You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

17 April 2019

Travel Route Planning with Optimal Coverage in Difficult Wireless Sensor Network Environment

,
,
,
and
1
College of Information Engineering, Yangzhou University, Yangzhou 225000, China
2
Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha 410000, China
3
School of Information Science and Engineering, Fujian University of Technology, Fuzhou 350000, China
4
School of Computing Science and Engineering, Vellore Institute of Technology (VIT), Vellore 632014, India
This article belongs to the Special Issue Sensing in Difficult Environments: Biomedical, Environmental and Industrial Sensors

Abstract

In recent years, wireless sensor networks (WSNs) have been widely applied to sense the physical environment, especially some difficult environment due to their ad-hoc nature with self-organization and local collaboration characteristics. Meanwhile, the rapid development of intelligent vehicles makes it possible to adopt mobile devices to collect information in WSNs. Although network performance can be greatly improved by those mobile devices, it is difficult to plan a reasonable travel route for efficient data gathering. In this paper, we present a travel route planning schema with a mobile collector (TRP-MC) to find a short route that covers as many sensors as possible. In order to conserve energy, sensors prefer to utilize single hop communication for data uploading within their communication range. Sojourn points (SPs) are firstly defined for a mobile collector to gather information, and then their number is determined according to the maximal coverage rate. Next, the particle swarm optimization (PSO) algorithm is used to search the optimal positions for those SPs with maximal coverage rate and minimal overlapped coverage rate. Finally, we schedule the shortest loop for those SPs by using ant colony optimization (ACO) algorithm. Plenty of simulations are performed and the results show that our presented schema owns a better performance compared to Low Energy Adaptive Clustering Hierarchy (LEACH), Multi-hop Weighted Revenue (MWR) algorithm and Single-hop Data-gathering Procedure (SHDGP).

1. Introduction

Wireless sensor networks (WSNs) have been widely applied recently to sense the physical environment, especially difficult environments due to their ad-hoc nature with self-organization and local collaboration characteristics. WSN, as a bond to connect the real world and digital systems, have attracted much attention over the past few decades [1,2,3,4]. In WSNs, sensors are generally deployed in the target areas by vehicles, such as planes, in a random manner. However, those target areas are usually in harsh environment, and once the sensors break down or exhaust their energy, they will be invalid because repair or battery replacement is impossible. After sensor deployment, they exchange the information with their neighbors and the WSN is formed rapidly. Due to the favorable characteristics of easy deployment and self-organization, as mentioned above, WSN can be seen everywhere in our daily life, such as environment monitoring [5], target surveillance [6,7], smart health [8,9] and many other intelligent systems [10,11,12,13].
Although WSNs are popular for some excellent characteristics, some challenges still trouble them [14,15]. The most severe one is the limited energy problem. Sensors are commonly powered by their carry-on batteries and battery replacement by manual operation is unrealistic, especially in some harsh environments [16]. Therefore, many researchers focus on the energy problems in WSNs. One of the efficient methods is routing protocol designing, and various energy efficient routing schemas are presented to prolong the lifetime of the network [17,18]. Traditional routing schema commonly focuses on the network with a fixed sink. In recent years, the development of an intelligent car has made it possible to gather mobile data. Intelligent cars are usually modified as mobile collectors by equipping multiple antennas so that they can collect the data from multiple objects simultaneously.
Routing schemas for WSNs can be mainly classified into three categories as follows. Figure 1 describes the classic clustering-based schema with a fixed sink [19,20,21,22,23,24]. In this schema, the network is usually partitioned into several regions according to some special rules, and each region denotes a cluster. Each cluster chooses a leader with the most energy as its cluster head (CH). The data of member nodes are firstly transmitted to their corresponding CHs, and then CHs adopt multi-hop communication to upload the data to the remote sink. This schema has been widely used in some hierarchical routing protocols, such as Low Energy Adaptive Clustering Hierarchy (LEACH), Two-tier Data Dissemination (TTDD) algorithm and Hybrid, Energy-efficient, Distributed Clustering (HEED).
Figure 1. Clustering-based schema with a fixed sink.
Figure 2 describes the data mule-based schema with a mobile collector [25,26,27,28,29,30]. The mobile collector moves along a predefined path, and once a sensor enters its transmission range, it will stop for data gathering.
Figure 2. Data mule-based schema with a mobile collector.
Figure 3 describes the rendezvous-based schema with a mobile data collector [31,32,33,34,35,36,37]. The rendezvous points are chosen in advance, and the mobile collector moves along a scheduled path to traverse all the rendezvous points. Data uploading only occurs when the mobile collector stops at any nearby rendezvous point. Data mule-based schema usually plans a long travel route for the mobile collector. Therefore, it results in serious network latency. Additionally, the changeless moving path is not flexible, and it is hard to balance the energy of different sensors. Rendezvous-based schema selects the sojourn points (SPs) for the mobile collector, and the total length of the travel route is related to the number and position of the selected SPs. Mobile collector in those schemas greatly enhances the performance of the network. However, the travel route of the mobile collector needs to be elaborately scheduled.
Figure 3. Rendezvous-based schema with a mobile data collector.
In this paper, both the number and the position are considered to select a set of SPs to maximize the coverage rate of the sensors as well as minimize the overlapped coverage rate. We firstly illustrate the coverage problems in WSN, and then we figure out the suitable number of rendezvous points according to the transmission range. After that, the PSO algorithm is utilized to search the optimal position for the SPs. Finally, the shortest loop will be scheduled by the ACO algorithm for the mobile collector to traverse all the SPs. Most of sensors adopt single hop communication and only a few sensors especially some outliers inevitably utilize multiple hops communication.
The remaining sections of this paper are organized as follows. Section 2 illustrates some similar work related to our presented schema. The system model which contains the network model and energy model is demonstrated in Section 3. In Section 4, the coverage problem in WSN is analyzed and our presented TRP-MC is described in detail. Simulations are conducted and the results are analyzed in Section 5. Section 6 gives a discussion, and Section 7 concludes this paper.

