1. Introduction
With the rapid advancement of modern technology, the expansion of the information world and Internet of Things has spawned a wireless sensor network (WSN) [1]. WSN is self-organizing multi-hop network system composed of thousands of micro-low-power sensor nodes scattered and a sink node of wireless communication. For the characteristics of WSN, an efficient low-power routing protocol is researched and designed, which can save energy consumption (EC) and increase network lifetime. According to the topology structure, wireless sensors are classified into a planar routing protocol [2] and a hierarchical routing protocol (cluster routing protocol) [3]. As the important research branch of WSN routing protocols, clustering routing protocols has the advantages of high energy utilization, clear node division, easy management of network topology, simple data fusion operation and easy system expansion, which makes the current WSN routing protocol become the key directions and hotspots of research.
The clustering routing protocol divides the network into multiple small areas according to the specific algorithm. Each area is referred to as a cluster, and each cluster is generally composed of a cluster head node (CHN) and many cluster member nodes (CMN). The CMN are responsible for sensing the information of the monitored area, and then transmitting the collected information to the CHN in the designated time slot. At last, the CHN is responsible for collecting the information and performing data fusion operations to forwarding to the sink node. The CMN usually turn off the wireless communication module in the transmission time slot that does not belong to itself in order to reduce EC. The clustering structure is not only beneficial to the application of distributed algorithms [4], but also suitable for large-scale network applications [5]. It is difficult to design an efficient data transmission mechanism is of great significance for WSN. The Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol proposed by Heinzelman et al [6]. Kulik proposes SPIN [7] protocol and Ossama proposes HEED [8] protocol. Due to the LEACH as the first clustering routing protocol has the performance of simple, flexible, energy-efficient and extensible. It also highlights the role of data fusion. Many clustering routing protocols are inspired by the clustering idea of the protocols. Therefore, the choice of LEACH protocol for research has certain advantages and typicality. Scholars have proposed different ways to improve their short-comings, and achieved corresponding results. The LEACH-C protocol [9] by using the sink node as the central control node. The protocol considers the distance from the CMN to the CHN in the cluster head elective. In LEACH-EO [10], the remaining energy of the node is considered in the cluster head election and the communication mechanism of each cluster is charged from single-hop to multi-hop. LEACH-HD [11] proposed the idea of regional division. The cluster head of this area is selected, which is characterized by the largest residual energy. And multi-hop communication is adopted between cluster heads.
The LEACH protocol [12] is cyclically executed in units of “rounds”. Each round consists of two phases, the details are showed in Fig. 1, including the cluster formation and the data transmission. Each cluster is consisted of one CHN and several CMNs, which are self-organized during the formation of the cluster. The CMN communicates with its own CHN, while the CHN is responsible for receiving data from all CMNs and transmitting the data to the sink node. In the data transmission process, a combination of routing algorithms and data fusion technology can reduce the amount of network data forwarding. However, the protocol uses single-hop communication between clusters and within the cluster leading to the energy consumption resource of the CHN is relatively high, which may affect the network lifetime. What’s more, the rationality of CHN selection is an important problem, which can achieve the purpose of extending the network lifetime. Therefore, a many-objective optimization WSN energy balance model is established
Fig. 1. The flow chart of LEACH protocol
In recent years, Many-objective Optimization Problems (MaOPs) [13] has become a major research hotspot. The MaOPs mainly refers to the objective number with more than four [14]. There are many pareto optimal solutions, and it is impossible to find all pareto optimal solutions. The many-objective optimization algorithm (MaOEA) can use fitness function to guide the population to close the Pareto Front (PF). Therefore, two aspects should be considered in designing the algorithm. On the one hand, the convergence of the algorithm [15] which is a process of approaching the pareto optimal solution set constantly. On the other hand, the distribution of the algorithm [16] which is that the non-dominant solutions are distributed as uniformly and broadly as possible in the objective function space. Based on the above problems, some scholars have achieved outstanding results in solving MaOPs. Typical MaOEAs can be divided into three categories according to different selection mechanisms [17].
a. The MaOEAs based pareto dominance. The convergence of the algorithm is guaranteed by pareto dominance, and diversity preservation mechanism is designed to ensure the diversity of the selection, such as NSGA-III [18] and NSGAIII-NE [19].
b. The MaOEAs based decomposition strategy. The core is to transform the many-objective optimization problem into multiple single-objective sub-problems, and output a set of pareto optimal solution simultaneously. Typical algorithms include MOEA/DD [20] and EFRRR [21].
c. The MaOEAs based performance evaluation index. Such as HypE [22] and IBEA [23]. By predicting the real PF, the corresponding performance evaluation index values were calculated.
Although the above algorithms balance diversity [24] and convergence [25] to some extent, there are corresponding problems in each algorithm. For example, parameter design is a very random factor. In order to overcome the shortcomings of MAOEA and optimize the choice of cluster head node, a many-objective optimization algorithm LEACH-ABF is designed. The contribution includes the following two points: (1) The many-objective optimization WSN energy balance model is designed to better balance the energy consumption and extend the network lifetime. (2) In order to optimize the model, the LEACH-ABF is proposed which combine the adaptive balance function strategy, genetic operation and penalty-based boundary selection intersection strategy.
