Next Article in Journal
A Decision Probability Transformation Method Based on the Neural Network
Next Article in Special Issue
Lossless Image Steganography Based on Invertible Neural Networks
Previous Article in Journal
Rosenblatt’s First Theorem and Frugality of Deep Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Node Deployment Optimization for Wireless Sensor Networks Based on Virtual Force-Directed Particle Swarm Optimization Algorithm and Evidence Theory

1
Xi’an Key Laboratory of Advanced Control and Intelligent Processing, School of Automation, Xi’an University of Posts and Telecommunications, Xi’an 710061, China
2
School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200241, China
3
Xi’an Robertic Intelligent Systems International Science and Technology Cooperation Base, Xi’an 710061, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(11), 1637; https://doi.org/10.3390/e24111637
Submission received: 9 October 2022 / Revised: 7 November 2022 / Accepted: 8 November 2022 / Published: 10 November 2022

Abstract

:
Wireless sensor network deployment should be optimized to maximize network coverage. The D-S evidence theory is an effective means of information fusion that can handle not only uncertainty and inconsistency, but also ambiguity and instability. This work develops a node sensing probability model based on D-S evidence. When there are major evidence disputes, the priority factor is introduced to reassign the sensing probability, with the purpose of addressing the issue of the traditional D-S evidence theory aggregation rule not conforming to the actual scenario and producing an erroneous result. For optimizing node deployment, a virtual force-directed particle swarm optimization approach is proposed, and the optimization goal is to maximize network coverage. The approach employs the virtual force algorithm, whose virtual forces are fine-tuned by the sensing probability. The sensing probability is fused by D-S evidence to drive particle swarm evolution and accelerate convergence. The simulation results show that the virtual force-directed particle swarm optimization approach improves network coverage while taking less time.

1. Introduction

Wireless sensor networks (WSNs) are commonly employed in harsh, high-risk, and distant unmanned environments. The sensor nodes in WSNs installed underwater (oceans, shallow seas, and lakes) are sometimes difficult to identify, and often swing or drift with the influence of ocean currents, waves, weather, ships, fish, and other factors. Physical causes of displacement or failure also have an impact on underwater acoustic detection equipment. Furthermore, monitoring signals attenuate quickly in an underwater environment, and different types of noise interference might occur often, resulting in quite significant energy loss of sensor nodes. As a result, while deploying wireless sensor network nodes, it is important to consider not only network coverage, but also the node displacement distance.
Many heuristic techniques, such as the genetic algorithm [1], the fish optimization algorithm [2], the ant colony algorithm [3], and the particle swarm optimization algorithm [4], are employed to optimize the placement of sensor nodes. These algorithms necessitate several repetitive computations. Wang et al. [5] suggested a virtual force-directed particle swarm algorithm (VF-PSO) deployment approach in which the moving distance is dictated by the connection between nodes, which is highly influenced by node density. Here, virtual force (VF) refers to the degree of mutual interference measured by the distance between nodes.
In this paper, a novel node deployment optimization strategy for WSNs is suggested. The virtual force-directed particle swarm (VF-PSO) algorithm and the D-S evidence theory are employed in the strategy. We provide the following contributions:
  • A sensing probabilistic model is constructed. To aggregate the sensing probability in the circular area with radius R around the sensor node, the D-S evidence theory is applied. When there is a considerable evidence conflict, the typical D-S evidence theory aggregation rule does not conform to the real circumstances, and the result is not convincing. To address the concern, the priority factor is introduced to reassign the sensing probability.
  • A virtual force-directed particle swarm optimization algorithm with sensing probabilities aggregated by D-S evidence (VF-PSO-DS for short) is proposed. The approach improves the virtual force-directed particle swarm optimization (VF-PSO) algorithm by considering sensing probability. The sensing probability is aggregated by D-S evidence, which guides the particle swarm evolution process and accelerates convergence.
The rest of this paper is organized as follows. Section 2 reviews related work. Section 3 presents and improves the D-S evidence theory. Section 4 presents the construction of the system model. Section 5 proposes the improved virtual force-directed particle swarm optimization algorithm (VF-PSO-DS). Section 6 presents the simulation and explains the results. The conclusion is reached in Section 7.

