Skip to main content

Multi-objective optimized connectivity restoring of disjoint segments using mobile data collectors in wireless sensor network

Abstract

Wireless sensor networks (WSNs) have been used extensively in a range of applications, which realizes data acquisition, processing, transmission, and analysis in an interesting area. Harsh surroundings and their inherent vulnerability often mean that these networks suffer from simultaneous node failure possibly causing the network to become partitioned into multiple disjointed segments. This in turn can prevent the gathering of data from the sensors and subsequent transmission to the sink, causing the whole network to fail. In this paper, a strategy is presented for restoring multi-objective optimization connectivity of these segments using mobile data collectors (MDCs), by considering the segments as collections of sensor nodes and not as some representative node. Different from existing uses of MDCs for restoration, the delay in data collection and task balance is considered, and the network connectivity and data acquisition path optimization problem are transformed into an improved multi-travelling salesman problem (iMTSP). An improved multi-objective optimization genetic algorithm for solving the optimal collection data collector position and moving paths is proposed, which introduces virtual segments and hierarchical chromosome structure, improved population diversity, and custom coding and decoding. The simulation results show that the proposed method can effectively solve the iMTSP of the Pareto optimal solution and can provide a new strategy for connectivity-restoring technology in WSNs. Compared with NSGA-II, the diversity of the proposed gene algorithm represents a clear improvement.

1 Introduction

Wireless sensor networks (WSNs) consist of spatially distributed autonomous sensors that monitor certain events and phenomena cooperatively in an area of interest. They have been used extensively in a range of applications, including battlefield surveillance, industrial monitoring, environmental protection, and machine health monitoring. The sensors tend to be limited in size, and cost can result in corresponding constraints on resources such as energy, memory, computation, and communications. Limited resources and harsh environments often mean that sensors are prone to failure or damage. Not only do these failures cause a loss of coverage of the monitored area, but the network may also be split into several disjoint segments, affecting network connectivity and even leading to immeasurable losses in service quality. All this implies that the problem of connectivity restoration from disjoint segments in WSNs is an attractive field of research [15].

We propose the use of mobile data collectors (MDCs) to restore network connectivity, which have the function of data acquisition and are mobile, providing more computing, communications, and storage capacity than general sensor nodes. An MDC moves from a segment, collects the data, and then moves to the next segment with path optimization until all segments are traversed. Finally, all data are then transmitted to a base station by the MDC, allowing network connectivity to be restored indirectly. Differently from existing literature on MDCs, this paper considers a segment as a set of nodes in an attempt to find more optional nodes for the path of travel, rather than using a single representative node; the MDC does not move between adjacent segments, instead it travels all segments in the optimized order. In considering moving MDCs, this paper focuses on two main questions: (1) how to determine the optimal traversal paths, which would make the total visiting path of all MDCs to be the shortest and (2) how to maintain a balance between the moving tasks of different MDCs, such that the moving distance of all MDCs are approximately equivalent.

The main contributions of our proposed restoration strategy can be summarized as follows: (1) it takes account of the constituting nodes of a segment, the shortest moving path, and the moving task balance of MDCs, as such the problem is closer to a real application environment. (2) It translates the optimal path problem of MDCs into a travelling salesman problem and brings about an improved multiple travelling salesman problem known as iMTSP. (3) It introduces virtual segments and a hierarchical chromosome and puts forward an improved multi-objective optimization genetic algorithm to solve the optimal solution of iMTSP. The remainder of this paper is organized as follows. In Section 2, we summarize all the related work in this area. Section 3 describes the iMTSP problem, giving a formal definition. Section 4 presents our approach in detail. Performance evaluations are presented in Section 5, and our conclusions are drawn in Section 6.

2 Related work

2.1 Establishing k-connected topologies

The existing methods are attempts to provide fault tolerance by forming a k-connected topology, rather than focusing on repairing damaged networks [68]. In [9], a number of additional relays are deployed to ensure that each sensor node in the initial design has k length-bounded vertex-disjoint shortest paths to the sinks and uses Counting-Paths to minimize the number of deployed relays. Almasaeid et al. [10] tried to exploit the overlap between communication ranges to minimize the number of additional nodes needed to repair k-connectivity.

2.2 Relocating existing nodes

When a specified event occurs, some sensor nodes adjust their position under restriction conditions to restore connectivity [1113]. In [14], a distributed actor recovery algorithm picks one of the neighbours of a failed node, in order to replace it. The selection of the best candidate is based on the lowest node degree and physical proximity to the failure. Alfadhly et al. [15] proposed a least distance movement recovery algorithm, in which a set of direct neighbours of the failed node move towards the position of the failed node while its original position is replaced with the nearest non-cut vertex actor.

2.3 Placing additional relay nodes

Some schemes employ relay nodes (RNs) to re-establish connectivity, which require additional nodes and may be applied to a large-scale network node failure [1620]. Chen et al. [21] proposed an algorithm called MST-1tRNP, which constructs the complete graph of terminals and calculates the minimum spanning tree using Kruskal’s algorithm. RNs are populated along the tree edges. In [22], the authors presented a three-step algorithm for federating network segments via a triangular Steiner tree approximation called FeSTA. Chen et al. [23] adopted a quadrilateral Steiner tree for finding the minimum relay nodes. Lee et al. [24] modelled the deployment area as a grid with equal-sized cells, proposing a distributed cell-based optimized relay node placement algorithm. Bio-inspired relay node placement heuristics were proposed in [25], where the segments are connected by deploying the RNs similar to a spider weaving its web.