The rest of this paper is described as follows: Section 2 introduces the related work of LEACH. And the many-objective optimization WSN energy balance model is designed in Section 3. Section 4 gives the detailed flow of the algorithm LEACH-ABF. Section 5 verifies the performance of the proposed algorithm through the standard test suite DTLZ. And the algorithm has better performance on LEACH by comparing with other different algorithms. Finally, the conclusion is provided in section 6.
2. The related work
In recent years, clustering protocol in WSN has been extensively studied. As the first clustering routing protocol, LEACH proposed the concept of network clustering. The main idea is dividing the network into clusters with different sizes, and the nodes are elected as the cluster heads to balance the energy consumption (EC) of the network effectively. The network topology [26] of the LEACH protocol is shown in Fig. 2, the network is represented by three clusters, red represents the cluster head node (CHN) and green represents the cluster member node(CMN). The sink node is the core of the entire network and is represented by black signal tower
Fig. 2. The network topology of the LEACH protocol
In Fig. 2, the LEACH protocol also has problems such as clustering unevenness, cluster head election randomness and single-hop within the cluster. Domestic and foreign scholars have proposed swarm intelligence algorithm [27-29] and intelligent optimization algorithm [30,31] to optimization the performance of LEACH, and achieved corresponding results. Cui et al [32] proposed a bat algorithm (BA) [33,34] combined with centroid strategy to optimize the LEACH protocol. In [35], the concept of advanced nodes and an enhanced cluster head election rule set are used to optimize the LEACH protocol, and the meta-heuristic particle swarm enhancement algorithm is used to initially cluster the sensor nodes. Cai [36] proposes an improved FTBA algorithm for fusion curve strategy, which improves local and global search ability to select cluster heads to extend the lifetime of the network. Jourdan [37] used genetic algorithm to optimize the energy of WSN for the first time. The binary code was used to divide the nodes into CHN and CMN. Then, the genetic algorithm was used to select the optimal chromosomes, and the optimized network is obtained by chromosome decoding. In [38], generic algorithms are used as an optimization method for sensor networks by introducing a special node-inactive point, which does not participate in network communication. From the above literature research, there are two aspects can be improved for LEACH algorithm.
(1) Keep traffic load balance [39]
Design a more efficient routing protocol to avoid unnecessary energy consumption. By spreading the data transmission task to balance the network EC and delay the node to die prematurely for each node.
(2) Reduce traffic to save energy
Design an efficient wireless sensor node deployment to avoid data communication EC due to data redundancy. Use the corresponding algorithm to minimize data traffic and avoid redundant data transmission. Thus, achieving the purpose of extending the entire lifetime.
LEACH faces many challenges in its research and development process, although it has enormous application potential and value. For example, the relative residual energy and cluster uniformity between nodes are not dynamically considered when the network is clustered. When multi-hop communication [40] is adopted between clusters, the protocol does not consider the optimization of the overall energy consumption of the network. These limitations make the lifetime of LEACH very limited, which seriously hinders the development and application of LEACH. It can be seen that the previous paper only optimized one or two goals, and did not consider optimizing the LEACH protocol from multiple perspectives. Therefore, it is an urgent problem to use energy efficiently and extend the lifetime of LEACH. In this paper, the LEACH protocol is selected for detailed research and analysis, and the cluster head election algorithm is improved. The sink node distance, cluster distance, the overall energy consumption of the network and the network energy consumption balance are used to select cluster nodes, which can reduce the EC caused by information transmission in WSN and balance the distribution of CHN in the network. On this basis, data fusion technology is introduced in the data transmission phase of the protocol to reduce the amount of data forwarding, reduce the EC of nodes, and extend the lifetime of the network.
3. WSN Model
3.1 Model hypothesis
In order to facilitate further study of LEACH protocol, it is necessary to make the following assumptions about the network model of LEACH protocol [41].
(1) Wireless sensor networks are small and medium-sized with fixed sink nodes.
(2) There is only one sink node in the network. The computing power, storage capacity and energy resources of the sink node are generally unlimited. And the sink node can obtain the location information, energy information and ID information of each node.
(3) Nodes are randomly distributed in a 100*100m work area, each node has a unique ID.
(4) Nodes have the same physical structure and initial energy, computing power, and storage capacity.
(5) The node is fixed and can communicate with the sink node either directly or indirectly.
(6) After the network clustering is formed, not only the single-hop communication mode is utilized between the cluster head node (CMN) and the cluster head node (CHN), but also between the CHN and the sink node.
3.2 WSN Energy Balance Many-objective Optimization Model
The randomness generated by the CHN in the LEACH protocol cannot guarantee the rationality of the CHN position. Unbalanced cluster head distribution consumes a lot of energies of CHN. Both of them will affect the lifetime of the entire network. In order to select the CHN, the four objectives is discussed: the distance from CMN to cluster nodes (cluster distance), the distance from cluster nodes to sink nodes (sink node distance), the overall energy consumption (EC) of the network and the network energy consumption balance, which are optimized as many-objective optimization algorithms [42]
(1) Cluster distance Dnc
In the WSN, the CMN needs to send information to the CHN. When the CMN in each cluster surround the cluster head, that means the distance between the CMN and the CHN is the closest, and the transmission distance is the shortest. Under this circumstance, the EC of CMN is the least. The cluster distance model is showed as follows:
\(D_{n c}=\min \left(\sum_{m=1}^{M}\left(\sum_{n=1}^{N} d_{n c l u s t e r}\right)\right)\) (1)
where, M represents number of CHN, N represents number of CMN of each cluster and ncluster dncluster represents Euclidean distance from CMN to CHN.
