Skip to main content
Erschienen in: Complex & Intelligent Systems 5/2023

Open Access 08.04.2023 | Original Article

Application of improved black hole algorithm in prolonging the lifetime of wireless sensor network

verfasst von: Wei-Min Zheng, Ning Liu, Qing-Wei Chai, Yong Liu

Erschienen in: Complex & Intelligent Systems | Ausgabe 5/2023

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sensor technology is developing rapidly and up to date. The lifetime of the Wireless Sensor Network (WSN) has also attracted many researchers, and the location of the Base Station (BS) plays a crucial role in prolonging the lifetime. The energy consumption in the WSN occurs during transmission of data and selection of cluster-head nodes. A reasonable location of the BS prolongs the lifetime of the WSN. This study proposes a Levy Flight Edge Regeneration Black Hole algorithm (LEBH) to speed up convergence and enhance optimization capabilities. The performance of LEBH and other heuristic algorithms are compared on CEC 2013. The result shows that the LEBH outperforms other heuristics in most cases. In this study, the energy consumption and WSN models are simulated. Subsequently, the proposed LEBH is combined with relocation technology to change the location of the BS to prolong the lifetime. Simulation results show LEBH-BS prolongs the lifetime of the WSN better than random-base and static-base stations and other heuristic algorithms in most cases.
Hinweise

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Introduction

Optimisation problems, especially NP problems, are becoming more complex. Heuristic algorithms solve NP problems better than other algorithms. The no-free-lunch theorem has proven that for any problem, there is no optimal algorithm, only the most suitable algorithm [1, 2]. To keep up with the development of the epoch, different heuristic algorithms were proposed to solve various optimisation problems. The earliest heuristic algorithm is the genetic algorithm (GA), which optimises the problem by imitating the crossover and mutation process of chromosomes in the biological genetic process [3]. In 1992, Dorigo proposed the ant colony optimisation (ACO) algorithm, which was inspired by the behaviour of ant foragings [4]. In 1995, Dorigo proposed the particle swarm optimisation (PSO) algorithm, which is the most widely used heuristic algorithm [5]. Between 2003 and 2016, Li Xiaolei, PAssino, Karaboga, Yang, Hatamlou, Mirjalili, Lewis and others successively proposed artificial fish swarm algorithm (AFSA) [6], bacterial foraging algorithm (BFA) [7], artificial bee colony (ABC) [8], firefly algorithm (FA) [9], black hole (BH) [10], bat algorithm (BA) [11], grey wolf optimisation (GWO) [12], ant lion optimisation (ALO) [13], and whale optimisation algorithm (WOA) [14]. In 2019, Weiguo Zhao was inspired by the coordinated symbiosis between various organisms in the artificial ecosystem and proposed an artificial ecosystem-based optimisation (AEO) [15]. In 2020, Fathollahi-Fard was inspired by the unusual mating behaviour of red deer and proposed the red deer algorithm (RDA) [16]. In 2020, Mirjalili was inspired by the changes in the sine and cosine functions in mathematics and proposed the sine–cosine algorithm (SCA) [17]. These algorithms are used to solve various problems in life [1820].
The BH was proposed by Hatamlou based on the characteristics of black holes [10]. The black hole can swallow all the matter around it. Stars entering within the radius of the black hole are swallowed. According to this phenomenon, the BH takes the black hole as the global optimal solution of each iteration, and stars as the individual iteration. The BH has attracted several scholars’attention due to its simple structure [2123]. Salih used BH to train convolutional neural network (CNN) to avoid local minimum traps, thereby improving the performance of CNN [24]. Existing feature selection methods need large amount of calculation. Pashaei proposed a binary BH to solve it [25]. Pashaei embedded the BH into the particle swarm algorithm, and applied it to medical gene selection technology [26].
The WSN effectively collects the information and transmits them to the BS for data analysis. The WSN has been applied to many scenarios, such as forest fire monitoring [27] and coal mining industry [28].The WSN is composed of BS, cluster-head nodes, anchor nodes, and ordinary nodes. Each node is composed of a receiver, controller, transmitter, memory, and battery. The energy of a node is usually limited, and in the form of a battery. However, it is very difficult to replace the battery in some extreme situations such as deep mountains, forests, deep waters, and alpine ice fields. Currently, the nodes under extreme conditions are broadcast by airplanes or warships, and are not replaced after the broadcast until the power is exhausted [29]. Therefore, prolonging the lifetime of the WSN is a crucial research topic [3032].
Nodes consume energy when they receive and transmit information. The distance between BS and every node is a key factor of the energy consumption [33, 34]. The position of the BS is crucial in prolonging the lifetime. Therefore, dynamically adjusting the best location of the BS according to the networking situation is a effective manner to prolong the lifetime [35, 36].
Akkaya referred to static positioning and other studies and introduced the dynamic scheme of relocating the BS during network operation. Dynamic base station positioning could effectively optimises network functions [37]. Osama proposed a new method to organise network and used the harmony search algorithm to relocate the BS to prolong the life of the WSN [38]. Pant proposed adaptive convergence and relocation methods (AST-EASR) to maximise the network lifetime of WSN [39]. Cayirpunar proposed that some nodes dissipate their energy sub optimally. Thus, the farther node transmits part of its data to a longer distance to reduce the burden of the node closer to the BS [40].
The remainder of this paper is organised as follows. The next section presents the related work. The subsequent section presents the energy consumption and simulation application models followed by which the improvement process of the LEBH is presented. Then the application of the LEBH to simulation application model is presented. The final section concludes the paper.
The BH and related studies of relocating the BS to prolong the lifetime of the WSN is presented in this section.

Black hole algorithm

The BH is a population-based optimisation algorithm [10]. It has several similarities with other algorithms. For example, in GA, the update of the optimal solution is generated through crossover and mutation [3]; in GWO, the update of the optimal solution is generated by the head wolf [41]. When other grey wolves find a better position than the head wolf, the original head wolf is replaced [12]. The BH is an extension of the PSO. In the BH, the position of the black hole is regarded as the best solution and each star is regarded as a particle. When the algorithm is initialised, several particles and a black hole position are randomly generated. In each iteration process, each particle is affected by gravity of the black hole and gradually moves to it. When a particle enters the range of the black hole, the particle is swallowed and a random particle is regenerated. The black hole position will be replaced when BH find a better position.
In the BH, each particle is regarded as a candidate solution. The fitness values of particles are calculated in each iteration. The best position of black hole represents the best solution. During each iteration, the particles move to the black hole according to Formula (1).
$$\begin{aligned} X_i^{g+1}=X_i^g+rand\times (X_{BH}-X_i^g) \qquad i=1,2,...,N, \end{aligned}$$
(1)
where \(X_i^{g+1}\) represents the position of the ith star at the g+1 iteration, and \(X_i^g\) represents the position of the ith star at the g iteration. \(X_{BH}\) indicates the location of the black hole. N indicates the total of candidate solutions.
During the movement process, if the particle finds a better position, the particle position replaces the original black hole position to become a new black hole; other particles move to the new black hole position in the next iteration. If the particle reaches the black hole’s swallowing radius, the particle is swallowed. To keep the number of particles unchanged, the particle is randomly regenerated. The black hole radius is related to the fitness values of particles and is calculated by Formula (2).
$$\begin{aligned} R=\frac{fitness(BH)}{\sum _{i=1}^Nfitness(i)}, \end{aligned}$$
(2)
where fitness(BH) represents the fitness value of the black hole. fitness(i) represents the fitness value of the ith particle.
The implementation process of the BH is shown in Algorithm (1).
In [38], it is proposed that energy consumption mainly occurs during the information transmission process between the anchor node and BS; the location of the BS determines the degree of energy consumption. Anchor nodes are grouped according to a routing protocol. A heuristic algorithm of harmony search is used to locate the BS. The simulation experiment proves that the relocation of the BS has a longer lifetime than the random-base and static-base stations.
In [42], it is proposed that a faulty node significantly consumes the energy of the WSN. A mechanism for restoring node connectivity is proposed in [42]. The mechanism recovers the connectivity of the network by moving as few nodes as possible to solve the problem of excessive energy consumption caused by failed nodes. In [43], a clustering method named decentralised fuzzy clustering protocol (DFCP) is proposed. This method divides the anchor nodes better. Initially, the K-means are used to divide the anchor nodes into different clusters and each cluster is divided through the DFCP protocol. The prolonged lifetime of WSN is achieved by optimising the networking protocol. In [44], a distance-based relocation mechanism is proposed. The mechanism reduces the energy consumption of the WSN. In [45], a method of relocating the mobile-base station is proposed. This method guarantees better data transmission and resource optimisation. The study conducts simulation experiments on energy utilization and false alarm rate and the results prove that the method proposed in the study effectively prolongs the lifetime of the WSN. In [46], an exhaustive search algorithm is used to evaluate the necessity of relocating BS in WSN. A mechanism for locating BS based on available energy resources and the flow of sensor nodes at that time is proposed.
In [47], the issues of when and where to relocate the BS and how to deal with the movement without affecting data traffic were discussed. When the energy consumption by the anchor node exceeds the threshold, the BS moves to a better position under the reasonable cost. This method prolongs the lifetime of the WSN and has been verified in a simulation environment. In [48], a bionic optimisation relocation method is proposed to relocate the sink node. Simulation experiments have proven that this method prolongs the network’s life. In [49], a designed technique based on the shortest path between multiple mobile nodes and a single BS was proposed. The position of the BS is dynamically located using relocation technology, which effectively increases the data transmission efficiency. In [50], the existing clustering solutions had low energy efficiency and poor scalability. For these problems, an improved clustering protocol for WSN based on harmony search was proposed. The protocol uses a new objective function to determine the cluster heads to reduce energy consumption. Simulation experiments verify the effectiveness of this method. In [51], a relocation method based on the balance of energy supply was proposed. This algorithm maximises the coverage and minimises the total distance of node movement. Simulation experiments verify the effectiveness of this method.
Although the methods for prolonging network life in various application scenarios mentioned in the numerous documents above are effective, there is room for improvement. The accuracy of the relocation and complexity of the application scenarios need to be further studied. This study applies the optimised BH to relocate the BS in more complex application scenarios to prolong the life of the WSN. The application scenario model is described in detail in the section “Energy consumption and application models”.

Energy consumption and application models

This section presents the energy consumption and simulation experiment application models.

Energy consumption model

The transmission and reception of data consumes energy. Energy consumption is related to data size and transmission distance. The formulas for calculating the energy consumption when the message of b bit is transmitted with a transmission distance of d m are shown in Formula (3) and Formula (4).
$$\begin{aligned} E_{Tx}= & {} E_{elec}\times b+E_{fs}\times b\times d^2,\ \ \ \ \ \ d\le d_0 \end{aligned}$$
(3)
$$\begin{aligned} E_{Tx}= & {} E_{elec}\times b+E_{mp}\times b\times d^4,\ \ \ \ \ \ d > d_0, \end{aligned}$$
(4)
where \(E_{Tx}\) indicates the total consumption of the sensor node. \(E_{elec}\) indicates the energy consumed by the transceiver when transmitting and receiving b bit data. \(E_{fs}\) represents the consumption to transmit data of b bit when the distance is d m in the free space model. \(E_{mp}\) represents the consumption for transmitting data of b bit when the distance is d m in the multipath model. The free space model is that the energy is only consumed by the diffusion of the radio wave in the process of propagation, and there is no other way of energy consumption. The multipath model considers that the signal is reflected by some objects during its propagation, which changes the propagation direction, amplitude, polarisation, and phase of the signal. These changed signals arrive at the receiver and overlap with the signals arriving at the receiver through the straight path to cause multipath effect. \(d_0\) represents a threshold selected by the energy consumption model. The formula of \(d_0\) is shown in Formula (5).
$$\begin{aligned} d_0=\sqrt{E_{fs}/E_{mp}}. \end{aligned}$$
(5)
The formula for calculating the energy consumed by the receiver and transceiver when receiving but not sending data is shown in Formula (6).
$$\begin{aligned} E_{Rx}=E_{elec}\times b. \end{aligned}$$
(6)
Considering that the data are highly similar when each cluster head broadcasts its cluster to each anchor node, a data aggregation scheme is proposed to reduce unnecessary energy consumption caused by repeated data transmission. Regardless of the number of nodes, this scheme compresses data into B bits. The energy consumption of data aggregation is set to \(E_{da}=2nJ/bit/message\).

Application model

The node types involved in the model include ordinary, anchor, and cluster-head nodes and BS. Taking four clusters as an example, in Fig. 1, black square represents the BS, black triangle represents the anchor node, and black circle represents the ordinary node. The red solid line indicates that after clustering, the anchor node transmits data to the cluster-head node and the blue solid line indicates that the cluster-head node transmits the data to the BS.
The concrete implementation steps in the application model are divided into the following steps: First, the nodes are clustered according to the most reasonable clustering scheme. Second, the cluster head node of each cluster is selected according to the selection strategy. Only anchor nodes with residual energy higher than the average energy in the cluster can participate in the election. The selection strategy is shown in Formula (7).
$$\begin{aligned} CH_{selec}=\max _{\forall cd_i \in CD_c} \left\{ \frac{E_{cd_i} \times q}{\alpha \times f_1 + (1-\alpha )\times f_2}\right\} , \end{aligned}$$
(7)
where \(CH_{selec}\) represents the cluster-head node to be selected next time. \(E_{cd_i}\) represents the residual energy of the candidate anchor node. \(f_1\) represents the sum of distances between the candidate node and other anchor nodes. \(f_2\) represents the distance between the candidate anchor node and the BS. \(\alpha \) and q are two control parameter. The formula of \(f_1\) and \(f_2\) are shown in Formulas (8) and (9).
$$\begin{aligned} f_1= & {} \sum _{j=1}^{N_c}\parallel n_j-cd_i\parallel \end{aligned}$$
(8)
$$\begin{aligned} f_2= & {} \parallel cd_i-BS\parallel , \end{aligned}$$
(9)
where \(N_c\) represents the number of anchor nodes that participate in the election. \(cd_i\) indicates the position of the ith candidate node. \(n_j\) indicates the position of the jth anchor node.
Candidate nodes consume energy when competing for cluster-head node. The formula for calculating energy consumption is shown in Formula (10).
$$\begin{aligned} E_{CH-Elec}=e \times number, \end{aligned}$$
(10)
where number represents the number of anchor nodes that participate in the election. e is a constant.
After determining cluster-head nodes, it is necessary to relocate the most suitable location of the BS. The location of the BS minimises the maximum distance from the BS to each cluster-head node. The BS is selected by Formula (11).
$$\begin{aligned} BS_{obj}=min\left( \max _{\forall i\in C}\left( BS_{loc},CH_i\right) \right) , \end{aligned}$$
(11)
where \(BS_{loc}\) represents the logical search location of the BS. \(CH_i\) indicates the position of the ith cluster-head node. C indicates the number of cluster-head nodes. \(BS_{obj}\) indicates the location of the BS determined after searching.
Subsequently, cluster-head nodes broadcast which cluster other anchor nodes belong to and the data transmission schedule to avoid transmission congestion caused by all nodes of the cluster transmitting data simultaneously. After receiving the broadcast schedule, anchor nodes store it and transmit the collected data according to the time specified in the schedule. During the transmission, anchor nodes activate the radio component at the specified time to realize the data transmission. Cluster nodes receive data and transmit them to the BS for data analysis.
If the anchor node fails or runs out of energy, it exits the WSN. When the anchor node exits the WSN, the entire WSN is rebuilt. Reconstruction improves the re-clustering of nodes, thus, prolonging the lifetime of WSN.

Improvement of black hole algorithm

In this study, Levy Flight and Edge Regeneration strategies are introduced to optimise the original BH.

Levy flight strategy

Levy Flight is a movement with a small probability of large step length and a large probability of small step length. Levy Flight is a non-Gaussian random walk. The figure of Levy Flight is shown in Fig. 2.
The random step size of Levy flight is obtained according to Levy state distribution function. Levy state distribution function is a simple power function and its distribution function is shown in Formula (12) [52].
$$\begin{aligned} L(s)\sim |s|^{-1-\beta },\ \ \ \ (0 < \beta \le 2), \end{aligned}$$
(12)
where s and \(\beta \) represent the step length and an index, respectively.
Mathematically, the simple definition of Levy distribution function is shown in Formula (13).
$$\begin{aligned}&L(s,\gamma ,\mu )\nonumber \\&={\left\{ \begin{array}{ll}\sqrt{\frac{\gamma }{2\pi }}\exp \left( -\frac{\gamma }{2(s-\mu )}\right) \frac{1}{(s-\mu )^{3/2}} &{} if \ \ 0<\mu<s<\infty \\ 0 &{} if \ \ s \le 0,\end{array}\right. } \end{aligned}$$
(13)
where \(\mu \) is location or shift parameter. \(\gamma > 0\) is a scale parameter.
Generally, Levy distribution function is often defined by Fourier transform as shown in Formula (14) [53].
$$\begin{aligned} F(k)=\exp (-\alpha |k|^\beta ), \ \ \ \ 0<\beta \le 2, \end{aligned}$$
(14)
where \(\beta \) is Levy index. \(\alpha \) is a scale factor, and it value is between [–1,1].
The step size s of Levy Flight is generally calculated by Mantegna algorithm as shown in Formula (15).
$$\begin{aligned} s=\frac{u}{v^{1/\beta }}, \end{aligned}$$
(15)
where u and v are drawn from normal distributions. as shown in Formula (16).
$$\begin{aligned} u\sim N(0,\sigma _u^2),\qquad v\sim N(0,\sigma _v^2). \end{aligned}$$
(16)
The value and calculation of \(\sigma _u\) and \(\sigma _v\) are shown in Formula (17).
$$\begin{aligned} \sigma _u=\left\{ \frac{\tau (1+\beta )\sin \left( \frac{\beta \pi }{2}\right) }{\tau \left( \frac{1+\beta }{2}\right) \beta 2^{\frac{\beta -1}{2}}}\right\} ^{1/\beta },\qquad \sigma _v=1, \end{aligned}$$
(17)
where \(\tau \) is the standard gamma function. Therefore, step(g) of Levy Flight in BH can be calculated by Formula (18).
$$\begin{aligned} step(g)=0.01\times s(g), \end{aligned}$$
(18)
where s(g) and step(g) indicates the step length of Levy Flight in the gth iteration and the gth Levy Flight in the BH, respectively. The constant 0.01 makes Levy Flight in the BH not extremely radical.
Levy Flight gives each particle a probability to adopt Levy Flight strategy to let the particles find a better solution. The position change of particles after Levy Flight is calculated using Formula (19).
$$\begin{aligned} X_i^{g+1} = X_i^g + step(g) \times (X_{BH}-X_i^g). \end{aligned}$$
(19)

Edge regeneration strategy

Edge regeneration strategy accelerates the convergence speed of BH. The original BH randomly generates new particles in the solution space after the particles enter the radius of the black hole. The Edge Regeneration strategy regenerates particles around the black hole, such that particles approach the optimal solution faster. Two sub-strategies, which are based on random regeneration and normal distribution around the black hole, are used during regeneration. A selection rate c is set for which strategy to use. When the particle is absorbed by the black hole, r is generated randomly. When r is smaller than c, Formula (20) is used to regenerate new particles; otherwise, Formula (21) is used to regenerate new particles. The regeneration formulas of the particle after being absorbed by the black hole are Formula (20) and Formula (21).
$$\begin{aligned} X_{new}= & {} X_{BH} \times (0.75 + 0.5 \times rand) \end{aligned}$$
(20)
$$\begin{aligned} X_{new}= & {} X_{BH} + normrnd(0,\sigma ^2), \end{aligned}$$
(21)
where \(X_{new}\) represents the location of the regenerated particles. The normrnd represents the standard normal distribution.

The pseudo-code of LEBH

As mentioned above, the implementation process of LEBH is shown in the algorithm (2).

Simulation experiment

First, the performance of LEBH is tested using CEC 2013 [54]. Second, to make the experiments more convincing, clustering experiments are carried out to compare the performance. Then, the relevant parameters of the simulation experiment of prolong the lifetime of the WSN are set and explained. In addition, the LEBH is used to relocate the BS and compare the lifetime with the random-base and static-base stations. Finally, the LEBH-BS and other heuristic algorithms are compared in terms of relocating to compare the lifetime of the WSN.

The performance test of LEBH

The performance of LEBH is tested using CEC 2013. CEC 2013 contains 5 unimodal, 15 multimodal, and 8 mixed functions. The functions in CEC 2013 are representative and persuasive. The 28 functions are represented by f1–f28. The parameter settings for each comparison are the same.
Table 1
Parameter settings for each algorithm
Name
Parameters
LEBH
D = 50; N = 60; Levy flight rate = 0.7; selection rate = 0.65
BH
D = 50; N = 60
PSO
D = 50; N = 60; w = 0.2; c1 = \(-\)0.07; c2 = 3.74
GA
D = 50; N = 60; crossover rate = 0.01; mutation rate = 0.9
BA
D = 50; N = 60; pulse rate = 0.5; loudness = 0.6; fmin = 0; fmax = 1
WOA
D = 50; N = 60; Probability switch = 0.5
SCA
D = 50; N = 60; Probability switch = 0.5
Table 2
The results of Wilcoxon signed rank test and performance test
 
BH
 
WOA
 
GA
 
PSO
 
SCA
 
BA
 
LEBH
f1
–1.40E+03
\(=\)
–1.36E+03
>
1.61E+05
>
–1.22E+03
>
2.70E+04
>
–1.39E+03
>
–1.40E+03
f2
2.78E+07
>
8.10E+07
>
5.34E+09
>
5.97E+06
>
5.07E+08
>
5.19E+06
>
4.76E+06
f3
7.94E+09
>
4.11E+10
>
7.38E+19
>
2.45E+10
>
1.09E+11
>
5.10E+08
<
1.19E+09
f4
3.18E+04
>
6.18E+04
>
6.55E+05
>
5.83E+03
<
6.37E+04
>
1.98E+04
<
2.28E+04
f5
–9.01E+02
>
–8.07E+02
>
8.99E+04
>
–9.38E+02
>
2.44E+03
>
–9.96E+02
>
–1.00E+03
f6
–7.96E+02
>
–6.66E+02
>
2.88E+04
>
–8.04E+02
>
1.21E+03
>
–8.40E+02
<
–8.14E+02
f7
–6.19E+02
>
–3.18E+02
>
6.09E+06
>
–2.39E+02
>
–6.06E+02
>
9.86E+02
>
–6.33E+02
f8
–6.79E+02
\(=\)
–6.79E+02
\(=\)
–6.79E+02
\(=\)
–6.79E+02
\(=\)
–6.79E+02
\(=\)
–6.79E+02
\(=\)
–6.79E+02
f9
–5.31E+02
>
–5.29E+02
>
–5.19E+02
>
–5.30E+02
>
–5.26E+02
>
–5.33E+02
>
–5.34E+02
f10
–4.67E+02
>
–2.17E+02
>
2.18E+04
>
–4.64E+02
>
3.42E+03
>
–4.96E+02
>
–4.99E+02
f11
4.33E+02
>
4.02E+02
>
2.11E+03
>
1.74E+02
>
3.09E+02
>
7.61E+02
>
–3.42E+02
f12
5.53E+02
>
6.50E+02
>
1.96E+03
>
3.37E+02
<
4.56E+02
<
8.98E+02
>
4.59E+02
f13
6.43E+02
>
8.43E+02
>
2.03E+03
>
6.86E+02
>
5.53E+02
<
1.16E+03
>
5.63E+02
f14
8.57E+03
>
8.92E+03
>
1.64E+04
>
8.11E+03
>
1.36E+04
>
8.93E+03
>
1.83E+03
f15
8.89E+03
>
1.15E+04
>
1.61E+04
>
1.03E+04
>
1.44E+04
>
8.81E+03
>
8.79E+03
f16
2.02E+02
>
2.03E+02
>
2.05E+02
>
2.03E+02
>
2.03E+02
>
2.02E+02
>
2.02E+02
f17
1.35E+03
>
1.47E+03
>
5.26E+03
>
1.18E+03
>
1.31E+03
>
2.65E+03
>
6.51E+02
f18
1.45E+03
>
1.51E+03
>
5.29E+03
>
1.28E+03
<
1.40E+03
>
2.94E+03
>
1.36E+03
f19
6.14E+02
>
6.74E+02
>
2.59E+07
>
7.75E+02
>
4.29E+04
>
5.68E+02
>
5.36E+02
f20
6.24E+02
<
6.25E+02
>
6.25E+02
>
6.25E+02
>
6.24E+02
<
6.25E+02
>
6.25E+02
f21
1.68E+03
<
1.86E+03
>
1.26E+04
>
1.59E+03
<
4.67E+03
>
1.53E+03
<
1.69E+03
f22
1.27E+04
>
1.28E+04
>
1.86E+04
>
1.20E+04
>
1.54E+04
>
1.27E+04
>
3.02E+03
f23
1.28E+04
>
1.39E+04
>
1.81E+04
>
1.36E+04
>
1.61E+04
>
1.22E+04
<
1.25E+04
f24
1.43E+03
>
1.41E+03
>
2.08E+03
>
1.47E+03
>
1.43E+03
>
1.45E+03
>
1.39E+03
f25
1.54E+03
<
1.53E+03
<
1.76E+03
>
1.68E+03
>
1.55E+03
>
1.47E+03
<
1.54E+03
f26
1.61E+03
<
1.65E+03
<
1.79E+03
>
1.70E+03
>
1.59E+03
<
1.69E+03
>
1.66E+03
f27
3.56E+03
>
3.54E+03
>
4.68E+03
>
3.91E+03
>
3.66E+03
>
3.50E+03
>
3.44E+03
f28
7.50E+03
>
8.79E+03
>
1.72E+04
>
7.92E+03
>
6.84E+03
>
1.08E+04
>
5.63E+03
\(>/=/<\)
22/2/4
 
25/1/2
 
27/1/0
 
23/1/4
 
23/1/4
 
21/1/6
  
Subsequently, LEBH is compared with PSO, GA, BA, WOA, SCA, and BH using CEC 2013. Meanwhile, the Wilcoxon signed rank tests are measured at a significant level \(\alpha =0.05\). All the algorithms in this study are tested in 50 dimensions and the population number is set to 60. The range of CEC 2013 test function is [–100, 100]. To prevent contingency, we test each function 20 times, and take the average as the test result. When comparing various algorithms, the values of common parameters are the same. D represents the dimension and N represents the population size. Table 1 shows the parameter settings.
Table 2 shows the results of the Wilcoxon signed rank test results and the performance comparisons. The \((<)\) indicates that the LEBH is worse than another algorithm. The \((>)\) indicates that the LEBH is better than another algorithm. The \((=)\) indicates that the two algorithm is similar. The last line counts the three cases.
Table 2 shows that the LEBH performs better than PSO on 23 functions, worse than PSO on four functions, and similar to PSO on one function. The LEBH performs better than GA on 27 functions except f8. The LEBH performs better than BA on 21 functions, worse than BA on six functions, and similar to BA on one function. The LEBH performs better than WOA on 25 functions except f8, f25, f26. The performance of LEBH is better than SCA on 23 functions, worse than SCA on four functions, and similar to SCA on f8. The performance of LEBH is better than BH on 22 functions, similar with BH on two functions and worse than BH on four functions.
We select several easily distinguishable function images to evaluate the optimising and convergence abilities of LEBH, PSO, GA, BA, WOA, SCA, and BH because on some test functions, the image difference is small and difficult to distinguish. The results are shown in Fig. 3.
The convergence curves in Fig. 3 represent the convergence process of each algorithm under the test function of CEC2013. At the beginning of the iteration, the faster the curve descends, the better the convergence of the algorithm. At the end of the iteration, the smaller the ordinate value of the curve, the better the optimization ability of the algorithm. Figure 3 selects six test functions with obvious convergence process for display. It can be seen from Fig. 3 that compared with other algorithms, LEBH has a better convergence advantage in the early stage of iteration, and has better optimization ability in the later stage. Figure 3 shows that the proposed LEBH has good performance in most test functions. Taking f23 as an example, in the first 300 iterations, LEBH converges rapidly, and then LEBH iteratively finds the optimal solution around the convergence range.

Clustering experiments

In this subsection, clustering experiments are taken to test the performance of different algorithms. Clustering is an important way of data analysis. The effect of clustering can reflect the performance of algorithms. In this subsection, four benchmark datasets of Iris, Cmc, Wine, and Seeds are used for algorithm performance analysis. The performance of the algorithm can be evaluated by two indicators: the error rate of clustering (ER) and the sum of intra-cluster distances (SD). The ER represents the rate of wrongly classified data in the clustering process, and the smaller the value, the better the performance of the algorithm. The SD indicates the sum of the distances from each cluster object to the center point of its own class, and the smaller the value, the better the performance of the algorithm. The sum of intra-cluster distances is also the fitness function of the optimization algorithm. The calculation process of ER and SD are shown in Formula 22 and 23.
$$\begin{aligned}&Error\_rate=\frac{Number\;of\;misclassified\;objects}{Total\;number\;of\;objects} \times 100\% \end{aligned}$$
(22)
$$\begin{aligned}&Sum\_Distance=\sum _{i=1}^N\sum _{j=1}^K\sqrt{(o_i-c_j)^2}, \end{aligned}$$
(23)
where N represents the total number of the objects, K represents the number of clusters, \(o_i\) indicates the ith object and \(c_j\) indicates the jth cluster center.
Because the results of ER and SD on the algorithm cluster analysis performance comparison are consistent. The ER is proportional to SD, and the smaller the ER, the smaller the SD. So this paper only shows experimental results of ER. Each group of experiments was carried out 20 times, and the mean value is taken as the result to ensure the accuracy of the experiment. The error rates of each algorithm after clustering on the four datasets are shown in Table 3.
Table 3
The error rate of clustering on different datasets
Dataset
Kmeans
PSO
GA
BA
WOA
SCA
BH
LEBH
Iris
10.93%
10.00%
20.93%
13.20%
9.40%
21.80%
9.67%
8.73%
Cmc
60.27%
60.07%
59.58%
60.41%
60.11%
60.07%
59.84%
59.06%
Wine
29.78%
28.26%
29.38%
28.60%
28.26%
28.71%
28.31%
28.09%
Seeds
10.71%
10.57%
22.29%
10.43%
10.81%
14.29%
10.48%
10.48%
Bold indicates the experimental values of the most dominant algorithms in the three sets of comparative experiments
The data from clustering experiments with the lowest clustering error rate in each dataset are marked in bold in Table 3. Table 3 shows that the ERs of LEBH are 8.73%, 59.06% and 28.09% on Irir, Cmc and Wine Respectively. Compared with Kmeans and other intelligent computing algorithms, LEBH can achieve better clustering effect on these three datasets. On the Seeds dataset, the ERs of LEBH and BH are both 10.48%, they have the same clustering effect, and LEBH and BH have better clustering effect than Kmeans and other algorithms. Experimental result shows that LEBH can find the optimal solution of the problem better than other algorithms, while other algorithms may fall into local optimum in the process of optimization.

Experimental parameters of prolong the lifetime of the WSN

This study uses Matlab R2016a to conduct a large number of simulation experiments. Hundred anchor nodes and 100 normal nodes are randomly generated within a 100 m \(\times \) 100 m range. The position coordinates of any two nodes are not equal, which means that any two sensor nodes are not in the same position. The Bound indicates the size of the two-dimensional experimental site. The Numberofnodes represents that experiments are performed using 100 sensor nodes. The Initialenergy indicates that initial energy of each sensor node is set to 0.2J. Subsequently, the relevant parameters of the energy consumption model are set and explained. \(E_{elec}\) in Formula (3) and Formula (4) represents the energy consumed by the transceiver when transmitting and receiving b bit data and \(E_{elec}\) is set to 50pJ/bit. \(E_{fs}\) represents the energy consumed to transmit data of b bit when the transmission distance is dm in the free space model, and \(E_{fs}\) is set to \(10pJ/bit/m^2\). \(E_{mp}\) represents the energy consumed to transmit data of b bit when the transmission distance is dm in the free multipath model, and \(E_{mp}\) is set to \(0.0013pJ/bit/m^4\). b represents the size of each message and b is set to 500bytes/message. \(\alpha \) and q in Formula (7) are two constants, which are used to determine the influence degree of residual energy and two distances on the election of a cluster-head node, respectively. q is set to 1000. \(\alpha \) is set to 0.75. In Formula (10), a is set to 5nJ/number. The initial energy is set to 0.2J. Table 4 shows the setting of parameters.
Table 4
Parameter settings of simulation experiment
Parameters
Values
Bound
\(100 m \times 100 m\)
Number of nodes
100
Initial energy
0.2 J
\(E_{elec}\)
\(50 pJ/bit\)
\(E_{mp}\)
\(0.0013 pJ/bit/m^4\)
\(E_{fs}\)
\(10 pJ/bit/m^2\)
Data message b
\(500 bytes/message\)
q
1000
\(\alpha \)
0.75
a
\(5 nJ/number\)