2. Related Work

Recently, deployment optimization in WSNs has been discussed by many researchers. Most of them consider this problem under different constraints and deployment goals. Dou et al. [6], for example, look at the optimization of sensing coverage and regional connectivity in both deterministic and random deployment. Hosseinzadeh et al. [7] offered a multi-agent distributed solution for WSN deployment. The optimization is considered a linear programming problem with time-invariant box constraints and potentially time-varying inequality constraints. Kang [8] discovered that the average number of clusters and the transmission range of control messages have a substantial influence on network lifetime. Liu et al. [9] present an optimization approach for WSN node deployment based on an ant lion optimization algorithm to address difficulties in WSN node deployment such as uneven distribution of nodes and incomplete coverage. Other influential works include [7,8,9,10,11]. Table 1 lists the above-mentioned work by constraints.
The virtual force (VF) approach has been a prominent WSN node deployment strategy for the past 15 years. In 2007, Wang et al. [5] suggested a virtual force-directed PSO (VF-PSO) algorithm for WSN deployment in an early work in this area. Yu et al. [15] proposed a self-deployment algorithm for nodes with mobility based on virtual force (VF). Xiaoping et al. [16] investigated the characteristics of four VF models and then assessed these models with several indicators: coverage increment scale, iterative number, coverage efficiency, and the average movement distance of nodes. They proved that the VF model with three parameters was superior, as was the VF model that does not include VF value but rather direction. To solve the problems of connectivity maintenance and node stacking in VF models, an extended VF-based approach was studied to achieve optimal deployment [17]. Yu et al. [18] proposed a sensor deployment strategy for mobile WSNs based on the van der Waals force. It is critical to improve sensing coverage and network connectivity to provide reliable communication [19]; therefore, a hybrid local virtual force algorithm (HLVFA) that incorporates the constraints of sensing coverage and network connectivity was proposed [20]. Theoretical analysis has shown that a hexagonal structure is the best two-dimensional network for providing the greatest coverage area with the fewest sensor nodes and the least amount of energy usage [21]. Yu et al. [22] reported a novel VF model based on virtual spring force (VFA-SF) and examined the associated efficiency in detail using statistical analysis. To place the self-consistent nodes in large-scale WSNs, a hybrid optimization algorithm based on two separate VF algorithms inspired by the interactions among physical sensor nodes was presented in [23]. Afterward, a method based on a 3D VF model driven by self-adaptive deployment (named 3DVFSD) was proposed in [24].
The application of D-S evidence theory in node deployment for WSNs has long been a hot topic. Zhao et al. [25] sought to reduce the influence of incomplete original or subjective parameters in evaluating the reliability of a distribution system. For WSNs, many factors, such as mutual interference of wireless links, battlefield applications, and nodes exposed to the environment without good physical protection, result in the sensor nodes being more vulnerable to attacks. To ensure network security, NBBTE (banding belief theory of node behavioral strategies of the trust evaluation algorithm) has been developed, which integrates the approach of node behavioral strategies with evidence theory [26]. Miao et al. [27] proposed a trustworthiness evaluation method for sensor nodes that can perceive multi-dimensional data based on D-S evidence theory at the data level. The Zigbee network was used to monitor the environmental parameters of aquiculture water [28]. Because artificial surveys have low accuracy, a gas pipeline leakage diagnosis system based on BP neural networks and D-S theory was presented by introducing WSN and information fusion theory [29]. Zhao et al. [30] proposed a novel fleet deployment approach based on route risk evaluation to fully use navigation resources while reducing risks. Song et al. [31] investigated many evidence theory-based approaches for node deployment optimization in WSNs. To improve the security in WSNs, Sun et. al. [32] proposed a trust ant colony routing algorithm by including a node trust evaluation model based on D-S evidence theory into the ant colony routing protocol. Song et. al. [33] presented a novel node deployment scheme that was based on the evidence theory approach and catered to 3D USWNs. To eliminate dependence on network training, an improved D-S evidence theory was applied to the host assessment [34].

3. D-S Evidence Theory with Priority Factors

3.1. D-S Evidence Theory

The Dempster–Shafer evidence theory, often known as the D-S evidence theory, is a widely used technique in the field of multi-sensor information fusion. D-S evidence theory, which is an inexact derivation of probability theory and is based on Bayesian reasoning, can work without a priori information and conditional probability [35]. D-S evidence theory begins with the assumption of a complete and incompatible element set (also called a recognition framework), denoted by Θ . Any element in the recognition framework is represented by Θ = { H 0 , H 1 } , where H 0 means “was not perceived by the sensor node” and H 1 means “was perceived by sensor node”.
Let m 1 and m 2 be the basic probability distribution functions in the same recognition framework Θ , with focal elements A i ( i = 1 , 2 , , k ) and B i ( i = 1 , 2 , , k ) , and then the aggregation formula of the two pieces of evidence is
m 1 m 2 ( A ) = { 0 , A = A i B i m 1 ( A i ) m 2 ( B i ) 1 K , A
where K = A i B i = m 1 ( A i ) m 2 ( B i ) , which indicates the degree of evidence conflict. denotes exclusive-or calculation.
The aggregation formula of N pieces of evidence is
m ( A ) = m 1 m 2 m 3 m N ( A )
Then, a basic probability function of joint action of multiple pieces of evidence is obtained.

3.2. The Problem with D-S Evidence Theory

A basic probability assignment function of n pieces of evidence is
m 1 = { m ( Φ ) = 0 m ( E ) = 1 m ( O ) = 0 m ( U ) = 0
m n = m n 1 = m n 2 = m 2 = { m ( Φ ) = 0 m ( E ) = k 1 , 0 k 1 < 1 m ( O ) = k 2 , 0 k 2 < 1 m ( U ) = 1 k 1 k 2 , 0 1 k 1 k 2 < 1
It can be seen from Formula (4) that if k 2 = 1 , there is a conflict between the first piece of evidence and the ( n 1 ) -th piece of evidence. When calculating the basic probability assignment after fusion, the denominator is 0, so the following calculation cannot be carried out normally, so the general evidence theory cannot easily solve this problem.
If k 2 1 , the following can be obtained:
m = m 1 m 2 m n = { m 1 ( Φ ) = 0 m 1 ( E ) = 1 m 1 ( O ) = 0 m 1 ( U ) = 0 = m 1 ,
According to Equation (5), the other n 1 pieces of evidence have nothing to do with the result of information fusion, but they are the same as the first one. This shows that all the n 1 pieces of evidence in this evidence are the same (i.e., m 2 ), and this shows that the result of information fusion has nothing to do with the n 1 pieces of evidence. The first piece of evidence denies the n 1 pieces of evidence, which is wrong.
If there is a conflict between one piece of evidence and other pieces of evidence, but the result of data fusion can be expressed, the denominator of zero will appear in the aggregation rules, resulting in the inability to use the D-S aggregation rules. Therefore, we should avoid the inconsistent results of the D-S evidence theory when it conflicts and synthesizes multiple pieces of evidence.

3.3. Introduction of Priority Factors

The priority factor is usually a correction method used in system decision-making. In this paper, the priority factor method is introduced into evidence aggregation rules, and the evidence provided by information sources is divided according to the priority level, to further solve the problems of invalidation and conflict in the D-S evidence theory aggregation rules.

