DOI QR코드

DOI QR Code

Optimal LEACH Protocol with Improved Bat Algorithm in Wireless Sensor Networks

  • Cai, Xingjuan (Complex System and Computational Intelligence Laboratory, Taiyuan University of Science and Technology) ;
  • Sun, Youqiang (Complex System and Computational Intelligence Laboratory, Taiyuan University of Science and Technology) ;
  • Cui, Zhihua (Complex System and Computational Intelligence Laboratory, Taiyuan University of Science and Technology) ;
  • Zhang, Wensheng (State Key Laboratory of Intelligent Control and Management of Complex Systems, Institute of Automation Chinese Academy of Sciences) ;
  • Chen, Jinjun (University of Technology Sydney)
  • Received : 2018.08.30
  • Accepted : 2018.11.21
  • Published : 2019.05.31

Abstract

A low-energy adaptive clustering hierarchy (LEACH) protocol is a low-power adaptive cluster routing protocol which was proposed by MIT's Chandrakasan for sensor networks. In the LEACH protocol, the selection mode of cluster-head nodes is a random selection of cycles, which may result in uneven distribution of nodal energy and reduce the lifetime of the entire network. Hence, we propose a new selection method to enhance the lifetime of network, in this selection function, the energy consumed between nodes in the clusters and the power consumed by the transfer between the cluster head and the base station are considered at the same time. Meanwhile, the improved FTBA algorithm integrating the curve strategy is proposed to enhance local and global search capabilities. Then we combine the improved BA with LEACH, and use the intelligent algorithm to select the cluster head. Experiment results show that the improved BA has stronger optimization ability than other optimization algorithms, which the method we proposed (FTBA-TC-LEACH) is superior than the LEACH and LEACH with standard BA (SBA-LEACH). The FTBA-TC-LEACH can obviously reduce network energy consumption and enhance the lifetime of wireless sensor networks (WSNs).

Keywords

1. Introduction

 As a prerequisite for the development of the Internet of Things (IoT), technologies related to object recognition and information acquisition are of paramount importance. Sensor technology is therefore indispensable. WSNs constitute an important part of IoT, which is of ten used for special purposes such as location, early warning systems, and emergency rescue [1]. These sensors must be able to collect [2], process, and transmit information. Desired information can be collected and detected by deploying sufficient sensors in an area to be monitored. WSNs are becoming widely used given IoT proliferation, such as in smart cities, intelligent transportation, military defense, modern agriculture, health care, and environmental monitoring applications [2-4].

 Due to the limited energy of sensor nodes, extending their use as much as possible is important when studying WSNs. Routing protocol technology greatly affects the network lifecycle [5]. Hierarchical routing is an efficient technique to reduce energy consumption via data aggregation and fusion by using a method to decrease the number of transmissions to the base station [6]. The LEACH is the first and most well-known hierarchical routing protocol [7]. In a typical hierarchical routing algorithm, the clustering idea in LEACH has been referenced in many subsequent routing protocols, including hierarchical routing protocols such as the threshold sensitive energy efficient sensor network protocol [7, 8] and power-efficient gathering in sensor information systems [9]. The clustering method reduces network energy consumption and improves network lifetime. The core concept of the LEACH is based on rounds, and the basic idea of the protocol is to randomly select a cluster-head node cyclically and distribute the network energy load evenly among sensor nodes [10]. This approach enhances energy consumption because transmissions are only managed by cluster-head nodes rather than all sensor nodes. However, the LEACH protocol does not consider current node energy, and the selection of random cluster-heads can easily result in uneven energy consumption among network nodes, which shortens the network life cycle. A monitoring blindspot can then form in the rear stage of the network and affect overall network performance [11,12].

 Many LEACH improvements have been implemented[13], many of which reduce energy consumption in the LEACH protocol; others consider the energy consumption balance. Most earlier improvements were based on head node selection. For example, LI Yan proposed a new modified protocol using a cluster-head multi-hop algorithm based on LEACH in which an optimal path forms between cluster-heads leading to the base station [14]. A simulated annealing algorithm has also been used to select a cluster-head node when implementing the LEACH protocol in WSNs, demonstrating much better performance compared with the original protocol [15]. An improved routing protocol named ANT-LEACH was proposed by WANG Lin, who adopted the strategy of combining an ant colony optimization algorithm and the routing process of cluster-head nodes [16]. HAN Dong-xue put forth a PSO-based double cluster-heads clustering algorithm; the master cluster-head and vice cluster-head assume different roles, where the master cluster-head completes data collection and date integration while the vice cluster-head is involved in communication with the base station [17].

 Despite these achievements, most methods are based on a predefined searching pattern or deterministic optimization algorithms. To identify a better energy-saving solution, superior optimization of cluster-head node selection is required. Cluster-head node selection is a complex optimization problem that should consider the node location and node residual energy. A biological heuristic algorithm is an effective method for solving this optimization problem, such as via standard particle swarm optimization (PSO) [18-21], ant colony optimization [22-27], cuckoo search (CS) [28-32], and artificial bee colony algorithm (ABC) [33-38].

 In 2010, University of Cambridge scholar YANG proposed a new intelligent optimization algorithm, the bat algorithm (BA), by simulating the echolocation behavior of bats [39 -42]. The algorithm is a population-based stochastic optimization algorithm of which bat individuals are the basic units. The movement of the entire population produces an evolutionary process from disorder to order in the problem-solving space, thereby obtaining the optimal solution. Li and Zhou [43] proposed a complex-valued BA where each bat is coded with a complex number. Cai and Wang [44] presented a fast BA with triangle-flipping strategy (FTBA), which increased the global search ability of the algorithm. This paper continues to improve FTBA coupled with another curve strategy to enhance local optimization.

 In this paper, an FTBA-TC-LEACH routing algorithm based on BA is proposed, and a new cluster-head selection mode is adopted to solve the problem of uneven cluster-head distribution in LEACH, which causes non-uniform energy consumption. The rest of this paper is organized as follows: in Section 2, we review the background of the LEACH protocol and propose improved cluster-head selection. Section 3 introduces the modified BA and uses it for cluster-head optimization. Section 4, we verify the proposed improvements through simulation experiments. Section 5 presents conclusions and a brief overview of our future work.

2. Background

2.1 Low-Energy Adaptive Clustering Hierarchy (LEACH)

 The LEACH protocol is a typical hierarchical routing protocol algorithm that is a commonly used clustering routing protocol; therefore, LEACH was taken as the research object given high representativeness. Assumed preconditions of the LEACH protocol are as follows:

 (1) All sensor nodes are the same, and the radio signal in each direction consumes the same energy; the initial energy of each node is equal, the energy is limited, and each node can perceive its remaining energy. The node has power control to change the transmit power and control the transfer distance, and each node has sufficient computing power;

 (2) all nodes can communicate directly with each other, which also applies to nodes and the base station;

 (3) the sink nodes are fixed and far from the entire WSN. Energy consumption of the sink nodes is not considered in this study, as they are assumed to have sufficient energy supply; and

 (4) the nodes are stationary.

 The WSN is assumed to be

\(S=\left\{\text {Sensor}_{1}, \text { Sensor}_{2}, \cdots, \text { Sensor }\right\}\)       (1)

 The behavior of each sensor Sensori in the LEACH protocol can be described as in Eq. (2):

\( { Sensor }_{i}=({ Time, Head, Table, Communication})\)       (2)

 In the Sensori ,

 Time indicates a stable time slice, during which Sensori is in accordance with the current state; if it exceeds the time segment, then the sensor will consider adjusting the current state;

 Head indicates if the sensor is a cluster-head node;

 Table : If Sensori is cluster-head node, then Table is used to indicate position information of the remaining sensors in the cluster;

 Communication : If Sensori is cluster-head node, then Communication reflects communication between the sensor and the base station and other sensors in the cluster; if Sensori is not a cluster-head node, it only indicates communication between the sensor and corresponding cluster-head node.

 The LEACH protocol cycles through a cluster reconstruction process wherein each phase of the cycle can be described as a round. Each round is divided into two phases: establishment phase of the cluster (setup phase) and stable phase of the transmitted data (ready phase). To conserve resource overhead, the ready phase lasts longer than the setup phase. Fig. 1 shows the LEACH protocol operation cycle chart.

 

Fig. 1. LEACH protocol operation cycle diagram

2.2 Original Cluster-head Node Selection in LEACH

 In the setup phase, cluster-head node selection is based on the total number of cluster-head nodes required in the network and the number of times each node has become the cluster-head node so far. Options are that each sensor node randomly selects a value in [0, 1]; if the selected value is less than a certain threshold \(T(n)\) , then the sensor node will be a cluster-head node. The calculation method of \(T(n)\) is as follows:

\(T(n)=\left\{\begin{array}{ll} \frac{P}{1-P \times\left[r^{*} \bmod \left(\frac{1}{P}\right)\right]} & n \in G \\ 0 & n \notin G \end{array}\right.\)       (3)

\(P=\frac{l}{k}\)       (4)

 In Eq. (4), P denotes a percentage of the cluster-head node, l denotes the cluster-head nodes needed in the network, and k denotes the total number of sensor nodes. In Eq. (3), r is the current number of rounds; G is a set; 1/ P round has not been selected as a cluster-head node in the past; and mod is the modulo operator. After selecting the cluster-head node, the entire network is informed by broadcast.

 In the ready phase, sensor nodes transmit gathered data to the cluster-head node. The cluster-head node collects data from all nodes in the cluster and then transmits it to the base station.

2.3 Improved Selection of Cluster-head Nodes

 To ensure that each sensor node works as long as possible, after each cluster-head operating time Time , the cluster-head must be reselected, and the remaining sensors can be classified according to the cluster-head so each class (i.e., each cluster) contains only one cluster-head. Therefore, the choice of the cluster-head node will directly affect the performance of the algorithm. Cluster-head nodes tend to be randomly generated; however, this method can easily lead to the following adverse consequences:

 (1) Intra-cluster nodes become unevenly distributed near the cluster-head node (i.e., the distance variance between cluster nodes and the cluster-head node is larger), resulting in greater energy consumption; and

 (2) a long distance from the cluster-head node to the base station will affect the lifetime of the cluster-head.

 To avoid these defects, we introduce an intelligent optimization algorithm into cluster-head selection so the two defects can be reduced as much as possible to minimize energy consumption. In other words, we use an intelligent optimization algorithm to optimize the objective function of cluster Cj as follows:

\(\min \quad f=\alpha_{D} \cdot \operatorname{std}\left(C_{j}\right)+\left(1-\alpha_{D}\right) \cdot D_{j}\)       (5)

\(\operatorname{std}\left(C_{j}\right)=\frac{\sum_\limits{k=1}^{L_{j}} D_{j k}^{2}}{L_{j}}-\left(\frac{\sum_\limits{k=1}^{L_{j}} D_{j k}}{L_{j}}\right)^{2}\)       (6)

\(E\left(A v e_{j}\right)=\frac{\sum_\limits{i=1}^{k} E\left(C_{j i}\right)}{k}\)       (7)

 In Eq. (5), \(\alpha_{D} \in(0,1)\) is the weight, set at 0.8 in this experiment; and Dj is the Euclidean distance from the base station to the cluster-head node of cluster Cj . If Lj indicates the number of sensors contained in cluster Cj , then Djk represents Euclidean distance between the k sensor and the cluster-head in cluster Cj , and \(\operatorname{std}\left(C_{j}\right)\) represents the distance variance within the cluster Cj. \(\operatorname{std}\left(C_{j}\right)\) is explained in Eq. (6).

 In addition, to avoid premature energy depletion at some nodes, the cluster-head position is guaranteed to be larger than the average energy \(E\left(A v e_{j}\right)\) within the cluster. The average energy is calculated by Eq. (7), where k is the number of nodes in cluster Cj, and \(E\left(C_{j i}\right)\) is the residual energy of node i in cluster Cj.

 In the following parts, we use the modified intelligence algorithm to solve the identified optimization problems; the fitness function is shown above.

3. Proposed FTBA-TC-LEACH Routing Algorithm

3.1 Standard Bat Algorithm

 BA is a heuristic intelligent algorithm that simulates the principle of echolocation used in bat predation. BA has passed standard test functions and achieved good results for solving continuity optimization problems [45]. The single-objective unconstrained optimization problem is considered in this paper as Eq. (8):

\(\min f(\boldsymbol{x}),\left[\boldsymbol{x}=\left(x_{1}, x_{2}, \ldots, x_{k}, \ldots, x_{D}\right) \in E\right]\)       (8)

 Suppose there are n virtual bats, and the ith bat: \((i=1,2,3, \dots, N)\) is represented as Eq. (9):

\(<\boldsymbol{x}_{i}(t), \boldsymbol{v}_{i}(t), f_{i}(t), A_{i}(t), r_{i}(t)>\)       (9)

 where \(\boldsymbol{x}_{i}(t)=\left(x_{i 1}(t), x_{i 2}(t), \ldots, x_{i k}(t), \ldots, x_{i D}(t)\right)\) and \(\boldsymbol{v}_{i}(t)=\left(v_{i 1}(t), v_{i 2}(t), \ldots, v_{i k}(t), \ldots, v_{i D}(t)\right)\) are the position and velocity of the ith bat in generation t , respectively, with frequency \(fr_i(t)\), loudness \(A_i(t)\), and emission rate \(r_i(t)\) as the three required parameters. In the next generation, the velocity is updated as follows:

 

\(v_{i k}(t+1)=v_{i k}(t)+\left(x_{i k}(t)-p_{k}(t)\right) \cdot f_{i}(t),\)       (10)

 

 where \(\boldsymbol{p}(t)=\left(p_{1}(t), p_{2}(t), \ldots, p_{k}(t), \ldots, p_{D}(t)\right)\) is the best position found thus far by the entires warm. Eq. (10) can be viewed as a combination of the inertia \(v_{ik}(t)\) and the influence of \(p(t)\) . The frequency \(fr_i(t)\) is calculated as follows:

\(f r_{i}(t)=f r_{\min }+\left(f r_{\max }-f r_{\min }\right) \cdot r a n d_{1},\)       (11)

 where \(fr_{max}\) and \(fr_{min}\) are the maximum and minimum frequency values, respectively, and rand1 is a random number uniformly distributed within [0,1].

 To reflect the bat decision, the position changes with some randomness. Let rand2 be a random number uniformly distributed within [0, 1]; if \(r a n d_{2}<r_{i}(t)\) is satisfied, then the ith bat will execute the following global search pattern:

\(x_{i k}^{\prime}(t+1)=x_{i k}(t)+v_{i k}(t+1).\)       (12)

 Otherwise, the following local search pattern is adopted:

\(x_{i k}^{\prime}(t+1)=p_{k}(t)+\varepsilon_{i k} \cdot \bar{A}(t),\)       (13)

 where εik is a random number generated by a uniform distribution within [-1, 1], \(\bar{A}(t)\) is the average loudness of all bats, and

\(\bar{A}(t)=\frac{\sum_\limits{i=1}^{n} A_{i}(t)}{n}\)       (14)

After the \(\boldsymbol{x}_{i k}^{\prime}(t+1)=\left(x_{i 1}^{\prime}(t+1), x_{i 2}^{\prime}(t+1), \ldots, x_{i k}^{\prime}(t+1), \ldots, x_{i D}^{\prime}(t+1)\right)\) is obtained by Eq. (12) and Eq. (13), the new \(x_{i}(t+1)\) can be updated as follows:

\({x}_{i}(t+1)=\left\{\begin{array}{ll} {x}_{i}^{\prime}(t+1) & \text { if } \operatorname{rand}_{3}<A_{i}(t) \text { and } f\left({x}_{i}^{\prime}(t+1)\right)<f\left({x}_{i}(t)\right) \\ {x}_{i}(t) & \text { otherwise } \end{array}\right.\)       (15)

where rand3 is a random number generated by uniform distribution within [0 , 1]. Similar to CS, Eq. (15) implies that the position is updated only when the following two conditions are met: (1) a better position is obtained; and (2) the probability \(\operatorname{rand}_{3}<A_{i}(t)\) is satisfied. If the position of the ith bat is updated, then the corresponding loudness and emission rate \(r_i(t+1)\) are replaced as follows:

\(A_{i}(t+1)=\alpha A_{i}(t),\)       (16)

\(r_{i}(t+1)=r(0) \cdot\left(1-e^{-\gamma \tau}\right),\)      (17)

where α > 0 and γ > 0 are two predefined parameters, and A(0) and r(0) are two initial values for the loudness and emission rate, respectively.

The pseudo code of the standard BA is listed in Algorithm 1:

Algorithm 1: Standard bat algorithm

 

3.2 Curve Strategy with BA

 The local search of the BA is a perturbation strategy, and in the position update of generation t+1 , if bat i is selected for the local search, it will produce the following perturbation near the global optimal value:

\(x_{i k}(t+1)=p_{k}(t)+\varepsilon_{i k} \bar{A}(t)\)       (18)

 where εik is a random vector that satisfies the uniform distribution between (-1 , 1), and \(\bar{A}(t)\) is the average loudness of all bats at time t .0

 This strategy considers using a perturbation parameter \(\tau \cdot x_{\max }\) to replace the mean loudness \(\bar{A}(t)\) and allows the parameter τ(t) to decrease linearly as the evolution algebra increases, thus modifying Eq. (18) to

\(\boldsymbol{x}_{i}^{\prime}(t+1)=\boldsymbol{p}(t)+\boldsymbol{\varepsilon}_{i} \cdot \tau(t) \cdot x_{\max }\)       (19)

 Because εi obeys the random vector that satisfies the uniform distribution in (-1, 1), the support set of the disturbed individual will be centered on the group Optimal \(p(t)\) . The region of the radius \(\tau(t) x_{\max }\) is searched, and the parameter \(\tau(t)\) decreases linearly with an increase in the evolution algebra, after which the radius of the search region can be reduced gradually to improve the local search performance of the algorithm.

 Eq. (20) describes the descending strategy of disturbance parameter \(\tau(t)\) :

\(\tau(t)=\tau_{\max } \cdot\left[1-\left(\frac{\tau_{\max }-\tau_{\min }}{\tau_{\max } \cdot(L G-1)} \cdot(t-1)\right)^{k_{1}}\right]^{k_{2}}\)       (20)

 When \(k_{1}=1 \text { and } k_{2}=1\) , the formula is

\(\tau(t)=\tau_{\max } \cdot\left[1-\left(\frac{\tau_{\max }-\tau_{\min }}{\tau_{\max } \cdot(L G-1)} \cdot(t-1)\right)\right]\)       (21)

 In Eq. (20), t represents evolutionary generation, LG represents the largest evolution algebra, and the values of k1 and k2 determine different downward trends. Fig. 2 shows the curves produced by different combinations of k1 and k2 when the evolutionary algebra t equals 3000, \(\tau_{\max }\) takes 30%, and the lower bound \(\tau_{\min }\) takes 0.01%.

 

Fig. 2. Various curves of \(\tau(t)\) variation.

 Will different downward trends exert different effects on the algorithm? For example, if the decline in the early stage is slower and that in the later stage is slower, or slower in the early stage and faster in the later stage, can the performance of the algorithm be further improved?From this perspective, we discuss several declining curves of different parameters in this section.

 Fig. 2 shows that the combination of k1 and k2 can roughly produce four curves: when k1 = 1, k2 = 1 , it is a linear descending line; when k1 = 1 , k2 = 2,3,... , it is a concave curve; when \(k_{1}=2,3, \dots, k_{2}=1\) , it is a convex curve; and when \(k_{1}=2,3, \dots, k_{2}=2,3, \dots\) , it is a front convex back concave curve. In addition to the linearly declining line, the remaining three curves are a few more representative typical curves introduced in this paper. In the subsequent argument selection, we discuss the value of \(k_{1}=1 \text { and } k_{2}=1\) . To demonstrate convenience, the algorithm is called BA with curve parameter (BA-CP). The process is illustrated in Algorithm 2.

 The curve-decrease strategy algorithm is proposed based on the linear decline strategy. In the experimental section, we determine which curves perform better when \(\tau \in[0.01 \%, 30 \%]\) .

 In the next part, we combine the curve strategy with FTBA and propose FTBA-TC. Then, we modify LEACH with the new algorithm.

Algorithm 2: Bat algorithm with curve parameter

 

3.3 Proposed FTBA-TC-LEACH

 FTBA was proposed by Cai to effectively improve the global search performance. In this part, we will combine the curve strategy with FTBA and the proposed fast BA with triangle flip and curve strategy (FTBA-TC).

 In BA, when a better position is found, the position is updated to a more preferable one; when a better position is not found, the bats are suspended. Following this rule, Cui proposed a multiple triangle-flipping strategy to enhance the performance.

 (1) BA with directing triangle-flipping strategy (BA-DTFS);

 (2) BA with directing triangle-flipping strategy for all bats without conditions (BA-DTFS1);

 (3) BA with random triangle-flipping strategy (BA-RTFS);

 (4) BA with random triangle-flipping strategy for all bats without conditions (BA-RTFS1); and

 (5) BA with hybrid triangle-flipping strategy (BA-HTFS). Simulation results show that the BA-HTFS was superior, so we will use it as FTBA. In FTBA, the improved equations are shown below:

\(\boldsymbol{v}_{i}(t+1)=\left(\boldsymbol{x}_{m}(t)-\boldsymbol{x}_{u}(t)\right) \cdot f_{i}(t)\)       (22)

\(\boldsymbol{v}_{i}(t+1)=\left(\boldsymbol{p}(t)-\boldsymbol{x}_{m}(t)\right) \cdot f r_{i}(t)\)       (23)

\(x_{\mathrm{gk}}(t+1)=x_{\min }+\left(x_{\max }-x_{\min }\right) \cdot r a n d\)       (24)

 In the eauation (22), the \(\boldsymbol{x}_{\boldsymbol{m}}(t)\) and \(\boldsymbol{x}_{\boldsymbol{u}}(t)\) are the locations of two randomly selected individuals in the population, the \(f r_{i}(t)\) is the frequency of generation t , \(\boldsymbol{v}_{i}(t+1)\) means the velocity of the next generation. The equation has 50% probability that the algorithm canimprove performance, while the other half of the probability is used to improve the algorithm to jump out of the local extremum point. As for equation (23), \(p(t)\) is the the population previous best position, and other parameters are defined in the same way as equation (22). This equation is used to strengthen the local search capability in later stage. And equation (24), rand is a random number that satisfies a uniform distribution between \((0,1), x_{\max } \text { and } x_{\min }\) are the maximum and minimum values of the defined domain. \(x_{g k}(t+1)\) indicates the location of the next generation of k dimensions in the g bat. The equation (24) can have a certain probability to jump out of the local optimal.

 Algorithm 3 presents the process of FTBA-TC.

 

Algorithm 3: Fast bat algorithm with triangle flip and curve strategy

 During selection, the temporary cluster-head is generated first, the average residual energy in clusters is calculated, and then the modified BA is used to find the optimal position in the cluster. If the temporary node’s energy is more than the average energy, the node becomes the official head node and broadcasts the identity message; if the node energy is lower than the average energy, the algorithm waits for an official node. This process loops until all clusters are complete, and then the protocol enters the ready phase.

 We replace the original selection algorithm with the modified BA in the protocol and use the intelligent algorithm to select the best position of the cluster-head node. The post-fusion protocol can find the cluster-head node accurately in the cluster; simulation results in the final section indicate effectiveness.

 And Fig. 3 shows the algorithm flow of the LEACH protocol combined with the intelligent optimization algorithm.

 

Fig. 3. LEACH protocol flow chart with intelligent optimization algorithm.

4. Simulation Results and Analysis

 In this section, we verify the effectiveness of the proposed algorithm via the following experiments: (1) effectiveness of FTBA-TC on numerical optimization, and (2) effectiveness of FTBA-TC-LEACH. All experiments were implemented in MATLAB.

 

4.1 Tuning Performance

 To verify the performance of FTBA-TC, we compared the algorithm with others to solve the CEC 2013 dataset [46]. The experimental index and parameter settings are listed in Table 1. Among them, the population size, dimensions, independent operating times, fitness value evaluation times, search domain, and other parameters were set according to the requirements of the CEC2013 test set. The nonparametric tests we adopted included two methods, the Friedman test and Wilcoxon test. The Friedman test is used to detect differences in treatments across multiple test attempts, and the Wilcoxon test detects whether this algorithm was significantly different from others.

Table 1. Parameter settings for bat algorithm.

 

 The experimental environment is as follows, where the test function set and parameters were identical. For convenient analysis, we labelled the concave curve as CP1, the convex curve as CP2, and the front convex back concave curve as CP3. k1 and k2 values are shown in Table 2.

 (1) Experiment 1: Performance comparison of three curves.

 First, consider the values of k1 and k2 to determine which curve performance is superior. Table 2 shows the results of the Friedman test for these four settings; the performance of CP1 was best. The Wilcoxon test results in Table 3 reveal a significant difference between CP1 and the other three settings; hence, the performance of the concave-type search curve was excellent.

Table 2. Initial value test results of k1 and k2.

 

Table 3. Wilcoxon test results.

 

 (2) Experiment 2: Parameter selection of concave curve.

 The above experiments show that the concave curve improves the average performance of the algorithm, and the concave curve is affected by parameter k2 . Fig. 4 demonstrates the influence of four k2 values on the concave curve; therefore, this experiment addresses how to select the value of k2 . As the different concave curves are mainly embodied in the selection of k2, we define the following strategies according to the value of k2 : CP1-2, CP1-3, CP1-4, CP1-5, CP1-6, and CP1-7. The settings for these strategies appear in Table 4.

 Table 4 presents the Friedman test of these strategies, ranked from small to large: CP1-4 < CP1-3 < CP1-5 < CP1-2 < CP1-6 < CP1-7. The performance of CP1-4 was therefore better. According to the Friedman test results in Table 4, the rankings show that CP1-4 was superior. As indicated in the righthand column, significant differences were found between CP1-4 and CP1-6 and CP1-7 in the Wilcoxon test. Results show that performance of the CP1-4 algorithm to be optimal when the k1 = 1 and k2 = 4.

 

Fig. 4. Different shapes of concave curves.

Table 4. Different combinations and Friedman and Wilcoxon tests of k1 and k2 .

 

4.3 Effectiveness of FTBA-TC on Numerical Optimization

 The experiments were conducted in two parts: first, we compared the performance of the following three algorithms to verify whether FTBA-TC improved FTBA performance.

 (1) For FTBA, we set Threshold = 0.258;

 (2) for BA with curve strategy (CP1-4), we set k1 = 1 and k2 = 4; and

 (3) FTBA-TC.

 Table 5 shows the average error of these algorithms; w/t/l indicates that the performance of FTBA-TC was better. Table 6 presents the Friedman test for these algorithms, ranked as FTBA-TC < CP1-4 < FTBA, confirming that the FTBA-TC performance of these three algorithms was superior. The Wilcoxon test results in Table 7 indicate significant differences between FTBA-TC and the other two algorithms.

Table 5. 30-dimension mean comparison results.

 

Table 6. Friedman test results.

 

Table 7. Wilcoxon test results.

 

 Second, to further test the performance of the FTBA-TC algorithm, we compared it to the following four algorithms:

 (1) PSO [47];

 (2) PSO with time-varying accelerator coefficient (TVAC) [48];

 (3) CS [49];

 (4) Multi-strategy ensemble artificial bee colony algorithm (MEABC) [34].

 Table 8 lists the average error in the CEC2013 test set for these five algorithms. From the w/t/l perspective, the deviation of seven functions in PSO was less than that of FTBA-TC, and the deviation of the other 19 functions was greater than that of FTBA-TC. TVAC included 20 functions whose deviations were greater than FTBA-TC; CS had 22 functions worse than FTBA-TC; and even for MEABC, 15 functions of deviations were inferior to FTBA-TC. It can be seen from table that many test functions are one or more orders of magnitude better than other algorithms. In conclusion, the average performance of FTBA-TC was superior to the other four algorithms.

 Table 9 presents the Friedman test of five algorithms, ranked as FTBA-TC < MEABC < TVAC < CS < PSO, suggesting that the average performance of the FTBA-TC algorithm was superior to others. The average performance of PSO algorithm was worse than the other algorithms; the Wilcoxon test results in Table 10 highlight significant differences between FTBA-TC and the other algorithms except MEABC.

Table 8. 30-dimension mean comparison results.

 

Table 9. Friedman test results.

 

Table 10. Wilcoxon test results.

 

 

Fig. 5. The time cost of standard BA and FTBA-TC.

 As can be seen from the above Fig. 5, the improved BA consumes a little more time than the standard BA, but the accuracy is higher than the original BA and works better, so this improvement is worthwhile.

4.4 Effectiveness of FTBA-TC-LEACH

 To verify our improved LEACH protocol, we used the following algorithms for comparison:

 (1) Standard LEACH protocol;

 (2) LEACH protocol combined with standard BA (SBA-LEACH); and

 (3) LEACH protocol combined with fast BA with triangle flip and curve strategy (FTBA-TC-LEACH).

Table 11. Parameter setting of simulation experiment.

 

 The simulation environment was 100m × 100 m, in which sensor nodes were randomly distributed and the base station was at ( 50 , 50 ). Assume the base station has unlimited energy and does not consider communication conflicts or communication delay between nodes. Specific simulation parameters are shown in Table 11.

 Fig. 6 presents a comparison of the LEACH protocol, SBA-LEACH protocol, and FTBA-TC-LEACH protocol life cycle based on survival node numbers. Starting from the 800th generation, the survival point of the LEACH protocol began to decline sharply and was lowest, occurring mainly in the 800th-1300th generations. After 1300 generations, the survival point declined by less than the SBA-LEACH protocol and FTBA-TC-LEACH protocol. Since the 1800s, the degree of decline increased dramatically; hence, the LEACH protocol was deemed inferior to the other two protocols in terms of survival points. Compared with the SBA-LEACH protocol and FTBA-TC-LEACH protocol, the difference in the survival point of the FTBA-TC-LEACH protocol was greater than the SBA-LEACH protocol starting from the 1400th generation.

 Fig. 7 indicates that the residual energy of the LEACH protocol, SBA-LEACH protocol, and FTBA-TC-LEACH protocol demonstrated little difference before 1400 generations, but as the algebra continued to increase, the energy of the LEACH protocol was consumed rapidly. The rate of decline was much faster than in the SBA-LEACH protocol and FTBA-TC-LEACH protocol; the same was true for the SBA-LEACH protocol. As can be seen from Table 12, after 2000 generations, the number of nodes remaining in the FTBA-TC-LEACH protocol was highest, nearly twice that of the LEACH protocol and greater than the SBA-LEACH by approximately 37.5%. The total residual energy of the FTBA-TC-LEACH protocol was 1.63 times that of the LEACH protocol and 1.41 times that of the SBA-LEACH protocol; therefore, the performance of the FTBA-TC-LEACH protocol was superior.

Table 12. Comparison results of three protocols.

 

 

Fig. 6. Comparison of life cycle.

 

Fig. 7. Comparison of node residual energy.

5. Conclusion and Future Work

 LEACH is a well-known algorithm used in WSNs to reduce system energy costs. In this paper, we improved the cluster-head node selection in LEACH. Because the cluster-head node is selected randomly, the cluster-head node may be far from the base station and the remaining energy may be poorly distributed in the system, leading to premature node death. To solve this problem, we modified the BA to optimize cluster-head node selection and proposed a curve strategy with FTBA (FTBA-TC). FTBA-TC enhanced the local search ability based on FTBA and improved the global and local search capacity of BA. Three different curve shapes and six different parameter combinations were tested using experiments. The simulation of the FTBA-TC was superior to the otsher algorithms, namely PSO, TVAC, CS, and MEABC. Then, the algorithm was applied to the LEACH protocol. Experiments compared standard LEACH, SBA-LEACH, and FTBA-TC-LEACH, the latter of which was most effective.

 Using BA to solve pertinent WSN problems is important. Node localization is a key technology in WSNs, and least square algorithm has low localization precision. WANG Zhanbei [50] used the BA to solve this problem. To solve the node location error in WSNs, SHANG Junna [51] proposed a new multi-agent bat algorithm with favorable local searching ability. In our future work, we will use a modified BA for relevant problem optimization.

Acknowledgement

 This work is supported by the National Natural Science Foundation of China under Grant No.61806138, No.U1636220 and No.61663028, Natural Science Foundation of Shanxi Province under Grant No.201601D011045, PhD Research Startup Foundation of Taiyuan University of Science and Technology under Grant No.20182002.

References

  1. M. A. Zu-Chang, Y. N. Sun, and T. Mei, "Survey on wireless sensors network," Journal of China Institute of Communications, vol. 20, no. 7, pp. 1737-1880, 2004.
  2. V. Potdar, A. Sharif, and E. Chang, "Wireless Sensor Networks: A Survey," in Proc. of International Conference on Advanced Information Networking and Applications Workshops, pp. 636-641, 2009.
  3. F. Y. Ren et al., "Wireless Sensor Networks," Journal of Software, vol. 14, no. 7, p. 1282-1291, 2003.
  4. Z. Cui, F. Xue, X. Cai, Y. Cao, G. G. Wang, and J. Chen, "Detection of Malicious Code Variants Based on Deep Learning," IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3187-3196, 2018. https://doi.org/10.1109/TII.2018.2822680
  5. K. Akkaya and M. Younis, "A survey on routing protocols for wireless sensor networks," Ad Hoc Networks, vol. 3, no. 3, pp. 325-349, 2005. https://doi.org/10.1016/j.adhoc.2003.09.010
  6. S. Sharma and M. Kumar, "LEACH PROTOCOL: A Survey," International Journal of Computer Science & Communication Networks, vol. 5(4), pp. 228-232, 2015.
  7. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of Hawaii International Conference on System Sciences, vol. 2, pp. 10, 2000.
  8. A. Manjeshwar and D. P. Agrawal, "TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks," in Proc. of Parallel and Distributed Processing Symposium., Proceedings International, p. 189, 2002.
  9. S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in Proc. of Aerospace Conference Proceedings, vol. 3, pp. 3-1125-3-1130, 2003.
  10. H. U. Gang, D. M. Xie, and W. U. Yuan-Zhong, "Research and Improvement of LEACH for Wireless Sensor Networks," Chinese Journal of Sensors & Actuators, vol. 20, no. 6, pp. 1391-1396, 2007. https://doi.org/10.3969/j.issn.1004-1699.2007.06.043
  11. Y. Hu and J. Wang, "Analysis of LEACH Protocol Based on Ant Algorithm," Advanced Materials Research, vol. 287-290, no. 5, pp. 2830-2833, 2011. https://doi.org/10.4028/www.scientific.net/AMR.287-290.2830
  12. Z. Wei-hua, L. La-yuan, Z. Liu-min, and W. Xuan-zheng, "Energy Consumption Balance Improvement of LEACH of WSN," Chinese Journal of Sensors & Actuators, vol. 21, no. 11, pp. 1918-1922, 2008. https://doi.org/10.3969/j.issn.1004-1699.2008.11.023
  13. Z. Cui, Y. Cao, X. Cai, J. Cai, and J. Chen, "Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things," Journal of Parallel & Distributed Computing, 2018.
  14. L. I. Yan, X. H. Zhang, and L. I. Yan-Zhong, "Algorithm of cluster head multi-hops based on LEACH," Computer Engineering & Design, vol. 17, pp. 100-102, 2007.
  15. W. W. Niu and T. G. Gao, "Improvement algorithm for simulated annealing in LEACH-C protocol," Computer Engineering & Design, vol. 32, no. 6, pp. 1869-290, 2011.
  16. W. Lin and J. Pan, "ANT-LEACH:LEACH routing protocol integrated energy optimization by ant colony optimization in wireless sensor network," Journal of Computer Applications, vol. 31, no. 11, pp. 2891-2894, 2011. https://doi.org/10.3724/SP.J.1087.2011.02891
  17. D. X. Han, R. H. Zhang, and D. H. Liu, "PSO-based Double Cluster-heads Clustering Algorithm for Wireless Sensor Network," Computer Engineering, vol. 36, no. 10, pp. 100-102, 2010. https://doi.org/10.3969/j.issn.1000-3428.2010.10.033
  18. Wang et al., "Diversity enhanced particle swarm optimization with neighborhood search," Information Sciences, vol. 223, no. 2, pp. 119-135, 2013. https://doi.org/10.1016/j.ins.2012.10.012
  19. J. Jiang, "An improved LEACH protocol in wireless sensor networks," Journal of Soochow University, vol. 01, pp. 4-8, 2011.
  20. S. Sadeghiram, "Bacterial foraging optimisation algorithm, particle swarm optimisation and genetic algorithm: a comparative study," International Journal of Bio-Inspired Computation (IJBIC), vol. 10, no. 4, pp. 275-282, Nov 2017. https://doi.org/10.1504/IJBIC.2017.087923
  21. W. A. K. R. B. S. L. J. Venstrom, "A parameter estimation method for stiff ordinary differential equations using particle swarm optimisation," International Journal of Computing Science and Mathematics (IJCSM), vol. 9, no. 5, pp. 419-432, Sep 2018. https://doi.org/10.1504/IJCSM.2018.095506
  22. S. Okdem and D. Karaboga, "Routing in Wireless Sensor Networks Using Ant Colony Optimization," in Proc. of Nasa/esa Conference on Adaptive Hardware and Systems, ed, pp. 401-404, 2006.
  23. P. Stodola and J. Mazal, "Applying the ant colony optimisation algorithm to the capacitated multi-depot vehicle routing problem," International Journal of Bio-Inspired Computation (IJBIC), vol. 8, no. 4, pp. 228-233, 2016. https://doi.org/10.1504/IJBIC.2016.10000256
  24. M. Z. Y. Zhang, "Ant colonial-based approach for the minimal full trie problem," International Journal of Bio-Inspired Computation (IJBIC), vol. 9, no. 4, pp. pp.235-239, May 2017. https://doi.org/10.1504/IJBIC.2017.084331
  25. J. L. L. K. G. Y. T. Zhang, "Ant colony optimisation for the routing problem in the constellation network with node satellite constraint," International Journal of Bio-Inspired Computation (IJBIC), vol. 10, no. 4, pp. 267-274, Nov 2017. https://doi.org/10.1504/IJBIC.2017.087919
  26. A. G.-P. J. D. S. D. Camacho, "Solving strategy board games using a CSP-based ACO approach," International Journal of Bio-Inspired Computation (IJBIC), vol. 10, no. 2, pp. 136-144, july 2017. https://doi.org/10.1504/IJBIC.2017.085892
  27. R. H. C. M. X. J. Q. X. L. Qi, "Optimisation of dangerous goods transport based on the improved ant colony algorithm," International Journal of Computing Science and Mathematics (IJCSM), vol. 8, no. 3, pp. 210-217, Jul 2017. https://doi.org/10.1504/IJCSM.2017.085738
  28. Z. Cui, B. Sun, G. Wang, Y. Xue, and J. Chen, "A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber-physical systems," Journal of Parallel & Distributed Computing, vol. 103, pp. 42-52, 2017. https://doi.org/10.1016/j.jpdc.2016.10.011
  29. X. S. Yang and S. Deb, "Engineering Optimisation by Cuckoo Search," International Journal of Mathematical Modelling & Numerical Optimisation, vol. 1, no. 4, pp. 330-343, 2010. https://doi.org/10.1504/IJMMNO.2010.035430
  30. Z. Cui, B. Sun, G. Wang, Y. Xue, and J. Chen, "A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber-physical systems," Journal of Parallel and Distributed Computing, vol. 103, pp. 42-52, 2017. https://doi.org/10.1016/j.jpdc.2016.10.011
  31. M. Zhang, H. Wang, Z. Cui, and J. Chen, "Hybrid multi-objective cuckoo search with dynamical local search," Memetic Computing, no. 10, no. 2, pp. 199-208, 2018. https://doi.org/10.1007/s12293-017-0237-2
  32. W.-H. Y. J.-R. L. Y. Zhang, "A new local-enhanced cuckoo search algorithm," International Journal of Computing Science and Mathematics (IJCSM), vol. 8, no. 2, pp. 175-182, Apr 2017. https://doi.org/10.1504/IJCSM.2017.083756
  33. D. Karaboga, "An Idea Based on Honey Bee Swarm for Numerical Optimization," TECHNICAL REPORT-TR06, 2005.
  34. H. Wang, Z. Wu, S. Rahnamayan, H. Sun, Y. Liu, and J. S. Pan, "Multi-strategy ensemble artificial bee colony algorithm," Information Sciences, vol. 279, pp. 587-603, 2014. https://doi.org/10.1016/j.ins.2014.04.013
  35. N. S. J. M.-S. A. G. Abro, "Robust variant of artificial bee colony (JA-ABC4b) algorithm," International Journal of Bio-Inspired Computation (IJBIC), vol. 10, no. 2, pp. 99-108, July 2017. https://doi.org/10.1504/IJBIC.2017.085896
  36. S. Z. Y. Z. Z. Z. D. Z. H. Zhang, "Comparative analysis of selection schemes used in artificial bee colony algorithm," International Journal of Computing Science and Mathematics (IJCSM), vol. 8, no. 3, pp. 218-227, Jul 2017. https://doi.org/10.1504/IJCSM.2017.085739
  37. X. Y. Y. M. Z. Liu, "An improved artificial bee colony algorithm for solving parameter identification problems," International Journal of Computing Science and Mathematics (IJCSM), vol. 8, no. 6, pp. 570-579, Dec 2017. https://doi.org/10.1504/IJCSM.2017.088971
  38. M. D. Y. B. Y. Wang, "A membrane-inspired quantum bee colony optimisation based on simulated quantum gate and its applications," International Journal of Computing Science and Mathematics (IJCSM), vol. 8, no. 5, pp. 465-474, Nov 2017. https://doi.org/10.1504/IJCSM.2017.088019
  39. X. S. Yang, "A New Metaheuristic Bat-Inspired Algorithm," Nature Inspired Cooperative Strategies for Optimization (NICSO 2010), vol. 284, pp. 65-74, 2010. https://doi.org/10.1007/978-3-642-12538-6_6
  40. X. Cai, X. Z. Gao, and Y. Xue, "Improved bat algorithm with optimal forage strategy and random disturbance strategy," International Journal of Bio-Inspired Computation (IJBIC), vol. 8, no. 4, 2016.
  41. F. L. Zhihua Cui, Wensheng Zhang, "Bat Algorithm with Principal Component Analysis," International Journal of Machine Learning and Cybernetics, 2018.
  42. N. M. Y. M. O. Tokhi, "A modified bats echolocation-based algorithm for solving constrained optimisation problems," International Journal of Bio-Inspired Computation (IJBIC), vol. 10, no. 1, pp. 12-23, July 2017. https://doi.org/10.1504/IJBIC.2017.085335
  43. L. Li and Y. Zhou, "A novel complex-valued bat algorithm," Neural Computing & Applications, vol. 25, no. 6, pp. 1369-1381, 2014. https://doi.org/10.1007/s00521-014-1624-y
  44. X. Cai, H. Wang, Z. Cui, J. Cai, Y. Xue, and L. Wang, "Bat algorithm with triangle-flipping strategy for numerical optimization," International Journal of Machine Learning & Cybernetics, vol. 9, no. 2, pp. 199-215, 2017. https://doi.org/10.1007/s13042-017-0739-8
  45. L. I. Zhi-Yong, M. A. Liang, H. Z. Zhang, and S. O. Management, "Application of Bat Algorithm in Multi-Objective and Multi-Choice Knapsack Problem," Computer Simulation, vol. 30, no. 10, pp. 350-353, 2013.
  46. J. J. Liang, B. Y. Qu, and P. N. Suganthan, "Problem definitions and evaluation criteria for the CEC 2013 special session and competition on real-parameter optimization," Technical Report 201212 Computational Intelligence Laboratory, Zhengzhou University, Zhengzhou China And Technical Report, Nanyang Technological University, Singapore, January, 2012.
  47. Y. E. R. C. Shi, "A modified particle swarm optimizer," in Proc. of 1998 IEEE International Conference on Evolutionary Computation Proceedings. IEEE World Congress on Computational Intelligence(no. 98TH8360), pp. 69-73, 4-9 May 1998.
  48. A. Ratnaweera, S. K. Halgamuge, and H. C. Watson, "Self-organizing hierarchical particle swarm optimizer with time-varying acceleration coefficients," in Proc, of IEEE Transactions on Evolutionary Computation, vol. 8, no. 3, pp. 240-255, 2004. https://doi.org/10.1109/TEVC.2004.826071
  49. X. S. Yang and S. Deb, "Cuckoo Search via Levy Flights," 2009 World Congress on Nature & Biologically Inspired Computing, pp. 210-214, January 2010.
  50. Z. Wang, "Node localization of wireless sensor networks based on bat algorithm," Computer Engineering & Applications, vol. 11, pp. 90-94, 2014.
  51. J. Shang, C. Liu, K. Yue, and L. I. Lin, "The Multi-Agent Bat Algorithm Applied to Wireless Sensor Networks," Chinese Journal of Sensors and Actuators, vol. 9, pp. 1418-1424, 2015.

Cited by

  1. A many-objective optimization WSN energy balance model vol.14, pp.2, 2019, https://doi.org/10.3837/tiis.2020.02.003
  2. A Gaussian error correction multi‐objective positioning model with NSGA‐II vol.32, pp.5, 2019, https://doi.org/10.1002/cpe.5464
  3. An improved energy‐low clustering hierarchy protocol based on ensemble algorithm vol.32, pp.7, 2020, https://doi.org/10.1002/cpe.5575
  4. Research on Low-energy Adaptive Clustering Hierarchy Protocol based on Multi-objective Coupling Algorithm vol.14, pp.4, 2020, https://doi.org/10.3837/tiis.2020.04.003