In addition to these methods, Senel et al. [26] used MDCs to restore network connectivity, but the MDCs are only moved back and forth between different partitions to establish bidirectional connection and do not bring any directly acquired data back to the sink node. Different from the existing methods, we first focus on using MDCs to traverse all segments rather than just two adjacent segments, under the conditions that minimize the mobile total distance and ensure that different MDCs have moving-distance equilibrium. On the other hand, we consider the segments as a collection of sensor nodes, which sets them apart from most existing methods.

3 Network model and fundamental definition

3.1 Problem description

Where WSNs have become seriously damaged, a network may be split into different disjoined segments. In this paper, we take MDCs as travelling salesmen, touring segments and collecting data from the segments they visit in order to restore the connectivity of damaged WSNs. As shown in Fig. 1, there are eight segments in a damaged WSN, and only segment S 1 can transfer data back to the user through the Internet. We use MDCs to travel around all segments and transfer the data from segments S 2,S 3,S 4,S 5,S 6,S 7, and S 8 to segment S 1 to restore the connectivity of the entire network indirectly. During the process, firstly, the moving distance of each MDC should be as small as possible to reduce moving costs. Secondly, if only one MDC is used, its total movement path will be longer, increasing the data acquisition delay time, which is inappropriate for certain applications. We therefore use multiple MDCs to collect data simultaneously in order to ensure a data acquisition delay within an appropriate range.

Fig. 1
figure 1

Principle of connectivity restoring from disjointed WSN by MDCs

The problem is similar to the multi-travelling salesman problem (MTSP), but it also has some key differences as follows: (1) any travelling city (segment) is no longer regarded as an abstract point (data acquisition position) but is a set of points. (2) Different travelling salesmen (MDCs) set out and return to the same city, which is the source city, but may in fact correspond to different points in the city. (3) The source city needs to be specified, and the starting and ending points are the same for the same travelling salesman but may be different for different travelling salesmen. As shown in Fig. 1, the moving path of one MDC is S 1S 2S 3S 4S 7S 1 and S 1S 8S 6S 5S 1 for another. Although both start and end with S 1, they correspond to different data acquisition positions of S 1. In solving our problem, the MDC has its own unique optimal data acquisition position in each segment, but this position is not the common representative point of a segment as it is in other work. In light of the above, we term the above problem the improved multi-travelling salesman problem (iMTSP). It is clear that iMTSP is a non-deterministic polynomial (NP) problem. If every city is abstracted into a single point, iMTSP is degenerated into a common MTSP.

3.2 iMTSP model

Let us assume that the sensor nodes of the damaged WSN are clustered into n disjointed segments: S 1,S 2, …, S n . The source segment S 1 is the starting and ending segment for MDCs, and only this can transmit the collected data to the user through the base station. S i ={s iv },i=1,2,…,n, v=1,2,…,ni, ni is the number of sensor nodes in S i . Given the intervals of returning data acquisition, m MDCs are required to restore connectivity.

Let the variable \(x_{S_{ijk}}\) be:

$$ x_{S_{ijk}} = \left\{ \begin{array}{ll} 1, & \text{The MDC-k moves the path from}\\ & \text{segment } S_{i} \text{ to } S_{j}\\ 0, & \text{Otherwise} \end{array}\right. $$
(1)

The variable \(y_{S_{ki}}\) is:

$$ y_{S_{ki}} = \left\{ \begin{array}{ll} 1, & \text{The MDC-k visits segment } S_{i}\\ 0, & \text{Otherwise} \end{array}\right. $$
(2)

\(c_{S_{ij}}\) is the moving distance of MDC from segment S i to S j :

$$ c_{S_{ij}} = \{|s_{iv}-s_{ju}|\},v=1,2,\ldots,ni, u=1,2,\ldots,nj $$
(3)

Usually in MTSP, ni=nj=1, and \(c_{S_{ij}}\) is a unique value. However, in iMTSP, \(c_{S_{ij}}\) represents the set of ninj Euclidean distances between two arbitrary points, which come from the corresponding segments S i and S j , respectively. The iMTSP model can be formalized as follows:

Set the objective function f 1 as:

$$ f_{1}(Z)=min\left(\sum_{k=1}^{N} z_{k}\right) $$
(4)

where

$$ z_{k}=\sum_{S_{i}=S_{1}}^{S_{n}} {\sum_{S_{j}=S_{1}}^{S_{n}} c_{S_{ij}}x_{S_{ijk}}},k=1,2,\ldots,m $$
(5)

The constraint conditions are:

$$ \sum_{k=1}^{m} y_{S_{ki}} = \left\{ \begin{array}{ll} m, & S_{i}=S_{1}\\ 0, & S_{i}=S_{2}{,}{,}\ldots,S_{n} \end{array}\right. $$
(6)
$$ \sum_{S_{i}=S_{1}}^{S_{n}} x_{S_{ijk}}=y_{S_{kj}},j=1,2,\ldots,n;k=1,2,\ldots,m. $$
(7)
$$ \sum_{S_{j}=S_{1}}^{S_{n}} x_{S_{ijk}}=y_{S_{ki}},i=1,2,\ldots,n;k=1,2,\ldots,m. $$
(8)
$$ X=(x_{S_{ijk}})\in S^{*},\text{\(S^{*}\) is the branch elimination constraint.} $$
(9)

In this model, Formula (4) represents the minimum value of the total moving distances for m MDCs. Formula (5) represents the moving distance of all the paths traversed by each MDC. Formula (6) yields the total moving distances of MDC-k, which comes from the source partition and passes through each segment only once, before returning to the source partition. Formulas (7) and (8) constrain the source and ending segment of each MDC to be the same segment. Formula (9) is used to eliminate incomplete paths, which is detailed described as the Limitations in Section 4.2.