Simulation experiment of LEBH-BS, Random-BS and Static-BS

This section discusses the effect of using the LEBH to relocate the BS on the lifetime of the WSN and compares it with random-base and static-base station positions. Simulation experiments are performed on the scenario where the energy of the first and last nodes are exhausted, respectively. The simulation experiment of each scenario is conducted ten times. This prevents accidental influence on experimental results. The experiment results are given in Table 5 and the boldface indicates the best result.
Table 5
Simulation experiment results of LEBH-BS, Random-BS and Static-BS
Algorithm
First node die
Last node die
LEBH-BS
1.56E+03
4.32E+03
Random-BS
9.25E+02
2.67E+03
Static-BS
7.17E+02
2.23E+03
Bold indicates the experimental values of the most dominant algorithms in the three sets of comparative experiments
Table 5 shows that LEBH-BS has the best performance in both scenarios and has the longest network lifetime. For the first node death scenario, the use of the LEBH-BS method increases the lifetime of the WSN by 68.4% and 117.1%, respectively, compared with the use of random-BS and static-BS. For the last node death scenario, the use of the LEBH-BS method increases the lifetime of the WSN by 62.2% and 94.3% compared with the use of random-BS and static-BS. Notably, the use of random-BS prolong the lifetime of the WSN is better than static-BS.
Figure 4 compares the histograms of the WSN lifetime under the two scenarios. Figure 4 shows that the relocation BS can better prolong the lifetime of the WSN compared to random-base and static-base stations. This is mainly because the relocated BS can find the BS position with the lowest energy consumption when transmitting data. The experimental results of the two scenarios show that the mobile-BS is better than the static-BS in prolonging the lifetime of the WSN. In a mobile BS, relocating the BS is better than random-BS location to prolong the lifetime of the WSN.

Simulation experiment of LEBH-BS and other heuristic algorithms

Subsequently, we discuss the influence of relocation of BS using the proposed LEBH other heuristic algorithms on the lifetime of WSN. Simulation experiments are conducted on the scenario where the energy of the first and last nodes are exhausted, respectively. The simulation experiment of each scene is performed ten times. The simulation experiment results are given in Table 6, and the boldface indicates the best result.
Table 6
Simulation experiment results of LEBH-BS, Random-BS and Static-BS
Algorithm
First node die
Last node die
LEBH-BS
1.56E+03
4.32E+03
PSO-BS
1.53E+03
4.23E+03
WOA-BS
1.52E+03
4.24E+03
BH-BS
1.51E+03
4.25E+03
GA-BS
1.51E+03
4.27E+03
GWO-BS
1.53E+03
4.27E+03
SCA-BS
1.52E+03
4.27E+03
Bold indicates the experimental values of the most dominant algorithms in the three sets of comparative experiments
Table 6 shows that the use of LEBH to relocate the BS shows the best performance in both scenarios and has the longest network lifetime compared to other heuristic algorithms. For the first node death scenario, the use of the LEBH-BS method increases the lifetime of the WSN by 2.1%, 2.5%, 2.8%, 2.8%, 2.0%, and 2.8%, respectively, compared with the use of PSO-BS, WOA-BS, BH-BS, GA-BS, GWO-BS, and SCA-BS. For the last node death scenario, the use of the LEBH-BS method increases the lifetime of the WSN by 2.3%, 2.0%, 1.7%, 1.4%, 1.3%, and 1.2%, respectively, compared with the use of PSO-BS, WOA-BS, BH-BS, GA-BS, GWO-BS, and SCA-BS.
Figure 5 compares the histogram of the maximum sensor network lifetime of BS relocation using different heuristic algorithms in two scenarios. Figure 5 shows that using LEBH-BS for BS relocation prolongs the lifetime of WSN better than using other heuristic algorithms. Because the initial energy is set to 0.2 J per anchor node, the result does not seem to have obvious effect. In fact, the initial energy of each anchor node is larger than the simulation experiment. LEBH-BS prolongs the lifetime of WSN more effectively because it can discover the location of the most energy-saving BS better and more accurately.
Therefore, to illustrate that the LEBH-BS is more meaningful than other heuristic algorithms. For each scenario, the bilateral U test was used for statistical verification. For the exhaustion scenarios of the first and last nodes, the null hypothesis is that the LEBH-BS and other algorithms are independent of identical continuous distributions with equal average value. The confidence level is set to 5%. The verified p value is shown in Table 7.
Table 7
Simulation experiment results of LEBH-BS, Random-BS and Static-BS
Algorithm
p value of First node die
p value of last node die
PSO-BS
3.13E-03
1.03E-03
WOA-BS
3.29E-03
3.54E-03
BH-BS
2.83E-04
1.40E-02
GA-BS
2.74E-03
4.98E-023
GWO-BS
5.33E-033
6.50E-02
SCA-BS
1.48E-04
9.10E-02
Table 7 shows that all other heuristic algorithms reject the null heuristic in the exhaustion scenario of the first node. Therefore, all other heuristic algorithms have different average values compared with LEBH-BS. In the exhaustion scenario of the last node, GWO-BS and SCA-BS accept the null hypothesis, and other algorithms reject the null hypothesis. Therefore, the averages of GWO-BS and SCA-BS are not significantly different from LEBH-BS and the averages of other algorithms are significantly different from LEBH-BS.
The results obtained by the bilateral U test in statistics show that in most cases, LEBH-BS has better performance than other heuristic algorithms.

Conclusion

This study we improved the original BH and proposed an LEBH. The proposed LEBH is compared with other algorithms in 28 test functions of CEC 2013. The results show that compared with other heuristic algorithms, the LEBH has faster convergence speed and better optimisation ability. In this study, the WSN model was simulated in detail and the energy consumption model was introduced in detail. The LEBH was applied to the relocation technology of BS in the network and simulation experiments were performed in the exhaustion scenarios of the first and last nodes. The results show that the LEBH-BS is better than random-BS and static-BS in prolonging the lifetime of the WSN in both scenarios. Compared with other heuristic algorithms for BS relocation, LEBH-BS prolonged the lifetime of the WSN better than other algorithms in most cases. The LEBH proposed in this study is highly flexible and usable. In future, this algorithm can be applied to more complex sensor networks.

Declarations

Conflict of interest

The authors declare no conflict of interest.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Literatur
4.
Zurück zum Zitat Colorni A, Dorigo M, Maniezzo V, et al (1992) An investigation of some properties of an” ant algorithm”. In: Ppsn, vol. 92 Colorni A, Dorigo M, Maniezzo V, et al (1992) An investigation of some properties of an” ant algorithm”. In: Ppsn, vol. 92
6.
Zurück zum Zitat Li X-l (2002) An optimizing method based on autonomous animats: fish-swarm algorithm. Syst Eng-Theory Pract 22(11):32–38 Li X-l (2002) An optimizing method based on autonomous animats: fish-swarm algorithm. Syst Eng-Theory Pract 22(11):32–38
9.
Zurück zum Zitat Xin-She Y et al (2008) Firefly algorithm. Nat-Inspir Metaheuristic Algorithms 20:79–90 Xin-She Y et al (2008) Firefly algorithm. Nat-Inspir Metaheuristic Algorithms 20:79–90
36.
Zurück zum Zitat Chai Q-W, Chu S-C, Pan J-S, Zheng W-M (2020) Applying adaptive and self assessment fish migration optimization on localization of wireless sensor network on 3-d terrain. J Inf Hiding Multim Signal Process 11(2):90–102 Chai Q-W, Chu S-C, Pan J-S, Zheng W-M (2020) Applying adaptive and self assessment fish migration optimization on localization of wireless sensor network on 3-d terrain. J Inf Hiding Multim Signal Process 11(2):90–102
39.
Zurück zum Zitat Pant S, Kumar R, Singh A (2017) Adaptive sink transmission and relocation to extend the network lifetime of wireless sensor network. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), IEEE. p 1–4. https://doi.org/10.1109/ICACCAF.2017.8344693 Pant S, Kumar R, Singh A (2017) Adaptive sink transmission and relocation to extend the network lifetime of wireless sensor network. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA)(Fall), IEEE. p 1–4. https://​doi.​org/​10.​1109/​ICACCAF.​2017.​8344693
44.
Zurück zum Zitat Chelliah M, Govindaram N, Gopalan N (2009) A novel distance based relocation mechanism to enhance the performance of proxy cache in a cellular network. Int Arab J Inf Technol 6(3):258–263 Chelliah M, Govindaram N, Gopalan N (2009) A novel distance based relocation mechanism to enhance the performance of proxy cache in a cellular network. Int Arab J Inf Technol 6(3):258–263
48.
Zurück zum Zitat Kataria S, Jain A (2013) Bio inspired optimal relocation of mobile sink nodes in wireless sensor networks. In: 2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA), IEEE, p 1–6. https://doi.org/10.1109/C2SPCA.2013.6749431 Kataria S, Jain A (2013) Bio inspired optimal relocation of mobile sink nodes in wireless sensor networks. In: 2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA), IEEE, p 1–6. https://​doi.​org/​10.​1109/​C2SPCA.​2013.​6749431
49.
Zurück zum Zitat Abdullah MZ, Shiltagh NA, Zarzoor AR (2018) Designing efficient paths between base station and multi mobile sink nodes to transfer data in wireless sensor networks based on anchor nodes. Int J Eng Technol 7(4):3810–3815 Abdullah MZ, Shiltagh NA, Zarzoor AR (2018) Designing efficient paths between base station and multi mobile sink nodes to transfer data in wireless sensor networks based on anchor nodes. Int J Eng Technol 7(4):3810–3815
50.
Zurück zum Zitat Saha B, Gupta GP (2017) Improved harmony search based clustering protocol for wireless sensor networks with mobile sink. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE, p 1909–1913. https://doi.org/10.1109/RTEICT.2017.8256929 Saha B, Gupta GP (2017) Improved harmony search based clustering protocol for wireless sensor networks with mobile sink. In: 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE, p 1909–1913. https://​doi.​org/​10.​1109/​RTEICT.​2017.​8256929
54.
Zurück zum Zitat Liang J, Qu B, Suganthan P, Hernández-Díaz AG (2013) Problem definitions and evaluation criteria for the cec 2013 special session on real-parameter optimization. Computational Intelligence Laboratory, Zhengzhou University, Zhengzhou, China and Nanyang Technological University, Singapore, Technical Report 201212(34):281–295 Liang J, Qu B, Suganthan P, Hernández-Díaz AG (2013) Problem definitions and evaluation criteria for the cec 2013 special session on real-parameter optimization. Computational Intelligence Laboratory, Zhengzhou University, Zhengzhou, China and Nanyang Technological University, Singapore, Technical Report 201212(34):281–295
Metadaten
Titel
Application of improved black hole algorithm in prolonging the lifetime of wireless sensor network
verfasst von
Wei-Min Zheng
Ning Liu
Qing-Wei Chai
Yong Liu
Publikationsdatum
08.04.2023
Verlag
Springer International Publishing
Erschienen in
Complex & Intelligent Systems / Ausgabe 5/2023
Print ISSN: 2199-4536
Elektronische ISSN: 2198-6053
DOI
https://doi.org/10.1007/s40747-023-01041-3

Weitere Artikel der Ausgabe 5/2023

Complex & Intelligent Systems 5/2023 Zur Ausgabe

Premium Partner