Essay:

Essay details:

  • Subject area(s): Engineering
  • Price: Free download
  • Published on: 7th September 2019
  • File format: Text
  • Number of pages: 2

Text preview of this essay:

This page is a preview - download the full version of this essay above.

Artificial Intelligence and Ant colony optimization based wireless sensor network to minimize energy of network

Ms. Sneha Suhas More                     Prof. Mininath K. Nighot

Computer Engineering Department Computer Engineering Department

K.JCOEMR, Pune, India               K.JCOEMR, Pune, India

[email protected]                           [email protected]

Abstract:

 Energy consumption and network lifetime are the major concerns in wireless sensor network. So for minimizing the energy of network and increasing the network lifetime, the ant colony optimization algorithm is proposed. Firstly, all the stages of Wireless sensor network such as node placement, network coverage, clustering and data aggregation and routing is optimized by Genetic algorithm. Secondly, the proposed algorithm focuses on two parameters i.e. energy consumption and network lifetime. In Ant swarm algorithm, EAAR (Energy-aware ant-based routing) and ANTHOCNET (Adaptive nature-inspired algorithm for routing in mobile ad hoc networks) protocols are used to minimize the energy of overall network and to follow the shortest path to reach to the destination. These protocols are also used to find the number of dead nodes due to which network lifetime increases. Lastly, APTEEN protocol with threshold energy finds the number of dead nodes by draining threshold energy to 50% and with maximum energy cluster head is selected. Results of EAAR, ANTHOCNET, APTEEN and proposed protocol (APTEEN with threshold energy) are analyzed in which proposed algorithm shows better results than APTEEN protocol where energy consumption is reduced from 90% to 60%.

Keywords: Artificial Intelligence, Ant colony optimization, Wireless sensor network, Network lifetime.

Introduction:

A wireless sensor network is the network of sensor node without wired communication between the nodes. A wireless sensor network (WSN) typically consists of a sink node sometimes referred to as a base station and a leaf node says small sensor node. The base station is assumed to be secure with unlimited available energy while the leaf nodes are assumed to be unsecured with limited available energy. The sensor nodes including cluster node, leaf node monitor a geographical area and capture data say Sensory information. The Same information is communicated to the sink node through secure wireless mesh networks. To conserve energy this information is aggregated at intermediate sensor nodes say cluster head by applying a suitable aggregation function collected data across from the whole network. The intention behind aggregation is to reduce the amount of network traffic which helps to decrease energy consumption on sensor nodes. Providing security to aggregate data in wireless sensor networks is known as secure data aggregation in WSN. The wireless sensor networks stages such as node placement, network coverage, clustering, data aggregation and routing by using a genetic algorithm can be optimized. And by using ant colony optimization these stages gives optimized results with efficiency, accuracy, and speed. In Ant colony optimization, this ant swarm algorithm used for optimization of wireless sensor networks. And EAAR protocol is used is used to maximize the network lifetime and for data routing in WSN. Also modified APTEEN gives the number of dead nodes by threshold energy drained to 50%.

Wireless sensor networks (WSN), sometimes called wireless sensor and actuator networks (WSAN), are spatially distributed autonomous sensors to watch physical or environmental conditions, like temperature, sound, pressure, etc. and to hand and glove pass their information through the network to the main location. The lot of trendy networks square measure bi-directional, conjointly facultative management of sensing element activity. The event of wireless sensing element networks was actuated by military applications like a parcel of land surveillance; these days such networks square measure utilized in several industrials and shopper applications, like process observance and management, machine health observance, and so on.

Wireless sensors are of low cost, so in many applications, they are not tampering resistant. It is composed of small, low cost, low power nodes. It is used for transferring data to the destination sink node without tampering. It is used to increase Packet Delivery Ratio (PDR) for real-time applications. It also decreases extra computation overhead for efficiency.  In the wired network that- it has high costs for the communication between networks.  The motivation from above concern is that the Wireless Sensor networks- kill the high cost of the wired network. Optimization of various stages of WSN can be easily optimized from artificial intelligence techniques.

Literature Survey:

A literature survey or a literature review in a project is that section which shows the sundry analyses and research made in the field of your interest and the results already published, taking into account the various parameters of the project and the extent of the project.

A.H. Mohamed, K.H. Marzouk in 2015 focuses on energy consumptions in WSN. The author introduces a new system that uses a genetic algorithm (GA) for optimizing the node deployment, node locations and dividing the sensor nodes into two form of operation that can minimize the energy consumption of the WSN. Recommended system has been applied for a simulated WSN used in the radiation discovering sites as proof of concept in industry standard [1]. The energy consumption is the major concern in WSN so to minimize the energy of network [6-7] explains about optimizing the energy consumption and the energy-efficient coverage in WSN by using the Genetic algorithm. All the issues of coverage, connectivity, and energy consumption are solved in [6-7]. But at the lower bound the performance is not optimal. Authors Mohammed Abo-Zahhad et al [8] explains about network lifetime and stable period of WSN. GAEEP protocol is used to increase the reliability of clustering process. It is difficult to recharge the batteries due to network lifetime cannot be achieved.

Sneha More, et al [3] focuses on optimization of WSN stages and also the energy consumption parameter. The author explains about the artificial intelligence techniques which optimizes the stages of WSN and for more accuracy APTEEN protocol is used. Ajit A. Chavan, et al [4] focuses on energy consumption and throughput of the network. COAPs and COAPs+RPK protocols are used to compare energy and throughput due to which energy consumption of nodes, memory requirement, network response and authentication interoperability is efficient. Mininath Nighot et al [5] explain about the GDCP protocol in which energy efficient routing is achieved using local communication among sensor nodes. The simulated results show the overall energy of network that is improved. This technique cannot be worked in a mobile sensor network.

Sohail Jabbar, et al [9] focuses on the energy consumption of WSN. EASARA (Energy-aware simple Ant routing algorithm) improves the route discovery procedure and mainly concentrate on energy efficient forwarding node and route selection so that the network lifetime can be increased. In M2M, IOT, Cyber-physical systems this technique is not used so encryption method can be used. Authors Gurjeet Singh, Er. Karandeep Singh [10] explains about the modified APTEEN routing protocol. A modified clustering technique is introduced with a variable value of threshold energy for nodes to aggregate and transmit data is utilized. The variable value withal modifies the cluster head selection, where energy utilization is improved. The improvement in energy efficiency and lifetime comes at the cost of an increase in complexity of the protocol. This protocol cannot use in mobility.

Arati Manjeshwar, et al [11] gives a detailed explanation of the APTEEN protocol. In APTEEN (Adaptive Periodic Threshold-sensitive Energy Efficient Sensor Network Protocol), when best features of both proactive and reactive networks combine then it provides periodic data collection as well as near real-time warnings about critical events. This protocol is mainly used for energy consumption of network. Charles E. Perkins, et al [12] explains about Ad-hoc On-Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc networks. Each Mobile Host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) with little or no reliance on periodic advertisements [12]. Our incipient routing algorithm is quite opportune for a dynamic self-starting network, as required by users wishing to utilize ad-hoc networks. AODV provides loop-free routes even while rehabilitating broken links. A route to a destination may be returned by any intermediate node [12]. Link breakages are reported immediately, and routes are expeditiously re-established. Dormant routes are expeditiously aged out of the system because they are more liable to go stale. This technique cannot work in various interconnection topologies with fixed networks.

Problem Definition:

To optimize the stages of wireless sensor networks i.e. node placement, network coverage, clustering, data aggregation and routing using a genetic algorithm for grid architecture and to overcome its limits the ant colony optimization algorithm is proposed. ACO can be worked on grid architecture for the balancing energy consumption and the proposed protocol is used to maximize network lifetime.

System Architecture:

   

Fig.1. System Architecture

The above system architecture i.e. Fig.1 describes the whole system which includes the 5 stages of WSN i.e. node placement, network coverage, clustering, data aggregation and routing. In above diagram, the main communication is going to start from the sink node i.e. Base Station (BS). Using this base station, the further communication is going to held in between the cluster heads and cluster members. Cluster members send data to the cluster head (CH) and one CH will send to another and finally, by following the shortest path or routing protocol, data is received by the base station. In node placement, the nodes are optimized easily because the nodes are placed as particles. In clustering, the cluster heads are used to optimize and to send the data to sink node i.e. base station, who behaves as the coverage of the network, and with the help of cluster members the broadcasting is done easily, the clustering can be achieved by APTEEN protocol. The data aggregation can be used to load balance, passing message from one node to other by using the genetic algorithm. And the last stage i.e. routing can be obtained in the data aggregation stage where we need to send the data in the minimum distance.

APTEEN Protocol

The APTEEN (Adaptive periodic threshold sensitive energy efficient sensor network) protocol is the most advantageous protocol to form the clustering with the help of cluster heads. A responsive network protocol called APTEEN is Adaptive periodic threshold sensitive energy efficient sensor network protocol. Hybrid Networks join the best components of proactive and reactive networks while minimizing their disadvantages. Nodes in such a network transmit information periodically at moderately longer intervals while in the meantime transmitting information when the detected esteem goes past its threshold. In this manner, the sensor energy is utilized effectively by decreasing the number of transmissions of noncritical information.

The client can change the periodicity, the threshold value(s) and the parameter to be detected in various regions. This network can copy either the proactive or the reactive network by reasonably changing the periodicity or threshold values. Along these lines, this network can be utilized as a part of an application by appropriately setting the different parameters. In any case, this adaptability and flexibility increase the complexity at the sensor. Here a new protocol APTEEN (Adaptive Periodic Threshold-sensitive Energy Efficient sensor Network Protocol) is presented for hybrid networks. There are applications in which the client needs time basic information furthermore needs to inquiry the system for examination of conditions other than gathering time basic information. As it were, the client may require a system that response quickly to time basic circumstances and gives a general picture of the network at periodic intervals, with the goal that it can answer examination inquiries.

APTEEN can consolidate the best components of proactive and reactive networks while minimizing their restrictions to make another type of network called a hybrid network. In this network, the nodes not just send data periodically; they additionally react to sudden changes in attribute values. Along these lines, it acts as a proactive protocol and additionally reactive protocol.

System Overview

The following Five steps which show us actual network creation and network optimization in the Genetic algorithm:-

1) Node Placement

Node placement is the placement of the node in the network to ensure that system keeps running with the most noteworthy practical execution, the nodes are situated on the grounds organizes as shown in Fig.2.

  

                Fig.2. Node placement

2) Network Coverage

Network Coverage is the term particularly inferred for keeping up and measuring the physical areas of networks. Really Network Coverage intends to associate the network indiscriminately and exactly so all network siblings get associated with Sink node say base station for network message correspondence as shown in Fig.3.

               Fig.3. Network coverage

3) Clustering

For making the networks very load balance clustering come into the picture. By utilizing fitness function, the clustering can be accomplished. Clustering is the stage in which packet forwarding problems are easily solved. When packet forwarding method is used, the time, energy, delay, and packet delivery ratio entities are more so to avoid these problems clustering is proposed as shown in Fig.4.

              

         Fig.4. Clustering

4) Data Aggregation

Data Aggregation makes it simple to gather every single sensible data from all networks including all clusters and his cluster member. Data Aggregation certifications to convey exact information to sink node say base station. Another pour stance is to dole out or choose load to the node in the network as shown in Fig.5. Additionally, help GA to make the load balance network.

5) Routing

At long last from fitness function, routing protocol takes some parameter to pick the optimum route to travel to every part of the entire WSN. Regularly routing fitness function consider three conditions of energy they are called

a) Low communication range

b) Middle communication range

c) High communication range

    Using above range routing algorithm decide the route to travel toward sink node.

 

             Fig.5. Data aggregation and routing

Hence, these are the stages of wireless sensor network which can be optimized by using the ant colony optimization.

Proposed work:

The stages of wireless sensor networks such as node placement, network coverage, clustering, data aggregation and routing can be optimized by proposed work i.e. Ant colony optimization algorithm. Whereas balancing of energy consumption and increasing the network lifetime can be achieved by using ACO and EAAR protocol.

An ant colony optimization algorithm gives us objectives:-

ï‚— For data aggregation and routing of the network where EAAR protocol used for routing.

ï‚— To balance the energy consumption and to increase the network lifetime.

Ant colony optimization (ACO) is a population-predicated meta-heuristic that can be acclimated to find approximate solutions to arduous optimization problems.

In ACO, a set of software agents called artificial ants search for good solutions to a given optimization problem. To apply ACO, the optimization problem is transformed into the quandary of finding the best path on a weighted graph. The artificial ants (hereafter ants) incrementally build solutions by moving on the graph. The solution construction process is stochastic and is partial by a pheromone model, that is, a set of parameters associated with graph components (either nodes or edges) whose values are modified at runtime by the ants.

The ACO meta-heuristic is:

Set parameters, initialize pheromone trails

SCHEDULE_ACTIVITIES

  ConstructAntSolutions

  DaemonActions    {optional}

  UpdatePheromones

END_SCHEDULE_ACTIVITIES

Ant Colony Optimization Algorithm:-

Step 1: Initialize

Pheromone trail

Step 2: Iteration

Repeat for each ant

Solution construction using pheromone trail

Update the pheromone trail

Until stopping criteria

Algorithm EAAR [2]

Input:

The following blank tables of all nodes are input:

(1) The neighbor table: A table containing all nodes in the neighborhood of a node.

(2) Seen table: A table containing all packets received by a node and their paths.

(3) Routing table: A table containing next hop to transfer packets.

Initial pheromone for all nodes = 0.

Output:

Updated tables with all the values required to transmit data.

Pheromone value for selected nodes.

Steps:

1. Broadcast all the request packets and initialize a “seen” set S of every node as NULL.

2. On receiving any route request:

for all routes Ri in S of node check:

if the route traveled by the request is not a superset of the Ri

if the route is a subset of Ri OR the hop count is less than 1.5 times the highest in the set S:

add a route in set S and rebroadcast it.

else

discard it

3. On reaching the destination, the route request is converted to the route reply, the path traveled is returned to, and the pheromone PH in the routing table of each node of the path is added.

PH= MBR/HOPS

4. When the source receives the first reply, the delay of the first packet is made 5 times in order to receive more packets and the routing table is updated.

5. Data transmission is initiated with each packet, selecting next hop with probability Pnd from all available, by taking the pheromone values from routing table.

6. On each transmission, the pheromone is reinforced and others are evaporated.

7. On link failure, Step 1 is repeated from the node that has data to send, but no neighbors available.

Own Contribution:

In APTEEN, find the number of dead nodes when one node’s energy becomes zero. And this would be compared with own work is contributed in:

 We will set the threshold energy to 50% and will check the dead nodes when one node’s energy becomes zero. This method would be compared with the simple APTEEN protocol with various parameters that can be shown by the graph.

Proposed Algorithm:

1. Initialize all the variables and threshold energy=50.00 Joules

2. Calculate the energy of all the nodes which is in the range and also its neighbor nodes.

3. Compare one node’s energy (val) with neighbor node’s energy (nb_val)

a) if val is greater than nb_val then select val.

4. Now compare this val and threshold energy, if that val is less than threshold energy then select val as a cluster head.

5. Now check cluster head is present in neighboring hops, if not then exit

6. Else send cluster head to announce message.

By using this proposed algorithm, a number of dead nodes are obtained by which the network lifetime can be calculated. Whereas in APTEEN protocol, dead nodes cannot occur by which network lifetime is not evaluated. This proposed protocol is 90% better than APTEEN protocol.

Results Analysis:

Comparison of APTEEN, proposed protocol, EAAR and ANTHOCET protocols has been shown by the graph in NS2. The graphs are of the number of dead nodes, energy consumed per delivery packets, the number of packets dropped, dead nodes received packets, the number of packets delivered. The comparison shows us that EAAR protocol is the most appropriate technique used for optimization as well as the enhancement of network lifetime.

Fig.6 shows graph of a number of dead nodes, in which there are less number of dead nodes in EAAR protocol and more number of dead nodes in proposed protocol due to which network lifetime can be calculated.

               Number of dead nodes=one node’s energy is zero       â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦... (1)

In Fig.7, energy consumed per delivered packets of all the protocols are compared, in which maximum energy is consumed in APTEEN and minimum energy is consumed in EAAR protocol.

The energy consumed per delivered packets can be calculated by using the below formula:-

Energy consumed=Total energy/nodes            â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦..…. (2)

Energy consumed per delivered packets=Energy consumed/received packets.  â€¦â€¦â€¦. (3)

Where number of delivered packets (recv) is calculated if-

          recv==0 then 1 else recv

Fig.6. Number of dead nodes           Fig.7. Energy consumed per delivered packets

Fig.8 shows graph of a number of packets dropped. A maximum number of packets is dropped in APTEEN protocol, then less in proposed protocol and minimum packets are dropped in EAAR protocol.

            No. of packets dropped=send-recv   â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦. (4)

   Where send is calculated from the trace file of the network.

Dead node received packets graph is shown in Fig.9. Here, maximum dead node packets are received in APTEEN and minimum dead nodes are received in EAAR protocol.  

Dead nodes received packets is calculated from trace file of the network.    â€¦â€¦â€¦â€¦â€¦â€¦. (5)

   

 Fig.8. Number of packets dropped Fig.9. Dead nodes received packets

In Fig.10, a number of packets delivered in all the protocols are compared. A maximum number of packets is delivered in EAAR protocol and minimum packets are delivered in APTEEN protocol.

       Number of delivered packets (recv) is calculated if-

                     recv==0 then 1 else recv             â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦â€¦.. (6)

          

      Fig.10. Number of packets delivered

These above results are used to optimize the stages of Wireless sensor networks. It is used to balance the energy consumption. It is also used to increase the network lifetime. The EAAR protocol is used to select the cluster head and to send data to base station in minimum time by following the routing mechanism. In less time, to aggregate the data and to reach the base station by following the shortest path through a routing protocol.

Conclusion:

The proposed protocol (APTEEN with threshold energy) provides the network lifetime and that is increased as compared with APTEEN protocol. To get more than 90% network lifetime, EAAR protocol is implemented and it shows better results than APTEEN protocol. Also, all the stages of the Wireless sensor network are optimized using the Genetic algorithm. The main concern of energy consumption and network lifetime has been solved by using two protocols, for energy consumption-EAAR protocol is proposed and for network lifetime- EAAR and proposed protocol is obtained. These results give 80-90% accuracy as compared with the existing system.

Future Scope

In future, this technique can be work on the security of sending and receiving the nodes to the base station where data can be sent in encryption format and receive in decryption format.

References:

[1] Ali Norouzi and A. Halim Zaim, “Genetic Algorithm Application in Optimization of Wireless Sensor Networks”, In: Hindawi Publishing Corporation, The Scientific World Journal Volume 2014.

[2] Sudip Misra, Sanjay K. Dhurandher, Mohammad S. Obaidat, Pushkar Gupta, Karan Verma, Prayag Narula, “An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks”, The Journal of Systems and Software 83 (2010) 2188–2199

[3] Sneha More, Prof. Mininath Nighot, “Survey paper on Optimization of Wireless Sensor Networks using Artificial Intelligence Techniques”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 12, December 2016

[4] Ajit A. Chavan, Mininath K. Nighot, “Secure and Cost-effective Application Layer Protocol with Authentication Interoperability for IOT”, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015

[5] Mininath Nighot, Ashok Ghatol, “GPS based Distributed Communication Protocol for Static Sensor Network (GDCP)”, International Conference on Information Security & Privacy (ICISP2015), 11-12 December 2015

[6] A.H. Mohamed, K.H. Marzouk, “Optimizing the Energy Consumption of Wireless Sensor Networks”, In: International Journal of Applied Information Systems (IJAIS) Volume 10 – No.2, December 2015.

[7] Neeraj Jaggi and Alhussein A. Abouzeid, “Energy-Efficient Connected Coverage in Wireless Sensor Networks”, 2007.

[8] Mohammed Abo-Zahhad, Sabah M. Ahmed, Nabil Sabor and Shigenobu Sasaki, “A New Energy Efficient Adaptive Clustering Protocol Based on Genetic Algorithm for Improving the Lifetime and the Stable Period of Wireless Sensor Networks”, In: International Journal of Energy, Information and Communications Vol.5, Issue 3 (2014)

[9] Sohail Jabbar, Rabia Iram, Muhammad Imran, Awais Ahmad, Anand Paul, Abid AliMinhas, andMohsin Iftikhar, “Energy Aware Simple Ant Routing Algorithm for Wireless Sensor Networks”, Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2015, Article ID 194532, 11 pages.  

[10] Gurjeet Singh, Er. Karandeep Singh, “Modified Cluster Head Selection to Improve the Energy Efficiency of APTEEN Routing Protocol”, International Journal of Innovations & Advancement in Computer Science IJIACS, Volume 5, Issue 7 July 2016

[11] Arati Manjeshwar and Dharma P. Agrawal, “APTEEN: A Hybrid Protocol for Efficient Routing and Comprehensive Information Retrieval in Wireless Sensor Networks”, In: IEEE, Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS.02) 1530-2075, Vol. 02, 2002.

[12] Charles E. Perkins, Elizabeth M. Royer, “Ad-hoc On-Demand Distance Vector Routing”

...(download the rest of the essay above)

About this essay:

This essay was submitted to us by a student in order to help you with your studies.

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, . Available from:< https://www.essaysauce.com/essays/engineering/2017-5-6-1494070189.php > [Accessed 17.10.19].