In order to maintain the moving equilibrium of each MDC, we introduce the objective function f 2:

$$ f_{2}(Z)=min\{max(z_{1},z_{2},\ldots,z_{m})-min(z_{1},z_{2},\ldots,z_{m})\} $$
(10)

The essence of the iMTSP model is a multi-objective optimization MTSP. Our purpose is to find the Pareto optimal solutions of multi-objective Formulas (4) and (10), under the given MDCs and constraint conditions (6)-(9). In other words, Formula (4) is a sum minimization to ensure that the total distance travelled is minimized, while Formula (10) is a range minimization to ensure the moving task balance of different MDCs.

3.3 Multi-objective optimization

Let Z i =(z 1,z 2,…,z m ) i be the feasible solution, and Z=(Z 1,Z 2,…,Z w ) is the solution space of the multi-objective problem iMTSP. The relevant definitions are listed as follows:

Definition 1 (Pareto dominance) Z 1 and Z 2 are two arbitrary feasible solutions of iMTSP. Solution Z 1 dominates (or is better than) Z 2 if and only if {i=1,2,…,n,f i (Z 1)≤f i (Z 2)}{j=1,2,…,n,f j (Z 1)<f j (Z 2)}; this is denoted Z 1Z 2.

Definition 2 (Pareto optimal solution) The Pareto optimal solution (or non-dominated solution) is the solution that is not dominated by any solution among the set of feasible solutions. The solution Z Z is the Pareto optimal solution if and only if there is no Z i Z,i=1,2,…,w to Z i Z .

Definition 3 (The set of Pareto optimal solutions) The set of Pareto optimal solutions (or non-dominated solutions) is a collection of all Pareto optimal solutions.

Definition 4 (Pareto optimal front) The Pareto optimal front PF is the region of all Pareto optimal solutions corresponding to the objective function value, which is denoted as PF={f(Z)=(f 1(Z),f 2(Z),…,f n (Z))|ZZ }.

4 Recovery strategy using MDCs

The gist of our proposed algorithm lies in converting the connection recovery problem into iMTSP, by introducing virtual segments and hierarchical chromosomes and then adopting a multi-objective optimization genetic algorithm to solve the optimal solutions of iMTSP. Firstly, it identifies the independent segments using a fuzzy C-mean clustering algorithm (FCMA) in a damaged network, in which internal nodes in the same cluster can communicate with each other. Secondly, it uses MDCs to travel among all segments, which then carry collected data back to the sink. The optimal path problem of the MDCs is transformed into our proposed iMTSP. Thirdly, the problem is solved by an improved multi-objective optimization genetic algorithm based on NSGA-II [27], which introduces hierarchical chromosome structures, improved population initialization, and self-defined genetic operating and optimized crowding distance calculation, allowing the optimal moving paths of different MDCs to be obtained.

4.1 Segment identification by clustering

For an unknown deployment, we would use inspection equipment to detect the physical location of the existing active sensor nodes, together with their location information. Considering the limited resources of the nodes, a clustering algorithm is used in the base station or the client. In this paper, the FCMA is used to undertake clustering analysis of the sensor nodes. We assume that the coordinates of the sensor nodes in the network is X={x 1,x 2,…,x n }. U=[u ij ] is the fuzzy C-class matrix of the data set X, in which u ij is the membership function of the j th data point for the i th class. The total membership of the j th data point for C-class satisfies the following conditions:

$$ \begin{aligned} \forall i,j,u_{ij} \in\, [\!0,1]; \\ \forall \sum_{j=1}^{n} u_{ij}>0, i=1,2,\ldots,c; j=1,2,\ldots,n; \\ \forall j,\sum_{i=1}^{e} u_{ij}=1 \end{aligned} $$
(11)

The clustering criterion is the minimization of the clustering loss function J m (U,V):

$$ J_{m}(U,V)=\sum_{j=1}^{n} {\sum_{i=1}^{e}} u_{ij}^{m}d_{ij}^{2}(x_{j},v_{i}) $$
(12)

where V is the clustering centre, m is the weighted index, and d ij (x j ,v i )=v i x j . After it is initialized, the algorithm is iterated continuously by Formulas (11) and (12), until converging to the minimum solution required realizing the fuzzy clustering.

4.2 Problem transfer, encoding, and decoding

A genetic algorithm (GA) is a type of parallel processing algorithm used to simulate biological evolution theory, which is an effective method for solving the multi-objective optimization problem. The solution process used in a genetic algorithm generally follows the following sequence: (1) conversion of the real problem into genetic sequences by encoding; (2) repeated execution of the basic genetic operations of selection, crossover, and mutation, producing new outstanding individuals, until the requirements are met; and (3) arrival at an approximate solution of practical problem according to decoding rules. Compared with a single-objective GA, a multi-objective GA must adopt special rules to evaluate the individual fitness and sorting.

To satisfy the requirements of problem transfer, we introduce virtual segments and hierarchical chromosomes into the iMTSP. The virtual segments transform the multi-travelling salesman problem into single travelling salesman problem with N+m−1 virtual segments (N is the number of segments, m is the number of MDCs). The virtual segment in iMTSP is different from the “virtual city” in MTSP, which is a set of virtual points in the whole segment, rather than a single representative point. The introduced hierarchical chromosome consists of two level chromosome structures: segment gene and node gene. The segment gene represents the travelled sequence of different segments, and the node gene indicates the visited internal sensor nodes of the corresponding segment. Both are coded using integer numbers, in which the rules and limitations of encoding and decoding are as follows:

Rule 1 Each segment in the network is uniquely identified by SegmentID, which is an integer number from 1 to N (N is the number of segments). Similarly, each node in each segment is uniquely identified by NodeID from 1 to n (n is the number of nodes in the segment). Thus, each node in the network can be uniquely identified by “SegmentID+NodeID”.

Rule 2 The corresponding relationship between the segment gene and the node gene lies in the gene position of the node gene and is not a simple one-to-one mapping.

Limitation 1 Each path of the MDCs starts from the source segment. The first gene position of the segment gene is always the source segment, and this does not participate in the subsequent crossover and mutation operation.

Limitation 2 Set \(c_{S_{11}}=M\), where M is a positive infinite value and S 1 is the source segment.

In decoding, the segment gene is visited one-by-one from the first gene position to the end position. The first gene position represents the source segment of the first MDC. From the second gene position, the decoding gene position is mapped to the source segment, which indicates the end of the moving path of the previous MDC and the beginning of the moving path of the next MDC. Different from the segment gene, the i th gene position of the node gene stores the traversed NodeID of the i th segment by a MDC.

As an example, let us assume that the number of MDCs is 3, denoted as MDC-1, MDC-2, and MDC-3. There are seven segments: S 1,S 2,S 3,S 4,S 5,S 6, and S 7, and the number of sensor nodes in each segment is 10 to 20. S 1 is the source segment, and S 8 and S 9 are the introduced virtual segments, all of which have the same internal nodes. Using a hierarchical chromosome structure, the feasible solution can be described as shown in Fig. 2.

Fig. 2
figure 2

The encoding of the chromosome structure

As indicated in Fig. 2, MDC-1 starts from S 1, moves through S 7 and S 4, and returns to S 1 (S 1 and S 8 are the same segments). The visited node NodeID=7 of S 1 comes from the 1st gene position of the node gene, and NodeID=12 of S 7 comes from the 7th gene position of the node gene. Correspondingly, the visited nodes of S 4 and S 8 are NodeID=17 and NodeID=18. The moving path of MDC-1 can be expressed as 1(7)-7(12)-4(17)-1(7). Similarly, the moving path of MDC-2 is 8(18)-6(5)-2(15)-8(18), and the moving path of MDC-3 is 9(3)-5(10)-3(9)-9(3). It is worth noting that Limitation 1 and Limitation 2 could ensure that the encoding is effective and feasible. If we do not limit the chromosome gene encoding, the segment gene may cause the following two cases to arise:

1. The source segment and virtual segments could be distributed in arbitrary gene positions apart from the first gene position. As shown in Fig. 3, there are three MDCs and four closed-loop moving paths in the encoding structure, which would be difficult to decode.

Fig. 3
figure 3

The first gene position is not the source segment in the segment gene structure

2. The multiple virtual segments could continuously appear in the same chromosome. As shown in Fig. 4, the possible paths of the three MDCs are S 8S 2S 5S 4S 8, S 9S 9, and S 1S 2S 7S 3S 1. The second path is invalid, starting from S 9 and returning to S 9. If we set \(c_{S_{11}}=M\) (M is a positive infinity), this kind of chromosome will be eliminated in the population selection of a GA.

Fig. 4
figure 4

Successive multiple virtual segments in segment gene structure

4.3 Improved population initialization

Different from NSGA-II, the parallel selection method is adopted for random population optimization to improve the convergence speed of a GA. The specific strategies are as follows: (1) a population with M individuals is randomly generated for iMTSP and (2) the M individuals are ordered by different objectives and the best m individuals of each objective function are preserved. If the number of individuals is not achieved, the best m+1 individuals are preserved until M individuals are generated. It is worth noting that duplicate individuals are deleted in the preservation of optimal individuals. The new population is the initial population of the subsequent genetic algorithm.

4.4 Fast non-dominated sort

This method uses the same non-dominated sort as NSGA-II. Each individual I(i) has two parameters, n i and S i , where the domination count n i is the number of individuals that dominate I(i) and S i contains all the individuals being dominated by I(i). In the outline, the sorting is as follows: Firstly, the individuals with n i =0 are denoted as the first non-dominated front F 1, which are removed from the population, and the rank of these individuals is set to I(i) rank =1. Then, we continue to look for the non-dominated solution set from the remaining population and denote them as the second non-dominated front F 2; their individuals are ranked as I(i) rank =2. The above procedure is continued using the remaining population, and the third front is identified. This process continues until all fronts are identified. The computational complexity of the sorting is O(mN 2), in which m is the number of objectives and N is the population size.

4.5 Improved crowding distance

Once the non-dominated sort is complete, the crowding distance is assigned. Because the individuals are selected based on rank and crowding distance, all the individuals in the population are assigned a crowding distance value. The crowing distance of NSGA-II is calculated as:

$$ \begin{aligned} I(d_{i})=\sum_{m=1}^{M} \frac{I(i+1).m-I(i-1).m}{f_{m}^{max}-f_{m}^{min}},\\ i=2,3,\dots,n-1;I(d_{1})=I(d_{n})=\infty \end{aligned} $$
(13)

I(d i ) is the crowding distance of individual I(i), and I(i).m is the value of the m th objective function of the i th individual. \(f_{m}^{max}\) and \(f_{m}^{min}\) are the maximum and minimum of the m th objective function of individuals in front F i . M is the number of objectives. The essence of the crowing distance is to find the Euclidean distance between each individual in a front based on m objectives in m dimensional hyper space.

However, there are some limitations in calculating the crowding distance in NSGA-II as shown in Fig. 5: (1) Individual I(a 1) and I(b 1) are close to each other and are far from other individuals. By contrast, individual I(d 1) and I(e 1) are more dispersed. Using the calculation in NSGA-II, the crowding distances of I(a 1) and I(b 1) are greater than I(d 1) and I(e 1). In gene selection, individuals I(a 1) and I(b 1) are retained simultaneously, and individuals I(d 1) and I(e 1) are eliminated. In fact, the ideal selection is that one of I(a 1) and I(b 1) is removed and both of I(d 1) and I(e 1) are retained. (2) Individuals I(b 2) and I(d 2) have the same (or similar) crowding distances, and they would have the same (or similar) genetic probabilities in the selection. However, the ideal situation is that the selection probability of I(d 2) is greater than that of I(b 2), because the uniform distribution of I(d 2) is better than that of I(b 2).

Fig. 5
figure 5

Limitations of crowding distance calculation in NSGA-II. a the crowding distances of I(a 1) and I(b 1) are greater than I(d 1) and I(e 1). b I(b 2) and I(d 2) have the same crowding distances

In order to solve these problems, we propose an improved calculation strategy: firstly, we introduce the crowding distance threshold of adjacent individuals in the same non-dominated front. If the distance between adjacent individuals is less than the threshold, some of the adjacent individuals are removed according to the elimination strategy. Secondly, the crowding distances are recalculated for the remaining individuals in the same front using Formula (13). Obviously, where the values of crowding distance are higher, this indicates that the distribution of individuals is better.

Crowding distance threshold: set \(\theta _{m}^{k}\) is the threshold on the m th objective function in the non-dominated front F k . After sorting individuals by arbitrary objectives in front F k , the threshold is calculated as follows:

$$ \theta_{m}^{k}=\frac{f_{m}^{max}-f_{m}^{min}}{2(n-1)},m=1,2,\dots,M $$
(14)

The threshold is adjusted along with the evolution and the density of individuals. It is higher in the early evolution and becomes smaller in the later one. If \(\forall m \in M, |I(i+1).m-I(i).m|<\theta _{m}^{k}\), then some similar individuals are removed by the following two strategies.

Removing strategy 1 If one of the solutions is a boundary solution in the front F k , then the non-boundary solution is removed. The main purpose is to keep the boundary solutions and expand the scope of the non-dominated solution as soon as possible.

Removing strategy 2 If both solutions are not boundary solutions, we introduce variables φ i and φ j of individual I(i) and I(j) to judge which individual should be removed.

$$ \begin{aligned} \varphi_{i}=\sum_{m=1}^{M} {[\!I(i).m-I(i-1).m]*\,[\!I(j+1).m-I(i).m]},&\\ \varphi_{j}=\sum_{m=1}^{M} {[\!I(j+1).m-I(j).m]*\,[\!I(j).m-I(i-1).m]},&\\ j=i+1 \end{aligned} $$
(15)

If φ i >φ j , individual I(i) will remain and individual I(j) will be removed. In the opposite case, I(j) will remain and I(i) will be removed. As shown in Fig. 6, the distance variance \(\sigma _{i}^{2}\) between individuals and their centre is

$$ \begin{aligned} \sigma_{i}^{2}&=\frac{\sum_{m=1}^{M} [I(i).m-I(i-1).m-\frac{I(j+1).m-I(i-1).m}{2}]^{2}}{M} \\ &=\frac{\sum_{m=1}^{M} [\frac{(I(j+1).m-I(i).m)-(I(i).m-I(i-1).m}{2}]^{2}}{M} \\ &=\frac{1}{4M}\sum_{m=1}^{M} [I(j+1).m-I(i-1).m]^{2}-\frac{1}{M}\varphi_{i} \\ \end{aligned} $$
(16)
Fig. 6
figure 6

Removing strategy for adjacent individuals in the same Pareto optimal front

From Formula (16), I(j+1).mI(i−1).m is a fixed value for individual I(i) and individual I(j). Therefore, the larger the φ i of individual I(i) is, the smaller the \(\sigma _{i}^{2}\) is. In other words, where the centre deviation between individuals I(i), I(i−1), and I(j+1) is smaller, the preserved individual I(i) is better for maintaining population diversity. It is worth noting that if I(i) and I(j) are repeated individuals, they would also be removed to avoid unnecessary genetic operation.

4.6 Selection operator

The same tournament selection operator is used as in NSGA-II: (1) if the non-dominated fronts are different between two random individuals, the individual with the smaller front is selected to ensure optimization searching along the non-dominated solution direction and (2) if they belong to the same front, the individual with the greater crowding distance is selected to maintain the population diversity.

4.7 Improved crossover and mutation

Our proposed algorithm differs from NSGA-II in respect of the introduced hierarchical chromosome structure. It will use a different crossover and mutation operator based on the characteristics of the segment gene and the node gene. Because the starting segment of any path is the source segment, the first gene position of the segment gene does not participate in the crossover and mutation. However, all the gene positions of the node gene are involved in the genetic operation.

The segment gene uses “Order Crossover Operator (OX)”. In essence, a swath of consecutive alleles from parent A drops down, and the remaining values are placed in the child in the order in which they appear in parent B, as shown in Fig. 7.

Fig. 7
figure 7

Order crossover operator used in the segment gene

The node gene uses “Partial Matching Crossover Operator (PMX)”. In essence, parent A donates a swath of genetic material, and the corresponding swath from the other parent is sprinkled around in the child. Once this is done, the remaining alleles are copied directly from parent B, as shown in Fig. 8.

Fig. 8
figure 8

Partial matching crossover operator used in the node gene

The segment gene is mutated by an exchange mutation operator, involving the exchange of two randomly selected genes. The node gene is mutated by an integer mutation operator, which itself is replaced by another gene with a certain mutation probability. The mutation operators are as shown in Fig. 9.

Fig. 9
figure 9

Mutation operator used in the segment gene and node gene

4.8 Elite strategy

The same recombination and selection strategy are used as in NSGA-II. The offspring population is combined with the current generation population, and selection is performed to set the individuals of the next generation. Because all the previous and current best individuals are added into the population, elitism is ensured. The population is now sorted based on non-domination. The new generation is filled by each front subsequently until the population size exceeds the current population size. If by adding all the individuals in front F k the population exceeds N, then individuals in front F k are selected based on their crowding distance in descending order until the population size is N.

4.9 Complexity analysis

The iMTSP is an improved multi-travelling salesman problem, which belongs to the non-deterministic polynomial (NP) problems. The computational complexity of our proposed algorithm is mainly contained in the clustering algorithm and the multi-objective genetic algorithm, with the latter playing the dominant role. The overall complexity of our algorithm is O(mN 2), in which m is the number of objective functions and N is the number of individuals in the initial population.

5 Performance evaluation

The performance evaluations are described in two different ways: firstly, we provide a verification of the effect of the improved NSGA-II algorithm on the distribution of the Pareto optimal solutions; secondly, we illustrate how to use MDCs to restore network connectivity from a damaged sensor network. We use Matlab 7.0 as computing tool to evaluate and analyse the results.

5.1 Evaluating performance of multi-objective optimization

Compared with NSGA-II, one of the main improvements of our proposed multi-objective optimization genetic algorithm is the introduction of the adjacent individuals’ removal strategy to improve the diversity of the algorithm, known as NSGA-II-d. Using the existing metric in [27], we analyse and compare (1) convergence to the Pareto-optimal set and (2) maintenance of diversity in solutions of the Pareto-optimal set between NSGA-II-d and NSGA-II. The constrained test problems used in the evaluation are shown in Table 1.

Table 1 Constrained test problems used in the evaluation (all objectives are to be minimized)

Convergence metric γ: it is used to measure the extent of convergence to a known set of Pareto-optimal solutions, which is the minimum Euclidean distance between the chosen Pareto optimal solution and a known Pareto optimal solution. The smaller the value of this metric is, the better the convergence towards the Pareto-optimal front. Set Z is the chosen Pareto optimal solution; Z is the known Pareto optimal solution. The calculation of the convergence metric is achieved as follows:

$$ \gamma=\frac{1}{|Z|} \sum_{z\in Z} {min\{|z-z'|,z' \in Z'\}} $$
(17)

Diversity metric Δ: this measures the extent of the spread achieved among the obtained solutions. The smaller this value is, the more uniform the distribution. Set d i contains the Euclidean distance between consecutive solutions in the obtained non-dominated set of solutions; d f and d l are the Euclidean distances between the extreme solutions and the boundary solutions of the obtained non-dominated set; \(\bar {d}\) is the average of all distances d i . There are N solutions on the best non-dominated front. With the solutions, there are N−1 consecutive distances. The calculation of the diversity metric is achieved as follows:

$$ \Delta=\frac{d_{f}+d_{l}+\sum_{i=1}^{Z-1}|d_{i}-\bar{d}|}{d_{f}+d_{l}+(|Z|-1)\bar{d}} $$
(18)

Each experimental result is averaged over 20 independent runs. The parameter settings are the same for NSGA-II and NSGA-II-d in the simulation: the population is 100, the iteration number is 1000, the crossover probability is 0.9, and the mutation probability is 0.1. The experimental results are shown in Table 2 and reveal that the diversity of NSGA-II-d is significantly better than that of NSGA-II for the same individual number and iteration number. The convergence of the two schemes is roughly equivalent.

Table 2 Comparing convergence and diversity between NSGA-II and NSGA-II-d

5.2 Evaluating performance of multi-objective optimization

The experimental raw data were obtained from the TSPLIB of Heidelberg University, but we needed to preprocess these data to generate the testing instance, though this was not directly used for the experimental evaluation. Firstly, we chose a dataset from TSPLIB and divided all the cities into different segments using the clustering algorithm described in Section 4.1. Secondly, if the distance of the city from its own cluster centre was greater than the threshold, it was deleted. The iMTSP test instance was then generated.

The dataset of file ch150.tsp in the TSPLIB library was analysed in the experiment, consisting of 150 cities. After removing the cities that were more than 5000 away from their cluster centre, 52 cities remained, which were then classified into 10 segments. The source segment is the nearest one to the original point. The specific coordinates of the cites are given in Table 3. For convenience, the processed dataset is termed “10ch150.tsp”, which represents the dataset ch150.tsp from TSPLIB classified into 10 segments.

Table 3 X- and Y- coordinates of data in the file 10ch150.tsp

The gene parameters are set as follows: the population is 100, the iteration number is 500, the crossover probability is 0.9, and the mutation probability is 0.05. We set the number of MDCs to 3, and two virtual segments (S 11 and S 12) are constructed. Some output from one experiment are shown in Table 4.

Table 4 Some experimental results of the 10ch150.tsp instance when MDCs=3

In Table 4, we only list the top 15 results sorted by crowding distance in front F 1. The first and second groups are the two boundary solutions in the front. The data of the first group indicate that the path of MDC-1 is 1(1)-10(6)-9(5)-4(5)-2(2)-1(1), the path of MDC-2 is 11(4)-5(1)-7(3)-11(4), the path of MDC-3 is 12(4)-8(4)-6(5)-3(1), the minimum of objective function f 1(x) is 2705.210, and the minimum of objective function f 2(x) is 2.935. Generally speaking, when the number of MDCs is 3, the Pareto optimal fronts of the 10ch150.tsp instance are shown in Fig. 10.

Fig. 10
figure 10

Pareto optimal front of the 10ch150.tsp instance when MDCs=3

It can be seen from Fig. 10 that the Pareto optimal front of iMTSP is discontinuous due to its discrete nature, which is different from the case for some continuous objective functions. For further analysis, we set the number of MDCs to be 2, 3, 4, and 5, respectively, with the same parameters of the algorithm as for file 10ch150.tsp. The experimental results are the minimum for f 1(x) and f 2(x) from 10 independent runs, which show the relationship among the number of MDCs and the total moving distance and the moving range of different MDCs. The detailed data are shown in Table 5.

Table 5 Performance analysis of proposed algorithm for different MDCs using the 10ch150.tsp

Considering the variation in the minima of the objective function f 1(x), it can be seen that where the number of MDCs is greater, the total moving distance is also greater. This is mainly due to that the starting and returning segment of each MDC is the same source segment. The larger the number of MDCs is, the higher the cost of returning to the source segment would require. When the number of MDCs is increased from 2 to 5, the total moving distance is increased from 2370.078 to 3761.941. The variation in the minima of objective function f 2(x) shows that the number of MDCs is not directly related to the moving ranges. For example, when the number of MDCs is 2, 3, 4, and 5, the corresponding moving ranges are 0.005, 0.058, 5.260, and 2.409, respectively. The experiment shows that our proposed algorithm is effective and can be used to restore network connection, and it also implies that having more MDCs is not always better; it is necessary to consider each specific application.

6 Conclusions

The deployment of WSNs in extreme environments is prone to large-scale damage, which can cause disconnected segments and result in a network being unavailable. Different from common solution methods, we propose a new method of multi-objective optimized connectivity restoration using MDCs. The optimal path problem of MDCs is transformed to yield an improved multi-travelling salesman problem iMTSP, and the collection delay and task equilibrium during data collection are considered. The proposed method introduces virtual segments and a hierarchical chromosome structure and then uses an improved multi-objective optimization genetic algorithm based on NSGA-II to solve the optimization of the moving path of the MDCs. Simulation experiments show that the proposed method can effectively solve iMTSP and obtain a better diversity of Pareto optimum solutions. This could provide new ideas for WSN connectivity recovery technologies. In further research, we will focus on the following: (1) We will use our proposed algorithms in real situations and improve the convergence speed of our genetic algorithm. (2) We will use other multi-objective optimization algorithms apart from NSGA-II to solve optional paths and compare the differences in performance between different algorithms. (3) We will optimize the analysis in an attempt to decrease the complexity of the algorithm.

References

  1. S Lee, M Younis, Eqar: Effective qos-aware relay node placement algorithm for connecting disjoint wireless sensor subnetworks. IEEE Trans. Comput. 60(12), 1772–1787 (2011).

    Article  MathSciNet  Google Scholar 

  2. YK Joshi, M Younis, in 2013 IEEE Global Communications Conference (GLOBECOM). Distributed approach for reconnecting disjoint segments (IEEE, 2013), pp. 255–260. http://ieeexplore.ieee.org/document/6831080/.

  3. S Chouikhi, IE Korbi, Y Ghamri-Doudane, LA Saidane, A survey on fault tolerance in small and large scale wireless sensor networks. Comput. Commun. 69:, 22–37 (2015).

    Article  Google Scholar 

  4. M Younis, IF Senturk, K Akkaya, S Lee, F Senel, Topology management techniques for tolerating node failures in wireless sensor networks: A survey. Comput. Netw. 58:, 254–283 (2014).

    Article  Google Scholar 

  5. L Shu, Y Zhang, LT Yang, Y Wang, M Hauswirth, N Xiong, Tpgf: geographic routing in wireless multimedia sensor networks. Telecommun. Syst. 44(1), 79–95 (2010).

    Article  Google Scholar 

  6. B Hao, H Tang, G Xue, in 2004 Workshop on High Performance Switching and Routing, 2004. HPSR. Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Formulation and Approximation (IEEE, 2004), pp. 246–250. http://ieeexplore.ieee.org/document/1303479/.

  7. X Cao, X Han, C-C Shen, EL Lloyd, Fault-tolerant relay node placement in heterogeneous wireless sensor networks. IEEE Trans. Mob. Comput. 9:, 1536–1233 (2009).

    Google Scholar 

  8. B Khelifa, H Haffaf, M Madjid, D Llewellyn-Jones, in 2009 IEEE Symposium on Computers and Communications. Monitoring Connectivity in Wireless Sensor Networks (IEEE, 2009), pp. 507–512. http://ieeexplore.ieee.org/document/5202236/.

  9. L Sitanayah, KN Brown, CJ Sreenan, A fault-tolerant relay placement algorithm for ensuring k vertex-disjoint shortest paths in wireless sensor networks. Ad Hoc Netw. 23:, 1570–8705 (2014).

    Article  Google Scholar 

  10. HM Almasaeid, AE Kamal, in 2009 IEEE International Conference on Communications. On the Minimum k-Connectivity Repair in Wireless Sensor Networks (IEEE, 2009), pp. 1–5. http://ieeexplore.ieee.org/document/5199257/.

  11. S Lee, MF Younis, AA Abbasi, A localized algorithm for restoring internode connectivity in networks of moveable sensors. IEEE Trans. Comput. 59:, 1669–1682 (2010).

    Article  MathSciNet  Google Scholar 

  12. A Abbasi, M Younis, U Baroudi, in IEEE International Conference on Communications. Restoring Connectivity in Wireless Sensor-Actor Networks with Minimal Topology Changes (IEEE, 2010), pp. 1–5. http://ieeexplore.ieee.org/document/5502448/.

  13. M Imran, M Younis, N Haider, MA Alnuem, Resource efficient connectivity restoration algorithm for mobile sensor/actor networks. EURASIP J. Wirel. Commun. Netw. 2012(1), 1–16 (2012).

    Article  Google Scholar 

  14. M Younis, K Akkaya, AA Abbasi, Movement-assisted connectivity restoration in wireless sensor and actor networks. IEEE Trans. Parallel Distrib. Syst. 20:, 1366–1379 (2008).

    Google Scholar 

  15. A Alfadhly, U Baroudi, M Younis, in 2011 7th International Wireless Communications and Mobile Computing Conference. Least Distance Movement Recovery Approach for Large Scale Wireless Sensor and Actor Networks (IEEE, 2011), pp. 2058–2063. http://ieeexplore.ieee.org/document/5982851/.

  16. G Xue, EL Lloyd, Relay node placement in wireless sensor networks. IEEE Trans. Comput. 56:, 134–138 (2007).

    Article  MathSciNet  Google Scholar 

  17. C Xiuzhen, D Ding-Zhu, W Lusheng, X Baogang, Relay sensor placement in wireless sensor networks. Wirel. Netw. 14(3), 347–355 (2008).

    Article  Google Scholar 

  18. S-F Hwang, W-L Chao, C-L Wu, C-R Dow, in IEEE International Conference on Software Engineering and Service Science. 2-Connected Relay Node Placement Scheme in Disjoint Wireless Sensor Networks (IEEE, 2014), pp. 1039–1043. http://ieeexplore.ieee.org/document/6933743/.

  19. S Kimence, I Bekmezci, Weighted relay node placement for wireless sensor network connectivity. Wirel. Netw. 20(4), 553–562 (2014).

    Article  Google Scholar 

  20. F Senel, M Younis, in Global Telecommunications Conference. Optimized Connectivity Restoration in a Partitioned Wireless Sensor Network (IEEE, 2011), pp. 1–5. http://ieeexplore.ieee.org/document/6134397/.

  21. C Donghui, D Dingzhu, H Xiaodong, L Guohui, W Lusheng, X Guoliang, Approximations for steiner trees with minimum number of steiner points. J. Glob. Optim. 18(1), 17–33 (2000).

    Article  MathSciNet  Google Scholar 

  22. S Fatih, Y Mohamed, Relay node placement in structurally damaged wireless sensor networks via triangular steiner tree approximation. Comput. Commun. 34(16), 1932–1941 (2011).

    Google Scholar 

  23. H Chen, K Shi, Quadrilateral steiner tree based connectivity restoration for wireless sensor networks. Chin. J. Comput. 37(2), 457–469 (2014).

    Google Scholar 

  24. L Sookyoung, Y Mohamed, Optimized relay placement to federate segments in wireless sensor networks. IEEE J. Sel. Areas Commun. 28(5), 742–752 (2010).

    Article  Google Scholar 

  25. F Senel, MF Younis, K Akkaya, Bio-inspired relay node placement heuristics for repairing damaged wireless sensor networks. IEEE Trans. Veh. Technol. 60(4), 1835–1848 (2011).

    Article  Google Scholar 

  26. F Senel, M Younis, in IEEE International Conference on Communications. Optimized Interconnection of Disjoint Wireless Sensor Network Segments Using k Mobile Data Collectors (IEEE, 2012), pp. 492–496. http://ieeexplore.ieee.org/document/6364467/.

  27. K Deb, A Pratap, S Agarwal, T Meyarivan, A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002).

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by the National Natural Science Foundation of China under the grant 91118005 and the Fundamental Research Funds for the Central Universities of China under the grant 106112014CDJZR098801.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiping Kang.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kang, Z., Zeng, H., Hu, H. et al. Multi-objective optimized connectivity restoring of disjoint segments using mobile data collectors in wireless sensor network. J Wireless Com Network 2017, 65 (2017). https://doi.org/10.1186/s13638-017-0852-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-017-0852-0

Keywords