You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

28 November 2022

An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm

,
and
Department of Information Technology, Karpagam College of Engineering, Coimbatore 641032, India
*
Author to whom correspondence should be addressed.

Abstract

Wireless Sensor Networks (WSN) have distributed a collection of tiny sensor nodes deployed randomly in the given symmetry environment to sense natural phenomena. The sensed data are disseminated symmetrically to the control station using multi-hop communication. In WSN, the energy conservation during node coverage plays a major role in detecting node failure and providing efficient and symmetrical data transmission to the nodes of WSN. Using the cluster method and efficient localization techniques, the nodes are grouped and the precise location of the nodes is identified to establish the connection with the nearby nodes in the case of node failure. The location accuracy is achieved using the localization estimation of the anchor nodes and the nearest hop node distance estimation using the received signal strength measurement. The node optimization can be performed efficiently by the accurate estimation of the localization of the node. To optimize the node coverage and provide energy efficient and symmetrical localization among the nodes, in this paper, a cluster-based routing protocol and a novel bio-inspired algorithm, namely, Modified Bat for Node Optimization ( M B N O ), to localize and optimize the unknown nodes along with the reinforcement-based Q learning algorithm is proposed with the motive of increasing the accuracy estimation between anchor nodes and the other neighbor nodes, with the objective function to optimize and improve the nodes’ coverage among the network’s nodes in order to increase the nodes’ localization accuracy. The distance metrics between the anchor nodes and other neighbor nodes have an estimated symmetry with three node positions, namely C-shape, S-shape and H-shape, using the Q learning algorithm. The proposed algorithm is implemented using the NS3 simulator. The simulation results show that the accuracy and precision of the proposed algorithm are achieved at 98% in the node coverage optimization with reduced Mean Localization Error (MLE) and computational process time compared with other bio-inspired algorithms, such as Artificial Bee Colony optimization and Genetic Algorithms.

1. Introduction

A Wireless Sensor Network (WSN) is a distributed collection of tiny sensor nodes which are assumed to be the self-operating and esteemed networks which can process the communication, sensing and distance estimation between the nodes in the network. Node coverage and localization are two of the main concerns involved in WSN for energy-efficient data communication [1]. In many wireless sensor network applications, the location information from which the data were obtained is necessary. As a result, the location of sensor nodes affects WSN performance. Compared to other methods, the original bat optimization technique has a lower mean localization error and takes less time to compute, but its localization efficiency is lower than 100% and it tends to get stuck at a local ideal value [2]. Most of the existing systems’ node coverage optimization and localization algorithms fail to accurately estimate the location of the nodes. Moreover, they fail to optimize node coverage, which will result in partitioning the network into disjointed segments. Therefore, providing efficient node coverage with accurate node location estimation in the network is needed to establish the connectivity among the nodes in the network [3]. The node coverage optimization and localization identification of the nodes are addressed by using the various algorithms in soft computing and Bio-inspired models. Particle Swarm Optimization (PSO) is a straightforward bio-inspired algorithm that finds the optimal solution; this algorithm is different from the other, following optimization techniques because it is not dependent on any gradient or any differential form of objectives, it needs only objective function. In addition, less hyper parameters are in use [4]. Various PSO and evolutionary algorithms have been applied to the WSN to provide an efficient solution to network node optimization, node localization, node clustering and node segmentation. The PSO algorithms work on the node with the node coverage problem to enhance the network lifetime and the coverage rate among the nodes in the network [5]. In WSN, PSO algorithms have been used to estimate the localizations of the nodes based on the angle measurement between the sensor nodes and the anchor node. Metrics such as the packet delivery ratio between the nodes are used to determine the angle measurement of the nodes in sensor nodes, time of arrival of the packets and range of the received signal strength [6].
Moreover, the PSO algorithms have been applied to WSNs to enhance the quality of service and provide energy-efficient data dissemination in a wireless sensor network. The bio-inspired algorithms have an efficient proposal for predicting the unknown nodes in the localization area and enhancing the various optimum node estimation parameters [7]. For the node coverage optimization challenges, the Bat Algorithm has been used to simulate the echolocation behavior of a bat. The Bat Algorithm has been employed, along with the various evolutionary algorithms, to provide the optimal solution to the node coverage and node localization problems in WSN. The node localization is estimated with the received signal strength; hence, the data are assumed to be from the proper location [8]. The unknown nodes near the sensor nodes are estimated with the analysis of the unknown sensor nodes, which are closer to the neighbor nodes and are taken into account in the known locations. While estimating the location of the unknown node using the node coverage parameters, it is essential to monitor the computational cost, and the received signal should not accumulate the data inferred in the optimal allocation [9]. The optimal constraint is analyzed with the hop node communication, and the distance is measured with hop-1 parameters multiplied by the total distance estimation. The PSO, Ant Colony Optimization algorithm (ACO) and The Artificial Bee Colony (ABC) algorithm are the estimation algorithms which identify the node localization using the received signal strength for the unknown node address. All these algorithms have been proposed to estimate a better accuracy in the proposed node analysis parameters. However, all these algorithms are not accurate in detecting the location of the unknown nodes and fail to optimize the node’s coverage in the WSN [10]. Motivated by all these observations, a novel bio-inspired algorithm, namely, the Bat Algorithm (BA), is based on the way the microbats use echolocation. In terms of accuracy and efficiency, BA is far better than other current usage algorithms. Due to a bat’s inability to thoroughly search every direction in the search area, the BA has an extremely low success rate. In order to solve this issue, the algorithm is modified as the Modified Bat for Node Optimization (MB-NO) algorithm to reduce the energy conservation. This is proposed, along with the Q learning method proposed in this paper, to optimize the node coverage and accurately estimate the sensor nodes’ proposed localization. Q learning is one of the reinforcement learning algorithms which is not dependent on any data model, i.e., model free learning; reinforcement learning is the subfield of Machine Learning that develops a model’s ability to solve issues at their best on its own. Moreover, the proposed method provides energy conservation during node coverage and localization of the nodes in WSN [11]. The layer-wise assumption in the node segments of the proposed system is shown in Figure 1 along with the node-based cluster creation.
Figure 1. Node-based optimization using cluster in WSN.
The major research contributions are:
  • This paper outlines the node coverage optimization in WSN using the Modified Bat for Node Optimization   ( M B N O )   algorithm to enhance the node coverage and reduce energy consumption to provide efficient sensor node localization.
  • A novel M B N O algorithm, along with Q learning, has been proposed to widely analyze the accuracy of the node localization and the sensor node precision coverage with the shortest hop distance nodes estimation.
  • The precision estimation is enhanced for the node coverage in WSN with the help of the received signal strength in the sensor nodes using the novel bio-inspired M B N O algorithm.
  • The objective function used is the number of nodes and the transmission time (ms), that is defined as:
O f = Σ   N ( i ) T t  
The Q learning approach to segment the sensor nodes and the localization accuracy is optimized in the proposed system.
The paper has been organized as follows: Section 1 outlines the “Introduction”, Section 2 covers the “Related Works”, and Section 3 proposes the “Network Model and Problem Formulation” with energy optimization to perform the node optimization. Section 4 proposes the “Modified Bat for Node Optimization ( M B N O )” algorithm-based node optimization with secure Q learning-based communication. Section 5 performs the “Performance Evaluation and Results”. Section 6 includes the “Conclusion and Future Work”.

3. Network Model and Problem Formulation

Let N = { N 1 , N 2 , N 3 , N n } be the set of sensor nodes, and each node is assumed to have constant transmission parameters and also to have equal participation in the deployed environment. Let U = { U N 1 , U N 2 , U N 3 U N n }   be the set of unknown nodes, set where the location of the nodes is not known. The unknown set of nodes may be operating with the sensor nodes to estimate the sensor pair in the neighbor nodes, determined as N S N = { N S N 1 ,   N S N 2 ,   N S N 3 , N S N , } . Hence, the sensor node is united to form a parametric assumption N = U N S N . By combining the operating parameters with the unknown locations and the coverage, the node coverage optimization is calculated [2]. The node coverage is estimated using the N pairs N (Xm, Yn), where the adjacent nodes are marked with U = m 1 , m 2 , m 3 and the nearest hop nodes are estimated using the U = n 1 , n 2 , n 3 . The hop distance is estimated using the distance between the N pairs of the sensor nodes and hop = N U . In addition, the distance denoted as h d m ,   n e s t and the probable actual attained distance are estimated using the h d m , n a c t .
In order to enhance network coverage among the nodes in a wireless sensor network (WSN), the position of the sensor nodes is determined using the hop distance. The error variation in the received signal strength is assumed to be minimal in count in the determined place. The number of sensor nodes increases when the hops are increased with the sensor pairs. The distance metrics between the different sensor nodes and the adjacent nodes have been obtained using the formula U = n 1 , n 2 , n 3 estimated nodes. The proposed localization and node optimization have been applied to WSN using the bat and the Q learning algorithms. In the proposed system, the received signal strength is used to enhance the localization of the unknown nodes. The average error distance between the sensor nodes and neighbor nodes is estimated using the sensor nodes. The shortest distance between the sensor and unknown nodes is estimated by measuring the distance in the reception parameters. Nm is assumed to be of the ‘m’ segments in the measurable distance, and the segment is completed with the localization values. The estimation accuracy of the proposed method is estimated with the EstAm for the m-segment sensor nodes in the WSN. The average distance error AVG disterror is the error where the process of the sensor nodes and the unknown nodes estimation is performed using the anchor sensor nodes to estimate the localization of unknown nodes in the network. Table 1 outlines the list of notations used in the proposed system.
Table 1. Notations used in the proposed system.

3.1. Node Clustering Using LEACH Protocol

WSN is susceptible to energy conservation, which depends on the network model and will affect the network’s lifetime. The network life depends on the routing protocol used in the network. The deployment of nodes takes place in the network and plays a major role where the network nodes can obtain the maximum coverage. In the proposed system, the LEACH routing protocol has been used to deploy the moving nodes to optimize the route parameters based on the signal strength with the sensing domain. The node deployment involves a setup phase, where the clustering of the sensor nodes is formed, and all the information is communicated from the cluster head to the corresponding cluster nodes via the sink node. The cluster head collects the information from the nodes and sends it to the various anchors and the adjacent nodes in the network. The energy consumption in each node is assumed to be under control in each phase of the sensor selection. The energy consumption is assumed to be off in the cluster assumptions in the threshold values attained using balance analysis. The energy monitoring is conducted using the LEACH protocol with the interval range threshold value [1, 0]. The threshold value of the network is computed by using Equation (1):
T S N ( i ) = { p r o b a b i l i t y   o f   p e r c e n t a g e   i n   c l u s t e r   h e a d ( p r c h )   1 p r o b a b i l i t y   o f   p e r c e n t a g e   i n   c l u s t e r   h e a d   ( p r c h )   i f   m N 0
where T S N ( i ) denotes the threshold values of the network.
The p r o b a b i l i t y   o f   p e r c e n t a g e   i n   c l u s t e r   h e a d ( p r c h ) is where ‘m’ denotes the number of nodes possible within the internal cluster communication, and ‘N’ denotes the set of sensor nodes possibly used within the framework estimation of the sensor nodes.

3.2. Energy Estimation for Node Coverage Optimization

In the proposed system, the Euclidean distance is used to compute the distance between the sensor nodes and the adjacent nodes by using the LEACH routing protocol. Equation (2) gives the Euclidean distance formula used in the proposed system.
E D ( N i , D j ) = ( ( X i   , D j   ) 2 ( Y i   , Y j   ) 2 )
The distance measurement is computed with the obstruction of values analyzed with probability estimation using the sensor nodes and the adjacent nodes. Euclidean distance (ED) is calculated using (Xi, Dj), (Yi, Yj), which are the two different coordinates. The nodes are aligned with the task of predicting the defined modelling using the LEACH protocol, which is shown in Equation (3).
Pr ch   ( N i , D j ) = { 0                                   I r i E D     ( N i , D j ) e γ   E D     ( N i , D j ) I r i I r e I r i E D     ( N i , D j )           I r i I r e   E D     ( N i , D j ) < I r e   1                               I r i I r e   E D     ( N i , D j )
The sensing error is identified in the sensor node using the I r e , and the radius is determined using the Iri. The γ illustrates the sensing parameter and attenuation coefficient. The target coefficient is obscured with the sensor network using the assumptions in the probability evaluation, defined as Porch ( N i , D j ) , which is shown in Equation (4).
P s n   = 1 i = 1 N Prch   ( N i , D j )
Figure 2 represents the formation of the cluster nodes between the nodes to monitor the energy conservation before the application of Bat implementation.
Figure 2. CH formation for node optimization with energy conservation.
The node coverage of the sensor node is illustrated by using the parameters in the received signal strength in each node of clusters, which is given in Equation (5):
E S ( i ) = ( i = 1 N u m S r c C H E S o u r c e   S N c h + E R S S I + E D A ) + i = 1 n u m E d e s t   S N c h + E F i n a l
Equation (5) shows the assumptions used in the network’s sensor node energy prediction using the LEACH protocol. Let E S o u r c e be the source node energy for the sensor nodes in clusters. E R S S I also predicts the energy of the received signal strength, and E D A is the data predicting the node in the transmission range. Edest is the destination node energy. The destination is assumed to be within the mean values, and Efinal is the final energy of the nodes that are assumed with the num values of the cluster head selection in the predetermined evaluation. The sensor nodes have been classified according to the metrics given in Table 2 for implementing the M B N O algorithm and Q learning parameters.
Table 2. Assumptions in energy monitoring using the cluster for M B N O algorithm.
The energy consumed in the proposed work can be estimated using the optimum coverage. The parameters for the optimum coverage are given in Equation (6):
E Src , dest = { E consum     X   Z + E dissip X   Z   X   E D   ( N i , D j )         i f     E D   ( N i , D j ) < E D 0   E consum     X   Z + E utilised X   Z   X   E D   ( N i , D j )       i f     E D   ( N i , D j ) E D 0
Let E Src , dest be the energy consumption from the source node to the destination nodes in the network. Let the E consum   be the consumed energy for all the sensor nodes, and the dissipation nodes for a neighbourhood with ‘z’ bits of data are transferred in the wireless communication environment. The Euclidean distance measures are used to identify the estimations using the forecasting model of the data in wireless communication. E D 0   = E dissip E utilised shows the distance estimated with the Euclidean assumption in energy dissipated with the energy utilized. The data can be transmitted using the analysis below; hence, the sensor nodes are utilized in the data transmission.

3.3. Node Coverage Rate and Localization Optimization

The received energy is estimated based on the node energy dissipated and the energy utilized in the estimation. Hence, the utilized energy is obtained with the ‘z’ number of bits having the received signal strength in terms of ‘z’ bits forming a reception of node positioning in the WSN given in Equation (7):
R X E = E u t i l i s e d X   Z = E d i s s i p X   Z   E R S S I
The sensor nodes and the corresponding nodes utilize the maximum amount of reception in the node strength. Equation (7) satisfies the allocated energy for utilization in the node optimization using cluster analysis.
E F i n a l = E I N   + S N a
The final average energy is assumed to be of inactive node energy consumption and active sensor nodes’ energy consumption, which is given in Equation (8). The falls are from the final sensor nodes in the active zones for the nodes to be perfect in the active region, as is shown in Equation (9):
S N a = { 1 ,   i f   E S r c , d e s t   S r c C H     o r   E S r c , d e s t   S r c n o n C H   0 ,     o t h e r w i s e
The possible energy outcome has determined the node coverage rate, and the energy consumption is assumed to be of the sensor nodes in the adjacent node’s enhancement. The node process with the coverage accuracy is estimated using Equation (10). The target node coverage rate is estimated using the coverage node having the target of ( SN i )   with   parameter s given in Equation (10):
T ( i ) = i = m T c ( S N i )
The average task performed in each node is assumed to be in the highest coverage area of the sensor nodes, as given in Equation (11):
S N i = { 0     i f     E D     S N i n a c t i v e   a n d   E D       r i 1                                   o t h e r w i s e
The coverage rate is assumed to be of the active sensor nodes’ parameters and the nodes’ inactive assumption. The radius ri assumes to be off the sensor node pairs in the segment. The final energy is assumed to be of the equilibrium-based energy options that prevail in the independent nodes. The energy equilibrium is used to obtain the final derivate of the sensor nodes’ active region coverage, as shown in the Equation (12):
E N e q u i l i b i r u m = i = 1 n E   S N a c t i v e n

3.3.1. Axiom 1

The energy maximization is obtained with the energy equilibrium in the network if the number of target nodes is assumed to be minimal, as given in the Equation (13):
E N e q u i l i b i r u m ( i ) = Max   ( S N i )

3.3.2. Axiom 2

The energy minimization is obtained with the energy equilibrium if the number of target nodes is assumed to be correlated with the sensor node coverage, as given in Equation (14):
E N e q u i l i b i r u m ( i ) = Min   ( S N i )

3.4. Node Localization Error

Identify the coordinates of the nodes to find the average localization error (Avg.LE), the coordinates of neighbor nodes (Si, Ni) and the sensor nodes (si, ni), which is outlined as below:
Avg .   LE = 1 Tn i = 1 T n ( S i s i   ) 2 + ( N i n i ) 2
Tn is the entire number of nodes.
The node localization is improved by inclined values of Avg. LE at Equation (15) and Unknown node (U) using optimization approaches. It is calculated as:
U = Sn − Tn
Sn—Sensor Nodes and Tn—Total nodes available.
Mean Localization Error (LE) is calculated by the normalized Average LE and the range of sensor nodes transmission (Rt).
Mean .   LE = 1 Tn i = 1 T n ( S i s i   ) 2 + ( N i n i ) 2 R t

4. Modified Bat for Node Optimization ( M B N O )

The Bat Algorithm (BA) is a bio-inspired algorithm used as an optimization algorithm for checking the node essentials in the WSN. The network is formed using the sensor nodes, adjacent nodes and anchor nodes. Besides the problem incurred, energy-constrained localization and node optimization are the major perspectives in the proposed work. The Bat Algorithm works on the principle of echolocation, which emits a wave to find the nearest food source. The nearest location is obtained through bat sense power, even though the network is complicated. The ultrasound waves emitted by bats observe the reflection sound to obtain the nearest locations. The capacity of the bat is obtained using the velocity and position it travels. A bat is unable to investigate every route in the search arena; the BA has a relatively low success rate. Therefore, the present BA is updated to Modified Bat for Node Optimization ( M B N O ) to address this issue. The proposed sensor nodes adjust the frequency. When the source node is identified, the Bat’s loudness decreases with increased frequency. The value of the fitness function determines the choice of bat movement and the effective search space exploration in the MB-NO algorithm. It outperforms the original Bat Algorithm in terms of computational time and the success rate of localized nodes.
Algorithm 1 represents the M B N O algorithm-based node classifications, and the optimization has been applied in the node source. The energy equilibrium is maintained throughout the big source of the network. The ultrasound waves emitted by bats observe the reflection sound to obtain the nearest locations. The capacity of the bat is obtained using the velocity and position it travels. The proposed sensor nodes adjust the frequency. When the source node is identified, the bat’s loudness decreases with increased frequency. The M B N O algorithm provides good comfort compared to the other GA algorithm; the energy equilibrium is assumed to be higher when dealing with the sensor nodes using Algorithm 1. The proposed algorithm focuses on the nearest neighborhood node in the M B N O nearest food locator. For the nearest node, once established, the M B N O will work on the node to establish communication using the frequent frequency estimation. The node optimizer may support the process using the SNi. The objective function is obtained in the search space using the node estimator. The fitness function is applied to identify the nodes which establish secure communication. The search space will provide the best communication using the algorithm, and the optimization needs to be retrieved using the M B N O module in the WSN. The generated solution was established with the node observation’s storage solution. The energy in the node optimization is acquired using the various sensor nodes established. The step-up process of implementing the M B N O algorithm for the sensor nodes process is shown in Figure 3.
Algorithm 1: Adjacent node formation and node optimization using MB-NO algorithm
1. initialize SN i N / / Set of Nodes
2. for all j   T ( i ) do
3.    if SN a , then
4.     Optimization Bat SN i { Freq , Node   location , Node   energy   limits }
5.     Select SN CH with cluster head formation for node optimization
6.    else
7.   ANj is selected according to the P sn   =   SN a   SN i //Adjacent Node pair se
lection from cluster
8.   do the process repeatedly
9.     SN i   { Freq , Node   location , Node   energy   limits }   =   ( { SN i } ,   i m ,   SN a )
10.    for all i P sn   do
11. if SN a then//Nearest optimal Node is obtained
12.    a collects the active nodes using the MB-NO algorithm i SN i
13.         EN equilibirum =
14.        for all [ i [ SN a N ] N ] do
15.            if EN equilibirum   , SN a   then
16.            N= Min ( SN i )
17.            else//energy is not conservator, and localization failed
18.             i = m T c ( SN i ) //The energy equilibrium is obtained
19.         j N , SN i = { i } //Node optimised with conservative energy
20.        else
21.     EN equilibirum ( i ) = Max ( SN i )//Maximum energy utilised and node fails.
22. end if
23. {freq, veloci } increase in the number of nodes and reduce the computation time.//calculate using the formula (15), (16)
25 .   if (current algo. mean error < existing algo. mean error)//connect the nodes
26 .   else
27 .   change the frequency and node location.
28 . end if
Figure 3. Implementation of M B N O algorithm to estimate the node optimization and energy conservation.

Q Learning-Based Secure Communication

Reinforcement Learning uses the original neighbor nodes to behave in the way of predicting the sensor node pair using the trustable nodes when there is a lack of secure nodes in wireless communication. The Q learning algorithm is used in the WSN, where the agent ‘a’ performs an action based on the environment’s current working ‘s’ state. The action is used to analyze the node behavior in the WSN environment. The state of the WSN behaves in such a way that the state may change from one state to a new state ‘ s 1 ’. The WSN employs the Bat Algorithm for the node optimization where the node can be performed. The learning policy, which is assumed to be of Q learning, proposes the mapping context.
Moreover, Q learning is an open structured Algorithm 2 that allows the below axioms.
(a)
The WSN has various sensor nodes operating in a different obscured environment; here, the sensor nodes are mapped with the agent for the RL process and the environment with the RL-based learning approaches.
(b)
The action space and state space are compared with the agent task and the working state of the corresponding sensor nodes in the working environment.
(c)
The task set of the sensor nodes and the working set of the anchor nodes is obscured by the nature of the state space. The applications of the WSN are mapped with the task set of the RL algorithm. The sensor nodes and the related nodes have a working set environment in the proposed modelling. This mapping may help analyze the data persistently in the nodes to map with the current setup.
(d)
The task set activates the agent, and the operating environment is learned using the proposed RL model.
The three metrics for the WSN approach are the event space, reward and the network result. The WSN process events represent the jamming in the node communication. The reward helps analyze the proposed model’s prospectus growth in communication. The move taken within the prescribed service establishes the agent modelling; hence, each state is subject to S t     S j , where S t   represents the state value in the t parameters. The S j represents the analysis in the assumptions for the neighbor values for j states. The environment will be working for the key model in the state space. The action and task space are consumed based on the node selection parameters. The Q learning is estimated using the Q m + 1 ( S t   , A C t   ) , representing that the estimation is completed with the state space S t   and A C t   action spaces in the working environment. The agent is assumed to be in the processing control of the sensor nodes, and the learning policy is obtained using the space which is given in Equation (15):
Q m + 1 ( S t , A C t ) = ( 1 α )   Q t ( S t , A C t ) + α [   β t   + γ max Q m ( S t + 1 , α t + 1 ) ]
The updated information regarding the Q learning aspects will be working on the nodes with the range of α [ 0 , 1 ] and the γ ϵ [ 0 , 1 ] . The ranges specify the action space and the state space of the action in the working sensor model. The Q value is obtained using the maximum positive reward that can help analyze the node with the neighborhood nature and the adjacent neighbor nature.
Axiom 1
(a)
Analyze the sensor node operating environment with the agent space in E n v t ;
(b)
The nature of the working environment for the present space state has been assumed to be in the space control for the sensor as exploration;
(c)
The best action is assumed as the collective reward from the node S N i for the set of action spaces.//implemented from M B N O ;
(d)
The action has been determined using the A C t   in the state space of the sensor deployed nodes of cluster head group 1;
(e)
The reward will be collected from S t   at time S t + 1   to estimate the γ max Q m ( S t + 1 , α t + 1   ) in the predetermined energy estimation.
Algorithm 2: Reinforcement learning algorithm
1. Initialize the parameters
(a) Assume the initial learning policy with a rate of α , the reward factor as β   and γ .
(b) The time-space at S t     = 0.
(c) For all state space, the S t       a 1 ,   a 2 , , a n and where the working sensor nodes are assumed in a single cluster.
(d) Let Q t   ( S t       a 1 ,   a 2 , , a n   ) = 0 //Initial assignment in all sensor nodes.
(e) δ ( S t ,     a ) = 1 1 | A i |     ( S t + 1 ,     a t   ) n   where the 1 | A i | is the assumption of state space having similar agent pairs.
(f) The cluster formation is supported in the state space control CHs ( S t ,     a ) = 1 1 | A i |     ( S t + 1 ,     a t   ) n + 1
2. Do the following
(a) Execute the action of the search space in the state with a 1 ,   a 2 , ,   a n .
(b) The event reward is assumed to be off in the state as r s 1 , r s 2 , r s 3 r s n .
(c) Estimate the values of Q
Q m + 1 ( S t     , A C t     ) = ( 1 α )   Q t ( S t     , A C t     ) + α [   β t   + γ max Q m ( S t + 1     , α t + 1     ) .
(d) SN i { Freq , Node   location , Node   energy   limits } = ( { SN i } ,   i m ,   SN a ) = 1 1 | A i |     ( S t + 1 ,     a t   ) n .
(d) Update 1 1 | A i |     ( S t + 1 ,     a t   ) n .
(e) Predict the next set of actions with the energy-constrained node mechanism for Q m + 1 ( S t     , A C t     ) .
3. End Do

5. Performance Evaluation and Results

In this section, the simulation has been performed using the M B N O algorithm for energy conserved node optimization, and the results are compared with ACO and ABC optimization. The simulation coverage has been conducted with the below experimental setup for various C-shaped, H-shaped and S-shaped networks, as shown in Table 3.
Table 3. Simulation settings.
In both Figure 4 and Figure 5 the original BOA and the suggested BOA versions, the initial deployment of target nodes and anchor nodes is arbitrary, Therefore, each BOA and BOA variation 1 algorithm is performed 50 times in order to lessen the impact of randomness, and the best value for computation time, number of localised nodes, and other mistakes is chosen [33]. The simulation has been performed with the three types of networks: C-shaped, H-shaped and S-shaped. To accomplish the objective of energy conservation and node optimization, two objective functions are used, including number of sensor nodes and the transmission time (time stamp measured in ms), which is defined in session 1. The experimental results demonstrated that the MB-NO is more effective at cutting overall power usage when compared to three other optimization techniques. Figure 6 estimates the Objective Function for the C-shaped network with optimized nodes. The estimation shows that the Bat Algorithm establishes a good optimal solution with better energy conservation with the optimized sensor and the adjacent nodes maintained throughout. Table 4 shows the conservative energy analysis using the above metrics, and the parameters are established within the conservative column. The Bat performs the best approach in energy conservation using the 30 sensor nodes with 250 adjacent nodes. The 30 sensor nodes use the best efficiency for the summarized time stamp. The M B N O outperform when compared with the ACO and ABC optimization.
Figure 4. Node localization.
Figure 5. Variant 1 based node localization.
Figure 6. Objective function estimation for a C-shaped network with optimized nodes.
Table 4. Objective function estimation for a C-shaped network with optimized sensor nodes.
Figure 7 estimates the objective function for an H-shaped network with optimized nodes. The estimation shows that the Bat Algorithm establishes a good optimal solution with proper energy conservation, with the optimized sensor and the adjacent nodes maintained throughout. Table 5 shows the conservative energy analysis using the above metrics, and the parameters are established within the conservative column. The M B N O performs the best approach in energy conservation using the 30 sensor nodes with 250 adjacent nodes. The 30 sensor nodes use the best efficiency for the summarized time stamp. The M B N O outperforms when compared with the ACO and ABC optimization. In the H-shaped network, the performance measurement is estimated with the rise in transmission time in ms. The H-shaped network is subject to parallel communication estimation in the fixed sensor nodes. The optimal values suggest that the efficient node optimization performs well with the H-shape based on the energy equilibrium, and the average solution attained here works well for the H-shaped network.
Figure 7. Objective function estimation for an H-shaped network with optimized nodes.
Table 5. Objective function estimation for an H-shaped network with optimized sensor node.
Figure 8 estimates the objective function for an S-shaped network with optimized nodes. The estimation shows that the Bat Algorithm establishes a good optimal solution with proper energy conservation, with the optimized sensor and the adjacent nodes maintained throughout. Table 6 shows the conservative energy analysis using the above metrics, and the parameters are established within the conservative column. The M B N O performs the best approach in energy conservation using the 30 sensor nodes with 250 adjacent nodes. The 30 sensor nodes use the best efficiency for the summarized time stamp. The M B N O outperforms when compared with the ACO and ABC optimization. In an S-shaped network, the performance measurement is estimated with the raise in transmission time in ms compared to the H- and C-shaped networks. The optimal values suggest that the efficient node optimization performs well with the S-shape based on the energy equilibrium, and the average solution attained here works well for the S-shaped network. At the offset, all the H- and C-shaped networks are assumed to be off, with the best solution, even in compressed mode transmission. Comparatively, the average solution implies a node estimation in the proper assumptions for the sensor and adjacent node communication using the M B N O algorithm.
Figure 8. Objective function estimation for an S-shaped network with optimized nodes.
Table 6. Objective function estimation for an S-shaped network with optimized sensor nodes.
In Figure 9, the number of iterations is increased with the sensor nodes in the node optimization. The M B N O algorithm proposes maximum energy conservation, as shown in Table 7; the maximum conservation is obtained with the energy measured, assuming that the other algorithms propose the values with the least energy level equilibrium.
Figure 9. Iterations vs. energy conservation using Bat Algorithm.
Table 7. Energy conservation using Bat Algorithm in various iterations.
In Figure 10, the number of iterations is increased with the sensor nodes in the node optimization. The number of iterations is measured with the network lifetime process; hence, the network may be compared in a higher lifetime using the M B N O algorithm. Hence, the energy parameters, node optimization and the increased secure transmission through Q learning assumed substantial outcomes.
Figure 10. Iterations vs. throughput analysis of a node in packet transmission using Bat Algorithm.
Table 8 depicts the comparison of the computational time, mean localization error and localization nodes. These metrics are evaluated with 10 to 50 nodes where the computational time is given as T ( s ) , mean localization error is provided as (MLE) and the localization nodes are provided as N L . The computational time ranges from 0.95 s to 1.04 s, the node location of the proposed MB-NO ranges from 132 to 152 and the mean localization error ranges from 0.47 to 0.31. Mean localization error (MLE) is achieved in the proposed algorithm and more in both bat variants and standard Bat Algorithm; moreover, the computational time is less in MB-NO and the number of nodes more than the other two algorithms. Due to this, the proposed algorithm is very efficient, with improved concurrence and producing a higher success rate (See Figure 11, Figure 12 and Figure 13). From the analysis, it is proven that the model works well compared to other approaches to fulfill the research requirements.
Table 8. Comparison of computational time, mean localization error and localization nodes.
Figure 11. Comparison of computational time.
Figure 12. Comparison of localization node.
Figure 13. Comparison of mean localization error.

6. Conclusions

In this paper, a proposal has been made with the node optimization enhancement with the localized sensor nodes and other node clusters. The received signal strength is observed in various environments. The proposed model outreached a fine-tuned node optimization; hence, the network has been tested under three network structures: C-shaped, H-shaped and S-shaped. The proposed M B N O algorithm works on the sensor nodes as it identifies the best optimal solution for node optimization. The results substantially outperformed better results than the ACO and the ABC optimization. The Q learning performs a secure communication with the optimized nodes to enhance the secured connectivity based on the working environment. The M B N O and Q learning algorithms develop a good network solution in the proposed node optimization and energy conservation in those nodes. All the shaped networks’ energy conservation improves by 10% around the ACO and ABC. The node optimization increases with the proposed M B N O algorithm and reduces the mean localization error (MLE). Future research enhances secure communication, with a timestamp and protocol estimation having limited power transmission, and enlarges the area coverage.

Author Contributions

Conceptualization, Resources, Writing-original draft S.B.N.P.; Supervision, Validation P.M., K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Baidas, M.W.; Awad, M.K.; El-Amine, A.; Hassan, O.A.; Shen, X.S. Join node selection, flow routing, and cell coverage optimization for network sum-rate maximization in wireless sensor networks. Wiley-IET Wirel. Sens. Syst. 2019, 9, 424–437 . [Google Scholar] [CrossRef]
  2. Goyal, S.; Patterh, M.S. Modified Bat Algorithm for Localization of Wireless Sensor Network. Wirel. Pers. Area Commun. 2016, 86, 657–670. [Google Scholar] [CrossRef]
  3. Kobo, H.I.; Abu-Mahfouz, A.M.; Hancke, G.P. A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements. Comput. Netw. 2017, 38, 399–422. [Google Scholar] [CrossRef]
  4. Kim, J.; Yoo, Y. Sensor Node Activation Using Bat Algorithm for Connected Target Coverage in WSNs. Sensors 2020, 20, 3733. [Google Scholar] [CrossRef]
  5. Elhabyan, R.; Shi, W.; St-Hilaire, M. Coverage protocol for wireless sensor network: Review and future direction. J. Commun. Netw. 2019, 21, 2292–2330. [Google Scholar] [CrossRef]
  6. Farsi, M.; Elhosseini, M.A.; Badawy, M.; Arafat, H. Deployment Techniques in Wireless Sensor Networks, Coverage and Connectivity: A Survey. Pervasive Mob. Comput. 2019, 5, 28940–28954. [Google Scholar] [CrossRef]
  7. Tripathi, A.; Gupta, H.P.; Dutta, T.; Mishra, R.; Shukla, K.K. Coverage and Connectivity in WSNs: A Survey, Research Issues and Challenge. J. Netw. Comput. Appl. 2019, 35, 619–632. [Google Scholar] [CrossRef]
  8. Ng, C.K.; Wu, C.H.; Ip, W.H.; Yung, K.L. A Smart Bat Algorithm for Wireless Sensor Network Deployment in 3-D Environment. IEEE Commun. Lett. 2018, 22, 2120–2123. [Google Scholar] [CrossRef]
  9. Poongodi, M.; Hamdi, M.; Malviya, M.; Sharma, A.; Dhiman, G.; Shanmuganthan, V. Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods. Pers. Ubiquitous Comput. 2021, 36, 1–10. [Google Scholar]
  10. Unaldi, N.; Temel, S. Wireless sensor deployment method on 3D environments to maximize quality of coverage and quality of network connectivity. In Proceedings of the World Congress Engineering and Computer Science, San Francisco, CA, USA, 22–24 October 2014; Volume 2, pp. 22–24. [Google Scholar]
  11. Priyadarshi, R.; Gupta, B.; Anurag, A. Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues. J. Supercomput. 2020, 76, 7333–7373. [Google Scholar] [CrossRef]
  12. Wang, N.-C.; Hsu, W.-J. Energy Efficient Two-Tier Data Dissemination Based on Q-Learning for Wireless Sensor Networks. Digit. Object Identifier 2020, 8, 74129–74136. [Google Scholar] [CrossRef]
  13. Lenka, R.K.; Rath, A.K.; Sharma, S. Building reliable routing infrastructure for green IoT network. IEEE Access 2019, 7, 129892–129909. [Google Scholar] [CrossRef]
  14. Ghosh, A.; Maeder, A.; Baker, M.; Chandramouli, D. 5G evolution: A view on 5G cellular technology beyond 3GPP release 15. IEEE Access 2019, 7, 127639–127651. [Google Scholar] [CrossRef]
  15. Nisioti, E.; Thomas, N. Fast Q-Learning for Improved Finite Length Performance of Irregular Repetition Slotted ALOHA. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2020, 9, 11–24. [Google Scholar] [CrossRef]
  16. Choudhary, G.; Kim, J.; Sharma, V. Security of 5G-mobile backhaul networks: A survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2018, 9, 41–70. [Google Scholar]
  17. Shen, S.; Yang, B.; Qian, K.; She, Y.; Wang, W. On Improved DV-Hop Localization Algorithm for Accurate Node Localization in Wireless Sensor Networks. Chin. J. Electron. 2019, 28, 658–666. [Google Scholar] [CrossRef]
  18. Singh, H.; Singh, D. Hierarchical clustering and routing protocol to ensure scalability reliability in large-scale wireless sensor networks. J. Supercomput. 2021, 75, 3712–3739. [Google Scholar] [CrossRef]
  19. Mohar, S.S.; Goyal, S.; Kaur, R. Optimized sensor nodes deployment in wireless sensor network using bat algorithm. Wirel. Pers. Commun. 2021, 116, 2835–2853. [Google Scholar] [CrossRef]
  20. Nieoleseu, D.; Nath, B. Ad-Hoc positioning system-s(APS). In Proceedings of the IEEE INFOCOM, San Antonio, CA, USA, 30 March–3 April 2003; pp. 1734–1743. [Google Scholar]
  21. Poongodi, M.; Hamdi, M.; Sharma, A.; Ma, M.; Singh, P.K. DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access 2019, 7, 183532–183544. [Google Scholar] [CrossRef]
  22. Han, Z.; Li, Y.; Liang, J. Numerical Improvement for the Mechanical Performance of Bikes Based on an Intelligent PSO-ABC Algorithm and WSN Technology. Digit. Object Identifier 2018, 6, 32890–32898. [Google Scholar] [CrossRef]
  23. Sharma, R.; Sharma, S. Evaluating the performance of density grid-based clustering using ABC technique for efficient routing in WSNs. Telecommun. Syst. 2018, 67, 63–71. [Google Scholar]
  24. Anwar, F.; Motakabber, S.M.A. A Noble Approach of ACO Algorithm for WSN. J. Vibroeng. 2018, 19, 4198–4209. [Google Scholar]
  25. Poongodi, M.; Vijayakumar, V.; Al-Turjman, F.; Hamdi, M.; Ma, M. Intrusion prevention system for DDoS attack on VANET With reCAPTCHA controller using information based metrics. IEEE Access 2019, 7, 158481–158491. [Google Scholar] [CrossRef]
  26. Mohar, S.S.; Goyal, S.; Kaur, R. Fruit fly optimization algorithm for intelligent IoT applications. In Emerging Trends and Role of Fog, Edge and Pervasive Computing in Intelligent IoT Driven Applications; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2020; pp. 284–309. [Google Scholar]
  27. Vijayakumar, K.; Suchitra, S.; Shri, P.S. A secured cloud storage auditing with empirical outsourcing of key updates. Int. J. Reason.-Based Intell. Syst. 2019, 11, 109–114. [Google Scholar] [CrossRef]
  28. Sivagami, P.; Jothi, N.M. Swaroopan, Smart methodology for performance improvement of energy sources for home application. Microprocess. Microsyst. 2020, 74, 103042. [Google Scholar] [CrossRef]
  29. Bharathi, M.L.; Basha, R.F.K.; Ramanathan, S.K.; Harikrishnan, R. Fuzzy Logic controlled Maximum Power Point Tracking for SEPIC converter fed DC drive—A Hybrid Power Generation System. Microprocess. Microsyst. 2020, 12, 103371. [Google Scholar] [CrossRef]
  30. Vijayakumar, K.; Arun, C. Continuous security assessment of cloud based applications using distributed hashing algorithm inSDLC. Clust. Comput. 2019, 22, 10789–10800. [Google Scholar] [CrossRef]
  31. Illavarason, P.; Arokia Renjith, J.; Mohan Kumar, P. Medicaldiagnosis of Cerebral Palsy Rehabilitation using eye images inMachine learning techniques. J. Med. Syst. 2019, 43, 278–302. [Google Scholar] [CrossRef]
  32. Sherubha, P.; Sasirekha, S.P.; Manikandan, V.; Gowsic, K.; Mohanasundaram, N. Graph Based Event Measurement for Analyzing Distributed Anomalies in Sensor Networks. Sadhana 2020, 45, 212. [Google Scholar] [CrossRef]
  33. Mohar, S.S.; Goyal, S.; Kaur, R. Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics. J. Supercomput. 2022, 78, 11975–12023. [Google Scholar] [CrossRef] [PubMed]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.