(2) Sink node distance Dcs
In the LEACH protocol, the CHN performs data fusion on the received information and sends it to the sink node. The shorter the transmission distance, the less the EC.
\(D_{c s}=\min \sum_{m=1}^{M} d_{c \sin k}\) (2)
where, dcsink represents Euclidean distance from cluster node to sink node.
(3) Overall energy consumption of the network Energy1
The overall EC of the network in the clustering stage as follows. Firstly, CHN broadcasts a message that it is the cluster head and transmits a TDMA schedule. The table is sent to the CMN, and the amount of data is t bit. The EC of CHN sends information is Ecn (t,dcn ) .
\(E_{c n}\left(t, d_{c n}\right)=\left\{\begin{array}{ll} t\left(E_{\text {elec }}+\tau_{f} d_{c n}^{2}\right), & d_{c n}<d_{0} \\ t\left(E_{\text {elec }}+\tau_{m} d_{c n}^{4}\right), & d_{c n} \geq d_{0} \end{array}\right.\) (3)
where, Eelec is the EC by the node to transmit 1 bit of data, τf and τm respectively represent the EC of the signal amplifier when transmitting 1 bit of data per unit distance in the free space and multipath fading models. dcn represents the Euclidean distance from current cluster member to CHN. Threshold conversion between communication channel models.
And then, the cluster member node accepts the t bit information and TDMA table from the CHN and sends the t bit data to the CHN according to the TDMA table. In this process, the EC by the CMN (Enon-cn t,dcn )is as follows:
\(E_{\text {non-cn }}\left(t, d_{c n}\right)=\left\{\begin{array}{ll} t\left(E_{\text {elec }}+\tau_{f} d_{c n}^{2}\right)+t \times E_{\text {elec }}, & d_{c n}<d_{0} \\ t\left(E_{\text {elec }}+\tau_{m} d_{c n}^{4}\right)+t \times E_{\text {elec }}, & d_{c n} \geq d_{0} \end{array}\right.\) (4)
Finally, the EC of the process for CHN accept the CMN sends the information Ecn (t,dcn ) :
\(E_{c n}\left(t, d_{c n}\right)=t E_{\text {elec }} \times\left(\frac{N}{M}-1\right)\) (5)
In summary, the overall EC of the network Energy1 in the clustering stage is summed by Eq. (3)-(5).
\(\text { Energy1 }=\left\{\begin{array}{ll} \min \left(t E_{\text {elec }} \times\left(\frac{N+2}{M}-1\right)+t \tau_{f} d_{c n}^{2} \times\left(\frac{N}{M}+1\right)\right), & d_{c n}<d_{0} \\ \min \left(t E_{\text {elec }} \times\left(\frac{N+2}{M}-1\right)+t \tau_{m} d_{c n}^{2} \times\left(\frac{N}{M}+1\right)\right), & d_{c n} \geq d_{0} \end{array}\right.\) (6)
(4) Network energy consumption balance Energy2
The network EC balance is composed of two parts Dno and Den . The variance of the number of CMN in each cluster Dno is as follows. The smaller the value, the more average the number of nodes in each cluster, which means that the load per cluster head is more balanced.
\(D_{n o}=\frac{\sum_{i=1}^{m}\left(v_{i}-u\right)^{2}}{m}\) (7)
where i v is the number of CMN in the i − th cluster, u is the average number of CMN of each cluster in the network.
The variance of the EC of clustered member modes in each cluster is Den .The value is smaller, the more average the EC in the clusters. The equation is:
\(D_{e n}=\frac{\sum_{i=1}^{m}\left(E_{i}-u_{e}\right)^{2}}{m}\) (8)
where Ei is the total EC in the i − th cluster and ue is the average of the EC of each cluster.
In summary, the network EC balance is:
Energy2 = min( Dno + Den) (9)
4. LEACH-ABF Algorithm
Aiming at the cluster head optimization problem of WSN, a many-objective optimization algorithm LEACH-ABF based on adaptive balance function is proposed. It is applicable for our proposed wireless sensor network energy balance optimization model. The algorithm flow of LEACH-ABF includes three parts: the proposed adaptive balance function strategy, genetic operation, and penalty-based boundary intersection selection strategy, which are respectively introduced in section 4.1 to 4.3. Finally, the framework of the algorithm is presented in section 4.4.
4.1 Balance function strategy
Inspired by [43], this function is adaptively combined with the diversity function and the convergence function to increase the selection pressure and make the solution to the true PF. Assume that the population ,..., X = {x1 ,x2 ,...., xN } consists of N individuals. For each individual x , the calculation method of ABF value is as follows:
\(A B F\left(x_{i}, X\right)=\lambda \times D F\left(x_{i}, X\right)+\sigma \times C F\left(x_{i}, X\right) \) (10)
where,DF (xi,X) and CF (xi, X) represent the normalized diversity and convergence of the population, respectively. λ and σ are two weight vector that impact the diversity and convergence of algorithm adaptively. This strategy can help us to choose a better solution.
Specifically, the normalized diversity function DF (xi,X) calculates individual distance from nearest neighbors. The greater the distance, the better the diversity of the population. And the formula is as follows:
\(D F\left(x_{i}, X\right)=\frac{S\left(x_{i}\right)-S_{\min }}{S_{\max }-S_{\min }}\) (11)
where, S(xi) x [44] represents the shifted Euclidian distance to the nearest neighbor:
\(S\left(x_{i}\right)=\min _{x_{j} \in X, j \neq i} \sqrt{\sum_{b=1}^{a} s\left(f_{b}^{\prime}\left(x_{i}\right), f_{b}^{\prime}\left(x_{j}\right)\right)^{2}}\) (12)
\(s\left(f_{b}^{\prime}\left(x_{i}\right), f_{b}^{\prime}\left(x_{j}\right)\right)=\left\{\begin{array}{cc} f_{b}^{\prime}\left(x_{j}\right)-f_{b}^{\prime}\left(x_{i}\right) & \text { if } f_{b}^{\prime}\left(x_{j}\right)>f_{b}^{\prime}\left(x_{i}\right) \\ 0 & \text { otherwise } \end{array}\right.\) (13)
\(f_{b}^{\prime}\left(x_{i}\right)=\frac{f_{b}\left(x_{i}\right)-f_{b} \min }{f_{b} \max -f_{b} \min }\) (14)
where, ( ) fb'(xi) is the b - th normalized objective of xi .
The convergence function CF(xp ) represents the convergence capacities (Euclidean distance between fb'(xi ) and the ideal point w = (0,0,...,0) ). The larger the value of CF , the closer the individual is to the ideal point. That means, the selection pressure that increases toward the ideal point, thus minimizing the objective function.
\(C F\left(x_{p}\right)=1-\operatorname{sqrt}\left(\sum_{b=1}^{a}\left(f_{b}^{\prime}\left(x_{i}\right)-w\right)^{2}\right.\) (15)
4.2 Genetic operation
A new genetic operation that combines tournament selection, simulating binary intersections and polynomial variations, which are widely used to solve MaOPs and provide an effective search capability [45]. Firstly, the tournament selection is used to select excellent offspring from the parents. And then the parents produce excellent offspring by simulating binary crossover and polynomial variation. Through such an operation, we can achieve the purpose of selecting better convergence and diversity solutions.
4.3 Penalty-based boundary intersection selection strategy
The approach of the PBI selection [46] is used to improving population convergence and diversity. And the main idea of strategy is defined as follows:
\(\begin{aligned} &\min B^{p b i}\left(x \mid q^{*}, e^{*}\right)=p_{a}+\partial p_{b}\\ &\text { subject to } x \in \Omega\\ &p_{a}=\frac{\left\|\left(F i t(x)-z^{*}\right)^{T} q^{*}\right\|}{\left\|q^{*}\right\|}\\ &p_{b}=\| F i t(x)-\left(e^{*}+p_{a} \frac{q^{*}}{\left\|q^{*}\right\|}\right) \mid \end{aligned}\) (16)
where, e* is the ideal point, q* represents the reference point and ∂ is the adaptively defined penalty parameter. The value of ∂ is five according to [46]. Also, pa and pb are used to evaluate the convergence of x towards efficient front and measure the diversity of population, respectively. The procedure of PBI selection operation is presented in Algorithm 1. Firstly, non-dominated sorting operations is performed in order to layer the population L , then the objective function is normalized. The obv is obtained by calculating the vertical distance between the reference point and the population to associate population with reference point and perform PBI calculations. Finally, niche operations are used to gain population P .
Algorithm 1: The main procedure of PBI selection operation
Begin
Input: population off , reference points q∗
L = Non-dominated sort ( off )
ob = Normalize objectives ( L )
obv = Associate ( ob , v )
r = PBI ( obv )
P = Niche ( r )
End
Output: population P
End
4.4 Framework of the LEACH-ABF
Algorithm 2 shows the framework of the LEACH-ABF. First, the parameters of the algorithm are initialized. And the objective function value is calculated by the wireless sensor energy balance model. Then, an adaptive balance function operation on the objective function value is performed to generate an archive Arch . Meanwhile, the genetic operator is used in the population P to produce excellent offspring off . The Arch and the off is combined to update the external archive, and then, the Arch perform genetic operations to generate a new solution S . Finally, output the best solutions by updating the population with the ABF strategy.
Algorithm 2: The main framework of LEACH-ABF
Begin
Initial the population P , the reference point q∗
Zmin =min ( P )
While Global Not Termination ( P )
Q = balance function ( P )
off = Genetic operator (Q )
Zmin = min ( Zmin , off )
P = PBI selection ( off )
End
Output the population P
End
4.5 Computational Complexity of LEACH-ABF
This section will analyze the time complexity of the designed LEACH-ABF algorithm. The components of algorithm include population initialization, definition of reference point, balance function operation, genetic operation and PBI calculation. Suppose the population size is N , the objective dimension is M and the number of reference points is H . The time complexity of defining the reference point of Algorithm 1 is O(MN), the balance function requires O(N2) computations, and the time complexity of crossover and mutation for genetic operation is O(MN2) , respectively. The PBI calculation operation includes non-dominated sorting, population normalization, association with reference points and niche processing operations. The time complexity of non-dominated sorting is O(N-2logM-2) , population normalization requires O(N) calculations, population size is 2N and H reference points are associated with would requires O( MNH ) computations, and the time complexity of niche processing operations is O(H). In summary, the algorithm complexity is 2 O(MN2 ) .
5. Simulation and Analysis
This section tests the algorithm in two aspects. The performance of the LEACH-ABF was first evaluated. In addition, the algorithm is applied to the energy balance many-objective optimization model of WSN and compared with other algorithms.
5.1 Algorithm Test and Analysis
DTLZ [47] problems are non-convex, multi-modal, non-connected and non-uniform Pareto front. The simulation results of LEACH-ABF are provided on 4 to 15 objective optimization problems. In the evaluation criterion, the inverse generational distance (IGD) is chose as the performance metric, evaluate the quality of the solution which can provide a combination of information about the convergence and diversity. The reference point generation scheme in NSGAIII is used to construct the reference set on the hyperplane. The IGD value is obtained as follows:
\(I G D(A, Z)=\frac{1}{|Z|} \sum_{i=1}^{|=|} \min _{j=1}^{|A|} d\left(z_{i}, a_{j}\right)\) (17)
where \(d\left(z_{i}, a_{j}\right)=\left\|z_{i}-a_{i}\right\|_{2}\) The smaller the IGD value is, the closer the solution set to the PF.
To test the fairness of the algorithm process, the parameter of algorithm is set as follows: for each algorithm, the number of iterations is 10000 generations, running 30 times independently, the best, median and worst IGD values are reported. For all algorithms, performance metrics are computed using the final solution set. Table 1 shows different population sizes corresponding to different number of objectives. Table 2 shows the LEACH-ABF algorithm, which compares with other three common algorithm on DTLZ test suite. The best results (average minimum) are marked with blue. In each test case, the symbol ‘+/-/= ‘shows the performance of good, poor and medium for other three algorithm to the LEACH-ABF.
Table 1. Different dimensions correspond to different population sizes
For DTLZ1 and DTLZ3, due to the multi-modal of these functions, it is difficult to get a good convergence solution. However, compared with other algorithms, LEACH-ABF has achieved good results on 6-15 objectives, and it also has the same performance as EFRRR algorithm on 4 objectives, as shown in Table 2. The reason is that the choice PBI strategy used to better balance the convergence and distribution of the solution. The PF of DTLZ2 is concave. As can be seen from Table 2, the effects of 8 and 15 objectives are slightly worse than NSGA-III, but the effects on 4 and 6 objectives are much better, while the 10 objectives are similar to KnEA. This is because the early stage of the algorithm is biased towards diversity rather than convergence. But the overall performance is better than other algorithms. DTLA4 is biased, and the overall performance of LEACH-ABF and EFRRR is similar, but slightly worse on the 15 objectives. The maximum ranking strategy is adopted by EFRRR effectively increases the selection pressure. The overall performance is superior to NSGAIII and KnEA compared to other algorithms. The PF of DTLZ5 and DTLZ6 is a degenerate curve, which makes it difficult to obtain the convergence and diversity of the solution when solving MaOPs. However, LEACH-ABF overcomes this difficulty and has achieved good results. The main reason is that the ABF strategy plays a major role in improving the convergence and distribution of the algorithm. DTLZ7 is a model of mixed, disconnected and multi-model, which requires very high algorithm design. LEACH-ABF is significantly better than other algorithms on 10, 15 objects, while the performance is degraded at 4, 6, and 8 objectives. And the overall performance is good due to the influence of the selection strategy.
Table 2. The IGD value obtained by four algorithms with different number of objectives
To better understand the distribution of the solution, Fig. 3 shows the parallel coordinates of the non-dominated fronts obtained by the four algorithms on four objectives for the DTLZ2 test problem. It can be seen that the non-dominated front of the LEACH-ABF algorithm is prospective in terms of convergence and diversity. At the same time, distribution of NSGA-III and KnEA is densely, which cannot well reflect diversity of population. The non-dominated PF of EFRRR has good performance in terms of convergence, but the distribution is slightly worse than the LEACH-ABF algorithm. It can be seen that the solution of LEACH-ABF is at the center of the PF, which can maintain a better diversity. In summary, the algorithm LEACH-ABF is better than other algorithms.
Fig. 3. PF of four algorithms on DTLZ2 with four objectives. (a) NSGAIII (b) KnEA (c) EFRRR (d) LEACH-ABF
5.2 The performance of LEACH-ABF on wireless sensor network energy balance many-objective optimization model
For the purpose of verifying the effectiveness of the improved algorithm, this section makes a simulation comparison experiment between the improved algorithm LAEACH-ABF and three different algorithms on the wireless sensor energy balance many-objective optimization model. The WSN simulation parameters are set as shown in Table 3.
Table 3. Wireless sensor network simulation parameter setting
Fig. 4 depicts the comparison of lifetime in four different algorithms, expressed in terms of the number of surviving nodes. Starting from the 1300 rounds, it is obvious that the number of surviving nodes of LEACH-ABF is significantly larger than other algorithms, and this situation has been maintained until the 2000 rounds. Fig. 5 also shows that the residual energy of the four algorithms is almost the same before 1300 rounds. But as the number of rounds grows, the energy consumption of the LEACH-ABF algorithm is smaller than others three algorithms. The detailed data information for the 2000 rounds is given in Table 4.
Table 4. Comparison of four algorithms
Fig. 4. Comparison of networks lifetime of the algorithm
Fig. 5. Comparison of residual energy nodes of the algorithm
In summary, it can be seen that the LEACH-ABF algorithm has the largest number of surviving nodes and the longest lifetime of WSN. The main reason for these results is the rational optimization of the cluster head through the PBI and ABF strategy, which can reduce the total distance transmitted by the entire network node, including not only the communication distance from the cluster head node to the cluster member node, but also the communication distance from the cluster head node to the sink node. For this reason, it can avoid the waste of energy in the communication process and improve the efficiency of energy.
6. Conclusion
As we all know, both the cluster distance and the sink distance will affect the network lifetime. However, the existing work ignores the impact of overall energy consumption of the network and network energy consumption balance on clustering. Therefore, the many-objective energy balance model of cluster head election in LEACH is designed. Taking into account four objectives: the sink node distance, the cluster distance, the overall energy consumption of the network and the network energy consumption balance, which are used to explore that how to choose an instance of a cluster head node. Meanwhile, A new many-objective optimization algorithm LEACH-ABF is proposed to solve the model. ABF adaptively combines the diversity function and convergence function, and uses genetic operations to produce better solutions, so that the optimal solution can be found more efficiently in the solution space. Experiments of DTLZ test suite and comparation test are used to analyze the performance of the algorithm. It shows that LEACH-ABF has better distribution and convergence than other algorithms, which can better balance the energy consumption and extend the lifetime of WSN.
In our future work, we will study and design WSN technology for each specific application in order to make the routing protocol performance superior. Finally, on the basis of the above work, we hope to use the many-objective optimization algorithm to optimize the wireless sensor energy consumption balance problem.
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No.61806138, Natural Science Foundation of Shanxi Province under Grant No.201801D121127, No.201801D121133, Taiyuan University of Science and Technology Scientific Research Initial Funding under Grant No.20182002.
References
- P. Shunmuga Perumal, V. Rhymend Uthariaraj and V. R. Elgin Christo, "WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol. 9, no. 3, pp. 901-920, 2015. https://doi.org/10.3837/tiis.2015.03.004
- K. Daehee, K. Dongwan and A. Sunshin, "Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol. 10, no. 3, pp. 1249-1272, 2016. https://doi.org/10.3837/tiis.2016.03.017
- Z. Q. Qin, B. X. Lu, M. Zhu, L. Sun and L. Shu, "Optimized Charging in Large-Scale Deployed WSNs with Mobile Charger," KSII Transactions on Internet and Information Systems, vol. 10, no. 12, pp. 5307-5327, 2016. https://doi.org/10.3837/tiis.2016.12.010
- T. A. Z. Raza, "A bacterial foraging-based batch scheduling model for distributed systems," International Journal of Bio-Inspired Computation, vol. 11, no. 1, pp. 16-26, 2018. https://doi.org/10.1504/IJBIC.2018.090062
- M. N. Omidvar, X. Li, Y. Mei and X. Yao, "Cooperative Co-Evolution With Differential Grouping for Large Scale Optimization," IEEE Transactions on Evolutionary Computation, vol. 18, no. 3, pp. 378-393, 2014. https://doi.org/10.1109/TEVC.2013.2281543
- W. R. Heinzelman, A. P. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol for wireless sensor networks," in Proc. of the 33rd Hawaii International Conference on System Sciences, January 7, 2000.
- W. Heinzelman, "Adaptive Protocols for Information Dissemination in Wireless Sensor Networks," in Proc. of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp.174-185, August 15 - 19, 1999.
- O. Younis and S. Fahmy, "HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks," IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366-379, 2004. https://doi.org/10.1109/TMC.2004.41
- W. B. Heinzelman, A. P. Chandrakasan and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transactions on Wireless Communication, vol. 1, no. 4, pp. 660-670, 2002. https://doi.org/10.1109/TWC.2002.804190
- J. Zhang, H. Yan, Y. Cui, H. Rong and J. P. Wang, "LEACH-EO: A More Energy-Efficient LEACH Protocol for WSN," Applied Mechanics and Materials, vol. 644-650, pp. 3108-3111, 2014. https://doi.org/10.4028/www.scientific.net/AMM.644-650.3108
- B. a. Attea and E. A. Khalil, "A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks," Applied Soft Computing Journal, vol. 12, no. 7, pp. 1950-1957, 2012. https://doi.org/10.1016/j.asoc.2011.04.007
- Asaduzzaman and H. Y. Kong, "Code Combining Cooperative Diversity in Long-haul Transmission of Cluster based Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol. 5, no. 7, pp. 1293-1310, 2011. https://doi.org/10.3837/tiis.2011.07.005
- Y. P. Liu, D. W. Gong, J. Sun and Y. C. Jin, "A Many-Objective Evolutionary Algorithm Using A One-by-One Selection Strategy," IEEE Transactions on Cybernetics, vol. 47, no. 9, pp. 2689-2702, 2017. https://doi.org/10.1109/TCYB.2016.2638902
- J. J. Zhang, F. Xue, X. J. Cai, Z. H. Cui, Y. Chang, W. S. Zhang and W. Z. Li, "Privacy protection based on many-objective optimization algorithm," Concurrency and Computation Practice and Experience, vol. 31, no. 20, 2019.
- Z. H. Cui, J. J. Zhang, Y. C. Wang, Y. Cao, X. J. Cai, W. S. Zhang and J. J. Chen, "A pigeon-inspired optimization algorithm for many-objective optimization problems," SCIENCE CHINA Information Sciences, vol. 62, no. 7, p. 070212, 2019. https://doi.org/10.1007/s11432-018-9729-5
- M. Abdel-Baset, Y. Q. Zhou and M. Ismail, "An improved cuckoo search algorithm for integer programming problems," International Journal of Computing Science and Mathematics, vol. 9, no. 1, pp. 66-81, 2018. https://doi.org/10.1504/IJCSM.2018.10011723
- Z. H. Cui, L. Du, P. H. Wang, X. J. Cai and W. S. Zhang, "Malicious code detection based on CNNs and multi-objective algorithm," Journal of Parallel and Distributed Computing, vol. 129, pp. 50-58, 2019. https://doi.org/10.1016/j.jpdc.2019.03.010
- K. Deb and H. Jain, "An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point-Based Nondominated Sorting Approach, Part I: Solving Problems With Box Constraints," IEEE Transactions on Evolutionary Computation, vol. 18, no. 4, pp. 577-601, 2014. https://doi.org/10.1109/tevc.2013.2281535
- X. J. Bi and C. Wang, "A niche-elimination operation based NSGA-III algorithm for many-objective optimization," Applied Intelligence, vol. 48, no. 1, pp. 118-141, 2018. https://doi.org/10.1007/s10489-017-0958-4
- K. Li, K. Deb, Q. Zhang and S. Kwong, "An Evolutionary Many-Objective Optimization Algorithm Based on Dominance and Decomposition," IEEE Transactions on Evolutionary Computation, vol. 19, no. 5, pp. 694-716, 2015. https://doi.org/10.1109/TEVC.2014.2373386
- Y. Yuan, H. Xu, B. Wang, B. Zhang and X. Yao, "Balancing Convergence and Diversity in Decomposition-Based Many-Objective Optimizers," IEEE Transactions on Evolutionary Computation, vol. 20, no. 2, pp. 180-198, 2016. https://doi.org/10.1109/TEVC.2015.2443001
- J. Bader and E. Zitzler, "HypE: An Algorithm for Fast Hypervolume-Based Many-Objective Optimization," Evolutionary Computation, vol. 19, no. 1, pp. 45-76, 2011. https://doi.org/10.1162/EVCO_a_00009
- E. Zitzler and S. Kunzli, "Indicator-Based Selection in Multiobjective Search," Lecture Notes in Computer Science, vol. 3242, pp. 832-842, 2004.
- X. J. Cai, Y. Niu, S. J. Geng, J. J. Zhang, Z. H. Cui, J. W. Li and J. J. Chen, "An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search," Concurrency and Computation: Practice and Experience, 2019.
- X. J. Cai, P. H. Wang, L. Du, Z. H. Cui, W. S. Zhang and J. J. Chen, "Multi-objective 3-Dimensional DV-Hop Localization Algorithm with NSGA-II," IEEE Sensors Journal, vol.19, no.21, pp..10003-10015, 2019. https://doi.org/10.1109/jsen.2019.2927733
- G. G. Wang, X. J. Cai, Z. H. Cui, G. Y. Min and J. J. Chen, "High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm," IEEE Transactions on Emerging Topics in Computing, p.1-1, 2017.
- W. Arloff, K. R. B. Schmitt and L. J. Venstrom, "A parameter estimation method for stiff ordinary differential equations using particle swarm optimisation," International Journal of Computing Science and Mathematics, vol. 9, no. 5, pp. 419-432, 2018. https://doi.org/10.1504/ijcsm.2018.10016539
- X. Zhang, X. T. Li and M. H. Yin, "Hybrid cuckoo search algorithm with covariance matrix adaption evolution strategy for global optimisation problem," International Journal of Bio-Inspired Computation, vol. 13, no. 2, pp. 102-110, 2019. https://doi.org/10.1504/IJBIC.2019.098403
- X. J. Cai, X. Z. Gao and Y. Xue, "Improved bat algorithm with optimal forage strategy and random disturbance strategy," International Journal of Bio-inspired Computation, vol. 8, no. 4, pp. 205-214, 2016. https://doi.org/10.1504/IJBIC.2016.078666
- B. P. Zhao, Y. Xue, B. Xu, T. H. Ma and J. F. Liu, "Multi-objective classification based on NSGA-II," International Journal of Computing Science and Mathematics, vol. 9, no. 6, pp. 539-546, 2018. https://doi.org/10.1504/ijcsm.2018.096325
- H. Kamel, K. Nadjet and D. Habiba, "Multi-objective bat algorithm for mining numerical association rules," International Journal of Bio-Inspired Computation, vol. 11, no. 4, pp. 239- 248, 2018. https://doi.org/10.1504/IJBIC.2018.092797
- Z. H. Cui, Y. Cao, X. J. Cai, J. H. Cai and J. J. Chen, "Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things," Journal of Parallel and Distributed Computing, vol. 132, pp. 217-229, 2019. https://doi.org/10.1016/j.jpdc.2017.12.014
- X. J. Cai, J. J. Zhang, H. Liang, L. Wang and Q. D. Wu., "An Ensemble Bat Algorithm for Large-scale Optimization," International Journal of Machine Learning and Cybernetics, vol.10, no.11, pp.3099-3113, 2019. https://doi.org/10.1007/s13042-019-01002-8
- X. J. Cai, H. Wang, Z. H. Cui, J. H. Cai, Y. Xue and L. Wang, "Bat algorithm with triangle-flipping strategy for numerical optimization," International Journal of Machine Learning and Cybernetics, vol. 9, no. 2, pp. 199-215, 2018. https://doi.org/10.1007/s13042-017-0739-8
- N. G. Kumar and D. Chetna, "ESO-LEACH: PSO Based Energy Efficient Clustering in LEACH," Journal of King Saud University - Computer and Information Sciences, 2018.
- X. J. Cai, Y. Q. Sun, Z. H. Cui, W. S. Zhang and J. J. Chen, "Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, vol. 13, no. 5, pp. 2469-2490, 2019. https://doi.org/10.3837/tiis.2019.05.013
- D. B. Jourdan and O. L. D. Weck, "Layout optimization for a wireless sensor network using a multi-objective genetic algorithm," in Proc. of 59th IEEE Vehicular Technology Conference, pp. 2466-2470, May 17-19, 2004.
- K. P. Ferentinos and T. A. Tsiligiridis, "Adaptive design optimization of wireless sensor networks using genetic algorithms," Computer Networks, vol. 51, no. 4, pp. 1031-1051, 2007. https://doi.org/10.1016/j.comnet.2006.06.013
- J. Wang and J. J. Yuan, "A high-efficient multi-deme genetic algorithm with better load-balance," International Journal of Computing Science and Mathematics, vol. 9, no. 3, pp. 240-246, 2018. https://doi.org/10.1504/IJCSM.2018.10014228
- P. H. Wang, J. R. Huang, Z. H. Cui, L. P. Xie and J. J. Chen, "A Gaussian Error Correction Multi-Objective Positioning Model with NSGA-II," Concurrency and Computation Practice and Experience, 2019.
- W. Shi, S. Y. Liu and Z. H. Zhang, "A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network," KSII Transactions on Internet and Information Systems, vol. 9, no. 9, 2015.
- Z. H. Cui, Y. Chang, J. J. Zhang, X. J. Cai and W. S. Zhang, "Improved NSGA-III with selection-and-elimination operator," Swarm and Evolutionary Computataion, vol. 49, pp. 23-33, 2019. https://doi.org/10.1016/j.swevo.2019.05.011
- Q. Z. Lin, S. B. Liu, Q. L. Zhu, C. Y. Tang, R. Z. Song, J. Y. Chen, C. A. C. Coello, K. C. Wong and J. Zhang, "Particle Swarm Optimization With a Balanceable Fitness Estimation for Many-Objective Optimization Problems," IEEE Transactions on Evolutionary Computation, vol. 22, no. 1, pp. 32-46, 2018. https://doi.org/10.1109/tevc.2016.2631279
- M. Li, S. Yang and X. Liu, "Shift-Based Density Estimation for Pareto-Based Algorithms in Many-Objective Optimization," IEEE Transactions on Evolutionary Computation, vol. 18, no. 3, pp. 348-365, 2014. https://doi.org/10.1109/TEVC.2013.2262178
- H. Z. Wu, Y. Q. Zhou and Q. F. Luo, "Hybrid symbiotic organisms search algorithm for solving 0-1 knapsack problem," International Journal of Bio-Inspired Computation, vol. 12, no. 1, pp. 25-53, 2018.
- Q. F. Zhang and L. Hui, "MOEA/D: A Multiobjective Evolutionary Algorithm Based on Decomposition," IEEE Transactions on Evolutionary Computation, vol. 11, no. 6, pp. 712-731, 2007. https://doi.org/10.1109/TEVC.2007.892759
- K. Deb, L. Thiele, M. Laumanns and E. Zitzler, "Scalable Test Problems for Evolutionary Multiobjective Optimization," Evolutionary Multiobjective Optimization: Theoretical Advances and Applications, pp. 105-145, 2005.
Cited by
- Proposing a Density-Based Clustering Approach (DBCA) to Aggregate Data Collected from the Environment in Arid Area for Desertification vol.2021, 2020, https://doi.org/10.1155/2021/6627771