3.3.1. Definition of Priority Factors

If there are n objective factors G 1 , G 2 , G n that need to be considered when making a decision, these factors may be too many and inconsistent to be judged directly, and the priority factor can be used to solve this problem. First, we need to compare these objective factors, such as objective factors G i and G j . If G i is considered more important, it will be recorded as G i > G j ; otherwise, it will be recorded as G i < G j . Then, we count the times that G i appear on the left side of the inequality symbol and arrange the target factors in descending order according to these times so that the priority order of the target factors can be obtained. Finally, the system will make decisions according to this order.
Considering that different sources of information provide different priority levels of evidence, the priority factor P i (i = 1,2,…L) is defined to indicate the priority level of each piece of evidence. The priority factor is just a symbol. Whenever a piece of evidence is listed as the most important piece of evidence, the priority factor is assigned to P 1 . If the priority factor level of a piece of evidence is in the k -th place, the priority factor is P k . A priority factor can also be regarded as a special normal number and a weight coefficient with special meaning as evidence. The relationship between each priority factor P i (i = 1,2,…L) is P 1 > P 2 > > P L . If any positive number M , P i M P i + 1 can be established, it is said that P i is far greater than P i + 1 , marked as P i P i + 1 , which indicates that P i and P i + 1 are not level quantities.

3.3.2. Determination of Priority Factors

To determine the priority factor of evidence, it is necessary to define the amount of self-conflict in the evidence. The amount of self-conflict of the evidence is the sum of conflicts between evidence i and evidence j (j = 1,2,…i − 1,i + 1,…, n), and its relationship is as follows:
φ i = j = 1 , j i n A i A j = Φ m i ( A i ) m j ( A j ) ,
where n represents the amount of evidence.
The steps to determine the priority factor are as follows: First, all evidence pieces should be collected, and the self-conflict amount φ i (i = 1,2,… n ) of each piece of evidence should be processed and calculated, and then the self-conflict amount φ i should be sorted from the largest to the smallest. The priority factor P 1 is the piece of evidence with the smallest conflict amount, and the priority factor P L refers to the piece of evidence with the largest self-conflict amount. The divergence of some evidence usually leads to conflicts between two pieces of evidence, so these conflicting pieces of evidence should have a relatively large number of self-conflicts φ i . If there are two pieces of evidence with the same number of self-conflicts φ i , then the values of the priority factors of the two pieces will be the same. The calculated priority factors are arranged according to the size of the last subscript, which is convenient for the subsequent synthesis.

3.4. D-S Evidence Aggregation Rules with Priority Factors

According to the above definition, the priority factor method of evidence synthesis is introduced. Firstly, the information about each piece of evidence is collected, and then the self-conflict quantity of evidence is calculated. According to the self-conflict quantity, the priority factor P i (i = 1,2,…L) is determined, and the value range of L is n L 1 . By fusing the pieces of evidence of these priority factors P k , the k value is k = 1 , 2 , L , when only the only evidence is left, the priority factor P k will not need to be fused continuously, and the number of existing pieces of evidence is L .
When the number of pieces of evidence L satisfies L 2 , it means that the conflicts have occurred in the fusion of pieces of evidence, and the conflicts need to be dealt with. By using the aggregation rule of D-S evidence theory, the evidence with less conflict is directly fused, and the aggregation method of evidence with a priority factor is used to deal with the evidence with the highest conflict, thus reducing the conflict between two pieces of evidence.
This method uses conflicting evidence m ( A ) to assign values to different propositions, so the assignment relationship is
{ m ( Φ ) = 0 m ( A ) = A i B j = A m 1 ( A i ) · m 2 ( B j ) + f ( A ) , A Φ ,
In Equation (7), the basic probability assignment of conflict evidence is expressed in f(A), and
{ f ( A ) 0 , f ( Φ ) = 0 A Θ f ( A ) = k ,
where k = A i B j = Φ m 1 ( A i ) · m 2 ( B j ) .
By using a voting method, the basic probability assignment with highly conflicting evidence is weighted, so f ( A ) can be taken as follows:
{ f ( A ) = k · q ( A ) q ( A ) = n A n ,
where n A is given by
n A = { n A + 1 , m i ( A ) m t h 0 n A ,   otherwise ,
In Equation (8), all supported propositions are counted. If the given threshold m t h is less than or equal to its basic probability assignment, then 1 is added to the value of n A , and the statistical total of different propositions is denoted as n, while the initial value of the threshold m t h is assigned to 1/2.
According to the synthesis method determined above, the method for the synthesis of new evidence again is as follows:
Step 1. The two pieces of evidence of priority factors P 1 and P 2 are E 1 and E 2 . If the amount of mutual conflict k i j is the conflict sum between evidence i and evidence j , then the relationship between them can be expressed as:
k i j = A i B j = A m i ( A i ) · m j ( A j ) ,
where i = 1 , 2 , n and j = 1 , 2 , n . Equation (12) shows the relationship between the amount of mutual conflict k i j and the amount of self-conflict φ i :
φ i = j = 1 , j i n k i j ,
Step 2. Calculate the conflict value between them.
A i A j = Φ i = 1 n m i ( E i ) , n = 2 ,
The amount of mutual conflict calculated by the evidence E 1 and the evidence E 2 is k 12 , and then k t h is assumed as the conflict threshold. If the relationship between them is k 12 < k t h , the aggregation rule of D-S evidence theory will be used to deal with it when synthesizing the evidence. If the relationship between them is k 12 k t h , when the evidence is aggregated, the priority factor P 1 and priority factor P 2 are added for processing, and then the formula is m = P 1 m 1 ( E 1 ) P 2 m 2 ( E 2 ) .
Therefore, the method of introducing the priority factor is used in evidence synthesis, which is shown as
m ( A ) = [ P 1 m 1 P 2 m 2 ] ( A ) = { X Y = A m ( X ) · m ( Y ) 1 X Y = Φ m ( X ) · m ( Y ) , k i j < k t h X Y = A m ( X ) · m ( Y ) + f ( A ) , k i j k t h ,
Step 3. Take the next piece of evidence E 3 of the next priority factor P 3 , and then re-synthesize the priority factor with the result obtained in the previous step according to the synthesis rules in Step 2.
Step 4. Use the above method to continuously synthesize the newly generated priority factor. When the priority factor is P L , the improved result is obtained through fusion calculation. Finally, a reasonable judgment condition is established, and the result is decided.
The synthesis method based on the evidence classification strategy is the evidence synthesis method with a priority factor, and its application process is shown in Figure 1.

4. System Model

4.1. Sensing Probability Model

If the two-dimensional plane monitoring area Λ is discretized into m × n pixels, we define the event r i j that the i -th pixel p i is sensed by the j -th sensor s j , and the probability of this event P { r i j } = P ( p i , s j ) ,
P ( p i , s j ) = { 1 ,   i f   d ( p i , s j ) R s R e e λ ( d ( p i , s j ) R s + R e ) β , i f   R s R e < d ( p i , s j ) R s + R e 0 ,   i f   d ( p i , s j ) > R s + R e ,
where d ( p i , s j ) is the distance between the i -th pixel p i and the j -th sensor s j , λ and β are parameters related to the sensing probability, and R e is the sensing error range of the sensor node s j .
By introducing the D-S evidence theory of the priority factor to synthesize perception probability, the probability that this pixel is perceived by a wireless sensor network is as follows:
P ( p i ) = P ( p i , 1 ) P ( p i , 2 ) P ( p i , 3 ) P ( p i , N )
The evidence is aggregated only if the sensing probability P ( p i , s j ) > 0 .

4.2. Area Coverage Model

There are m × n pixels in the monitoring area of the bitplane Λ , and the area of each pixel is expressed as x × y (assuming that the area of each pixel is 1 in this paper). The probability of the i -th pixel being sensed by the wireless sensor network is P ( p i ) ; when P ( p i ) P μ ( P μ denotes the lowest sensing probability allowed by the wireless sensor network), this pixel can be regarded as being sensed by the wireless sensor network.
Whether the i -th pixel is sensed by the sensor node is marked as P C O V ( p i ) ; i.e.,
P C O V ( p i ) = { 0 ,   if   P ( p i ) < P μ 1 ,   if   P ( p i ) P μ ,
In this paper, the coverage of the monitoring area R a r e a is defined as the ratio of the perceived pixel area Λ a r e a to the total area of the monitoring area Λ s , namely
R a r e a = Λ a r e a Λ s = x = 1 m y = 1 n P C O V ( p i ) m × n

5. Deployment Optimization Using Virtual Force-Directed Particle Swarm Algorithm

5.1. Virtual Force

By calculating the sensing probability of pixels in a circular area with the sensor node s j as the center and R as the radius, the movement of the sensor node s j is determined.
Assuming any pixel p i and sensor node s j , the force exerted by the sensor node s j by the pixel p i can be expressed as follows:
F ( p i , s j ) = { α P ( i ) k d ( p i , s j ) , 0 < d ( p i , s j ) < R 0 , d ( p i , s j ) R .
where P ( i ) is the comprehensive probability that the i -th pixel p i is perceived by the wireless sensor network, k and α denote the gain coefficients, and d ( p i , s j ) is the distance between the pixel p i and the sensor node s j .
The force direction points from the pixel p i to the sensor node s j , and the component of the X-axis F x ( p i , s j ) and the component of the Y-axis F y ( p i , s j ) can be obtained after decomposition.
The resultant force in the X-axis direction is F x ( s j ) = F x ( p i , s j ) , and the resultant force in the Y-axis direction is F y ( s j ) = F y ( p i , s j ) s j , so the resultant force generated by the pixels in the circular area with radius R on the sensor node is F x y ( s j ) = F x 2 ( s j ) + F y 2 ( s j ) .

5.2. Optimization Problem Formulation

The goal of deployment optimization is to maximize aware coverage
max { R a r e a } = max { Λ a r e a Λ s }
where R a r e a = Λ a r e a Λ s can be obtained by the following equations:
{ Λ a r e a Λ s = x = 1 m y = 1 n P C O V ( p i ) m × n P C O V ( p i ) = { 0 , if P ( p i ) < P u 1 , if P ( p i ) P u P ( p i ) = P ( p i , 1 ) P ( p i , 2 ) P ( p i , 3 ) P ( p i , N ) P ( p i , s j ) = { 1 , i f   d ( p i , s j ) R s R e e λ ( d ( p i , s j ) R s + R e ) β , i f   R s R e < d ( p i , s j ) R s + R e 0 , i f   d ( p i , s j ) > R s + R e F ( p i , s j ) = { α P ( i ) k d ( p i , s j ) , 0 < d ( p i , s j ) < R 0 , d ( p i , s j ) R F x ( s j ) = F x ( p i , s j ) F y ( s j ) = F y ( p i , s j ) F x y ( s j ) = F x 2 ( s j ) + F y 2 ( s j ) F x ( p i , s j ) = F ( p i , s j ) s i n θ F y ( p i , s j ) = F ( p i , s j ) c o s θ
where θ measures the angle between the sensor s j and the pixel p i .
The constraints are listed as follows:
s . t . { 0 < d ( p i , s j ) < R d ( p i , s j ) = d x 2 ( p i , s j ) + d y 2 ( p i , s j ) 0 < d x ( o , s j ) < R 0 < d y ( o , s j ) < R
It can be seen from (21) that d ( p i , s j ) (i.e., the distance between the sensor s j and the pixel p i ) is the variable need to be determined. From (22), we can say that the optimization problem is, in fact, adjusting the locations of the sensor set { s j } . What needs to be done is to adjust the lateral movement distance d x ( o , s j ) and longitudinal movement distance d y ( o , s j ) to the central point o of the circular area with radius R, so as to maximize the coverage.
The distribution of pixel set { p i } is known. For an example, see Figure 2.

5.3. The Process of Particle Swarm Optimization

Particle swarm optimization (PSO) regards each sensor node as a massless particle flying at a certain speed in the search space. This speed is dynamically adjusted according to the flight experience of itself and its companions. Reference [10] discusses in detail that the optimal position and velocity of the node particles in particle swarm optimization depend on the initial random position and velocity of the nodes and the evolution formula. Because the virtual force algorithm can effectively guide the distribution process of mobile nodes, and the swarm intelligence optimization strategy has a strong global optimization ability, this paper adds the influence of virtual force into the evolution formula of the swarm intelligence algorithm, and its evolution formula is as follows:
v q , D i m ( t + 1 ) = w ( t ) × v q , D i m ( t ) + c 1 Rand ( ) ( L q , D i m * ( t ) x q , D i m ( t ) ) + c 2 Rand ( ) ( L D i m * ( t ) L q , D i m ( t ) + c 3 Rand ( ) v q , D i m )
where the particle swarm size is Q ; v q ; D i m ( t ) is the velocity of the particle q in the D i m -th dimension in the t -th generation; D i m = 1 expresses the transverse direction (X-axis); D i m = 2 expresses the longitudinal direction (Y-axis); w ( t ) is inertia weight; c 1 and c 2 are acceleration constants; c 3 is the acceleration factor used to adjust the influence of virtual force; and Rand ( ) denotes the random function varying in the range of [0, 1], which should gradually decrease with the increase of iteration times. L q , D i m * is the best position of the particle q in the D i m -th dimension, the index number of the best position of all particles in the D i m -th dimension is L D i m * , and the current position of the particle q in the D i m -th dimension is L q , D i m . We have
w ( t ) = 0.9 t M a x N u m b e r × 0.5 .
where M a x N u m b e r is the maximum number of iterations and t denotes the number of iterations. Driven by virtual force, the lateral movement distance x q ( t ) of the particle q in the t -th generation is
x q ( t ) = { 0 , | F x y | F t h F x q F x y q × M a x Step × e F x y 1 , | F x y | > F t h , D i m = 1 .
The longitudinal moving distance y q ( t ) of the particle q in the t -th generation is
y q ( t ) = { 0 , | F x y | F t h F y q F x y q × M a x Step × e F x y 1 , | F x y | > F t h , D i m = 2 .
where M a x Step is the maximum allowable moving distance of the sensor node, F x y q is the virtual force acting on the particle q , F x q and F y q are the virtual force components of the particle q on the X-axis and the Y-axis, and F t h is the threshold value of the virtual force.

5.4. Deployment Strategy

The algorithm steps are as follows:
Step 1. Each wireless sensor node in the area Λ broadcasts information, which includes the index and location information of the node, and enters step 2.
Step 2. If the wireless sensor node s j receives the broadcast information of the neighbor node, it updates the neighbor list information and enters step 3.
Step 3. By introducing the D-S evidence theory of the priority factor, the sensing probability P ( p i ) of the pixel p i in the circular area R = ( R s + R e ) with a radius around the sensor node s j is aggregated.
Step 4. Using the particle swarm optimization algorithm, calculate the optimal distance x ( t ) that sensor node s j needs to move horizontally and the optimal distance y ( t ) that sensor node s j needs to move vertically, and enter step 5.
Step 5. If the new position to be moved is outside the monitoring area Λ , the moving process will not be carried out, and the wireless sensor node will not move, so go to step 6. Otherwise, move to a new position and go to step 6.
Step 6. If the preset number of cycles is reached, the algorithm ends. Otherwise, go to step 1 and start the next moving process.

6. Simulation and Discussion

Python language was used to program the above deployment model. It is assumed that N wireless sensor nodes are randomly deployed in a monitoring area Λ of 100 m × 100 m, with the sensing radius of all nodes R s = 10 m, sensing error range R e = 2 m, and communication radius R c = 3 R s = 30   m . m = 100 ; n = 100 .
The parameters of the VF algorithm are as follows: k 1 = 1 , α 1 = 2 , F t h = 1 , M a x Step = 5   m . The parameters of this algorithm are as follows: sensing probability parameters, β = 2 , λ = 0.2 ; gain coefficients, k = 2 , α = 2 ; VF threshold, F t h = 1 ; minimum sensing probability allowed by a wireless sensor network, P μ = 1 ; maximum moving distance allowed by a sensor, M a x Step = 5   m ; sensing radius, R = 16   m . The parameters related to the optimization of the particle swarm are set as follows: acceleration factors of the particle swarm, c 1 = c 2 = c 3 = 1 ; maximum number of iterations, M a x N u m b e r = 300 ; velocity interval of particles [ v m i n , v m a x ] = 0.2 × [ 0 , 50 ] = [ 0 , 10 ] .
To prevent wireless sensor nodes from moving out of the monitoring area Λ , if the new position to be moved to is located at the edge 5 m wide inside the monitoring area, the nodes will not move and will remain in the original position.

6.1. The Deployment Results

The fixed position of the sensor node after the initial random arrangement is shown in Figure 3a. Figure 3b shows the deployment of sensor nodes using the VF algorithm. The hot attraction of fixed nodes to ordinary nodes limits the movement of nodes, resulting in a local accumulation of nodes. Figure 3c shows the optimized deployment effect of particle swarm optimization. The local aggregation phenomenon has been alleviated, and the average coverage rate of the network has reached 83.62. Figure 3d shows the sensor node deployment optimized by the proposed VF-PSO-DS strategy. The blind area of regional coverage is reduced, and the local aggregation phenomenon almost disappears. This shows that the aggregation of the two algorithms plays an effective role in the uniform coverage of the network, and the effective coverage of the optimized network reaches 89.38%.
To further verify the performance of the three algorithms, the convergence rates were compared through experiments, as shown in Figure 4. The original VF strategy does not take moving distance optimization into account, and most work determines the moving distance based on the amount of the virtual force (see [36]). As a result, the VF algorithm provides the lowest coverage rate. In addition, the PSO algorithm does not account for virtual force, and the convergence time is substantially slower; the final optimization result, however, is gratifying.
One hundred independent simulation experiments were conducted. The average effective coverage, average calculation time, and average iteration times of the three algorithms are shown in Table 2. Experimental results show that the proposed VF-PSO-DS strategy can quickly and effectively optimize the deployment of wireless sensor networks, and its calculation time is 85.1% and 41.6% of that of the VF algorithm and particle swarm optimization algorithm, respectively, while the effective coverage of the network increases by 19.34% and 3.37% respectively. Compared with the VF algorithm and particle swarm optimization algorithm, the algorithm not only has a better deployment optimization effect for wireless sensor networks, but also has a faster convergence speed and requires less calculation time.

6.2. The Adaptability Tests

To verify the adaptability of the proposed VF-PSO-DS strategy to hot spots and obstacles, it is assumed that the area to be measured contains one hot spot and several obstacles, and the wireless sensor network contains 16 fixed sensor nodes and 80 mobile sensor nodes, while other network parameters and algorithm parameters remain unchanged. The initial deployment of the network is shown in Figure 5a,b. Based on the measurement requirements of different areas in the deployment of the network, the network can effectively avoid obstacles, and the density of sensor nodes in hot spots can be improved. Thus, the VF-PSO-DS strategy can meet the needs in a complex environment, and the algorithm is robust.
The stability of the deployment strategy was tested for the case of the number of sensor nodes increasing. At each of the values of N = 300 , 350 , 400 , 450 , 500 , the simulation was carried out 20 times, and the results were averaged. From Table 3 and Table 4, it can be concluded that with the increase in the number of sensor nodes, the coverage of the monitoring area increases, and the moving distance of the nodes also increases. Because the VF algorithm does not control the position of nodes’ movement in the dense nodes, the moving distance is too large, the moving effect is not good, and it is less helpful to improve the coverage rate.

7. Conclusions

In this paper, a sensing probability model of nodes is suggested and the sensing probability is aggregated by D-S evidence. Because the traditional D-S evidence theory is inconsistent with the actual situation and the result is invalid when there is a large evidence conflict, the priority factor is introduced to reassign the sensing probability in the part where the evidence conflict occurs. A virtual force-directed particle swarm optimization algorithm based on D-S evidence theory (VF-PSO-DS) for node deployment is proposed. In this approach, the effective coverage rate of the network is taken as the optimization goal, the global optimal scheme is searched for by particle swarm optimization, and the virtual force fine-tuned by sensing probability given by D-S evidence is employed to guide the particle evolution and speed up the convergence. Experimental results show that the virtual force-directed particle swarm optimization approach can quickly and effectively achieve global optimization. Compared to the virtual force algorithm and the particle swarm optimization algorithm, the virtual force-directed particle swarm optimization approach takes less time, converges faster, and increases the sensing coverage of wireless sensor networks.

Author Contributions

Conceptualization, J.Q.; methodology, L.W. and H.S.; software, L.W.; validation, P.L., J.Q. and H.S.; formal analysis, L.W.; investigation, L.W.; resources, J.Q.; data curation, H.S.; writing—original draft preparation, L.W.; writing—review and editing, P.L. and H.S.; visualization, L.W.; supervision, J.Q.; project administration, J.Q.; funding acquisition, J.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Xi’an Key Laboratory of Advanced Control and Intelligent Process under grant No. 2019220714SYS022CG04, Key R&D plan of Shaanxi Province under grant No. 2021ZDLGY04-04, and Postgraduate Innovation Fund of Xi’an University of Posts and Telecommunications under grants CXJJDL2021014 and CXJJDL2021015.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors thank Yun Wu for technical assistance.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Banimelhem, O.; Mowafi, M.; Aljoby, W. Genetic algorithm based node deployment in hybrid wireless sensor networks. Commun. Netw. 2013, 2013, 39564. [Google Scholar] [CrossRef] [Green Version]
  2. Wang, Y.; Hongmei, L.; Hengyang, H. Wireless sensor network deployment using an optimized artificial fish swarm algorithm. In Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering, Hangzhou, China, 23–25 March 2012; Volume 2. [Google Scholar]
  3. Liu, X.; He, D. Ant colony optimization with greedy migration mechanism for node deployment in wireless sensor networks. J. Netw. Comput. Appl. 2014, 39, 310–318. [Google Scholar] [CrossRef]
  4. Li, Y.; Cao, J. WSN node optimal deployment algorithm based on adaptive binary particle swarm optimization. ASP Trans. Internet Things 2021, 1.1, 1–8. [Google Scholar] [CrossRef]
  5. Wang, X.; Wang, S.; Bi, D. Virtual Force-Directed Particle Swarm Optimization for Dynamic Deployment in Wireless Sensor Networks. In Advanced Intelligent Computing Theories and Applications; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  6. Runliang, D.; Nan, G. Optimizing Sensor Network Coverage and Regional Connectivity in Industrial IoT Systems. IEEE Syst. J. 2017, 11, 1351–1360. [Google Scholar]
  7. Hosseinzadeh, M.; Garone, E.; Schenato, L. A Distributed Method for Linear Programming Problems with Box Constraints and Time-Varying Inequalities. IEEE Control. Syst. Lett. 2019, 3, 404–409. [Google Scholar] [CrossRef]
  8. Kang, S.H. Energy Optimization in Cluster-Based Routing Protocols for Large-Area Wireless Sensor Networks. Symmetry 2019, 11, 37. [Google Scholar] [CrossRef] [Green Version]
  9. Liu, W.; Yang, S.; Sun, S.; Wei, S. A Node Deployment Optimization Method of WSN Based on Ant-Lion Optimization Algorithm. In Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (Idaacs-Sws), Lviv, Ukraine, 20–21 September 2018. [Google Scholar]
  10. Xiang, T.; Wang, H.; Shi, Y. Hybrid WSN Node Deployment Optimization Strategy Based on CS Algorithm. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019. [Google Scholar]
  11. Xu, K.; Zhao, Z.; Luo, Y.; Hui, G.; Hu, L. An Energy-Efficient Clustering Routing Protocol Based on a High-QoS Node Deployment with an Inter-Cluster Routing Mechanism in WSNs. Sensors 2019, 19, 2752. [Google Scholar] [CrossRef] [Green Version]
  12. Redhu, S.; Rajesh, M.H. Cooperative Network Model for Joint Mobile Sink Scheduling and Dynamic Buffer Management Using Q-Learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1853–1864. [Google Scholar] [CrossRef]
  13. García, L.; Parra, L.; Jimenez, J.M.; Parra, M.; Lloret, J.; Mauri, P.V.; Lorenz, P. Deployment Strategies of Soil Monitoring WSN for Precision Agriculture Irrigation Scheduling in Rural Areas. Sensors 2021, 21, 1693. [Google Scholar] [CrossRef]
  14. Tang, R.; Tao, Y.; Li, J.; Hu, Z.; Yuan, K.; Wu, Z.; Liu, S.; Wang, Y. A Novel 3D Node Deployment Inspired By Dusty Plasma Crystallization in UAV-Assisted Wireless Sensor Network Applications. Sensors 2021, 21, 7576. [Google Scholar] [CrossRef]
  15. Yu, X.; Huang, W.; Lan, J.; Qian, X. A Novel Virtual Force Approach for Node Deployment in Wireless Sensor Network. In Proceedings of the 2012 IEEE 8th International Conference on Distributed Computing In Sensor Systems, Washington, DC, USA, 16–18 May 2012. [Google Scholar]
  16. Xiaoping, R.; Zi-xing, C.; Zhao, L.; Wuyi, W. Performance Analysis of Virtual Force Models in Node Deployment Algorithm of WSN; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  17. Li, J.; Zhang, B.; Cui, L.; Chai, S. An Extended Virtual Force-Based Approach to Distributed Self-Deployment in Mobile Sensor Networks. Int. J. Distrib. Sens. Netw. 2012, 8, 417307. [Google Scholar] [CrossRef]
  18. Yu, X.; Liu, N.; Huang, W.; Qian, X.; Zhang, T. A Node Deployment Algorithm Based on Van Der Waals Force in Wireless Sensor Networks. Int. J. Distrib. Sens. Networks 2013, 9, 505710. [Google Scholar] [CrossRef]
  19. Ahmad, P.A.; Mahmuddin, M.; Omar, M.H. Node Placement Strategy in Wireless Sensor Network. Int. J. Mob. Comput. Multim. Commun. 2013, 5, 18–31. [Google Scholar] [CrossRef] [Green Version]
  20. Cheng-Chih, Y.; Wen, J.-H. A Hybrid Local Virtual Force Algorithm for Sensing Deployment in Wireless Sensor Network. In Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan, 3–5 July 2013. [Google Scholar]
  21. Deng, X.; Yu, Z.; Tang, R.; Qian, X.; Yuan, K.; Liu, S. An Optimized Node Deployment Solution Based on a Virtual Spring Force Algorithm for Wireless Sensor Network Applications. Sensors 2019, 19, 1817. [Google Scholar] [CrossRef] [Green Version]
  22. Yu, Z.; Tang, R.; Yuan, K.; Lin, H.; Qian, X.; Deng, X.; Liu, S. Investigation of Parameter Effects on Virtual-Spring-Force Algorithm for Wireless-Sensor-Network Applications. Sensors 2019, 19, 3082. [Google Scholar] [CrossRef] [Green Version]
  23. Li, Q.; Yi, Q.; Tang, R.; Qian, X.; Yuan, K.; Liu, S. A Hybrid Optimization from Two Virtual Physical Force Algorithms for Dynamic Node Deployment in WSN Applications. Sensors 2019, 19, 5108. [Google Scholar] [CrossRef] [Green Version]
  24. Fang, Y.; Cheng, B.; Kang, K.; Tan, H. A Self-adaptive Deployment Model of UAV Cluster for Emergency Communication Network. Int. J. Distrib. Sens. Netw. 2021, 17, 15501477211049327. [Google Scholar] [CrossRef]
  25. Zhao, S.; Wang, H.; Cheng, D. Power Distribution System Reliability Evaluation By D-S Evidence Inference and Bayesian Network Method. In Proceedings of the 2010 IEEE 11th International Conference on Probabilistic Methods Applied to Power Systems, Singapore, 14–17 June 2010. [Google Scholar]
  26. Feng, R.; Xu, X.; Zhou, X.; Wan, J. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory. Sensors 2011, 11, 1345–1360. [Google Scholar] [CrossRef]
  27. Miao, C.; Huang, L.; Guo, W.; Xu, H. A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory. In International Conference on Wireless Algorithms, Systems, and Applications; Springer: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  28. Li, H.; Hua, X. Water Enviroment Monitoring System Based on Zigbee Technology. In Proceedings of the 2013 Third International Conference on Intelligent System Design and Engineering Applications, Hong Kong, China, 16–18 January 2013. [Google Scholar]
  29. Liu, P.T.; Gong, R.K.; Gong, Y.H.; Wang, C.H. A Gas Pipeline Leakage Diagnosis of Fusing BP Neural Network Basing on WSN and D-S Theory. Appl. Mech. Mater. 2014, 541, 1442–1446. [Google Scholar] [CrossRef]
  30. Zhao, Y.; Jia, R.; Jin, N.; He, Y. A Novel Method of Fleet Deployment Based on Route Risk Evaluation. Inf. Sci. 2016, 372, 731–744. [Google Scholar] [CrossRef]
  31. Song, X.; Gong, Y.; Jin, D.; Li, Q.; Jing, H. Coverage Hole Recovery Algorithm Based on Molecule Model in Heterogeneous WSNs. Int. J. Comput. Commun. Control 2017, 12, 562. [Google Scholar] [CrossRef]
  32. Sun, Z.; Zhang, Z.; Xiao, C.; Qu, G. D-S Evidence Theory Based Trust Ant Colony Routing in WSN. China Commun. 2018, 15, 27–41. [Google Scholar] [CrossRef]
  33. Song, X.; Gong, Y.; Jin, D.; Li, Q. Nodes Deployment Optimization Algorithm Based on Improved Evidence Theory of Underwater Wireless Sensor Networks. Photonic Netw. Commun. 2018, 37, 224–232. [Google Scholar] [CrossRef]
  34. He, L.; Wan, T.; Zhang, C.; Xia, F.; Wang, S.; Wang, Y. Network Situation Assessment of Host Node Based on Improved D-S Evidence Theory. J. Phys. Conf. Ser. 2021, 1738, 012091. [Google Scholar] [CrossRef]
  35. Du, Q.; Xu, L.; Zhao, H. DS evidence theory applied to fault diagnosis of generator based on embedded sensors. In Proceedings of the Third International Conference on Information Fusion, Paris, France, 10–13 July 2000; Volume 1. [Google Scholar]
  36. Li, Q.; Ma, D.; Zhang, J.; Fu, Z. Nodes Deployment Algorithm of Wireless Sensor Network. Comput. Meas. Control. 2013, 21, 1715–1717. [Google Scholar]
Figure 1. The process of evidence aggregation with priority factors.
Figure 1. The process of evidence aggregation with priority factors.
Entropy 24 01637 g001
Figure 2. A possible diagram of pixels.
Figure 2. A possible diagram of pixels.
Entropy 24 01637 g002
Figure 3. Network coverage using various algorithms.
Figure 3. Network coverage using various algorithms.
Entropy 24 01637 g003aEntropy 24 01637 g003b
Figure 4. Convergence curves of various algorithms.
Figure 4. Convergence curves of various algorithms.
Entropy 24 01637 g004
Figure 5. (a) Initial network layout with hot spots and obstacles; (b) the network layout optimized by VF-PSO-DS approach with hot spots and obstacles.
Figure 5. (a) Initial network layout with hot spots and obstacles; (b) the network layout optimized by VF-PSO-DS approach with hot spots and obstacles.
Entropy 24 01637 g005
Table 1. Classification of related work by research constraints.
Table 1. Classification of related work by research constraints.
SchemesConstraints
EnergyQoSNetwork LifetimeNetwork ConnectivitySensing Coverage
[6] YY
[7] YYY
[8] Y Y
[9] YY
[10] Y Y
[11]Y Y
[12] Y Y
[13]Y Y
[14] Y
Table 2. Statistics of 100 independent optimizations.
Table 2. Statistics of 100 independent optimizations.
VFPSOVF-PSO-DS
Effective coverage (%)79.2995.2698.63
Calculation time137.43280.95116.91
Iterations161.48140.3340.59
Table 3. Network coverage using various algorithms when the number of nodes increases.
Table 3. Network coverage using various algorithms when the number of nodes increases.
Number of SensorsInitial Random DeploymentVF VF-PSO-DS
3000.41230.52850.5524
3500.46220.55510.5919
4000.52750.60160.6693
4500.57190.65820.6916
5000.62360.69230.7372
Table 4. Total moving distances of nodes using various algorithms when the number of nodes increases.
Table 4. Total moving distances of nodes using various algorithms when the number of nodes increases.
Number of SensorsMoving Distance of VFMoving Distance of VF-PSO-DS
300314.16 m256.19 m
350426.82 m358.27 m
400517.65 m399.23 m
450578.19 m451.96 m
500609.87 m512.25 m
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wu, L.; Qu, J.; Shi, H.; Li, P. Node Deployment Optimization for Wireless Sensor Networks Based on Virtual Force-Directed Particle Swarm Optimization Algorithm and Evidence Theory. Entropy 2022, 24, 1637. https://doi.org/10.3390/e24111637

AMA Style

Wu L, Qu J, Shi H, Li P. Node Deployment Optimization for Wireless Sensor Networks Based on Virtual Force-Directed Particle Swarm Optimization Algorithm and Evidence Theory. Entropy. 2022; 24(11):1637. https://doi.org/10.3390/e24111637

Chicago/Turabian Style

Wu, Liangshun, Junsuo Qu, Haonan Shi, and Pengfei Li. 2022. "Node Deployment Optimization for Wireless Sensor Networks Based on Virtual Force-Directed Particle Swarm Optimization Algorithm and Evidence Theory" Entropy 24, no. 11: 1637. https://doi.org/10.3390/e24111637

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop