Next Article in Journal
Multichannel Variational Autoencoder-Based Speech Separation in Designated Speaker Order
Previous Article in Journal
Study on Probabilistic Properties of Fluctuating Wind Pressure Distribution of Low-Rise Buildings Affected by Slope Gradient in Mountain Forms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm

by
Sreeja Balachandran Nair Premakumari
*,
Prakash Mohan
and
Kannimuthu Subramanian
Department of Information Technology, Karpagam College of Engineering, Coimbatore 641032, India
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(12), 2515; https://doi.org/10.3390/sym14122515
Submission received: 7 October 2022 / Revised: 24 October 2022 / Accepted: 25 October 2022 / Published: 28 November 2022

Abstract

:
Wireless Sensor Networks (WSN) have distributed a collection of tiny sensor nodes deployed randomly in the given symmetry environment to sense natural phenomena. The sensed data are disseminated symmetrically to the control station using multi-hop communication. In WSN, the energy conservation during node coverage plays a major role in detecting node failure and providing efficient and symmetrical data transmission to the nodes of WSN. Using the cluster method and efficient localization techniques, the nodes are grouped and the precise location of the nodes is identified to establish the connection with the nearby nodes in the case of node failure. The location accuracy is achieved using the localization estimation of the anchor nodes and the nearest hop node distance estimation using the received signal strength measurement. The node optimization can be performed efficiently by the accurate estimation of the localization of the node. To optimize the node coverage and provide energy efficient and symmetrical localization among the nodes, in this paper, a cluster-based routing protocol and a novel bio-inspired algorithm, namely, Modified Bat for Node Optimization ( M B N O ), to localize and optimize the unknown nodes along with the reinforcement-based Q learning algorithm is proposed with the motive of increasing the accuracy estimation between anchor nodes and the other neighbor nodes, with the objective function to optimize and improve the nodes’ coverage among the network’s nodes in order to increase the nodes’ localization accuracy. The distance metrics between the anchor nodes and other neighbor nodes have an estimated symmetry with three node positions, namely C-shape, S-shape and H-shape, using the Q learning algorithm. The proposed algorithm is implemented using the NS3 simulator. The simulation results show that the accuracy and precision of the proposed algorithm are achieved at 98% in the node coverage optimization with reduced Mean Localization Error (MLE) and computational process time compared with other bio-inspired algorithms, such as Artificial Bee Colony optimization and Genetic Algorithms.

1. Introduction

A Wireless Sensor Network (WSN) is a distributed collection of tiny sensor nodes which are assumed to be the self-operating and esteemed networks which can process the communication, sensing and distance estimation between the nodes in the network. Node coverage and localization are two of the main concerns involved in WSN for energy-efficient data communication [1]. In many wireless sensor network applications, the location information from which the data were obtained is necessary. As a result, the location of sensor nodes affects WSN performance. Compared to other methods, the original bat optimization technique has a lower mean localization error and takes less time to compute, but its localization efficiency is lower than 100% and it tends to get stuck at a local ideal value [2]. Most of the existing systems’ node coverage optimization and localization algorithms fail to accurately estimate the location of the nodes. Moreover, they fail to optimize node coverage, which will result in partitioning the network into disjointed segments. Therefore, providing efficient node coverage with accurate node location estimation in the network is needed to establish the connectivity among the nodes in the network [3]. The node coverage optimization and localization identification of the nodes are addressed by using the various algorithms in soft computing and Bio-inspired models. Particle Swarm Optimization (PSO) is a straightforward bio-inspired algorithm that finds the optimal solution; this algorithm is different from the other, following optimization techniques because it is not dependent on any gradient or any differential form of objectives, it needs only objective function. In addition, less hyper parameters are in use [4]. Various PSO and evolutionary algorithms have been applied to the WSN to provide an efficient solution to network node optimization, node localization, node clustering and node segmentation. The PSO algorithms work on the node with the node coverage problem to enhance the network lifetime and the coverage rate among the nodes in the network [5]. In WSN, PSO algorithms have been used to estimate the localizations of the nodes based on the angle measurement between the sensor nodes and the anchor node. Metrics such as the packet delivery ratio between the nodes are used to determine the angle measurement of the nodes in sensor nodes, time of arrival of the packets and range of the received signal strength [6].
Moreover, the PSO algorithms have been applied to WSNs to enhance the quality of service and provide energy-efficient data dissemination in a wireless sensor network. The bio-inspired algorithms have an efficient proposal for predicting the unknown nodes in the localization area and enhancing the various optimum node estimation parameters [7]. For the node coverage optimization challenges, the Bat Algorithm has been used to simulate the echolocation behavior of a bat. The Bat Algorithm has been employed, along with the various evolutionary algorithms, to provide the optimal solution to the node coverage and node localization problems in WSN. The node localization is estimated with the received signal strength; hence, the data are assumed to be from the proper location [8]. The unknown nodes near the sensor nodes are estimated with the analysis of the unknown sensor nodes, which are closer to the neighbor nodes and are taken into account in the known locations. While estimating the location of the unknown node using the node coverage parameters, it is essential to monitor the computational cost, and the received signal should not accumulate the data inferred in the optimal allocation [9]. The optimal constraint is analyzed with the hop node communication, and the distance is measured with hop-1 parameters multiplied by the total distance estimation. The PSO, Ant Colony Optimization algorithm (ACO) and The Artificial Bee Colony (ABC) algorithm are the estimation algorithms which identify the node localization using the received signal strength for the unknown node address. All these algorithms have been proposed to estimate a better accuracy in the proposed node analysis parameters. However, all these algorithms are not accurate in detecting the location of the unknown nodes and fail to optimize the node’s coverage in the WSN [10]. Motivated by all these observations, a novel bio-inspired algorithm, namely, the Bat Algorithm (BA), is based on the way the microbats use echolocation. In terms of accuracy and efficiency, BA is far better than other current usage algorithms. Due to a bat’s inability to thoroughly search every direction in the search area, the BA has an extremely low success rate. In order to solve this issue, the algorithm is modified as the Modified Bat for Node Optimization (MB-NO) algorithm to reduce the energy conservation. This is proposed, along with the Q learning method proposed in this paper, to optimize the node coverage and accurately estimate the sensor nodes’ proposed localization. Q learning is one of the reinforcement learning algorithms which is not dependent on any data model, i.e., model free learning; reinforcement learning is the subfield of Machine Learning that develops a model’s ability to solve issues at their best on its own. Moreover, the proposed method provides energy conservation during node coverage and localization of the nodes in WSN [11]. The layer-wise assumption in the node segments of the proposed system is shown in Figure 1 along with the node-based cluster creation.
The major research contributions are:
  • This paper outlines the node coverage optimization in WSN using the Modified Bat for Node Optimization   ( M B N O )   algorithm to enhance the node coverage and reduce energy consumption to provide efficient sensor node localization.
  • A novel M B N O algorithm, along with Q learning, has been proposed to widely analyze the accuracy of the node localization and the sensor node precision coverage with the shortest hop distance nodes estimation.
  • The precision estimation is enhanced for the node coverage in WSN with the help of the received signal strength in the sensor nodes using the novel bio-inspired M B N O algorithm.
  • The objective function used is the number of nodes and the transmission time (ms), that is defined as:
O f = Σ   N ( i ) T t  
The Q learning approach to segment the sensor nodes and the localization accuracy is optimized in the proposed system.
The paper has been organized as follows: Section 1 outlines the “Introduction”, Section 2 covers the “Related Works”, and Section 3 proposes the “Network Model and Problem Formulation” with energy optimization to perform the node optimization. Section 4 proposes the “Modified Bat for Node Optimization ( M B N O )” algorithm-based node optimization with secure Q learning-based communication. Section 5 performs the “Performance Evaluation and Results”. Section 6 includes the “Conclusion and Future Work”.

2. Related Works

Various authors have proposed methods to optimize node coverage and accurate location estimation in WSN. Some of the methods proposed in the literature include the following: Neng et al. [12] has proposed joint node selection, flow routing and cell coverage optimization for network sum-rate maximization in wireless sensor networks. In their approach, the authors have proposed joint node selection for routing packets in the network. Moreover, the authors have proposed cell coverage optimization using sum rate maximization in WSN to enhance node coverage optimization. Their method’s limitations are less accurate in detecting the nodes’ location, and there is a network coverage problem. Lenka et al. [13] and Ghosh et al. have proposed remote sensor systems which play a crucial role in incalculable applications. The fundamental capacity of WSN is to measure extricated information and to communicate it to distant areas. The inclusion and availability issues of the node’s lifetime are the primary concerns to be considered in this paper [14].
Eleni et al. [15] has outlined that Wireless Sensor Networks (WSNs) comprise an Fe battery-controlled sensor hub. The detecting inclusion of the Field of Interest (FoI) is a significant capacity of the sensor hubs in associated WSNs. An FoI is supposed to be canvassed if each point in the FoI is checked by any event. Due to the small size and battery power, there are limited connectivity and coverage issues addressed in the paper by Choudhary et al. [16], who has proposed a smart Bat Algorithm in WSN to optimize the connectivity in WSN. The smart Bat Algorithm has been applied to the 3D environment to optimize the network coverage and connectivity in WSN. The limitations of their approach are the connectivity exit and connection issues in their system. Shen et al. [17] have proposed an ant colony optimization approach for maximizing the lifetime of heterogeneous wireless sensor networks. The advantage of their approach is its energy conservation, and the limitations are their network connectivity and node coverage. Singh et al. [18] have proposed a system where the grid-based deployment of sensor nodes is used to quantify the connectivity issue in WSN. In their system, the sensor nodes are organized as grids so that the distance between the deployed modes is uniform. The limitation of their approach is that there is no coverage optimization, and, hence, it consumes more energy during the network node’s connectivity. Mohar et al. [19] has investigated a productive network based on the organization anticipating the availability of the network when sensors are situated and influenced by arbitrarily limited blunders around their comparative lattice vertices. They have proposed another way to assess the normal availability level of the sent sensor hubs. They have applied pragmatic 3D arrangement situations to form the cubic framework based on an organization with limited uniform irregular mistakes. The normal availability rate is registered mathematically and confirmed by broad reenactment results. Nieoleseu et al. [20] has proposed a system where the arrangement of remote sensor nodes is exceptionally reliable, based on the objective condition. When the attributes of the ideal territory are known, the subject of system size emerges. Elements such as transmission power level, cost of system organization and the inclusion territory legitimately influence the size of the system. This paper dissects the conduct of an average multi-bounce remote sensor that arranges it to work in an outside situation.
Poongudi et al. [21] has proposed Q learning-based two-tier data dissemination in WSN. In their system, the network is organized into two tiers. The first tier is responsible for node coverage, and the second is used for data dissemination in WSN. The limitations are that it suffers from scalability and node coverage optimization in WSN. Zidong et al. [22] have proposed a reliable routing infrastructure for green IoT. The proposed system’s major aim is to conserve energy during data communication. The limitation of their approach is that they only focus on energy conservation and not on localization and node optimization in IoT networks. Rimpy et al. [23] have studied Medium Access Control (MAC) for remote sensor systems (WSNs) under the Irregular Repetition Slotted ALOHA (IRSA) convention. Specifically, they upgrade the degree conveyance utilized by IRSA for limited casing sizes. Their model employs IRSA as a Decentralized Partially Observable Markov Decision Process (Dec-POMDP). The proposed system results are nonexclusive regarding node coverage optimization in WSN. F. Anwar et al. [24] has proposed Distance Vector based node localization in WSN. Their system estimates the location of the nodes precisely by using the distance vector calculation of the nodes in the network. The limitation of their system is that the DV calculation is not accurate. Therefore, it leads to the node coverage optimization problem in WSN. Poongudi et al. [25] has proposed the indoor localization algorithm for WSN in an NLOS environment. The proposed system provides an efficient method to locate the nodes and optimize the node coverage in WSN. This method’s limitations are exiting node coverage and an optimization problem in WSN.
J. Wang et al. presented that in the misfortune situations, dynamic sensors are regularly utilized for localization in WSNs. Be that as it may, many of the current localization calculations are intended for the static hubs in WSNs. This paper presents an overview of localization calculations in versatile remote sensor systems: mechanical technology localization calculations, Monte Carlo-based portable localization calculations and without-range-based portable localizations. This paper leads to an examination of cutting-edge portable localization calculations [26]. The author proposed that executing situating frameworks for indoor conditions is famously troublesome. The immense range of communicating boundaries, for example, furniture, room shape and materials, imply that the reenactment of such a situation is of restricted worth. We present results from an observational examination regarding the feasible precision of a Radio Frequency (RF) situating framework, dependent on signal quality. Techniques to improve certainty, for example, recurrence averaging and bi-directional going, are investigated. At last, we introduce and assess a novel technique for adjusting the channel engendering type with no earlier information on the sensor organize format or room shape [27]. In remote sensor systems, sensor position vulnerability debases the precision of the vitality-based objective confinement, accomplished utilizing the Maximum Likelihood Estimation (MLE) techniques. In this paper, we built up another MLE approach that fuses a model of sensor position vulnerability. Recreations showed that our new MLE approach outflanked an MLE approach that does not represent sensor position vulnerability. Root–Mean–Square (RMS) assessment mistakes for target confinement were near the Cramer-Rao lower bound (CRLB).
Sivagami et al. [28] proposed a novel mixture enhancement calculation, a molecule swarm streamlining the counterfeit honey bee province (PSO-ABC), given the PSO and ABC calculations. The ABC calculation can counterbalance the PSO calculation that effectively falls into a nearby advancement; consolidating the calculations can somewhat improve the PSO calculation’s enhancement capacity. Along these lines, this paper applied the PSO-ABC mixture calculation and the limited component technique to methodically enhance the mechanical presentation of the plate rotor of a bicycle and confirmed the mathematical calculation model through the remote sensor arrange innovation. The exploratory test was finished with remote sensor arrange innovations. The calculation contrasted the conventional PSO and ABC models to confirm the advanced impacts of the proposed PSO-ABC cross-breed calculation after boundary choice. The PSO, ABC and PSO-ABC models received a similar populace to direct a multi-target advancement for vibration-increasing velocities of the circle rotor. The outcomes from these models demonstrated that the proposed PSO-ABC technique is prevalent for advancing the vibration qualities of the circle rotors.
Per M. L. Bharathi et al. [29]., remote sensor systems are outstanding systems that include organized gadgets in enormous numbers and spatial dissemination. They have distinctive detecting limits and take an interest in completing basic undertakings. It is recorded as a hard copy outline where thickness matrix-based bunching in WSN has improved the execution of the WSNs by using social event-based data collection. Regardless, no improvement strategy is considered for the effective course determination in thickness matrix-based bunching. This paper proposes two new methodologies. For example, fake honey bee province is a multitude-based enhancement procedure for vitality proficient steering calculation, and compressive detecting is, likewise, used to expand the vitality rate or execution. The proposed procedure has demonstrated very critical improvement over accessible ones [30]. In a paper by F. Anwar et al., in vitality constrained remote sensor system WSNs, the methods to perform strong direction are among the fundamental core interests. A respectable methodology of insect state advancement ACO calculation for finding the ideal course in the WSNs for information transmission is proposed here for improvement and streamlining, considering the method by which to arrive at the hubs. Utilizing the proposed ACO calculation and considering both the hub portability and the current vitality of the hubs, an ideal course and the best expense from the starting hub to the objective hub is identified. The proposed calculation has been reproduced and confirmed using MATLAB. The reenactment results show that a new subterranean insect province enhancement-based calculation can accomplish better execution and quicker assembly by which to decide on the best cost course [31].
An intelligent Distance–Vector (DV-Hop) [32] calculation for finding hubs has been developed to address the problem of the helpless finding execution in unique DV-Hop calculations. One of the without-range computations in Wireless Sensor Networks (WSN) was proposed in this paper. Considering the impact of dynamic geography, the self-versatile fake honey bee province calculation was discovered by gauging the obscure hub area. Recreation results show that the new calculation has better finding execution exactness and accuracy steadiness than DV-Hop calculation with no extra gadgets and correspondence overhead. Therefore, it is an additionally encouraging finding plan in WSNs, with irregular dispersing hubs and dynamic geography.
Satinder Singh Mohar et al. [33] proposed a work to improve the localization efficiency with a decrease in error. The simulation result showed that the performance of the proposed algorithm produced an efficient result when compared with other algorithms, but the demerits are that it produced the best result for a short distance only, and cannot provide a proper response over a large geographical area.

3. Network Model and Problem Formulation

Let N = { N 1 , N 2 , N 3 , N n } be the set of sensor nodes, and each node is assumed to have constant transmission parameters and also to have equal participation in the deployed environment. Let U = { U N 1 , U N 2 , U N 3 U N n }   be the set of unknown nodes, set where the location of the nodes is not known. The unknown set of nodes may be operating with the sensor nodes to estimate the sensor pair in the neighbor nodes, determined as N S N = { N S N 1 ,   N S N 2 ,   N S N 3 , N S N , } . Hence, the sensor node is united to form a parametric assumption N = U N S N . By combining the operating parameters with the unknown locations and the coverage, the node coverage optimization is calculated [2]. The node coverage is estimated using the N pairs N (Xm, Yn), where the adjacent nodes are marked with U = m 1 , m 2 , m 3 and the nearest hop nodes are estimated using the U = n 1 , n 2 , n 3 . The hop distance is estimated using the distance between the N pairs of the sensor nodes and hop = N U . In addition, the distance denoted as h d m ,   n e s t and the probable actual attained distance are estimated using the h d m , n a c t .
In order to enhance network coverage among the nodes in a wireless sensor network (WSN), the position of the sensor nodes is determined using the hop distance. The error variation in the received signal strength is assumed to be minimal in count in the determined place. The number of sensor nodes increases when the hops are increased with the sensor pairs. The distance metrics between the different sensor nodes and the adjacent nodes have been obtained using the formula U = n 1 , n 2 , n 3 estimated nodes. The proposed localization and node optimization have been applied to WSN using the bat and the Q learning algorithms. In the proposed system, the received signal strength is used to enhance the localization of the unknown nodes. The average error distance between the sensor nodes and neighbor nodes is estimated using the sensor nodes. The shortest distance between the sensor and unknown nodes is estimated by measuring the distance in the reception parameters. Nm is assumed to be of the ‘m’ segments in the measurable distance, and the segment is completed with the localization values. The estimation accuracy of the proposed method is estimated with the EstAm for the m-segment sensor nodes in the WSN. The average distance error AVG disterror is the error where the process of the sensor nodes and the unknown nodes estimation is performed using the anchor sensor nodes to estimate the localization of unknown nodes in the network. Table 1 outlines the list of notations used in the proposed system.

3.1. Node Clustering Using LEACH Protocol

WSN is susceptible to energy conservation, which depends on the network model and will affect the network’s lifetime. The network life depends on the routing protocol used in the network. The deployment of nodes takes place in the network and plays a major role where the network nodes can obtain the maximum coverage. In the proposed system, the LEACH routing protocol has been used to deploy the moving nodes to optimize the route parameters based on the signal strength with the sensing domain. The node deployment involves a setup phase, where the clustering of the sensor nodes is formed, and all the information is communicated from the cluster head to the corresponding cluster nodes via the sink node. The cluster head collects the information from the nodes and sends it to the various anchors and the adjacent nodes in the network. The energy consumption in each node is assumed to be under control in each phase of the sensor selection. The energy consumption is assumed to be off in the cluster assumptions in the threshold values attained using balance analysis. The energy monitoring is conducted using the LEACH protocol with the interval range threshold value [1, 0]. The threshold value of the network is computed by using Equation (1):
T S N ( i ) = { p r o b a b i l i t y   o f   p e r c e n t a g e   i n   c l u s t e r   h e a d ( p r c h )   1 p r o b a b i l i t y   o f   p e r c e n t a g e   i n   c l u s t e r   h e a d   ( p r c h )   i f   m N 0
where T S N ( i ) denotes the threshold values of the network.
The p r o b a b i l i t y   o f   p e r c e n t a g e   i n   c l u s t e r   h e a d ( p r c h ) is where ‘m’ denotes the number of nodes possible within the internal cluster communication, and ‘N’ denotes the set of sensor nodes possibly used within the framework estimation of the sensor nodes.

3.2. Energy Estimation for Node Coverage Optimization

In the proposed system, the Euclidean distance is used to compute the distance between the sensor nodes and the adjacent nodes by using the LEACH routing protocol. Equation (2) gives the Euclidean distance formula used in the proposed system.
E D ( N i , D j ) = ( ( X i   , D j   ) 2 ( Y i   , Y j   ) 2 )
The distance measurement is computed with the obstruction of values analyzed with probability estimation using the sensor nodes and the adjacent nodes. Euclidean distance (ED) is calculated using (Xi, Dj), (Yi, Yj), which are the two different coordinates. The nodes are aligned with the task of predicting the defined modelling using the LEACH protocol, which is shown in Equation (3).
Pr ch   ( N i , D j ) = { 0                                   I r i E D     ( N i , D j ) e γ   E D     ( N i , D j ) I r i I r e I r i E D     ( N i , D j )           I r i I r e   E D     ( N i , D j ) < I r e   1                               I r i I r e   E D     ( N i , D j )
The sensing error is identified in the sensor node using the I r e , and the radius is determined using the Iri. The γ illustrates the sensing parameter and attenuation coefficient. The target coefficient is obscured with the sensor network using the assumptions in the probability evaluation, defined as Porch ( N i , D j ) , which is shown in Equation (4).
P s n   = 1 i = 1 N Prch   ( N i , D j )
Figure 2 represents the formation of the cluster nodes between the nodes to monitor the energy conservation before the application of Bat implementation.
The node coverage of the sensor node is illustrated by using the parameters in the received signal strength in each node of clusters, which is given in Equation (5):
E S ( i ) = ( i = 1 N u m S r c C H E S o u r c e   S N c h + E R S S I + E D A ) + i = 1 n u m E d e s t   S N c h + E F i n a l
Equation (5) shows the assumptions used in the network’s sensor node energy prediction using the LEACH protocol. Let E S o u r c e be the source node energy for the sensor nodes in clusters. E R S S I also predicts the energy of the received signal strength, and E D A is the data predicting the node in the transmission range. Edest is the destination node energy. The destination is assumed to be within the mean values, and Efinal is the final energy of the nodes that are assumed with the num values of the cluster head selection in the predetermined evaluation. The sensor nodes have been classified according to the metrics given in Table 2 for implementing the M B N O algorithm and Q learning parameters.
The energy consumed in the proposed work can be estimated using the optimum coverage. The parameters for the optimum coverage are given in Equation (6):
E Src , dest = { E consum     X   Z + E dissip X   Z   X   E D   ( N i , D j )         i f     E D   ( N i , D j ) < E D 0   E consum     X   Z + E utilised X   Z   X   E D   ( N i , D j )       i f     E D   ( N i , D j ) E D 0
Let E Src , dest be the energy consumption from the source node to the destination nodes in the network. Let the E consum   be the consumed energy for all the sensor nodes, and the dissipation nodes for a neighbourhood with ‘z’ bits of data are transferred in the wireless communication environment. The Euclidean distance measures are used to identify the estimations using the forecasting model of the data in wireless communication. E D 0   = E dissip E utilised shows the distance estimated with the Euclidean assumption in energy dissipated with the energy utilized. The data can be transmitted using the analysis below; hence, the sensor nodes are utilized in the data transmission.

3.3. Node Coverage Rate and Localization Optimization

The received energy is estimated based on the node energy dissipated and the energy utilized in the estimation. Hence, the utilized energy is obtained with the ‘z’ number of bits having the received signal strength in terms of ‘z’ bits forming a reception of node positioning in the WSN given in Equation (7):
R X E = E u t i l i s e d X   Z = E d i s s i p X   Z   E R S S I
The sensor nodes and the corresponding nodes utilize the maximum amount of reception in the node strength. Equation (7) satisfies the allocated energy for utilization in the node optimization using cluster analysis.
E F i n a l = E I N   + S N a
The final average energy is assumed to be of inactive node energy consumption and active sensor nodes’ energy consumption, which is given in Equation (8). The falls are from the final sensor nodes in the active zones for the nodes to be perfect in the active region, as is shown in Equation (9):
S N a = { 1 ,   i f   E S r c , d e s t   S r c C H     o r   E S r c , d e s t   S r c n o n C H   0 ,     o t h e r w i s e
The possible energy outcome has determined the node coverage rate, and the energy consumption is assumed to be of the sensor nodes in the adjacent node’s enhancement. The node process with the coverage accuracy is estimated using Equation (10). The target node coverage rate is estimated using the coverage node having the target of ( SN i )   with   parameter s given in Equation (10):
T ( i ) = i = m T c ( S N i )
The average task performed in each node is assumed to be in the highest coverage area of the sensor nodes, as given in Equation (11):
S N i = { 0     i f     E D     S N i n a c t i v e   a n d   E D       r i 1                                   o t h e r w i s e
The coverage rate is assumed to be of the active sensor nodes’ parameters and the nodes’ inactive assumption. The radius ri assumes to be off the sensor node pairs in the segment. The final energy is assumed to be of the equilibrium-based energy options that prevail in the independent nodes. The energy equilibrium is used to obtain the final derivate of the sensor nodes’ active region coverage, as shown in the Equation (12):
E N e q u i l i b i r u m = i = 1 n E   S N a c t i v e n

3.3.1. Axiom 1

The energy maximization is obtained with the energy equilibrium in the network if the number of target nodes is assumed to be minimal, as given in the Equation (13):
E N e q u i l i b i r u m ( i ) = Max   ( S N i )

3.3.2. Axiom 2

The energy minimization is obtained with the energy equilibrium if the number of target nodes is assumed to be correlated with the sensor node coverage, as given in Equation (14):
E N e q u i l i b i r u m ( i ) = Min   ( S N i )

3.4. Node Localization Error

Identify the coordinates of the nodes to find the average localization error (Avg.LE), the coordinates of neighbor nodes (Si, Ni) and the sensor nodes (si, ni), which is outlined as below:
Avg .   LE = 1 Tn i = 1 T n ( S i s i   ) 2 + ( N i n i ) 2
Tn is the entire number of nodes.
The node localization is improved by inclined values of Avg. LE at Equation (15) and Unknown node (U) using optimization approaches. It is calculated as:
U = Sn − Tn
Sn—Sensor Nodes and Tn—Total nodes available.
Mean Localization Error (LE) is calculated by the normalized Average LE and the range of sensor nodes transmission (Rt).
Mean .   LE = 1 Tn i = 1 T n ( S i s i   ) 2 + ( N i n i ) 2 R t

