Professional Documents
Culture Documents
Using Voronoi Diagram and Genetic Algorithm To Deploy Nodes in Wireless Sensor Network
Using Voronoi Diagram and Genetic Algorithm To Deploy Nodes in Wireless Sensor Network
3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
Abstract- A wireless sensor network (WSN) is a large- directly to optimization of resources in a field. In
scale ad-hoc multi-hop network deployed (usually, at wireless sensor network, sensors may be deployed
random) in a region of interest for surveillance purpose. either randomly or deterministic, depending upon the
Coverage is one of the important aspects of wireless application [3]. Deployment in a battlefield or
sensor networks and many approaches introduced to hazardous areas is generally random whereas the
maximize it. In this paper, a novel approach for deterministic deployment is preferred in amicable
maximizing coverage proposed. Voronoi diagram environments Also it is possible to use multi-robot
divides the field into cells and inside of each cell some systems to fulfill this task [4]. In most applications a
holes exist. Different number of additional nodes must random deployment is required and sensor nodes
be placed inside cells to cover the holes because voronoi usually scatter from an aircraft. In random
cells have different sizes. Genetic algorithm is used to deployment method sensor density is not equal in
determine best places for additional nodes to maximize different regions so some regions could not be
the coverage. The proposed algorithm is distributed and covered because of lack of sensor nodes in that
optimization for each voronoi cell can be done in parallel
region. These uncovered areas are called coverage
holes. The coverage is one of most important
to others. Optimal placement of nodes can guarantee the
problems in WSN. There are different strategies for
maximum coverage with less number of nodes and
solving coverage problem which are categorized into
energy consumption decreases. Simulations results show
three groups, namely; force based, grid based or
that our new approach can outperform other earlier
computational geometry based [5]; Force based
works.
strategies use attraction and repulsion forces to
determine the optimal position of the sensors while
Key words: Node Placement, Voronoi Diagram, Wireless
grid based strategies use grid points for determining
Sensor Networks, Genetic Algorithm, CoverageI.
the optimal position of the sensors. As for the
Introduction computational geometry approach, Voronoi diagram
and Delaunay triangulation are commonly used in
In recent years wireless sensor networks (WSN) have WSN coverage optimization algorithm. Coverage can
become one of the most active research areas due to be classified into three classes; Area coverage, point
the bright and interesting future promised to the world coverage and barrier coverage. Area coverage, as the
of information technology. Wireless Sensor Networks name suggests is on how to cover an area with the
(WSNs) generally consist of a large number of low- sensors, while point coverage deals with coverage for
cost, low-power, multifunctional sensor nodes that are a set of points of interest. Decreasing the probability
small in size and communicate over short distances of undetected penetration is the main issue in barrier
[1]. A sensor node consists of four basic components coverage. We are using area coverage where the
[2]: a processing unit, a power unit, a communication objective is to maximize the coverage percentage [6].
unit and a sensing unit. Also a sensor node may
include optional units such as GPS, energy generator Existence of coverage holes are very important in
unit, mobility unit etc. In wireless sensor network WSN and must be covered to increase QoS and the
each node sense the environment around itself and accuracy. Many researches exist that try to cover these
sends gathered data to base station hop-by-hop. Area holes [6, 7]. Most of these researches consider the
coverage is one of the most fundamental problems in network to be mobile or hybrid. Most of nodes in a
ad-hoc wireless sensor networks because it relates hybrid network are stationary and there are few
706
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
Computational geometry is frequently used in WSN Voronoi diagram [15] can be used to detect a
coverage optimization, the most commonly used coverage hole and to calculate the size of a coverage
computational geometry approach are Voronoi hole [16, 17]. A Voronoi diagram for N sensors s1; s2;
diagram and Delaunay triangulation [5]. Voronoi . . . ; sN in a plane is defined as the subdivision of the
diagram is partition of sites in such a way that points plane into N cells each for one sensor, such that the
inside a polygon are closer to the site inside the distance between any point in a cell and the sensor of
polygon than any other sites, thus one of the vertices the cell is closer than that distance between this point
of the polygon is the farthest point of the polygon to and any other sensors. Two Voronoi cells meet along
the site inside it. Therefore Voronoi diagram can be a Voronoi edge and a sensor is a Voronoi neighbor of
used as one of the sampling method in determining another sensor if they share a Voronoi edge. A
WSN coverage; with the sensors act as the sites, if all Voronoi diagram is first constructed for all stationary
Voronoi polygons vertices are covered then the field sensor nodes, assuming that each node knows its own
is fully covered otherwise coverage holes exist [18]. and its neighbor’s coordinates. In [23] authors
Delaunay triangulation is the dual of Voronoi diagram propose a localized construction algorithm to
[13]. Voronoi diagram for 3 and 4 points is presented construct a local Voronoi diagram: Each node
in figure 1 and figure 2. constructs its own Voronoi cell by considering only
A Delaunay triangle is formed by three sites provided its 1-hop neighbors. After the local Voronoi diagram
if and only if the site’s circumcircle does not contain construction, the sensor field is divided into sub
other sites. The centre point of the circle is a Voronoi regions of Voronoi cells and each stationary node is
vertex with equal distance from each of the three sites. within a Voronoi cell. Figure 3 illustrates a Voronoi
In [14] authors used Voronoi diagram in enhancing diagram in a bounded sensor field, where the
WSN coverage using mobility of sensors. boundaries of the sensor field contribute to a Voronoi
cell too. According to the property of a Voronoi
diagram, all the points within a Voronoi cell are
closest to only one node that lies within this cell.
Therefore, if some points of a Voronoi cell are not
707
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
covered by its generating node, these points will not They identified the problem of deploying mobile
be covered by any other sensor and contribute to sensors in a mixed sensor network as an NP-complete
coverage holes. If a sensor covers all of its Voronoi problem and designed bidding protocols to tackle this
cell’s vertices, then there are no uncovered points
problem in a distributed fashion, in which static
within its Voronoi cell; otherwise, uncovered points
exist within its Voronoi cell. sensors act as bidders and mobile sensors act as hole-
healing servers. In their simulations users can
determine the percentage of mobile sensors to get the
most economical deployment of sensors to construct a
network satisfying the coverage requirement.
708
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
709
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
6. Termination criterion
A termination criterion is one of the important
parameters in genetic algorithms. There are several
methods for specifying termination criterion such as
determining a constant number of iterations or until a
predefined value for fitness acquired or until in M
iterations the fitness value doesn’t change. Here we
used a constant number of iterations equal to 200.
V. Simulation Results Figure 10- number of nodes for each voronoi cell with r=2m
Simulation in MATLAB has been used to evaluate the
proposed algorithm. In this simulation, a field of
100×100meters has been used where 60 nodes are
scattered randomly which is presented in figure 9.
Then voronoi diagram of this field has been calculated
and to optimize each voronoi cell the genetic
algorithm has been used. Genetic algorithm used to
optimize each voronoi cell by placing k new nodes in
710
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
711
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
References
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, [13] Aurenhammer, F. and Klein, R “Voronoi diagrams.” In J.
Wireless sensor networks: a survey, Computer Networks 38 Sack and G.Urrutia, editors, “Handbook of Computational
(2002) 393–422. Geometry” Chapter V, pages 201-290. Elsevier Science
[2] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A Publishing, 2000.
Survey on Sensor networks. IEEE Communications [14] Wang, G., Cao, G. and Porta, T.L “Movement-Assisted
Magazine,40(8):102-114 Sensor Deployment”, IEEE INFOCOM 2004, Vol. 4, pp 2469-
[3] M. Ishizuka, M. Aida, Performance study of node placement in 2479
sensor networks, in: Proc. of 24th International Conference on [15] F. Aurenhammer, Voronoi diagrams – a survey of a
Distributed Computing Systems Workshops, 2004, pp. 598–603. fundamental geometric data structure, ACM Computing Surveys
[4] F. Nematy , A. M. Rahmani , M. Teshnelab , N. Rahmani, 23 (4) (1991) 345–406
“Ant Colony Based Node Deployment and Search in Wireless [16] A. Ghosh, Estimating coverage holes and enhancing coverage
Sensor Networks”, International Conference on Computational in mixed sensor networks, in: IEEE International Conference on
Intelligence and Communication Networks (CICN), 2010 , pp.363 Local Computer Networks, 2004, pp. 68–76.
- 366 [17] G. Wang, G. Cao, P. Berman, T.F.L. Porta, Bidding protocols
[5] N. A. Ab. Aziz, K. Ab. Aziz, W. Z. Wan Ismail, Coverage for deploying mobile sensors, IEEE Transactions on Mobile
Strategies for Wireless Sensor Networks, World Academy of Computing 6 (5) (2007) 515–528.
Science, Engineering and Technology ,2009 [18] A. Efrat, S. Har-Peled, J.S.B. Mitchell, Approximation
[6] A. Ghosh, Estimating coverage holes and enhancing coverage algorithms for two optimal location problems in sensor networks,
in mixed sensor networks, in: IEEE International Conference on in: Proceedings of the 3rd International Conference on Broadband
Local Computer Networks, 2004, pp. 68–76. Communications, Networks and Systems (Broadnets’05), Boston,
[7] G. Wang, G. Cao, P. Berman, T.F.L. Porta, Bidding protocols Massachusetts , October 2005.
for deploying mobile sensors, IEEE Transactions on Mobile [19] X. Cheng, DZ Du, L. Wang, B. Xu, Relay sensor placement in
Computing 6 (5) (2007) 515–528. wireless sensor networks, ACM/Springer Journal of Wireless
[8] P.-C. Wang, T.-W. Hou, R.-H. Yan, Maintaining coverage by Networks, in press.
progressive crystallattice permutation in mobile wireless sensor [20] S. Poduri, S. Pattem, B. Krishnamachari, G.S. Sukhatme,
networks, in: IEEE International Conference on Systems and Sensor network configuration and the curse of dimensionality, in:
Networks Communication (ICSNC), 2006, pp. 1–6. Proceedings of the 3rd IEEE Workshop on Embedded Networked
[9] Y.-C. Wang, C.-C. Hu, Y.-C. Tseng, Efficient placement and Sensors, Cambridge, MA, May 2006.
dispatch of sensors in a wireless sensor network, IEEE [21] C. Gazen, C. Ersoy, Genetic algorithms for designing
Transactions on Mobile Computing 7 (2) (2008) 262–274. multihop lightwave network topologies, Artificial Intelligence in
[10] S. Chellappan, X. Bai, B. Ma, D. Xuan, C. Xu, Mobility Engineering 13 (1999) 211–221.
limited flip-based sensor networks deployment, IEEE Transactions [22] D.E. Goldberg, Genetic Algorithms in Search, Optimization,
on Parallel and Distributed Systems 18 (2) (2007) 199–211. and Machine Learning, Addison Wesley, Reading, MA, 1989.
[11] S. Yang, M. Li, J. Wu, Scan-based movement-assisted sensor [23] J. Holland, Adaptation in Natural and Artificial Systems,
deployment methods in wireless sensor networks, IEEE University of Michigan Press, 1975
Transactions on Parallel and Distributed Systems 18 (8) (2007) [24] L. Davis, Handbook of Genetic Algorithms, Van Nostrand
1108–1121. Reinhold, New York, 1991.
[12] J. Wu, S. Yang, Optimal movement-assisted sensor [25] Ming-Tsung Chen, Shian-Shyong Tseng, A genetic algorithm
deployment and its extensions in wireless sensor networks, for multicast routing under delay constraint in WDM network with
Simulation Modelling Practice and Theory 15 (4) (2007) 383–399.
712
The International Journal of Soft Computing and Software Engineering [JSCSE], Vol. 3, No. 3, Special Issue:
The Proceeding of International Conference on Soft Computing and Software Engineering 2013 [SCSE’13],
San Francisco, CA, U.S.A., March 2013
Doi: 10.7321/jscse.v3.n3.107 e-ISSN: 2251-7545
713