3. System Model

3.1. Fundamental Assumptions

In order to have a better illustration of our proposed TRP-MC and conduct the simulation conveniently, we present the following assumptions.
(1)
All the sensors keep static after deployment, and once their energy is exhausted, they will be invalid.
(2)
Sensors can adjust their communication distance within communication range and single hop communication are mainly utilized for data uploading.
(3)
We define the sojourn points (SPs) as the places where the mobile collector stops for data gathering.
(4)
A static sink is set at the corner of the sensor field, and during each round, the mobile collector will visit the sink once to upload its collected data.
(5)
A mobile collector which is modified by an intelligent car is employed for data gathering. It travels through the sensor field and only stops at SPs which are elaborately selected for data gathering.

3.2. Network Model

The network model utilized in this paper is shown in Figure 4. We consider the sensor field as a rectangular area and plenty of sensors are deployed randomly in this area. There is no obstacle in the sensor field so that the mobile collector can move freely. Each round denotes the time for the mobile collector to traverse all the SPs. In each round, each sensor will upload a data package to the mobile collector respectively.
Figure 4. Network model.

3.3. Energy Model

The energy consumption of WSNs is generally composed of many parts, such as monitoring, data storing, and data transmitting. However, the energy used for data transmission takes up a large proportion of the total energy consumption. Therefore, we only consider the energy consumption used in transmission in this paper. We use the same energy model as literature [38,39] adopted. The following formulas are used to calculate the energy consumption for sending k-bit data.
E T x ( k , d i s ( s m , s n ) ) = E e l e c · k + ε a m p · k
where d i s ( s m , s n ) represents the distance between node m and node n and it can be calculated using Formula (2).
d i s ( s m , s n ) = ( x m x n ) 2 + ( y m y n ) 2
E e l e c represents the energy to run the transmission circuit. ε a m p denotes the energy consumption for the amplifier to strengthen the signal for further transmission and it can be further divided into Formula (3).
ε a m p = { ε f s · d i s 2 i f   d i s d 0 ε m p · d i s 4 i f   d i s > d 0
where ε f s represents the power for close range communication and ε m p represents the power for long distance communication. Those two schemas are also called free space model and multi-path fading model, respectively. The threshold value d 0 is used to judge which model should be adopted and it can be calculated as:
d 0 = ε f s ε m p
The energy dissipates for receiving k-bit data can be figured out by Formula (5).
E R x = E e l e c · k

4. Our Presented TRP-MC Algorithm

4.1. Coverage Problem Formulation

In this section, we first transform the travel route planning problem of the mobile collector into the coverage problem of SPs. As we all know, two sensors can communicate with each other only when they are both in their communication range. Although the mobile collector possesses a better performance than the common sensors, their valid communication ranges are the same. We assume that the mobile collector only stops for data gathering because moving data gathering will result in a high package loss rate and much energy will be dissipated for retransmission. The places where the mobile collector stops are called SPs. When the mobile collector stops at one SP, it can communicate with the sensors within its transmission range. We define the covered area as the place where the mobile collector can communicate with when it stops at SPs. A coverage sample is shown in Figure 5.
Figure 5. Covered areas of the mobile collector.
Where S P 1 , S P 2 and S P 3 represent three different covered areas of SPs, respectively. As Figure 5 describes, the area A 1 , A 2 and A 3 are covered by 2 SPs and A 4 is covered by 3 SPs simultaneously. We define those areas which are covered by at least one SP as covered area, and those areas which are covered by more than one SP as overlapped covered areas. One sensor can upload its monitored data to the mobile collector if it is deployed at any covered area of the SP. However, overlapped covered areas dissipate the resource of the mobile collector and increase the travelling distance of the mobile collector. The mobile collector will work more efficiently if the overlapped covered areas are decreased.
Due to the round shape of each covered area, it is difficult to calculate the overlapped covered areas, especially the areas covered by multiple SPs. Hence, we introduce anchor points to assist in calculating the overlapped coverage rate. The anchor points are virtual points evenly distributed in the sensor field, as is shown in Figure 6.
Figure 6. Anchors for coverage rate calculation.
Each anchor point can calculate its distance to the SP to confirm whether it is covered by the SP. Therefore, we define the coverage rate and overlapped coverage rate using Formulas (6) and (7).
r c o v e r = n c o v e r n
r o v e r l a p _ c o v e r = n o v e r l a p _ c o v e r n c o v e r
where n denotes the number of anchor points. n c o v e r and n o v e r l a p _ c o v e r denote the anchor points cover by at least one SP and more than one SPs, respectively. Additionally, the accuracy of r c o v e r and r o v e r l a p _ c o v e r is corresponding to the density of anchor points. In Figure 5, the coordinates of SPs S P 1 , S P 2 and S P 3 are (180,240), (120,120), and (240,120), respectively. The corresponding transmission range is 90 and the density of the anchors is one. The coverage rate and the overlapped coverage rate are 0.5214 and 0.1718, respectively.
In our presented TRP-MC, we regard the sensor nodes as the anchor points mentioned above. The TRP-MC can be formalized after all the SPs are selected. When the mobile collector stops at the SPs, sensors which are in the transmission range of the mobile collector are called the neighbors of SPs. Our goal is to use a fixed number of SPs to cover as many sensors as possible and the overlapped coverage rate is as low as possible at the same time. The object of TRP-MC can be transformed into mixed-integer programming using Formula (8).
M a x i m i z e r   r c o v e r   & &   M i n i m i z e   r o v e r l a p _ c o v e r
where r c o v e r and r o v e r l a p _ c o v e r can be calculated using Formulas (9) and (10).
r c o v e r = i = 1 n c i n
r o v e r l a p _ c o v e r = i = 1 n o i i = 1 n c i
where n is the number of sensors, c i and o i are illustrated in Formulas (11) and (12), respectively.
c i = { 1   i f   s e n s o r   i   i s   c o v e r e d   b y   a t   l e a s t   o n e   S P 0   o t h e r w i s e
o i = { 1   i f   s e n s o r   i   i s   c o v e r e d   b y   m o r e   t h a n   o n e   S P s 0   o t h e r w i s e

4.2. Hexagon Division

We consider the sensor field is covered by a fixed number of SPs and one of the efficient methods has been discussed in reference [40] for sensor deployment. The authors use a regular hexagon to divide the sensor field and the length of the regular hexagon is set to the transmission range. Therefore, in each regular hexagon, only one node needs to keep active and the other nodes can stay in sleep mode momentarily. This method makes full use of the perceived range of sensor so that the active nodes in the network are decreased. In the same way, we can introduce a regular hexagon to select the SPs for a mobile collector. Figure 7 shows the selection of SPs using a regular hexagon. The side length of the regular hexagon is the transmission range of sensors and each sensor in the covered area can upload its data to its corresponding SP. This approach decreases the number of SPs and the travel route length is reduced. However, the areas covered by two adjacent SPs still have few overlaps.
Figure 7. Hexagon division.

4.3. Coverage Optimization Using PSO

In order to further optimize the number of SPs and the travel route length, we introduce PSO to find the best position for the SPs. Particle swarm optimization (PSO) is a searching algorithm inspired by the hunting process of birds [41]. It can achieve the near-optimal solution in the searching space by iteration. As tour scheduling for the mobile collector has been verified as an NP-hard problem, it is difficult to figure out the optimal solution. Therefore, PSO is very suitable for the tour scheduling in WSNs. We use the virtual particles to represent the location of SPs, and each particle denotes a whole solution for the SPs selection. Due to the fixed dimension of particles in PSO, first we need to confirm the number of SPs. First, we assume that SPs can make full use of the wireless communication space and the number of SPs can be calculated using Formula (13). Different number of SPs will be discussed in the next section.
s p n = S π r 2
where S denotes the total area of the sensor field, and r denotes the transmission range of the sensors. Then we can construct the particles using a matrix with p n × ( 2 · s p n ) dimension which is shown as Formula (14) and p n denotes the number of particles.
P = [ p 1 p 2 p 2 p p n ] = [ x s p 1 1 , y s p 1 1 , x s p 2 1 , y s p 2 1 x s p n 1 , y s p n 1 x s p 1 2 , y s p 1 2 , x s p 2 2 , y s p 2 2 x s p n 2 , y s p n 2 x s p 1 3 , y s p 1 3 , x s p 2 3 , y s p 2 3 x s p n 3 , y s p n 3 x s p 1 p n , y s p 1 p n , x s p 2 p n , y s p 2 p n x s p n p n , y s p n p n ]
where a 2-tuple ( x s p i k , y s p i k ) denotes the location of the i-th SP in the k-th particle. We set the restrictions for the moving speed of the particles in each dimension and the location of the particles. The restrictions are shown as Formulas (15) and (16).
restriction ( v i k ) = [ 20 , 20 ]
restriction ( x s p i k , y s p i k ) = [ 0 , L ]
where v i k denotes the speed of the i-th dimension of the k-th particles. Formula (15) ensures that the particles will not move too fast and Formula (16) guarantees the particles will not move away from the sensor field. Next, we define the fitness function for the PSO. As r c o v e r and r o v e r l a p _ c o v e r are both positive numbers, we adopt Formula (17) which is transformed from Formula (8) as the fitness function and our goal is to minimize the fitness function.
Fitness = r o v e r l a p _ c o v e r r c o v e r e d
Then we execute the PSO algorithm using the following steps.
Step 1: We initialize the particles P and the speed of the particles v with random numbers and they both satisfy the above restrictions.
Step 2: The value of the fitness function is calculated according to Formula (17). Then each particle compares the current fitness value with its previous optimal fitness value and chooses the smaller one as its local optimal solution which is denoted as L b e s t . In the same way, the previous optimal fitness value of all particles is compared with its current fitness value and the smaller one is chosen as the global optimal solution which is denoted as G b e s t .
Step 3: Then, we use Formulas (18) and (19) to update the speed and the location of the particles respectively.
V ( t + 1 ) = λ V ( t ) + α · random · ( L b e s t P ( t ) ) + β · random ( ) · ( G b e s t P ( t ) )
P ( t + 1 ) = P ( t ) + V ( t + 1 )
where λ represents the inertia coefficient and the function of random ( ) is to generate a random number which is between zero and one. α and β are two weight coefficients, and they satisfy α + β = 1 .
Step 4: After updating the parameters of the particles, the bounds checking is conducted. If the speed exceeds the restriction as Formula (15) describes, we set it as the boundary value. If the location of the particle exceeds the boundary of the sensor field as Formula (16) describes, we set it as the boundary value.
Step 5: Next, the algorithm returns to step 2 and iterates to the maximal number of iterations.
Ultimately, we achieve the optimal solution for the SPs selection as G b e s t shows. One sample after executing PSO is shown in Figure 8. As Figure 8 shows, most of the sensors are covered by only one SP and only a few sensors are covered by multiple SPs. Inevitably, very few sensors may not be covered by any SPs especially when they are outliers.
Figure 8. SPs selection using PSO.
For those uncovered sensors, we could only introduce multi-hop transmission for data delivering. Once a sensor finds that it is not covered by any SP, it will choose the closest relay node which is covered by the nearby SP. Although multi-hop communication still exists in the network, it has a slight effect on the performance of the network because only a few sensors will use it.