4. Modified Bat for Node Optimization ( M B N O )

The Bat Algorithm (BA) is a bio-inspired algorithm used as an optimization algorithm for checking the node essentials in the WSN. The network is formed using the sensor nodes, adjacent nodes and anchor nodes. Besides the problem incurred, energy-constrained localization and node optimization are the major perspectives in the proposed work. The Bat Algorithm works on the principle of echolocation, which emits a wave to find the nearest food source. The nearest location is obtained through bat sense power, even though the network is complicated. The ultrasound waves emitted by bats observe the reflection sound to obtain the nearest locations. The capacity of the bat is obtained using the velocity and position it travels. A bat is unable to investigate every route in the search arena; the BA has a relatively low success rate. Therefore, the present BA is updated to Modified Bat for Node Optimization ( M B N O ) to address this issue. The proposed sensor nodes adjust the frequency. When the source node is identified, the Bat’s loudness decreases with increased frequency. The value of the fitness function determines the choice of bat movement and the effective search space exploration in the MB-NO algorithm. It outperforms the original Bat Algorithm in terms of computational time and the success rate of localized nodes.
Algorithm 1 represents the M B N O algorithm-based node classifications, and the optimization has been applied in the node source. The energy equilibrium is maintained throughout the big source of the network. The ultrasound waves emitted by bats observe the reflection sound to obtain the nearest locations. The capacity of the bat is obtained using the velocity and position it travels. The proposed sensor nodes adjust the frequency. When the source node is identified, the bat’s loudness decreases with increased frequency. The M B N O algorithm provides good comfort compared to the other GA algorithm; the energy equilibrium is assumed to be higher when dealing with the sensor nodes using Algorithm 1. The proposed algorithm focuses on the nearest neighborhood node in the M B N O nearest food locator. For the nearest node, once established, the M B N O will work on the node to establish communication using the frequent frequency estimation. The node optimizer may support the process using the SNi. The objective function is obtained in the search space using the node estimator. The fitness function is applied to identify the nodes which establish secure communication. The search space will provide the best communication using the algorithm, and the optimization needs to be retrieved using the M B N O module in the WSN. The generated solution was established with the node observation’s storage solution. The energy in the node optimization is acquired using the various sensor nodes established. The step-up process of implementing the M B N O algorithm for the sensor nodes process is shown in Figure 3.
Algorithm 1: Adjacent node formation and node optimization using MB-NO algorithm
1. initialize SN i N / / Set of Nodes
2. for all j   T ( i ) do
3.    if SN a , then
4.     Optimization Bat SN i { Freq , Node   location , Node   energy   limits }
5.     Select SN CH with cluster head formation for node optimization
6.    else
7.   ANj is selected according to the P sn   =   SN a   SN i //Adjacent Node pair se
lection from cluster
8.   do the process repeatedly
9.     SN i   { Freq , Node   location , Node   energy   limits }   =   ( { SN i } ,   i m ,   SN a )
10.    for all i P sn   do
11. if SN a then//Nearest optimal Node is obtained
12.    a collects the active nodes using the MB-NO algorithm i SN i
13.         EN equilibirum =
14.        for all [ i [ SN a N ] N ] do
15.            if EN equilibirum   , SN a   then
16.            N= Min ( SN i )
17.            else//energy is not conservator, and localization failed
18.             i = m T c ( SN i ) //The energy equilibrium is obtained
19.         j N , SN i = { i } //Node optimised with conservative energy
20.        else
21.     EN equilibirum ( i ) = Max ( SN i )//Maximum energy utilised and node fails.
22. end if
23. {freq, veloci } increase in the number of nodes and reduce the computation time.//calculate using the formula (15), (16)
25 .   if (current algo. mean error < existing algo. mean error)//connect the nodes
26 .   else
27 .   change the frequency and node location.
28 . end if

Q Learning-Based Secure Communication

Reinforcement Learning uses the original neighbor nodes to behave in the way of predicting the sensor node pair using the trustable nodes when there is a lack of secure nodes in wireless communication. The Q learning algorithm is used in the WSN, where the agent ‘a’ performs an action based on the environment’s current working ‘s’ state. The action is used to analyze the node behavior in the WSN environment. The state of the WSN behaves in such a way that the state may change from one state to a new state ‘ s 1 ’. The WSN employs the Bat Algorithm for the node optimization where the node can be performed. The learning policy, which is assumed to be of Q learning, proposes the mapping context.
Moreover, Q learning is an open structured Algorithm 2 that allows the below axioms.
(a)
The WSN has various sensor nodes operating in a different obscured environment; here, the sensor nodes are mapped with the agent for the RL process and the environment with the RL-based learning approaches.
(b)
The action space and state space are compared with the agent task and the working state of the corresponding sensor nodes in the working environment.
(c)
The task set of the sensor nodes and the working set of the anchor nodes is obscured by the nature of the state space. The applications of the WSN are mapped with the task set of the RL algorithm. The sensor nodes and the related nodes have a working set environment in the proposed modelling. This mapping may help analyze the data persistently in the nodes to map with the current setup.
(d)
The task set activates the agent, and the operating environment is learned using the proposed RL model.
The three metrics for the WSN approach are the event space, reward and the network result. The WSN process events represent the jamming in the node communication. The reward helps analyze the proposed model’s prospectus growth in communication. The move taken within the prescribed service establishes the agent modelling; hence, each state is subject to S t     S j , where S t   represents the state value in the t parameters. The S j represents the analysis in the assumptions for the neighbor values for j states. The environment will be working for the key model in the state space. The action and task space are consumed based on the node selection parameters. The Q learning is estimated using the Q m + 1 ( S t   , A C t   ) , representing that the estimation is completed with the state space S t   and A C t   action spaces in the working environment. The agent is assumed to be in the processing control of the sensor nodes, and the learning policy is obtained using the space which is given in Equation (15):
Q m + 1 ( S t , A C t ) = ( 1 α )   Q t ( S t , A C t ) + α [   β t   + γ max Q m ( S t + 1 , α t + 1 ) ]
The updated information regarding the Q learning aspects will be working on the nodes with the range of α [ 0 , 1 ] and the γ ϵ [ 0 , 1 ] . The ranges specify the action space and the state space of the action in the working sensor model. The Q value is obtained using the maximum positive reward that can help analyze the node with the neighborhood nature and the adjacent neighbor nature.
Axiom 1
(a)
Analyze the sensor node operating environment with the agent space in E n v t ;
(b)
The nature of the working environment for the present space state has been assumed to be in the space control for the sensor as exploration;
(c)
The best action is assumed as the collective reward from the node S N i for the set of action spaces.//implemented from M B N O ;
(d)
The action has been determined using the A C t   in the state space of the sensor deployed nodes of cluster head group 1;
(e)
The reward will be collected from S t   at time S t + 1   to estimate the γ max Q m ( S t + 1 , α t + 1   ) in the predetermined energy estimation.
Algorithm 2: Reinforcement learning algorithm
1. Initialize the parameters
(a) Assume the initial learning policy with a rate of α , the reward factor as β   and γ .
(b) The time-space at S t     = 0.
(c) For all state space, the S t       a 1 ,   a 2 , , a n and where the working sensor nodes are assumed in a single cluster.
(d) Let Q t   ( S t       a 1 ,   a 2 , , a n   ) = 0 //Initial assignment in all sensor nodes.
(e) δ ( S t ,     a ) = 1 1 | A i |     ( S t + 1 ,     a t   ) n   where the 1 | A i | is the assumption of state space having similar agent pairs.
(f) The cluster formation is supported in the state space control CHs ( S t ,     a ) = 1 1 | A i |     ( S t + 1 ,     a t   ) n + 1
2. Do the following
(a) Execute the action of the search space in the state with a 1 ,   a 2 , ,   a n .
(b) The event reward is assumed to be off in the state as r s 1 , r s 2 , r s 3 r s n .
(c) Estimate the values of Q
Q m + 1 ( S t     , A C t     ) = ( 1 α )   Q t ( S t     , A C t     ) + α [   β t   + γ max Q m ( S t + 1     , α t + 1     ) .
(d) SN i { Freq , Node   location , Node   energy   limits } = ( { SN i } ,   i m ,   SN a ) = 1 1 | A i |     ( S t + 1 ,     a t   ) n .
(d) Update 1 1 | A i |     ( S t + 1 ,     a t   ) n .
(e) Predict the next set of actions with the energy-constrained node mechanism for Q m + 1 ( S t     , A C t     ) .
3. End Do

5. Performance Evaluation and Results

In this section, the simulation has been performed using the M B N O algorithm for energy conserved node optimization, and the results are compared with ACO and ABC optimization. The simulation coverage has been conducted with the below experimental setup for various C-shaped, H-shaped and S-shaped networks, as shown in Table 3.
In both Figure 4 and Figure 5 the original BOA and the suggested BOA versions, the initial deployment of target nodes and anchor nodes is arbitrary, Therefore, each BOA and BOA variation 1 algorithm is performed 50 times in order to lessen the impact of randomness, and the best value for computation time, number of localised nodes, and other mistakes is chosen [33]. The simulation has been performed with the three types of networks: C-shaped, H-shaped and S-shaped. To accomplish the objective of energy conservation and node optimization, two objective functions are used, including number of sensor nodes and the transmission time (time stamp measured in ms), which is defined in session 1. The experimental results demonstrated that the MB-NO is more effective at cutting overall power usage when compared to three other optimization techniques. Figure 6 estimates the Objective Function for the C-shaped network with optimized nodes. The estimation shows that the Bat Algorithm establishes a good optimal solution with better energy conservation with the optimized sensor and the adjacent nodes maintained throughout. Table 4 shows the conservative energy analysis using the above metrics, and the parameters are established within the conservative column. The Bat performs the best approach in energy conservation using the 30 sensor nodes with 250 adjacent nodes. The 30 sensor nodes use the best efficiency for the summarized time stamp. The M B N O outperform when compared with the ACO and ABC optimization.
Figure 7 estimates the objective function for an H-shaped network with optimized nodes. The estimation shows that the Bat Algorithm establishes a good optimal solution with proper energy conservation, with the optimized sensor and the adjacent nodes maintained throughout. Table 5 shows the conservative energy analysis using the above metrics, and the parameters are established within the conservative column. The M B N O performs the best approach in energy conservation using the 30 sensor nodes with 250 adjacent nodes. The 30 sensor nodes use the best efficiency for the summarized time stamp. The M B N O outperforms when compared with the ACO and ABC optimization. In the H-shaped network, the performance measurement is estimated with the rise in transmission time in ms. The H-shaped network is subject to parallel communication estimation in the fixed sensor nodes. The optimal values suggest that the efficient node optimization performs well with the H-shape based on the energy equilibrium, and the average solution attained here works well for the H-shaped network.
Figure 8 estimates the objective function for an S-shaped network with optimized nodes. The estimation shows that the Bat Algorithm establishes a good optimal solution with proper energy conservation, with the optimized sensor and the adjacent nodes maintained throughout. Table 6 shows the conservative energy analysis using the above metrics, and the parameters are established within the conservative column. The M B N O performs the best approach in energy conservation using the 30 sensor nodes with 250 adjacent nodes. The 30 sensor nodes use the best efficiency for the summarized time stamp. The M B N O outperforms when compared with the ACO and ABC optimization. In an S-shaped network, the performance measurement is estimated with the raise in transmission time in ms compared to the H- and C-shaped networks. The optimal values suggest that the efficient node optimization performs well with the S-shape based on the energy equilibrium, and the average solution attained here works well for the S-shaped network. At the offset, all the H- and C-shaped networks are assumed to be off, with the best solution, even in compressed mode transmission. Comparatively, the average solution implies a node estimation in the proper assumptions for the sensor and adjacent node communication using the M B N O algorithm.
In Figure 9, the number of iterations is increased with the sensor nodes in the node optimization. The M B N O algorithm proposes maximum energy conservation, as shown in Table 7; the maximum conservation is obtained with the energy measured, assuming that the other algorithms propose the values with the least energy level equilibrium.
In Figure 10, the number of iterations is increased with the sensor nodes in the node optimization. The number of iterations is measured with the network lifetime process; hence, the network may be compared in a higher lifetime using the M B N O algorithm. Hence, the energy parameters, node optimization and the increased secure transmission through Q learning assumed substantial outcomes.
Table 8 depicts the comparison of the computational time, mean localization error and localization nodes. These metrics are evaluated with 10 to 50 nodes where the computational time is given as T ( s ) , mean localization error is provided as (MLE) and the localization nodes are provided as N L . The computational time ranges from 0.95 s to 1.04 s, the node location of the proposed MB-NO ranges from 132 to 152 and the mean localization error ranges from 0.47 to 0.31. Mean localization error (MLE) is achieved in the proposed algorithm and more in both bat variants and standard Bat Algorithm; moreover, the computational time is less in MB-NO and the number of nodes more than the other two algorithms. Due to this, the proposed algorithm is very efficient, with improved concurrence and producing a higher success rate (See Figure 11, Figure 12 and Figure 13). From the analysis, it is proven that the model works well compared to other approaches to fulfill the research requirements.

6. Conclusions

In this paper, a proposal has been made with the node optimization enhancement with the localized sensor nodes and other node clusters. The received signal strength is observed in various environments. The proposed model outreached a fine-tuned node optimization; hence, the network has been tested under three network structures: C-shaped, H-shaped and S-shaped. The proposed M B N O algorithm works on the sensor nodes as it identifies the best optimal solution for node optimization. The results substantially outperformed better results than the ACO and the ABC optimization. The Q learning performs a secure communication with the optimized nodes to enhance the secured connectivity based on the working environment. The M B N O and Q learning algorithms develop a good network solution in the proposed node optimization and energy conservation in those nodes. All the shaped networks’ energy conservation improves by 10% around the ACO and ABC. The node optimization increases with the proposed M B N O algorithm and reduces the mean localization error (MLE). Future research enhances secure communication, with a timestamp and protocol estimation having limited power transmission, and enlarges the area coverage.

Author Contributions

Conceptualization, Resources, Writing-original draft S.B.N.P.; Supervision, Validation P.M., K.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Baidas, M.W.; Awad, M.K.; El-Amine, A.; Hassan, O.A.; Shen, X.S. Join node selection, flow routing, and cell coverage optimization for network sum-rate maximization in wireless sensor networks. Wiley-IET Wirel. Sens. Syst. 2019, 9, 424–437 . [Google Scholar] [CrossRef]
  2. Goyal, S.; Patterh, M.S. Modified Bat Algorithm for Localization of Wireless Sensor Network. Wirel. Pers. Area Commun. 2016, 86, 657–670. [Google Scholar] [CrossRef]
  3. Kobo, H.I.; Abu-Mahfouz, A.M.; Hancke, G.P. A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements. Comput. Netw. 2017, 38, 399–422. [Google Scholar] [CrossRef]
  4. Kim, J.; Yoo, Y. Sensor Node Activation Using Bat Algorithm for Connected Target Coverage in WSNs. Sensors 2020, 20, 3733. [Google Scholar] [CrossRef]
  5. Elhabyan, R.; Shi, W.; St-Hilaire, M. Coverage protocol for wireless sensor network: Review and future direction. J. Commun. Netw. 2019, 21, 2292–2330. [Google Scholar] [CrossRef] [Green Version]
  6. Farsi, M.; Elhosseini, M.A.; Badawy, M.; Arafat, H. Deployment Techniques in Wireless Sensor Networks, Coverage and Connectivity: A Survey. Pervasive Mob. Comput. 2019, 5, 28940–28954. [Google Scholar] [CrossRef]
  7. Tripathi, A.; Gupta, H.P.; Dutta, T.; Mishra, R.; Shukla, K.K. Coverage and Connectivity in WSNs: A Survey, Research Issues and Challenge. J. Netw. Comput. Appl. 2019, 35, 619–632. [Google Scholar] [CrossRef]
  8. Ng, C.K.; Wu, C.H.; Ip, W.H.; Yung, K.L. A Smart Bat Algorithm for Wireless Sensor Network Deployment in 3-D Environment. IEEE Commun. Lett. 2018, 22, 2120–2123. [Google Scholar] [CrossRef]
  9. Poongodi, M.; Hamdi, M.; Malviya, M.; Sharma, A.; Dhiman, G.; Shanmuganthan, V. Diagnosis and combating COVID-19 using wearable Oura smart ring with deep learning methods. Pers. Ubiquitous Comput. 2021, 36, 1–10. [Google Scholar]
  10. Unaldi, N.; Temel, S. Wireless sensor deployment method on 3D environments to maximize quality of coverage and quality of network connectivity. In Proceedings of the World Congress Engineering and Computer Science, San Francisco, CA, USA, 22–24 October 2014; Volume 2, pp. 22–24. [Google Scholar]
  11. Priyadarshi, R.; Gupta, B.; Anurag, A. Deployment techniques in wireless sensor networks: A survey, classification, challenges, and future research issues. J. Supercomput. 2020, 76, 7333–7373. [Google Scholar] [CrossRef]
  12. Wang, N.-C.; Hsu, W.-J. Energy Efficient Two-Tier Data Dissemination Based on Q-Learning for Wireless Sensor Networks. Digit. Object Identifier 2020, 8, 74129–74136. [Google Scholar] [CrossRef]
  13. Lenka, R.K.; Rath, A.K.; Sharma, S. Building reliable routing infrastructure for green IoT network. IEEE Access 2019, 7, 129892–129909. [Google Scholar] [CrossRef]
  14. Ghosh, A.; Maeder, A.; Baker, M.; Chandramouli, D. 5G evolution: A view on 5G cellular technology beyond 3GPP release 15. IEEE Access 2019, 7, 127639–127651. [Google Scholar] [CrossRef]
  15. Nisioti, E.; Thomas, N. Fast Q-Learning for Improved Finite Length Performance of Irregular Repetition Slotted ALOHA. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2020, 9, 11–24. [Google Scholar] [CrossRef]
  16. Choudhary, G.; Kim, J.; Sharma, V. Security of 5G-mobile backhaul networks: A survey. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2018, 9, 41–70. [Google Scholar]
  17. Shen, S.; Yang, B.; Qian, K.; She, Y.; Wang, W. On Improved DV-Hop Localization Algorithm for Accurate Node Localization in Wireless Sensor Networks. Chin. J. Electron. 2019, 28, 658–666. [Google Scholar] [CrossRef]
  18. Singh, H.; Singh, D. Hierarchical clustering and routing protocol to ensure scalability reliability in large-scale wireless sensor networks. J. Supercomput. 2021, 75, 3712–3739. [Google Scholar] [CrossRef]
  19. Mohar, S.S.; Goyal, S.; Kaur, R. Optimized sensor nodes deployment in wireless sensor network using bat algorithm. Wirel. Pers. Commun. 2021, 116, 2835–2853. [Google Scholar] [CrossRef]
  20. Nieoleseu, D.; Nath, B. Ad-Hoc positioning system-s(APS). In Proceedings of the IEEE INFOCOM, San Antonio, CA, USA, 30 March–3 April 2003; pp. 1734–1743. [Google Scholar]
  21. Poongodi, M.; Hamdi, M.; Sharma, A.; Ma, M.; Singh, P.K. DDoS detection mechanism using trust-based evaluation system in VANET. IEEE Access 2019, 7, 183532–183544. [Google Scholar] [CrossRef]
  22. Han, Z.; Li, Y.; Liang, J. Numerical Improvement for the Mechanical Performance of Bikes Based on an Intelligent PSO-ABC Algorithm and WSN Technology. Digit. Object Identifier 2018, 6, 32890–32898. [Google Scholar] [CrossRef]
  23. Sharma, R.; Sharma, S. Evaluating the performance of density grid-based clustering using ABC technique for efficient routing in WSNs. Telecommun. Syst. 2018, 67, 63–71. [Google Scholar]
  24. Anwar, F.; Motakabber, S.M.A. A Noble Approach of ACO Algorithm for WSN. J. Vibroeng. 2018, 19, 4198–4209. [Google Scholar]
  25. Poongodi, M.; Vijayakumar, V.; Al-Turjman, F.; Hamdi, M.; Ma, M. Intrusion prevention system for DDoS attack on VANET With reCAPTCHA controller using information based metrics. IEEE Access 2019, 7, 158481–158491. [Google Scholar] [CrossRef]
  26. Mohar, S.S.; Goyal, S.; Kaur, R. Fruit fly optimization algorithm for intelligent IoT applications. In Emerging Trends and Role of Fog, Edge and Pervasive Computing in Intelligent IoT Driven Applications; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2020; pp. 284–309. [Google Scholar]
  27. Vijayakumar, K.; Suchitra, S.; Shri, P.S. A secured cloud storage auditing with empirical outsourcing of key updates. Int. J. Reason.-Based Intell. Syst. 2019, 11, 109–114. [Google Scholar] [CrossRef]
  28. Sivagami, P.; Jothi, N.M. Swaroopan, Smart methodology for performance improvement of energy sources for home application. Microprocess. Microsyst. 2020, 74, 103042. [Google Scholar] [CrossRef]
  29. Bharathi, M.L.; Basha, R.F.K.; Ramanathan, S.K.; Harikrishnan, R. Fuzzy Logic controlled Maximum Power Point Tracking for SEPIC converter fed DC drive—A Hybrid Power Generation System. Microprocess. Microsyst. 2020, 12, 103371. [Google Scholar] [CrossRef]
  30. Vijayakumar, K.; Arun, C. Continuous security assessment of cloud based applications using distributed hashing algorithm inSDLC. Clust. Comput. 2019, 22, 10789–10800. [Google Scholar] [CrossRef]
  31. Illavarason, P.; Arokia Renjith, J.; Mohan Kumar, P. Medicaldiagnosis of Cerebral Palsy Rehabilitation using eye images inMachine learning techniques. J. Med. Syst. 2019, 43, 278–302. [Google Scholar] [CrossRef]
  32. Sherubha, P.; Sasirekha, S.P.; Manikandan, V.; Gowsic, K.; Mohanasundaram, N. Graph Based Event Measurement for Analyzing Distributed Anomalies in Sensor Networks. Sadhana 2020, 45, 212. [Google Scholar] [CrossRef]
  33. Mohar, S.S.; Goyal, S.; Kaur, R. Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics. J. Supercomput. 2022, 78, 11975–12023. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Node-based optimization using cluster in WSN.
Figure 1. Node-based optimization using cluster in WSN.
Symmetry 14 02515 g001
Figure 2. CH formation for node optimization with energy conservation.
Figure 2. CH formation for node optimization with energy conservation.
Symmetry 14 02515 g002
Figure 3. Implementation of M B N O algorithm to estimate the node optimization and energy conservation.
Figure 3. Implementation of M B N O algorithm to estimate the node optimization and energy conservation.
Symmetry 14 02515 g003
Figure 4. Node localization.
Figure 4. Node localization.
Symmetry 14 02515 g004
Figure 5. Variant 1 based node localization.
Figure 5. Variant 1 based node localization.
Symmetry 14 02515 g005
Figure 6. Objective function estimation for a C-shaped network with optimized nodes.
Figure 6. Objective function estimation for a C-shaped network with optimized nodes.
Symmetry 14 02515 g006
Figure 7. Objective function estimation for an H-shaped network with optimized nodes.
Figure 7. Objective function estimation for an H-shaped network with optimized nodes.
Symmetry 14 02515 g007
Figure 8. Objective function estimation for an S-shaped network with optimized nodes.
Figure 8. Objective function estimation for an S-shaped network with optimized nodes.
Symmetry 14 02515 g008
Figure 9. Iterations vs. energy conservation using Bat Algorithm.
Figure 9. Iterations vs. energy conservation using Bat Algorithm.
Symmetry 14 02515 g009
Figure 10. Iterations vs. throughput analysis of a node in packet transmission using Bat Algorithm.
Figure 10. Iterations vs. throughput analysis of a node in packet transmission using Bat Algorithm.
Symmetry 14 02515 g010
Figure 11. Comparison of computational time.
Figure 11. Comparison of computational time.
Symmetry 14 02515 g011
Figure 12. Comparison of localization node.
Figure 12. Comparison of localization node.
Symmetry 14 02515 g012
Figure 13. Comparison of mean localization error.
Figure 13. Comparison of mean localization error.
Symmetry 14 02515 g013
Table 1. Notations used in the proposed system.
Table 1. Notations used in the proposed system.
ParametersDetails
NSensor nodes group
{N1,N2,N3,…Nn}Set of sensor nodes
UUnknown nodes
NSNNeighbor nodes
N = U N S N Coverage optimization
N (Xm, Yn)Node coverage
XAdjacent nodes coverage parameter
YnNearest hop nodes
U = m−1, m−2, m−3Adjacent node
U = n−1, n−2, n−3Nearest hop node estimation
hop = N U Hop distance
h d m ,   n e s t Nearest hop distance estimation
h d m , n a c t Nearest hop distance actual
EAThe average error in distance between the sensor and adjacent nodes
SDShortest distance between the sensor and unknown nodes
NmSensor nodes in the m segments
EstAmEstimation accuracy of the sensor nodes
ANSet of the unknown nodes in the coverage area
AVG disterrorAverage of the distance in the estimated and the actual
TSN(i)Threshold values of sensor network
EDEuclidean distance
Pr chProbability of percentage in cluster head
PsnProbability of sensor nodes
EsSensor node energy
Esrc,destEnergy of source node and destination node
RXEReceived energy
TnTotal number of nodes
RtRange of transmission nodes
Table 2. Assumptions in energy monitoring using the cluster for M B N O algorithm.
Table 2. Assumptions in energy monitoring using the cluster for M B N O algorithm.
ValuesEstimations
−1The sensor node and the route are assumed to be non-alive
0The sensor node and the route are assumed to be of static or ideal mode
1The sensor node and the route are assumed to be in the cluster head assumption
>1A node acting as cluster head
Table 3. Simulation settings.
Table 3. Simulation settings.
Simulation ParametersC-, H-, S-Shaped Networks
Simulation area250 × 250 m
Frequency band700 MHz
Sensor nodes30
Anchor and other unknown nodes250
Channel bandwidth4 MHz
Packet size (Control)150 bit
Packet size (Data)4 Kbytes
Energy during transmission0.1
Transmitter energy40 × 10−8
Receiver energy40 × 10−8
Maximum lifetime6 × 10−8
Table 4. Objective function estimation for a C-shaped network with optimized sensor nodes.
Table 4. Objective function estimation for a C-shaped network with optimized sensor nodes.
NodesObjective Function Values (ms)
M B N O ACOABC
100.30.20.1
150.40.350.2
200.60.540.3
250.850.620.42
3010.70.45
Table 5. Objective function estimation for an H-shaped network with optimized sensor node.
Table 5. Objective function estimation for an H-shaped network with optimized sensor node.
NodesObjective Function Values (ms)
M B N O ACOABC
100.40.30.2
150.50.50.3
200.70.60.4
250.950.80.56
301.120.90.6
Table 6. Objective function estimation for an S-shaped network with optimized sensor nodes.
Table 6. Objective function estimation for an S-shaped network with optimized sensor nodes.
NodesObjective Function Values (ms)
M B N O ACOABC
100.50.40.3
150.60.50.4
200.80.70.6
250.980.80.7
301.181.081.03
Table 7. Energy conservation using Bat Algorithm in various iterations.
Table 7. Energy conservation using Bat Algorithm in various iterations.
Iterations M B N O ACO (J)ABC (J)
1000606570
2000556068
3000454855
4000404556
5000354050
6000253545
700081520
Table 8. Comparison of computational time, mean localization error and localization nodes.
Table 8. Comparison of computational time, mean localization error and localization nodes.
Anchor NodeMBNO AlgorithmBat VariantStandard Bat Algorithm
T(s) N L MLET(s) N L MLET(s) N L MLE
100.291460.30.341450.440.951320.32
150.311500.310.351480.400.961350.32
200.311510.30.361510.370.971440.31
250.311510.260.361510.340.991460.31
300.311520.290.371510.3311490.30
350.311530.260.371510.321.011500.29
400.321530.250.371510.321.021510.28
450.331530.240.371510.321.031510.28
500.331540.230.371510.301.041520.27
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Balachandran Nair Premakumari, S.; Mohan, P.; Subramanian, K. An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm. Symmetry 2022, 14, 2515. https://doi.org/10.3390/sym14122515

AMA Style

Balachandran Nair Premakumari S, Mohan P, Subramanian K. An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm. Symmetry. 2022; 14(12):2515. https://doi.org/10.3390/sym14122515

Chicago/Turabian Style

Balachandran Nair Premakumari, Sreeja, Prakash Mohan, and Kannimuthu Subramanian. 2022. "An Enhanced Localization Approach for Energy Conservation in Wireless Sensor Network with Q Deep Learning Algorithm" Symmetry 14, no. 12: 2515. https://doi.org/10.3390/sym14122515

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop