Skip to main content

Computational intelligence-based connectivity restoration in wireless sensor and actor networks

Abstract

Network failure is categorized into the two types of software and hardware (physical layer) failure. This paper focuses on the physical layer failure in the wireless sensor and actor networks (WSANs). Actors play an important role in data processing, decision-making, and performing appropriate reactions. Single or multiple nodes failure of actors due to the explosion, energy depletion, or harsh environments, can cause multiple disjoint partitions. This paper has proposed a new computational intelligence-based connectivity restoration (CICR) method. It uses a combination of advanced computational intelligence methods to solve restoration problem. The proposed algorithm applies the novel enhanced Lagrangian relaxation with a novel metaheuristic sequential improved grey wolf optimizer (SIGWO) search space algorithm in simultaneous selection of k sponsor and p pathway nodes. The reactive proposed method aims to reduce the travel distance or moving cost and communication cost. As a result, the restored network has minimum of topology change and energy consumption. In terms of total traveled distance, CICR has 37.19%, 71.47%, and 44.71% improvement in the single-node failure averagely in comparison with HCR, HCARE, and CMH, respectively. Also, it has an average of 61.54%, 40.1%, and 57.76% improvement in comparison with DCR, PRACAR, and RTN in multiple partitions resulted from multiple nodes failure, respectively. The reliability of CICR method has improved averagely by 35.85%, 38.46%, 22.03% over HCR, CMH, and HCARE in single-node failure. In multiple nodes failure, reliability of CICR has averagely 61.54% and 20% over DCR and PRACAR, respectively.

1 Introduction

Wireless sensor and actor networks (WSANs) refer to a set of sensors and actors that communicated by wireless medium to perform sensing and acting [1]. In this network, sensors sense the humidity, temperature, chemical parameters, and other environmental parameters, then analyze and even calibrate the information. The actors such as robots make decisions, forward the messages to sink or sink to sensors, and then perform appropriate actions upon routing, failures, and communications between equipment. Applications of these networks are monitoring and collecting data from the battlefield, environment, and human health body. The latest applications of WSANs are smart home, smart city, smart grids, industrial internet, smart farming, and cloud computing [2]. Stability of connectivity and coverage in these networks is crucial. Therefore, connectivity restoration approaches in wireless sensor networks (WSNs) and WSANs have attracted significant attention.

Due to energy depletion, hardware malfunction, failure of nodes in WSANs, or explosion in a harsh and hostile environment, one or multiple actors may fail and results partitioning the network. A network partitioning is the reduction of a graph to a smaller graphs by segmenting its nodes into the exclusive groups, that each group with the other group has no communication and data exchange. This failure can disconnect a part of nodes and make them unreachable from their adjacent nodes. Thus, restoring connectivity repairs the failures which can be due to hardwares such as sensors and actors malfunction. This paper ignores software failures or traffic crashes in routers.

After the wide explosion, several actors and nodes will fail at the same time. In connectivity restoration process, there should be a comprehensive algorithm that can repair two or more created partitions of single or multiple failures. In order to retain the connectivity under the failure of some nodes, the node redundancy method has been proposed by deploying more nodes than necessary [3]. But redundancy of nodes has overhead cost of hardware. In addition, it is not possible to replace the actor in the harsh or impassable places. Therefore, in the recent researches, one of the neighbors of actors with respect to distance, degree, or other parameters will replace with the failed actor. In these methods, the topology and routing of the network will change.

Connectivity restoration must be intelligent, distributed approach and automatic self-healing process. Performance of restoration algorithms depends on the energy efficiency, scalability, node density, network recovery time, or time complexity of algorithms for online applications and communicational complexity.

The less travel distance has a less energy consumed by the network. In harsh environments, the nodes are equipped with solar cells in addition to the battery [4]. Energy saving is very important. Therefore, energy consumption during restoration must be low. The minimum total energy consumed prolongs the lifetime of the network. Therefore, an energy-efficient approach to solve this issue is necessary. Optimal energy-efficient algorithm is an algorithm with minimum traveled distance by all nodes and minimum message overhead. Also, the fewer relocated nodes, cause the less topology change, and the sense of critical area information is more covered.

This paper proposes comprehensive, intelligent, distributed, hybrid, localized, and energy-efficient algorithm that can repair all kinds of failures. Unlike proactive mechanisms, reactive methods can restore any type of failures, whether single or multiple failures by evaluating the number and the location of the failed nodes. The goal of this method is to decrease the movement and communication overhead during the restoration process.

The rest of the paper has been organized as follows. Section 2 reviews related literature respect to the two categorizations including proactive and reactive methods. Section 3 formulates the problem of restoring and describes the network model. Section 4 introduces the proposed method in detail. Section 5 describes the theoretical analysis of the algorithm. The simulation setup and results are presented in section 6. Finally, section 7 expresses the conclusions and future work.

2 Related works

A node failure can create multiple partitions in a WSAN. The presented strategies for connectivity restoration can be categorized into the proactive and reactive restoration [5]. In the proactive strategies, the problem of restoration can be solved by using redundant actors [6]. As well as the backup node for each actor is also chosen at the network setup time to control the network message overhead and replacement during the process [7]. In the other proactive methods, k-connected topologies will generate [8]. k-connected topologies are included k paths between two nodes. Proactive methods put a lot of resources cost overhead on the network, in contrast, they will not interrupt the network.

Many metaheuristic approaches have been proposed for solving the proactive relay placement problem to restore connectivity such as genetic [9], artificial bee colony [10], particle swarm optimization-based [11] algorithms. Uwitonze et al. [12] has proposed connectivity restoration in wireless sensor networks via space network coding (RPSNC) based on relay placement. This algorithm studies network coding in Euclidean space and places excess relay nodes at the network. Deployment of redundant relays and actors cannot be an optimal solution due to time complexity, and it is not possible to use in the combat areas and rough paths. Therefore, these processes replaced with relocation of existing nodes by self-restoration techniques with non-extensive damages. In reactive strategies, the process relocates neighbors. Reactive approach distributed actor recovery algorithm (DARA) [13] has been used for single-node failure with multiple partitions. DARA selects the proper node among the two-hop failed node’s neighbors with considering degree and distance. Selected node moves to the location of the failed node. If the moved node causes the partitioning of the network; therefore, the algorithm will execute iteratively until the whole of the network is connected. Like as DARA algorithm, Younis et al. [14] proposed the recovery through inward motion (RIM) algorithm to minimize messaging overhead and reduce the distance traveled of neighbor nodes. RIM initiates a local recovery process by relocating all the single-hop neighbors of the failed node toward it, until it is within its transmission radius. Other disconnected nodes have cascaded inward motion to connect with the network. Unnecessary neighbor movements cause high energy consumption and increase message overhead. As well as, the cascaded inward motion will decrease the coverage of the network. To save energy by reducing relocation overhead, an energy-efficient method, intelligent on-demand connectivity restoration for wireless sensor networks (IDCRWSN) [15] has been presented which considers the energy level of the participant nodes in the process. The adjacent node will broadcast a recovery message and will increase its transmission radius instead of moving toward the failed node.

Hybrid connectivity restoration (HCR) combines proactive and reactive restoration mechanisms for single-node failure [16]. In the proactive process, an actor selects a backup node through its single-hop neighbors based on the minimum travel cost and distance. The reactive process includes cascaded nodes movement. In this method, the backup selection and restoration process start only for critical actors. The node whose failure breaks its directed adjacency connectivity is named a critical node. The HCR is designed for restoring two partitions and cannot recover connectivity of more disjoint network. Another weakness of this algorithm is that it checks the moving cost for backup assignment in each recovery step and it has no overall vision and causes of the cascading relocations and higher moving cost, as well as, the cascaded motions will decrease the coverage of the network and not suitable for large-scale networks. For this reason, Zhang et al. has suggested a hybrid optimization scheme on connectivity restoration processes for large scale networks that both the backup selection and the relocation process are reactive. This method is a hybrid coverage-aware perception-based connectivity restoration (HCARE) algorithm [17]. The goal of HCARE method, which is a hybrid method, in addition to increasing coverage and network reliability, is to reduce the total traveled distance. In this method, the overlapping function will calculate. Then with respect to the overlapping function and degree of nodes, the node that leaves the least loophole in its location with the lowest degree, will be selected as the backup node. This selected node is one of the neighbors of the failed node and reduces the total traveled distance. The optimal location for the backup node is the place where it maintains the best network coverage with minimum overlapping coverage after network connectivity recovery. This method has fewer cascading motions and will be repeated until a non-critical node selects as the backup.

To maintain the robustness of the topology against failure and reducing the total traveled distance, a distributed k-connectivity maintenance and restoration algorithm for heterogeneous (CMH) WSANs has been presented [18]. After a node failure, a neighbor of the failed node sends a move message to actors with minimum moving cost to the location of the failed node. The objective of CMH is reducing of moving cost. In this method, failure occurs when k decreases. In single-node failure k = 1 can be defined for critical nodes. CMH uses the basic idea of distributed Dijkstra’s algorithm [19] for finding the paths with minimum moving. After selection of an actor with minimum moving cost, the move message is forwarded by the other nodes until it reaches the selected actor which can increase the number of exchanged messages. Proactively selection of critical and backup nodes for multiple nodes failure has been carried out by Imran et al. [20]. They proposed a distributed connectivity restoration algorithm (DCR) for restoring multiple partitions of single and multiple nodes failure. DCR proactively detects critical actors and considers non-critical backups for them based on distance and node degree. If the backup is also a critical node, cascaded relocation of backups will be carried out. The authors also proposed an extended version of DCR named recovery algorithm for the failure of multiple nodes failure (RAM), for restore connectivity of two adjacent nodes failure. The goal of this method is reduction of the restoration time and overhead. Backup movement to the same position of the failed node is drawback of this scheme and grows the total moving cost.

Permanent relocation algorithm for centralized actor recovery (PRACAR) and self-route recovery algorithm (SRRA) also solves the single-node failure resulting multiple partitions restoration problem [21]. The PRACAR replaces the failed centralized actor by its neighbor. PRACAR selects reactively the best actor node for substitution in terms of distance from the failed node, lowest cluster sensors, and lowest degree of nodes that covers lowest area. Then, it applies SRRA that finds the optimal path for the remaining neighboring sensors of relocated actors. The moved nodes in this algorithm are low but the total travel cost is not minimum. Also, the messaging overhead is large.

A method with low data exchange overhead has been suggested for cluster based restoration process which clusters are unaware of their own size, surviving nodes, and links as well as size and location of other survivor clusters while the nodes are equipped with GPS. This algorithm solves the problem of restoration of connectivity in mobile wireless sensor networks after multiple simultaneous nodes failure named round-table negotiation (RTN) approach [22]. In this method, each cluster sends a negotiator to participate in a round table negotiation and decision-making process. They exchange information and find paths for connecting clusters through known dead node locations and then select the nodes to be moved to those paths. Negotiators return to their clusters and restoration begins. The relocation of nodes in this method increases the energy consumption and the total traveled distance. Another method of collocated multiple nodes failure is the restoring connectivity in a resource constrained WSN (RCR) [23] algorithm that restores connectivity by relocating nodes to act as relays. If the existing nodes are insufficient, many of selected nodes will be used as mobile data collectors with optimal tours to decrease latency. The recovery goal of RCR is moving the fewest nodes and reducing the moving cost.

One of the researches in scattered failures is the distributed autonomous connectivity restoration method based on finite state machine (DCRMF) that employs a regional restoration [24]. Finite state machine identifies whether a node is a critical or non-critical. If a failed node is a critical node, at the same time, the nearest non-critical nodes will be relocated to replace the scattered failed nodes. The goal of this algorithm is decreasing the movement overhead.

In section 4, the problem will be formulated as constrained optimization problem. Related literature has solved this problem by metaheuristic approaches. Little information requirement about the problem, search capability in very large spaces of candidate solutions, reliable and robust performance, and easy implementation are the advantages of these algorithms [25]. Wang [26] applied an effective co-evolutionary particle swarm optimization (CPSO) for constrained engineering problems. PSO is used with two kinds of swarms for exploration and exploitation in spaces of solutions. The proposed CPSO is population based. Huang et al. [27] has proposed a differential evolution approach based on a co-evolution differential evolution mechanism (CDE) to solve the constrained problems. To handle the constraints, a special penalty function is introduced. Then, a co-evolution model is presented and differential evolution (DE) is used to perform evolutionary search in spaces of both solutions and penalty factors interactively. Brajevic [28] proposed a crossover-based artificial bee colony (ABC) algorithm. To enhance the exploitation of ABC, two modified ABC agents are used in employed and onlooker phases, and crossover operator is used in scout phase instead of random search. These methodologies do not find the optimal solution and will often find the near-optimal solutions for the constrained problem.

Compared to other population-based algorithms, grey wolf optimizer (GWO) has easy implementation and few parameters to set [29]. GWO outperforms in terms of the optimality of the results, efficiency, robustness, and convergence speed. It provides optimal results in most cases compared with other metaheuristic algorithms. As a result, to solve the connectivity restoration problem in this paper, a novel metaheuristic SIGWO is applied to find optimal solution in search spaces of candidate nodes in subsection 4.2.2. A summary of the classical GWO algorithm is given in subsection 2.1.

2.1 Classical GWO algorithm

The GWO algorithm is a new meta-heuristic approach inspired by the social hierarchy of the grey wolves. GWO imitates the behavior of the grey wolves in terms of the leadership hierarchy and hunting mechanism in nature. Grey wolves such as alpha (α), beta (β), delta (δ), and omega (ω) are assumed for presenting the leadership hierarchy [30]. Delta wolves must take orders from alpha and beta, but they dominate the omega. In GWO algorithm, search process can be performed by wolf sets as solutions that deployed in search area randomly [29]. The main steps of grey wolves hunting are including searching prey, tracking, encircling, and then attacking [31]. The mathematical model of GWO and novel method stated at subsection 4.2.2.

3 Network model and problem description

3.1 Network model

In this paper, a WSAN composed of ordinary and stationary sensor nodes via movable actor nodes. Actors have more processing capabilities and larger transmission radius than sensors. Sensor nodes have limited energy and computational unit, that sense data from environments. Actors in a WSAN are gateways to sink. Sensors send their data to actors through multi-hop paths and then actors forward the data to the sink. Sink nodes process or analyze the data and send processed data to the control center or transmit commands from the control center to other nodes with respect to the IDs of nodes. Sensors and actors are randomly deployed in the sensing area of the environments. Assumed network in this paper have mobile actors and low powered stationary sensors. Sensors periodically update their status like residual energy and their location information to actors and exchange this information with adjacent nodes. Some nodes and actors that are in the transmission radius of each other can communicate together.

