate the coefficient vectors according to Eq.: (1-7)

Update the positions of the Whales [Update the * best position if y is better than „y*‟]

Update the fitness function for all search agents end for

end while

NN = Nearest node to the y* position

(6)

end while

For all the search agent the fitness value is evaluated and reference is chosen from the best one .The parameters of WOA is updated such that the other search agents position themselves with respect to the best agent. The fitness function is given by Eq.8:

F (NNj) =

z

1|M (NNj)|+

z

2Σ (NNE) (8)

Where the

z

1 and

z

2 are randomly chosen between 0 and 1. M (NNj) is the list of all the node neighbours NNj, and the NNE is the neighbour node‟s residual energy level. The largest fitness value is the best solution and hence it will have enough excess energy and adequate number of neighbouring nodes.

VI PERFORMANCE EVALUATION Performance evaluation metrics

The following metrics have been used to measure the performance of the proposed algorithm :

Average end to end delay – It is defined as the average time taken by the packet to deliver from source to the destination.

Average packet delivery ratio – It is defined as the ratio of average number of packet received to the sink to the average number of packet transmitted from source.

Average throughput-- It is the total haul over the entire session divided by the total time. Itis calculated by taking the difference in time-stampsbetween the first and last packet.

VII SIMULATION AND RESULT ANALYSIS Simulation in NS 2

Fig.1

Node creation

(7)

Fig.2Random deployment

Fig.3

Fitness evaluation

Fig.4

Path selection

(8)

Performance Chart

Fig.5 Delay(ms) vs Number of Packets

Fig.6 Throughput(mJ) vs Number of Packets

(9)

Fig.7 Energy(mJ) vs Number of packets

The proffer circuit are simulated and synthesised byusing network simulator ns2. Node creation is in fig.1,Random deployment is in fig.2, Fitness evaluation is in fig.3, path selection is in fig.4.Fig 5 compares delay and the number of packets delivered. Throughput and number of packets are compared in fig6.Fig 7 represents the comparison between energy and number of packets respectively.

VIII CONCLUSION

In this paper, the proposed Whale Optimization Algorithm is an energy efficient method of routing. The neighbour node is selected based on the fitness function that evaluates the excess energy of the nodes and the total energy of the close by nodes for reducing the energy utilization of the sensor nodes. In addition the WOA algorithm is compared with the PSO algorithm. The proposed algorithm has the high stability, throughput, energy efficiency and network duration.

IX REFERENCES

1. S. Alkalbani, T. Mantoro, S. Moedjiono and M. A. Ayu, "Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor Networks," 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), Jakarta, 2015, pp. 78-83, doi: 10.1109/CyberSec.2015.24.

2. Daanoune, A. Baghdad and A. Balllouk, "A comparative study between ACO-based protocols and PSO-based protocols in WSN," 2019 7th Mediterranean Congress of Telecommunications (CMT), Fès, Morocco, 2019, pp. 1-4, doi: 10.1109/CMT.2019.8931320.

3. R. Janapati, C. Balaswamy and K. Soundararajan, "Enhancement of localized routing using CDPSO in WSN," 2018 Conference on Signal Processing And Communication Engineering Systems (SPACES), Vijayawada, 2018, pp. 16-19, doi: 10.1109/SPACES.2018.8316306.

4. Karthikeyann, V. P. Arunachalam, S. Karthik and P. Dhivya, "Energy Efficient Structure Free and Location Based Routing Protocol in WSN," 2018 International Conference on Soft-

(10)

computing and Network Security (ICSNS), Coimbatore, 2018, pp. 1-5, doi:

10.1109/ICSNS.2018.8573682.

5. Mathur and T. Newe, "Medical WSN: Power, routing and selective forwarding defense," 2015 13th International Conference on Telecommunications (ConTEL), Graz, 2015, pp. 1-6, doi:

10.1109/ConTEL.2015.7231208.

6. V. Mathurkar and P. D. Dorge, "Performance Evaluation of Wireless Sensor Network Using AOMDV Routing Protocol," 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 2020, pp. 479-483, doi: 10.1109/ICRITO48877.2020.9197861.

7. Z. Sun, Z. Zhang, C. Xiao and G. Qu, "D-S evidence theory based trust ant colony routing in WSN," in China Communications, vol. 15, no. 3, pp. 27-41, March 2018, doi:

10.1109/CC.2018.8331989.

8. A.Umar, Z. M. Hanapi, A. Sali and Z. A. Zulkarnain, "A Forwarding Strategy for DWSIGF Routing Protocol," 2015 5th International Conference on IT Convergence and Security (ICITCS), Kuala Lumpur, 2015, pp. 1-4, doi: 10.1109/ICITCS.2015.7292917.

9. [AGKT98] G. Apoatolopoulos, R. Guerin, S. Kamat ,S.K. Teipathi, “ Quality of service based Routing : A performance perspective,” pp.17- 28, ACM. SIGCOMM‟98 Vancouver, B.C.,(1998)

10. Madden, S., Franklin, M.J Hellerstein. J.M., &Hong, W. (2002). A tiny aggregation service for ad-hoc sensor networks.

11. MauanagoudaPatil&Rajashekhar C., Biradar (2012) . A survey on routing protocols in wireless sensor networks.

12. Gandomi, A.H., Yang, XS. &Alavi, A.H. Cuckoo . A metaheuristic approach to solve structural optimization problems. Engineering with computers 29, 17-35 (2013).

13. Kuila, P., & Jana, P.K (2014). Energy efficient clustering and routing algorithms for wireless sensor networks : Particle swarm optimization approach. Engineering Applications of Artificial Intelligence , 33,127-140.

14. Hassan ECHOUKAIRI, Khalid BOURGBA, Mohammed OUZZIF (2015). A survey on flat routing protocols in wireless sensor Networks.

15. SeyedaliMirjalili&AndrewLewisa (2016). Advances in Engineering Software Volume 95,Pages 51-67.

16. Qingxi Wang, Libua Zhu (2017) – Optimization of wireless sensor networks based on Chichen Swarm optimization algorithm.

17. Wang, H., Han, G., Zhu, C., Chan, S., & Zhang. W (2017). A trace cost based source location privacy protection scheme in WSNs for smart cities.

18. Mohamed Abd El Aziz &Aboul Ella Hassanien social spider optimization algorithm ; An improved social spider optimization algorithm based on rough sets for solving minimum number attribute reduction problem. Neural computing and Applications volume 30, (2018).

(11)

19. AmruthaLipare, Damodar Reddy, EdiaVenkatanareshbabuKuppili (2019). Energy efficient load balancing approach for avoiding energy hole problem in WSN using Grey Wolf Optimizer with novel fitness function.

20.Mittal, N. (2019). Moth Flame Optimization based energy efficient stable clustered roting approach for wireless sensor networks.

21. Mohammed Kaddi 1, Abdallah Banana, Mohammed Omari . ECO BAT ; A new roting protocol for energy consumption optimization based on BAT algorithm in WSN. Vol.66, No.2, (2021).

22. Murugan, S., Jayarajan, P., &amp;amp; Sivasankaran, V.Majority Voting based Hybrid Ensemble Classification Approach for Predicting Parking Availability in Smart City based on IoT.

23. Efficient Contourlet Transformation Technique for Despeckling of Polarimetric SyntheticApertureRadarImageRobbi Rahim, S. Murugan, R. Manikandan, andAmbeshwarKumarJ. Comput. Theor. Nanosci. 18, 1312–1320(2021)

24. Eye blink controlled virtual keyboard using brain sense B kavitha vp, janani meganathan, sreehoshini j, mounika International research journal of engineering and technology (irjet) 7,08-2020

25. An optimal pruning algorithm of classifier ensembles: dynamic programming approach OA Alzubi, JA Alzubi, M Alweshah, I Qiqieh, S Al-Shami, ...Neural Computing and Applications 32 (20), 16091-16107

Referințe

DOCUMENTE SIMILARE

Toate acestea sunt doar o parte dintre avantajele in care cred partizanii clonarii. Pentru a si le sustine, ei recurg la o serie de argumente. Unul dintre ele are in atentie

During the period 1992-2004, for criminal offenses with elements of abuse in the field of real estate turnover in Kosovo there were accused in total 35 persons and none

Abstract: The Canadian Immigration and Refugee Protection Act provides that one of the objectives of immigration is “to see that families are reunited in Canada.” The Act

Keywords: trickster discourse, meaning, blasphemy, social change, transgression of social norms.. The Myth of the trickster and its

We then go on to examine a number of prototype techniques proposed for engineering agent systems, including methodologies for agent-oriented analysis and design, formal

The best performance, considering both the train and test results, was achieved by using GLRLM features for directions {45 ◦ , 90 ◦ , 135 ◦ }, GA feature selection with DT and

Un locuitor al oglinzii (An Inhabitant of the Mirror), prose, 1994; Fascinaţia ficţiunii sau despre retorica elipsei (On the Fascination of Fiction and the Rhetoric of Ellipsis),

units, it is worth noting that the fundamental reference quantities in the British system of units (foot, pound, second) are based on the primary dimensions of length (L), force