4.4. Travel Path Planning Using ACO

After all the SPs are selected, the shortest loop is scheduled by ACO to connect all the SPs. ACO is a metaheuristic algorithm inspired by the food-seeking of ants [42]. Ants secrete pheromones on their moving path and the shorter path will be traveled by more ants. Then, higher concentration of pheromones will be focused on those paths. Therefore, ants can seek a shorter path by referring to the experience of other ants. We regard the network as a complete undirected graph which is denoted by G = < V , E > , where V denotes the set of SPs and E denotes the virtual links between every two SPs. We use the matrix A with dimension m × s p n to record the journey of ants, where m denotes the number of ants and s p n denotes the number of SPs. Matrix T with dimension s p n × s p n is used to record the pheromone concentration of the virtual link. ACO algorithm is executed using the following steps.
Step 1: We randomly distribute m ants in SPs and initialize matrix A .
Step 2: Then, we calculate the possibility of selecting SPs which are not visited as the next destination for each ant, according to the pheromone concentration and their distance. Ants visit all those SPs according to the possibility and record the journey in matrix A . The possibility of SPs which are not visited can be calculated by Formula (20).
p i j k ( t ) = { φ i j α ( t ) · μ i j β ( t ) m n e x t φ i m α ( t ) · μ i m β ( t )   i f   j n e x t 0 o t h e r w i s e
where p i j k ( t ) represents the possibility of selecting the path from S P i to S P j for the k-th ant in the t-th iteration. φ i j denotes the pheromone concentration of the path from S P i to S P j and μ i j denotes the reciprocal of the distance from S P i to S P j . α and β denote two different control factors for pheromone concentration and inspired factor. The set next denotes the SPs that the ant has not visited.
Step 3: Next, we calculate the journey of each ant using Formula (21). Since our goal is to minimize the tour length of the mobile collector, we only evaluate the journey on its length.
L ( a k ) = i , j S P s , i j l i j · b i j
where l i j denotes the distance from S P i to S P j and b i j can be illustrated using Formula (22).
b i j = { 1   i f   p a t h   f r o m   S P i   t o   S P j   i s   c o n t a i n e d   o n   k t h   a n t s   j o u r n e y 0 o t h e r w i s e
Step 4: Finally, we update the concentration of the pheromone using the following formulas.
φ i j ( t + 1 ) = ( 1 η ) · φ i j ( t ) + Δ φ i j
Δ φ i j = k = 1 m Δ φ i j k
Δ φ i j k = { Q L ( a k )   i f   t h e   k t h   a n t   p a s s   p a t h i j 0 o t h e r w i s e
where η denotes the volatilization rate of pheromone and Q denotes the total amount of pheromone secreted by one ant during one whole travel.
Step 5: Steps 1–4 are repeatedly executed until the algorithm achieves its maximal iteration number.
The same sample after executing ACO is shown in Figure 9.
Figure 9. Path planning using ACO.

5. Performance Evaluation

5.1. Parameters for PSO and ACO

We firstly execute the PSO algorithm for SPs selection, and different values of the PSO parameters are tried to explore the optimal performance of the algorithm. Then the ACO algorithm is carried out many times with different ACO parameters to find the shortest loop. All the optimal parameters for PSO and ACO are listed in Table 2.
Table 2. Parameters for PSO and ACO.

5.2. Network Parameters and Settings

We adopt Matlab as the simulator to test the performance of our presented TRP-MC. We also compare it with some similar work, such as LEACH, SHDGP, and MWR and analyze the simulation results. Some relevant parameters of the network are described in Table 3.
Table 3. Network parameters.
We use the same network model to execute LEACH, SHDGP, and MWR to equally evaluate their performance. Following are some settings for the compared methods.
LEACH: The number of cluster heads in LEACH is the same as nsp and a static sink is placed in the center of the network. We assume that the transmission range of sensors in LEACH is big enough that every two sensors in the network can communicate with each other.
SHDGP: We only adopt the single mobile collector pattern in SHDGP. The speed of the mobile collector and the sojourn time of data uploading are the same as TRP-MC. Transmission range of sensors is also the same as that in TRP-MC.
MWR: The number of polling points in MWR is the same as the number of SPs in TRP-MC. The transmission range of MWR and TRP-MC are the same. In the same way, the mobile data collector owns the same properties as the mobile collector in TRP-MC.

5.3. Comparison of Energy Consumption

The energy consumption of the network using different methods is firstly compared. As Figure 10 demonstrates, the energy consumption of the four algorithms increases while SHDGP obtains a better performance compared to the other three algorithms. SHDGP achieves a little improvement in the performance of energy consumption compared to TRP-MC. However, energy consumption in SHDGP increases more rapidly than TRP-MC. When the time is about 10000 s, SHDGP consumes the same energy as TRP-MC, and we can infer that TRP-MC will achieve better performance on energy consumption than SHDGP after 10,000 s. LEACH consumes the most energy because it is a multi-hop based routing schema and many cluster heads have to transmit data packages to the fixed sink via long-distance communication. MWR, TRP-MC, and SHDGP all adopt mobile collector to gather the data, therefore, their energy consumption decreases in various degrees compared to LEACH. MWR defines compatible pairs for data forwarding while the communication between data collector and compatible pairs are much smaller than LEACH. TRP-MC and SHDGP are both single-hop based schemas, therefore, they both economize much energy and have similar performance in aspects of energy consumption.
Figure 10. Comparison of energy consumption between different algorithms.

5.4. Comparison of Network Lifetime

We next explore the lifetime of the network after executing different algorithms. Generally, the network lifetime is defined as the time when nodes in the network begin to die. The simulation result is illustrated in Figure 11. In LEACH, the first node dies at about 2300 s and the other three algorithms are much superior to LEACH in aspects of network lifetime. Uneven energy dissipation of nodes, especially the cluster heads and super-long-distance communication, result in the premature death of sensors in LEACH. The adoption of mobile collector greatly decreases the communication distance between the source node and the gatherer. Therefore, the network lifetime of those schemas with a mobile data collector is prolonged in various degree compared to LEACH. Multi-hop communication in MWR increases the burden of compatible pairs which function as the forwarders and that is the primary reason for the short lifetime of MWR. Although TRP-MC and SHDGP both adopt single-hop communication, TRP-MC minimizes the overlapped nodes of SPs and further improves the gather efficiency of the mobile collector.
Figure 11. Comparison of network lifetime between different algorithms.

5.5. Comparison of Travel Route Length

Generally, the mobile collector is deployed in a converted intelligent car and its velocity is limited by its physical features. Therefore, the scheduled route length has a significant influence on the performance of the network especially network latency. We define the round as the period which denotes the time for the mobile collector to visit all the SPs for data gathering. Different algorithms are executed in many rounds respectively to compare the scheduled route length. The simulation result is described in Figure 12. LEACH generally adopts a static sink to gather information, and we set its travel route length is zero. The travel route length in TRP-MC is constant because the coverage rate will not change once the network model and transmission range are determined. Therefore, TRP-MC only needs to be executed once and the energy consumption used for control messages is greatly decreased. SHDGP plans the longest travel route path in each round because it constructs a tree structure to traverse all the polling points instead of a loop and many paths have to be visited repeatedly.
Figure 12. Comparison of travel route length between different algorithms.

5.6. Study on the Nnumber of SPs

As we mentioned above, we first calculate the number of SPs according to the transmission range and network size. However, other numbers of SPs are also feasible and they will result in different impacts. We use the same network to execute TRP-MC with different numbers of SPs. We first focus on the coverage rate and overlapped coverage rate of sensors. The simulation result is demonstrated in Figure 13. We can see that with the number of SPs increasing, the coverage rate also raises. When the number of SPs exceeds 15, the coverage rate almost does not change. The overlapped coverage rate hardly changes when the number of SPs is under 15. Therefore, 15 is a suitable number of SPs for the applied network model.
Figure 13. Comparison of different numbers of SPs.

6. Discussion and Future Work

Travel route planning is a crucial procedure among the routing protocol designing with a mobile collector. The scheduled route has a significant influence on the performance of the network. If the scheduled path is too long, it will take the mobile collector much time for traveling and the network will experience serious network latency. If the scheduled path is too short, many sensors may not communicate with the mobile collector directly so that much energy will be wasted for data forwarding. Therefore, it is difficult to schedule a short path as the coverage rate of sensors is high at the same time. In this paper, we not only focus on the coverage rate of the SPs but also take the overlapped coverage rate into consideration. The overlapped covered sensors waste the efficiency of the usage of the mobile collector. Additionally, the overlapped coverage rate is generally in inverse proportion to the coverage rate which accelerates the convergence of the fitness function of our proposed schema.
A single mobile collector contributes limited improvement in the performance of the network. With the incessant improvement of the software and hardware, the cost of the mobile collector is decreasing and more and more researchers transform their attention to WSNs with multiple mobile devices. Following are some problems which need to be addressed for multiple mobile sink-based routing protocol. Firstly, a communication mechanism should be designed for communication between the mobile collectors. Then, a cooperative mechanism which contains the moving paths and the target areas division for each collector should be elaborately designed. Additionally, the speed of the mobile collectors should also be controlled to confirm that the data of the network is synchronized. Our future work will mainly focus on the problems mentioned above and further improve the performance of the network.

7. Conclusions

Travel route planning plays a significant role in protocol designing adopts the mobile collector. In this paper, we transform the path planning problem into the coverage problem in WSN and optimize the SPs for the mobile collector. We first formulate the problem as mixed-integer programming, and then the PSO algorithm is utilized to optimize the position of the SPs to cover more sensors. Additionally, we also take the overlapped coverage rate into consideration to accelerate the convergence of the algorithm. After the SPs are determined, the ACO algorithm is introduced to connect all the SPs into a loop with the shortest length. Plenty of simulations prove the effectiveness of our presented schema in aspects of energy consumption, network lifetime and network latency.

Author Contributions

J.W. and S.-J.L. conceived and designed the experiments; Y.G. performed the experiments; A.K.S. and W.W. analyzed the data and helped to revise this paper and J.W. wrote this paper.

Funding

This work is supported by the National Natural Science Foundation of China (61772454, 61811530332, 61811540410, U1836208). The APC was funded by National Natural Science Foundation of China (61772454).

Conflicts of Interest

The authors declare no conflict of interest.

Data Availability

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Tunca, C.; Isik, S.; Donmez, M.Y.; Ersoy, C. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 877–897. [Google Scholar] [CrossRef]
  2. Yu, S.; Zhang, B.; Li, C.; Mouftah, H. Routing protocols for wireless sensor networks with mobile sinks: A survey. IEEE Commun. Mag. 2014, 52, 150–157. [Google Scholar] [CrossRef]
  3. Galloway, B.; Hancke, G.P. Introduction to industrial control networks. IEEE Commun. Surv. Tutor. 2012, 15, 860–880. [Google Scholar] [CrossRef]
  4. Ren, Y.; Liu, Y.; Ji, S.; Sangaiah, A.K.; Wang, J. Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks. Mob. Inf. Syst. 2018, 2018, 6874158. [Google Scholar] [CrossRef]
  5. Wang, J.; Gao, J.; Liu, W.; Wu, W.; Lim, J. An Asynchronous Clustering and Mobile Data Gathering Schema based on Timer Mechanism in Wireless Sensor Networks. Comput. Mater. Contin. 2019, 58, 711–725. [Google Scholar] [CrossRef]
  6. Butun, I.; Morgera, S.D.; Sankar, R. A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 266–282. [Google Scholar] [CrossRef]
  7. Krontiris, I.; Langheinrich, M.; Shilton, K. Trust and privacy in mobile experience sharing: Future challenges and avenues for research. IEEE Commun. Mag. 2014, 52, 50–55. [Google Scholar] [CrossRef]
  8. De, D.; Mukherjee, A.; Sau, A.; Bhakta, I. Design of smart neonatal health monitoring system using smcc. Healthc. Technol. Lett. 2016, 4, 13. [Google Scholar] [CrossRef] [PubMed]
  9. Wang, J.; Zhang, Z.; Li, B.; Lee, S.; Sherratt, R.S. An Enhanced Fall Detection System for Elderly Person Monitoring using Consumer Home Networks. IEEE Trans. Consum. Electron. 2014, 60, 23–29. [Google Scholar] [CrossRef]
  10. Ya, T.; Lin, Y.; Wang, J.; Kim, J. Semi-supervised Learning with Generative Adversarial Networks on Digital Signal Modulation Classification. Comput. Mater. Contin. 2018, 55, 243–254. [Google Scholar]
  11. Tirkolaee, E.B.; Hosseinabadi, A.R.; Soltani, M.; Sangaiah, A.K.; Wang, J. A Hybrid Genetic Algorithm for Multi-trip Green Capacitated Arc Routing Problem in the Scope of Urban Services. Sustainability 2018, 10, 1366. [Google Scholar] [CrossRef]
  12. Hu, X.; Yang, L.; Xiong, W. A novel wireless sensor network frame for urban transportation. IEEE Internet Things J. 2015, 2, 586–595. [Google Scholar] [CrossRef]
  13. Wang, H.; Dong, L.; Wei, W.; Zhao, W.S.; Xu, K.; Wang, G. The wsn monitoring system for large outdoor advertising boards based on Zigbee and MEMS sensor. IEEE Sens. J. 2017, 18, 1314–1323. [Google Scholar] [CrossRef]
  14. Wang, J.; Ju, C.; Gao, Y.; Sangaiah, A.K.; Kim, G. A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks. Comput. Mater. Contin. 2018, 56, 433–446. [Google Scholar]
  15. Yun, Y.S.; Xia, Y. Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications. IEEE Trans. Mob. Comput. 2010, 9, 1308–1318. [Google Scholar]
  16. Ma, C.; Yang, Y. A battery-aware scheme for routing in wireless ad hoc networks. IEEE Trans. Veh. Technol. 2011, 60, 3919–3932. [Google Scholar] [CrossRef]
  17. Sha, K.; Gehlot, J.; Greve, R. Multipath routing techniques in wireless sensor networks: A survey. Wirel. Pers. Commun. 2013, 70, 807–829. [Google Scholar] [CrossRef]
  18. Wang, J.; Cao, J.; Sherratt, R.S.; Park, J.H. An improved ant colony optimization-based approach with mobile sink for wireless sensor networks. J. Supercomput. 2018, 74, 6633–6645. [Google Scholar] [CrossRef]
  19. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000. [Google Scholar]
  20. Lindsey, S.; Raghavendra, C.S. PEGASIS: Power efficient gathering in sensor information systems. Proc. IEEE Aerosp. Conf. 2003, 3, 1125–1130. [Google Scholar]
  21. Younis, O.; Fahmy, S. HEED: A Hybrid, Energy-efficient, Distributed Clustering Approach for Ad hoc Sensor Networks. IEEE Trans. Mob. Comput. 2004, 3, 366–379. [Google Scholar] [CrossRef]
  22. Li, C.; Ye, M.; Chen, G.; Wu, J. An energy-efficient unequal clustering mechanism for wireless sensor networks. In Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, Washington, DC, USA, 7 November 2005. [Google Scholar]
  23. Leu, J.S.; Chiang, T.H.; Yu, M.C.; Su, K.W. Energy efficient clustering scheme for prolonging the lifetime of wireless sensor network with isolated nodes. IEEE Commun. Lett. 2015, 19, 259–262. [Google Scholar] [CrossRef]
  24. Liu, Y.; Xiong, N.; Zhao, Y.; Vasilakos, A.V.; Jia, Y. Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Commun. 2010, 4, 810–816. [Google Scholar] [CrossRef]
  25. Luo, H.; Ye, F.; Cheng, J.; Lu, S.; Zhang, L. Ttdd: Two-tier data dissemination in large-scale wireless sensor networks. Wirel. Netw. 2005, 11, 161–175. [Google Scholar] [CrossRef]
  26. Dongliang, X.; Xiaojie, W.; Dan, L. Multiple mobile sinks data dissemination mechanism for large scale Wireless Sensor Network. China Commun. 2014, 11, 1–8. [Google Scholar] [CrossRef]
  27. El-Moukaddem, F.; Torng, E.; Xing, G. Maximizing Network Topology Lifetime Using Mobile Node Rotation. In International Conference on Wireless Algorithms, Systems, and Applications; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
  28. Wang, J.; Cao, J.; Ji, S.; Park, J. Energy Efficient Cluster-based Dynamic Routes Adjustment Approach for Wireless Sensor Networks with Mobile Sinks. J. Supercomput. 2017, 73, 3277–3290. [Google Scholar] [CrossRef]
  29. Rasheed, A.; Mahapatra, R.N. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 958–965. [Google Scholar] [CrossRef]
  30. Wang, J.; Gao, Y.; Yin, X.; Li, F.; Kim, H. An Enhanced PEGASIS Algorithm with Mobile Sink Support for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018, 2018, 9472075. [Google Scholar] [CrossRef]
  31. Miao, Y.; Sun, Z.; Wang, N.; Cao, Y.; Cruickshank, H. Time efficient data collection with mobile sink and vmimo technique in wireless sensor networks. IEEE Syst. J. 2016, 12, 639–647. [Google Scholar] [CrossRef]
  32. Zhao, M.; Yang, Y.; Wang, C. Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2015, 14, 770–785. [Google Scholar] [CrossRef]
  33. Metin, K.; Korpeoglu, I. Coordinated movement of multiple mobile sinks in a wireless sensor network for improved lifetime. EURASIP J. Wirel. Commun. Netw. 2015, 2015, 245. [Google Scholar]
  34. Ma, M.; Yang, Y.; Zhao, M. Tour Planning for Mobile Data-Gathering Mechanisms in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2013, 62, 1472–1483. [Google Scholar] [CrossRef]
  35. Wang, J.; Gao, Y.; Liu, W.; Sangaiah, A.K.; Kim, H. An Improved Routing Schema with Special Clustering using PSO Algorithm for Heterogeneous Wireless Sensor Network. Sensors 2019, 19, 671. [Google Scholar] [CrossRef] [PubMed]
  36. Shi, G.; Zheng, J.; Yang, J.; Zhao, Z. Double-blind data discovery using double cross for large-scale wireless sensor networks with mobile sinks. IEEE Trans. Veh. Technol. 2012, 61, 2294–2304. [Google Scholar]
  37. Gao, Y.; Wang, J.; Wu, W.; Sangaiah, A.K.; Lim, S. A Hybrid Method for Mobile Agent Moving Trajectory Scheduling using ACO and PSO in WSNs. Sensors 2019, 19, 575. [Google Scholar] [CrossRef]
  38. Kuila, P.; Jana, P.K. Energy efficient clustering and routing algorithms for wireless sensor networks: Particle swarm optimization approach. Eng. Appl. Artif. Intell. 2014, 33, 127–140. [Google Scholar] [CrossRef]
  39. Wang, G.; Wang, T.; Jia, W.; Guo, M.; Li, J. Adaptive location updates for mobile sinks in wireless sensor networks. J. Supercomput. 2009, 47, 127–145. [Google Scholar] [CrossRef]
  40. Soni, V.; Mallick, D.K. Fuzzy logic based multihop topology control routing protocol in wireless sensor networks. Microsyst. Technol. 2018, 24, 2357–2369. [Google Scholar] [CrossRef]
  41. Dorigo, M.; Maniezzo, V.; Colorni, A. Ant system: Optimization by a colony of cooperating agents. IEEE Trans. Syst. Man Cybern. Part B 1996, 26, 29–41. [Google Scholar] [CrossRef]
  42. Kennedy, J. Particle Swarm Optimization. In Proceedings of the ICNN95—International Conference on Neural Networks, Perth, Australia, 6 August 2002; pp. 12–17. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.