Each actor node just keeps and updates a single-hop adjacency table including information such as neighbor’s locations, node ID, and criticality. Communication between multi-hop adjacent nodes is performed by exchanging single-hop adjacency information.

In the distributed methods, computations and decision-making will carry out locally. One advantage of the distributed methods is that fewer messages are transmitted over the network. Distributed computations like distances are carried out by their own neighbor actors. Master actor (MA) proactively has been introduced for each segment at the network setup time for performing centralized main computations of the proposed algorithm and finding an optimal solution. MA has control over the information and positions of all the nodes in the partition.

To define the assumptions and conditions of the algorithm, the following definitions are described.

Definition 1 (multi-hop adjacency): A WSAN will be represented as an undirected Graph, G = (V, E), where V defines set of vertices, E defines a set of edges and E = {eij|(i,j)V} defines bidirectional communication between nodes in the network.\( {N}_i^m \) is the multi-hop adjacency set of i, if and only if there is at least one path between i and j with multiple hop. j is the multi-hop adjacent of i.

Definition 2 (criticality): The critical node might be cut-vertex node or strategic node. A cut-vertex is a critical actor in the network topology and failure of it breaks direct connectivity and divides the network into the multiple segments [32]. In addition, in this paper, another definition of the criticality of a node is defined. The node that is located in the region of great importance is named strategic node, such as flood-prone areas. This metric is determined by the control center. A node is a non-critical if and only if it is removed, all its neighbors have a connectivity path. The criticality of each node is determined through exchanging information of its single-hop adjacency table.

Other CICR algorithm assumptions are in the following:

  • Sponsor and pathway nodes are selected from actor nodes.

  • The transmission radius is Rc. To strengthen the connectivity between actors, both in the CICR and the baseline approaches, the distance between adjacent actors is less than or equal toRc.

  • Transmission radius of actors is the same. Actors are homogeneous. An actor can communicate and forward messages and commands of the arbitrary number of actors.

  • Until the network is fully connected, actors are static and when failure occurred and the recovery process started, actors can move.

  • There will be no new failures during the process. If the new failure occurs, it will be repaired after the end of the first process.

  • Single-node failure can lead the network to the two or multiple partitions.

  • Actors are divided into the critical and non-critical categories. If a non-critical actor failed, the cost of restoration is zero and process is not initiated.

  • Nodes are equipped with GPS and geographical coordinates of all nodes are assumed to be known.

3.2 Problem description and actor failure problem

In a WSAN, actors act as a gateway to base station. The number of actors is less than sensors. They can manage the network to be energy-efficient, since an actor calculates the optimal path between its connected sensors, and it can avoid the interference. Furthermore, it has a vital role in medium access control (MAC) layer of the network. The actor failure either disconnects its connectivity with its connected sensors and with other actors. Therefore, actor’s failure is more important than the failure of the sensors. Due to the critical actor failure resulting multiple disjoint partitions, parts of the connected actor networks will lose their connectivity with the rest of the network. Therefore, the sensing performance of the network drops significantly.

In the steady state, actors exchange heartbeat messages to determine liveness of the links. With the heartbeat messages exchanging, each actor notifies its neighbor’s failure locally and informs to MA or sink. Nodes select single-hop neighbor to send heartbeat message to monitor it. If the sender node does not receive the ACK (acknowledgement) of the message from its neighbor after predefined time, it declares neighbor node as a failed node and forwards this announcement to the MA to carry out CICR algorithm computations.

The ACK message contains the survival time for the ACK, that is, the time to live (TTL). The value of TTL minus 1 is when an ACK passes one checkpoint node. Checkpoint nodes are neighbors of a nodes in the heartbeat routing path from the neighbors to the source node in the ACK-based scheme. As long as a checkpoint node receives a data packet, it will return an ACK to the upstream node. If the value of TTL in an ACK message is 0, then the ACK message is discarded. After the heartbeat message is forwarded by the node, it then waits for the arrival of the ACK packet. If the node has not yet received the expected number of ACK messages, it will send an alert message to the source node and then the source node declares the failed node and sends the alert message to the master actor for running CICR algorithm to restore connectivity. For example, when using TTL = 2, if some neighbor nodes do not receive 2 ACK packets, they will send an alert message to the source node to warn that there is a failure [33]. Nodes receive heartbeat messages based on the performance and duration of its sleep and active modes that are defined by the control center.

If an actor fails, there must be existed at least one path between all actors in the network. In this case restoring connectivity has not cost. Restoration initiates for critical actor.

The proposed method is explained with details in the next section.

4 Proposed method

The proposed method in this paper named CICR restores connectivity after partitioning of the network in a WSAN. This method is the hybrid of proactive and reactive restoration process. Proactive part includes the MA assignment. The CICR uses a reactive algorithm to select the relocating nodes and move them to the designated locations which is described.

4.1 Reactive k sponsor and p pathway nodes selection

When single or multiple critical nodes failed, CICR relocates k = p-1 number of sponsor nodes to joint p pathway nodes to minimize the travel cost of the relocated sponsor nodes, where p is the number of partitions. A pathway node has been selected from each partition so that other nodes can communicate with each other through this node and the sponsor node. The sponsor node can move to establish a connection.

This method is a hybrid kind of advanced computational intelligence or soft computing. Soft computing, unlike traditional computing, includes approximate models and solves complicated real-life problems. In order to reduce the computational and time complexity, the enhanced Lagrangian relaxation method can be used and a metaheuristic search method or sequential improved grey wolf optimizer (SIGWO) finds more accurate solutions that are described in subsection 4.2.2.

Unlike the HCR and HCARE that are used for restoring the connectivity of two partitions resulted from single-node failure, DCR, PRACAR, and RTN can repair failure of multiple partitions in single or multiple adjacent node failure. In addition to restoring a single-node failure, CMH can also be extended to solve multiple nodes failure. After occurring multiple failures in CMH, the neighbors of the failed nodes start the restoration simultaneously. For multiple nodes failure, DCR can be run more times. CICR is applied in both single and multiple nodes failure. The CICR selects simultaneously sponsor and pathway nodes for connecting created partitions in order to minimize the total traveled distance of the moved sponsor nodes in the single operation. CICR detects sponsor nodes for connecting pathway nodes of partitions, even if pathway nodes are in multi-hop adjacency. In other words, it selects a pathway node from each partition in order to minimize the total moving cost of moved sponsor nodes. Sponsor nodes are moved to establish a connection between pathway nodes.

According to Fig. 1, CICR determines pathway and sponsor nodes through the algorithm mentioned in subsection 4.2. Suppose two nearest nodes of two disjoint partition, as shown in Fig. 1a, are A1 and A2. One solution determines A1 and A2 as pathway nodes. As well as, A3 is selected as a sponsor node. This is one solution that is found by CICR among existing solutions as can be seen in Fig. 1b, the optimal position for sponsor node A3 is A3'. In the second solution as shown in Fig. 1c, A1 and A3 are determined as pathway nodes and A2 is selected as the sponsor node, which relocates to the optimal location A2' for restoring. The dashed line in Fig. 1 b and c shows the total distance moved. The total distance moved by sponsor node in Fig. 1c is lesser than in Fig. 1b.

Fig. 1
figure 1

(a) Two disjoint partitions. (b) Restored connectivity (one solution), (c) Another form of restoration

Generally, the CICR does not select the p nearest pathway nodes of the partitions. It selects p pathway and k sponsor nodes that decrease the total traveled distance of all sponsor nodes. CICR intelligently assumes the nodes A1 and A3 as the pathway nodes and A2 as the sponsor node. In dense and semi-dense WSANs, CICR selects only this combination for sponsor and pathway nodes. This combination is one of the reasons why this approach is better than HCR, CMH, and HCARE and other approaches like DCR, PRACAR, and RTN. These selected nodes generate a pathway for communicating partitions. The rest of the nodes communicate together through these nodes in the path with an optimal routing. The total moving cost is the distance moved by a single sponsor node. As a result, in multiple disjoint partitions, the distance moved by all sponsor nodes is the total moving distance or failure cost.

For two disjoint partitions, the proposed algorithm restores the connectivity through a single actor given the distance between them if it is not more than 2Rc. Otherwise, it estimates the distance to restore connectivity with the lowest number of sponsor nodes and the least moving cost.

Theorem 1: Best position for sponsor node must be on the intersection line of sponsor and farthest pathway node and R c far away from farthest pathway or non-adjacent pathway node.

Proof. In this algorithm, if one of the pathway nodes is non-critical, the sponsor node will definitely be in the adjacency of non-critical pathway node. The robust neighborhood condition for the two nodes is to be located at distanceRcfrom each other. Sponsor node goes to the best position and since it is in the transmission radius of the pathway node, the connection will be established. The best position of sponsor node to restore connectivity between two pathway nodes A1 and A3 in Fig. 2, must be in theA2'. A1 is the farthest pathway node.

Fig. 2
figure 2

Best position for moved sponsor node A2

The HCR selects properly the best position in some cases and in most cases, it is the intersection of communication circles of any two nodes. In CMH, DCR and PRACAR, the backup or selected node moves to the position of the failed node. In the best case, the total moving cost of all backups is the nearest adjacent distance. HCARE selects the location of moved backup nodes based on the overlap of the transmission radius of nodes in the failed area. Destination location can be exactly the intersection of two nodes and does not have more overlap with one of the nodes, which increases the total traveled distance. RTN does not accurately identify boundary nodes (described in the subsection 6.3.1) and increases the total traveled distance. Therefore, the CICR outperforms HCR, CMH, HCARE, DCR, PRACAR, and RTN in terms of total distance moved.

Theorem 2: The minimum moving cost of CICR is when the sponsor nodes will be located between two partitions after moving unless the pathway nodes are not in the single or two-hop neighborhood of the failed node.

Proof. In Fig. 3, the transmission radius of sponsor nodes is denoted by dashed line and three nodes A2, A3, and A5 are pathway nodes of three disjoint partitions. Figure 3b shows the solution that has the minimum total traveled distance and two sponsor nodes moved to restore connectivity (\( {d}_{A1,A{1}^{\prime }}+{d}_{A4,A{4}^{\prime }} \)). Therefore, it causes the low energy consumption and little topology change. The second solution in Fig. 3c is the case that a single sponsor node moves to the intersection of three transmission radii and restores the connection of three partitions (total traveled distance is \( {d}_{\mathrm{A}4,\mathrm{A}{4}^{{\prime\prime} }} \)). The total traveled distance in the latter case in Fig. 3c is more than the first case in Fig. 3b, i.e., \( {d}_{A1,A{1}^{\prime }}+{d}_{A4,A{4}^{\prime }}<{d}_{\mathrm{A}4,\mathrm{A}{4}^{{\prime\prime} }} \). The proposed algorithm intelligently considers all of these solutions and ultimately selects the first solution.

Fig. 3
figure 3

Selection of pathway and sponsor nodes for three partitions, (a) partitioned network, (b) two moved sponsor node, (c) single moved sponsor node

If the distance between two nodes is more than 2Rc, more than one sponsor node is essential to restore the connectivity between two pathway nodes. Figure 4 shows the five partitioned networks after restoration with CICR method. It has five pathway and four sponsor nodes.

Fig. 4
figure 4

A five partitioned WSAN after restoration

Efficient area coverage fulfilled after restoration, because of the robust topology form in this algorithm.

CICR comprises of three nested algorithms 1 to 3. The algorithm 1 is the pseudo-code of the restoration process.

figure a

In dense and large WSANs as well as in large-scale damage, assignment of the k sponsor nodes to p pathway nodes, between single or multi-hop adjacent nodes of the failed nodes and minimizing the total cost is hard. To solve this problem, if the number of candidate nodes for sponsor and pathway nodes are n, and finally p + k of them are selected, the problem will be np + k-hardness problem. This problem is well-known as a NP-hard problem. Due to the NP-hard nature of this problem, exact methods involve intense computation. Therefore, usage of enhanced Lagrangian method and SIGWO mathematical relations for NP-hard problem solution has been explained in subsection 4.2.

4.2 Mathematical computations

4.2.1 Enhanced Lagrangian method

To reduce the time complexity of the problem, an enhanced Lagrangian relaxation and a novel metaheuristic optimal search algorithm has been proposed to find the exact and best solution for solving the actor failure recovery problem.

Let I = {1,…, m} is the candidate set of pathway nodes containing single-hop and two-hop neighborhood of the failed node’s adjacents. Assume vector J = {1,..., n} is the candidate set for sponsor nodes. The nodes in I and J are denoted by i and j indices. (i, j) denotes the edges between vertices i and j, so that i ∈ I, j ∈ J. Since simultaneous pathway and sponsor node selections, the candidates set of pathway and sponsor nodes are the same.

The output pathway number of the algorithm will be equal to the number of partitions. k is the maximum number of sponsor nodes that can either interconnect the partitions or can have minimum total traveled distance as it is proved in Theorem 1. Selecting k sponsor and p pathway nodes with minimum cost and determining best locations for sponsor nodes are output of algorithm 2. The nodes in a partition are grouped into the same groups and after selecting the nodes, it checks whether they are in a same group, if they are, other nodes will be selected instead of them. These groups are denoted by {Pr| r = 1, …, p}. Where p is the number of created partitions. Assume the definitions of variables in Equations (1) and (2) as below.

$$ {a}_{ij}=\left\{\begin{array}{ll}1& \mathrm{if}\ \mathrm{sponsor}\ j\kern0.5em \mathrm{is}\ \mathrm{connected}\ \mathrm{to}\kern0.5em \mathrm{pathway}\kern0.5em \mathrm{node}\ i\\ {}0& \mathrm{otherwise}\end{array}\right. $$
(1)
$$ {S}_j=\left\{\begin{array}{ll}1& \mathrm{if}\ \mathrm{a}\ \mathrm{node}\ j\ \mathrm{is}\ \mathrm{sponsor}\\ {}0& \mathrm{otherwise}\end{array}\right. $$
(2)

aij is a decision variable that determines whether a sponsor node j is assigned to a pathway node i. dij is defined as the cost of selecting pathway node i to a sponsor node j, therefore, dij > 0 for all i ∈ I and j ∈ J. If a sponsor node to be assigned to three pathway nodes, there exist three dij with three different i and single j. The sum of the three values of dij is the total cost for sponsor node j. The total cost of assignment k sponsor nodes for p pathway nodes is the sum of all these costs in one solution. The total cost of reestablishing of the failed network is as Equation (3).

$$ R=\min \sum \limits_{i=1}^m\sum \limits_{j=1}^n{d}_{ij}{a}_{ij}\kern4.75em \forall i\in {P}_r\&i+l\notin {P}_r,r=1,\dots, p,l=1,\dots, m-i $$
(3)

where R is the minimum total cost of selecting p pathway and k sponsor nodes. Pr represents nodes belong to the same partition. This function R is called the objective function, subject to Equation (4).

$$ \sum \limits_{j=1}^n{S}_j=k $$
(4)

where k is the total number of required sponsor nodes. Considering the problem that each pathway node is connected to the two different sponsor nodes as shown in Fig. 4, the following relation (5) exists for the decision variable aij:

$$ \sum \limits_{j=1}^n{a}_{ij}=2\kern3.5em \forall i=1,\dots, m $$
(5)

Another condition specifies if a decision variable aij is equal to 1, corresponding Sj is also 1 and j will be the sponsor for pathway node i. It is defined as Equation (6).

$$ {x}_{ij}\le {S}_j,\forall i=1,\dots, m\kern0.5em ,j=1,\dots, n $$
(6)

Dm × n is a matrix with minimum Euclidean distance elements dij between all candidates.

The equations (4, 5 and 6) are constraints on the variables that aim to find the connected i and j that will be achieved the minimum cost R. Enhanced Lagrangian has been used to solve it. Lagrangian relaxation gives a vector of Lagrangian multipliers. Generally, Lagrangian relaxation is the sum of the objective function and constraints and Lagrange multiplier λ [34]. Equations (1) and (2) transform to the Equations (7) and (8) to generate the Lagrangian relaxation.

$$ {a}_{ij}\in \left\{0,1\right\},\forall i=1,\dots, m,j=1,\dots, n $$
(7)
$$ {S}_j\in \left\{0,1\right\},\forall j=1,\dots, n $$
(8)

The constraint in Equation (5), is relaxed with objective function. Then, a Lagrangian relaxation is obtained as Equation (9).

$$ {\displaystyle \begin{array}{l}R=\underset{\lambda_i}{\max}\underset{a_{ij},{s}_j}{\min}\sum \limits_{i=1}^m\sum \limits_{j=1}^n{d}_{ij}{a}_{ij}+\sum \limits_{i=1}^m{\lambda}_i\left(2-\sum \limits_{j=1}^n{a}_{ij}\right)\\ {}\mathrm{Subject}\ \mathrm{to}\ \mathrm{Equations}\ (4),(6),(7),(8).\end{array}} $$
(9)

where λiis a vector of Lagrangian multipliers. Equation (9) is equivalent to Equation (10).

$$ {\displaystyle \begin{array}{l}R=\underset{\lambda_i}{\max}\underset{a_{ij},{s}_j}{\min}\sum \limits_{i=1}^m\sum \limits_{j=1}^n\left({d}_{ij}-{\lambda}_i\right){a}_{ij}+2\sum \limits_{i=1}^m{\lambda}_i\\ {}\mathrm{Subject}\ \mathrm{to}\ \mathrm{Equations}\ (4),(6),(7),(8).\end{array}} $$
(10)

The relation (10) and constraint (6) are unified into the Equation (11).

$$ {a}_{ij}=\left\{\begin{array}{c}{S}_j\kern2em if\ {d}_{ij}-{\lambda}_i\le 0\\ {}0\kern3.75em \mathrm{otherwise}\end{array}\right. $$
(11)

The Lagrangian (10) is changed into the Equation (12).

$$ {\displaystyle \begin{array}{l}R\left(\lambda \right)=\underset{S_j}{\min}\sum \limits_{j=1}^n\sum \limits_{i=1}^m{\phi}_{ij}{S}_j+2\sum \limits_{i=1}^m{\lambda}_i\\ {} Subject\ to\ {\sum}_{j=1}^n{S}_j=k\ and\ (8).\end{array}} $$
(12)

where vector λi = [λ1, …, λm] and ϕij = min(0, dij − λi) with considering relation (11). Sj is the unknown variable that must be determined in such a way minimize R(λ). The desired Sj are related to the k number of minimum \( {\sum}_{i=1}^m{\phi}_{ij} \).

For solving the problem, first, the search space of Lagrangian multipliers has been determined. In the earliest approaches λi can be found by decomposition R(λ) into the m maximization problems of equation (13) and is performed a random search for λ.

$$ \underset{\lambda_i}{\max }R\left({\lambda}_i\right)\cong \sum \limits_{j=1}^n\min \left(0,{d}_{ij}-{\lambda}_i\right)+{\lambda}_i\kern2em for\ i=1,\dots, m $$
(13)

In the proposed CICR, a Lagrangian relaxation (12) is used for finding the optimal solution of Equations (3) to (8). A SIGWO search has been carried out in the space of the Lagrangian multipliers λ to find the λvector with respect to Equation (11) and the optimal solution set of Equation (4) is {j ∈ J| Sj = 1}.

CICR determines a lower and upper bound for Lagrangian multipliers with respect to (13). R(λi) will be maximized if λi is in the range between di[1] and di[2], as Equation (14).

$$ {\lambda}_i\in \left[{d}_{i\left[1\right]},{d}_{i\left[2\right]}\right],i=1,\dots, m $$
(14)

di[1], di[2] are the first and second smallest minimum element in the ith row of the cost matrix D respectively.

Theorem 3: R(λi)will be maximized if λi ∈ [di[1], di[2]for i = 1, …, m.

Proof. Because for λi = di[2], R(λi) = ∑j min(0, dij − di[2]) + di[2] where dij ≥ di[2], min(0, dij − di[2])) = 0, therefore, R(λi) = min(0, di[1] − di[2]) + di[2] = di[1]. It is the smallest in row i. Thus, λi = di[2] maximizes R(λ). Then, assume λi = di[1], R(λi) = ∑j min(0, dij − di[1]) + di[1]. When min(0, dij − di[1])) = 0 for all j, R(λi) = di[1] which is optimal.

In this paper, corresponding pathway and sponsor nodes i, j, and Lagrangian multipliers λi are determined by solving the Lagrangian problem (12) due to the upper and lower bound for λi. Then, SIGWO is used for finding {j ∈ J| Sj = 1}.

Therefore, H is a m × 2 matrix that has di[1], di[2] for each row i = 1,…,m , that is defined as Equation (15).

$$ H=\left[\begin{array}{l}{d}_{1\left[1\right]}\kern0.5em {d}_{1\left[2\right]}\\ {}{d}_{2\left[1\right]}\kern0.5em {d}_{2\left[2\right]}\\ {}\kern0.5em \vdots \\ {}\begin{array}{cc}{d}_{m\left[1\right]}& {d}_{m\left[2\right]}\end{array}\end{array}\right] $$
(15)

The pseudo-code for k sponsor and p pathway nodes selection for p disjoint partitions is shown in algorithm 2.

figure b

A summary description of the GWO algorithm and finding an optimal solution with proposed SIGWO is introduced in subsection 4.2.2.

4.2.2 Finding optimal solution with SIGWO

The aim of using this algorithm is finding the fittest Lagrangian multipliers and assignments Sj for all i and j in problem of (12). Generally, the GWO has not been used to restore the connectivity of actors in the WSANs. In GWO algorithm, to mathematically simulate social and hunting behavior of them, the three best solutions are considered to be alpha (most optimal and best solution), beta (second best solution), and delta (third best solution) that have better knowledge about the potential location of the prey. The remainder of the solutions are supposed as Omega. The initial Lagrangian multiplier vector λi is a random population of the grey wolves. The optimal location of the prey is unknown. During iterations, alpha, beta, and delta wolves estimate the value of the prey. The objective function is Equation (12). Each solution calculates the value of the objective function and acquires vector {j ∈ J| Sj = 1}. If the final solution is true, then relation (4) will satisfy.

The mathematical encircling behavior of grey wolf due to [29] has been proposed in Equations (16, 17 and 18). The first three best solutions obtained are saved and the other search agents must update their positions according to the position of the best solutions as Equations (16, 17 and 18):

$$ {\overrightarrow{D}}_{\alpha }=\left|{\overrightarrow{C}}_1.{\overrightarrow{X}}_{\alpha }-\overrightarrow{X}\right|,{\overrightarrow{D}}_{\beta }=\left|{\overrightarrow{C}}_2.{\overrightarrow{X}}_{\beta }-\overrightarrow{X}\right|,{\overrightarrow{D}}_{\delta }=\left|{\overrightarrow{C}}_3.{\overrightarrow{X}}_{\delta }-\overrightarrow{X}\right| $$
(16)
$$ {\overrightarrow{X}}_1={\overrightarrow{X}}_{\alpha }-{\overrightarrow{A}}_1.\left({\overrightarrow{D}}_{\alpha}\right),{\overrightarrow{X}}_2={\overrightarrow{X}}_{\beta }-{\overrightarrow{A}}_2.\left({\overrightarrow{D}}_{\beta}\right),{\overrightarrow{X}}_3={\overrightarrow{X}}_{\delta }-{\overrightarrow{A}}_3.\left({\overrightarrow{D}}_{\delta}\right) $$
(17)
$$ \overrightarrow{X}\left(t+1\right)=\left({\overrightarrow{X}}_1+{\overrightarrow{X}}_2+{\overrightarrow{X}}_3\right)/3 $$
(18)

where \( {\overrightarrow{X}}_{\alpha } \), \( {\overrightarrow{X}}_{\beta } \), \( {\overrightarrow{X}}_{\delta } \) are the position vector of the three best solutions. \( \overrightarrow{X} \) indicates the position vector of a grey wolf. t indicates the current iteration. For random initialization of them, values for \( {\overrightarrow{A}}_1 \), \( {\overrightarrow{A}}_2 \), \( {\overrightarrow{A}}_3 \), \( {\overrightarrow{C}}_1 \), \( {\overrightarrow{C}}_2 \), and \( {\overrightarrow{C}}_3 \) are selected according to the Equations (19 and 20).

$$ \overrightarrow{A}=2\overrightarrow{a}.{\overrightarrow{r}}_1-\overrightarrow{a} $$
(19)
$$ \overrightarrow{C}=2.{\overrightarrow{r}}_2 $$
(20)

where \( \overrightarrow{A} \), \( \overrightarrow{C} \) are coefficient vectors, \( {\overrightarrow{r}}_1 \), \( {\overrightarrow{r}}_2 \) are random vectors in [0, 1], and \( \overrightarrow{a} \) is linearly decreased from 2 to 0 in each iteration. In classical GWO, exploitation is ensured by parameter \( \overrightarrow{a} \). Teng [35] has investigated the improvement of the exploration process in GWO by decreasing the value of \( \overrightarrow{a} \) according to a nonlinearly function as given in Equation (21).

$$ \overrightarrow{a}={\overrightarrow{a}}_{initial}.\left(1-\mu .{\left( iter/{iter}_{\mathrm{max}}\right)}^2\right) $$
(21)

where µ ∈ (0, 3) is a nonlinear modulation index, iter denotes current iteration and itermax is the maximum number of iterations. \( {\overrightarrow{a}}_{initial} \) is the initial value of the control parameter \( \overrightarrow{a} \). Based on results of [35] for μ ∈ (1,1.5), to improve exploration process and robustness of searching, μ is set to 1.3, resulting in the number of iterations used for exploration is 70% and the number of iterations of exploitation is 30%.

In the iterative period, when \( \left|\overrightarrow{A}\right|<1 \) is the encircling area will shrink, and the candidate solutions converge toward the value of the prey. In every iteration, the best three solutions will save and oblige the search agents to update their positions in the search space and converging to optimal locals of the solution space. This is the reason of fast convergence of GWO to find Lagrangian multipliers.

In SIGWO, for each row i = 1, ..., m, there exists three best solutions for λi. The SIGWO runs m times to find the smallest value for Equation (12) and acquires all pathways and sponsor nodes. The three best solutions of SIGWO for λ vectors are in the following matrix (22).

$$ \lambda =\left[\begin{array}{l}{\lambda}_{1\alpha}\kern0.5em {\lambda}_{1\beta}\kern0.5em {\lambda}_{1\delta}\\ {}\begin{array}{ccc}{\lambda}_{2\alpha }& {\lambda}_{2\beta }& {\lambda}_{2\delta}\end{array}\\ {}\kern2.75em \vdots \\ {}\begin{array}{ccc}{\lambda}_{i\alpha}& {\lambda}_{i\beta}& {\lambda}_{i\delta}\end{array}\end{array}\right] $$
(22)

The pseudo-code of the proposed SIGWO is shown in algorithm 3.

figure c

The overall hierarchical flowchart of the proposed CICR algorithm is presented in Fig. 5.

Fig. 5
figure 5

Flow chart of the proposed CICR

In the sparse network that has more critical nodes, the probability of choosing a critical node as a sponsor node will be high and it results from recursive process more often. In order to avoid an unfinished loop, each moved sponsor node can only relocate once in the case of cascading motion.

5 Analysis of CICR algorithm

This novel proposed method can improve the performance in terms of time and computational complexity specially in the multiple partitions or large network size. The recovery time of this algorithm is very low, in contrast, in HCR and DCR, assigning the backup and failure cost for all critical nodes in dense networks with more than 200 nodes, is time-consuming and practically impossible for very dense networks. The major disadvantage of Dijkstra’s algorithm in CMH is the fact that it does a blind search by consuming a lot of time waste of necessary resources. Dijkstra’s algorithm has a lot of memory wasting [36].

At continuation, the performance (subsection 5.1) and complexity (subsection 5.2) of the CICR will be analyzed.

5.1 Performance analysis

To analyze the performance of the CICR, the following theorems are introduced.

Theorem 4: CICR can restore connectivity of single or multiple nodes failure in collocated or non-collocated created partitions in a process execution.

Proof: CICR is a reactive process because selection of sponsor and pathway nodes for multiple failure needs to detect the number of partitions and make a decision. The centralized main computations are performed in the MA. MA estimates scale of failure and carries out the computations of any failure. Considering this issue that the pathway and sponsor nodes are selected all at once, calculations can be carried out with the parallel computing using FPGAs (field programmable gate arrays).

Theorem 5: In the worst case, the maximum number of moved nodes in the CICR equals to k = p − 1, where p is the number of partitions.

Proof: The number of partitions is equal to the number of pathway nodes. In the worst case, one sponsor node is required to bridge two pathway nodes that each one is representative for one partition. In this way, all failures and partition connections are restored. Theorems 1 and 2 can confirm this statement.

Theorem 6: In the CICR, the maximum distance moved by one sponsor node, is equal to the transmission radius Rc.

Proof: In this approach, a sponsor node is the neighbor of one of the pathway nodes. sponsor node moves to the best position that mentioned in Theorem 1. In the worst case, a sponsor node moves to the location of the failed node. Also, each sponsor node is relocated once, so the maximum relocation of sponsor is equal toRc. Because the maximum distance between the neighboring nodes isRc.

5.2 The computational and time complexity analysis of the CICR

In the CICR method, to reduce the time and computational complexity, enhanced Lagrangian method is used to speed up finding optimal solution using a convergence approach, also the SIGWO has been used instead of a stochastic search. Enhanced Lagrangian relaxation keeps the optimality as well as decreasing the computational complexity.

In addition, the search space of Lagrange multipliers is reduced with determining the lower and upper bounds of each λi. The time complexity of the best position calculation for sponsor nodes is constant. Given a R(λ) in Equation (12), yj is determined with definition of vector λi and a SIGWO search is performed to find Lagrangian multipliers. This sentence \( 2{\sum}_{i=1}^m{\lambda}_i \) in Equation (12) defines the overall time complexity of the CICR. So, the complexity of the problem is just equal to the time complexity of the SIGWO. λ matrix in Equation (22) has m number of rows, that m is the number of members of vector I. According to algorithm 3, the for loop runs m times in each iteration and the outer while loop runs itermaxtimes. The time complexity of the overall algorithm is O(itermax × m). itermaxfor sparse networks which is very small.

6 Simulation results and discussion

The performance of CICR is compared to HCR, CMH, HCARE, DCR, PRACAR, and RTN methods. The performance metrics and setting of the simulation are presented in subsection 6.1. Analysis and obtained comparison results are explained in subsections 6.2 and 6.3. The reliability of CICR in comparison with HCR, DCR, and PRACAR is evaluated in subsection 6.4. Limitations of this study are mentioned in subsection 6.5.

6.1 Simulation setup and performance metrics

Two kinds of scenarios have been simulated using the MATLAB R2019b software. First, scenario is the case that single-node failure causes two partitions and the performance of CICR has been compared with HCR, CMH, and HCARE.

In the first scenario that is described in subsection 6.2, the number of deployed actors or nodes (DN) is varying from 20 to 140 with an increment step of 20 when Rc = 80 as assumed in [16]. Then, the transmission radius (Rc) of all nodes is the same. The value of Rc is chosen from 20 to 120 with changing 20 step each time when the number of nodes is fixed. All the sensor nodes are randomly deployed over a network size of 1000 m × 1000 m.

In the second evaluation that will describe in subsection 6.3, the performance of CICR is compared with the DCR, PRACAR, and RTN methods. In these topologies, more than two partitions, i.e., six partitions resulted from single or two adjacent failures are evaluated. In addition to all the above conditions and random topologies, DN is varying from 25 to 200 with an increment step of 25 when Rc is fixed at 100 like as [20, 21]. Then, Rc is varying from 25 to 200 with an increment step of 25 when DN = 100. All the sensor nodes are randomly deployed over a network size 600 m × 600 m. When nodes fail, for each network, all methods include CICR, DCR, PRACAR, HCR, CMH, HCARE, and RTN are run and evaluation metrics are computed for these methods.

In order to obtain the correct average results, for the same DN and Rc, 15 random WSANs are created in both scenarios and all of the deployed critical nodes are randomly failed. Also, all results are the average over these random simulations.

In the following, four metrics that are used to evaluate the performance of CICR has been described.

  • Number of relocated actors: This parameter represents the overall number of actors participating in the restoration process. According to this parameter, whatever the number of relocated actors is fewer, then the higher efficiency of the algorithm will be resulted.

  • Total traveled distance: It represents the sum of the total distance moved by all the relocated nodes during the restoration process which evaluates the efficiency in terms of overhead and energy consumption. This parameter that is called moving cost must be minimized.

  • The number of exchanged messages: It indicates the total number of exchanged messages during restoration and evaluates the energy consumption and overhead.

  • Reliability: Reliability of a connectivity restoration method describes the proper operation of the restored area without a second failure and partitioning. As reliability increases, the network becomes more resistant to the second failure.

6.2 Single-node failure results and discussion

In this section, the CICR has been compared with HCR, CMH, and HCARE in terms of total traveled distance, number of relocated actors, and number of exchanged messages.

6.2.1 Total traveled distance

As shown in Fig. 6, CICR outperforms CMH, HCR, and HCARE in all values of DN and Rc. Figure 6a shows the change of varying DN on the total traveled distance with fixed Rc = 80. HCR has many cascaded movements which result in more travel cost than CICR. CICR generally converges the restoration process toward a higher density of region. The total traveled distance reduces with increasing DN and when DN > 60, remains almost constant and linear. In general, the total traveled distance decreases during increasing DN. Because for the same Rc, if DN grows, then the density gets higher. As a result, the area covered by the nodes increases. In this case, the CICR incorporates more nodes, and then selects pathway and sponsor nodes between them that minimizes the total traveled distance of all moved sponsor nodes.

Fig. 6
figure 6

The total traveled distance with varying (a) the number of actors (fixed Rc = 80), (b) the transmission radius (fixed DN = 40)

The curve trend almost is the same and with increasing DN drops just a little. The linearity of CICR is more than other methods. In HCR, a sparse WSAN encounters large traveled distance compared to a dense WSAN, since deployment of nodes is more linear, and this leads to the long inter-node distance and cascading movements. For non-critical actors, cost will be zero in both HCR and CICR. In the simulations of HCR in [16], both critical and non-critical actors have randomly failed, and values are calculated with having zeros. But in this paper, just failure of critical actors is considered. Therefore, the curve of HCR is nearer to CICR. According to Table 1, the CICR method has a 37.19% improvement over the HCR averagely.

Table 1 The total traveled distance with varying the number of actors (fixed Rc = 80)

In the simulations for CMH algorithm k = 1, and like the other algorithms, if a node is critical and loses all its connections, failure is declared. The purpose of this method, in addition to keeping the stable connections, is to reduce the moving cost. As shown in Fig. 6a, in lower DN values, the moving cost is higher because the number of critical nodes is higher and CMH in 1-connectivity mode does not select the backup nodes from the critical nodes. Because each critical node in this method must have at least one connection to another node. Therefore, the critical node does not move in this method. In this case, a non-critical node is selected from a distance that does not disconnect the connection of the critical nodes, which increases the total traveled distance relative to the CICR. As the number of nodes increases, the number of non-critical nodes decreases. Selected node moves along the shortest graph path toward the location of the failed node based on Dijkstra’s algorithm. This movement along the graph path, in contrast to the Euclidean path, increases the moving cost. As a result, one of the limitations of selecting a node in CMH is that it must have a path to the failed node. Refer to Table 1, CICR has 44.71% improvement over CMH.

By obtaining the overlapping function of the node transmission radius, HCARE examines the total traveled distance and proves that if the overlapping function in dense networks in the failed area is higher, then the total traveled distance will be shorter. Backup node from the neighboring of the failed node is selected in such a way that it has less overlap in its area and less degree. The selected backup node goes to a place where the overlapping function of the communication range of the neighboring nodes is minimized. This location can be exactly the intersection of two nodes and does not overlap with one of the nodes, which increases the cost of relocation. This method, like HCR, has cascading movements for critical backup nodes which increases the cost of moving. As shown in Table 1, the total traveled distance in the CICR method has 71.47% improvement over HCARE.

Figure 6b shows, CICR, HCR, CMH, and HCARE rise with the increasing the Rc. As can be seen, in CICR the total traveled distance increases with the transmission radius of Rc < 80. Because with the increasement of Rc, the inter-node distance will be long, therefore, the traveled distance grows until reach to 80 and coverage will grow in Rc > 80. Then for Rc > 80, the increasing Rc does not affect the distance traveled and almost will be stable.

In small Rc < 60, because of the short inter-node distance, HCR selects many nodes to move with minor movements. Therefore, the curve of HCR is nearer to CICR. In CMH, the total traveled distance in Rc < 60 increases significantly compared to the CICR method, because when the transmission radius is low, the number of critical nodes is higher. Therefore, the distance that a non-critical node needs to travel is longer. In Rc > 60, in CMH and HCARE as well as HCR, as the Rc increases, the inter-node distance will increase too, which the total traveled distance increases.

6.2.2 Number of relocated actors

According to Theorem 2, k = p-1 number of relocated actors can minimize the cost of moving nodes. In sparse networks, relocated actors during restoration is more than dense networks. Whatever the number of relocated actors is smaller, then the topology will change less, and the less critical area information will be lost during restoration.

Figure 7 shows the average number of relocated actors with increasing DN and Rc. The two curves of CICR demonstrate that the CICR moves only one sponsor node to restore two partitions, because the number of relocated actors depends on the number of generated partitions, while HCR moves more actors than the CICR. In the dense networks, in HCR, sometimes the number of moved nodes can reach to six nodes. Also, in the sparse networks, can reach to four nodes in one restoration process and has more moving overhead. In this case, since at higher density the number of neighboring nodes is higher, it is more likely to select backup which will break a new connectivity by HCR. These cascade motions increase the movement overhead of the network. But as shown in Fig. 7, HCR moves more nodes in low Rcand DN, because of the low distance between actors and low degree of nodes respectively. HCARE, like HCR, has cascading relocations. In a low-density network, there are more critical nodes and in HCARE, the coverage loophole must be repaired, therefore, the number of relocated actors increases. Gradually, as the number of deployed actors increases, the coverage will increase, and the number of relocated actors decreases (as shown in Fig. 7a). In CMH, exactly one node is selected and goes to the location of the failed node. This node is a non-critical node and CMH has no cascading relocations.

Fig. 7
figure 7

Average number of relocated actors with varying (a) average number of actors (fixed Rc = 80), (b) the transmission radius (fixed DN = 40)

In Fig. 7b, for low Rc, internode-distance is lower and decreases the number of relocated actors. Rcand DN has no effect on the number of nodes moved in the CICR.

Figure 7 confirms that the CICR outperforms HCR, HCARE and is equal to CMH in terms of the number of relocated nodes. The plotted results are the average over 15 random simulations.

6.2.3 Number of exchanged messages

The total exchanged message or communication cost consumes resources, from the aspect of time, bandwidth, and hardware. Figure 8 shows the relationship of the total exchanged messages with DN and Rc in average. The CICR outperforms the HCR, CMH, and HCARE in terms of the exchanged messages with increasing both DN and Rc. As shown in Fig. 8, the total exchanged messages remain constant with CICR as DN increases. Message overhead in this case can divide into two phases. One step before restoration and another is during the restoration. Message overhead during the restoration is important and can effect on energy consumption and recovery time.

Fig. 8
figure 8

The number of exchanged messages with varying (a) the number of actors (fixed Rc = 80), (b) the transmission radius (fixed DN = 40)

Proactively selection of MA reduces message overhead during the restoration. The MA sends the new coordinates of sponsor nodes to them. In two partitions, a single sponsor node connects two pathway nodes. Therefore, a message has been sent from MA to the sponsor node and reactive motion starts. In this case, the message overhead equals to one in all DN and Rc.

The exchanged message between neighbors at a new position of sponsor nodes has not been considered since it is the ordinary status update for single-hop adjacency table. Before the restoration process, the nodes maintain single-hop adjacency table. So, it also reduces the message overhead. The CICR has superiority than HCR on the exchanged message overhead. In the curve of Fig. 8a, Rchas been fixed at 80 m and the number of messages is shown with the increasing of DN. While this curve for CICR is constant, the HCR curve decreases almost with the growth of DNs. In HCR, the number of messages in sparse WSANs is larger than dense WSANs. It is related to the high possibility of the cascading node motions.

Of course, the large number of moved nodes can exist in the dense networks. Multiple moved backup nodes grow the total messages overhead.

As shown in Fig. 8a, in CMH, when the non-critical nodes and paths to that nodes become larger in the dense network, the closest path to the failed node will be selected. The number of exchanged messages depends on the number of nodes along the selected graph path. As much as, the path is shorter, then the number of move messages is smaller. In this method, overhead messages are counted during restoration. Move message is forwarded by a neighbor of the failed node until it reaches an actor node that has the minimum moving cost. Each node that forwards the message to the next node, adds its location information to the message. Thus, after receiving a move message, the mobile node will have a complete path to the location of the failed node.

The number of exchanged messages in HCARE is 4L + 2, where L is equal to the neighbors of the failed node. As the number of deployed actors increases, the degree and the neighbors of the failed node () increases. As a result, the number of messages increases with the number of deployed actors as shown by the HCARE method curve in Fig. 8a.

In the largeRc, the HCR and HCARE curves drop since the inter-node coverage is long and moved backups decreases as shown in Fig. 8b. In the case of CMH, large Rc results fewer and farthest non-critical nodes for movement which increases the path of the message to the destination node and increases the number of messages.

6.3 Multiple collocated node failures results and discussion

In the second scenario, 40% of the network is randomly selected and has been failed. Single or two adjacent nodes are assumed which can divide the network into the multiple disjoint partitions. In the simulations, the number of disjoint partitions is six. Proposed CICR is compared with DCR, PRACAR, and RTN in terms of the total traveled distance, the number of relocated actors, and the number of exchanged messages.

6.3.1 Total traveled distance

Figure 9 shows the total traveled distance of the moved nodes with changes in Rc and DN. As illustrated in Fig. 9, the CICR outperforms the DCR, PRACAR, and RTN. The PRACAR chooses a single non-critical actor for relocation even if it has a large total travel distance from the failed node. In most cases, there is no relocation of several nodes resulting in minimum moving cost. As a result, this method is not efficient in harsh environments, also it increases energy consumption. In DCR, the changing DN, has a little effect on the performance of the total traveled distance but as shown in Fig. 9a, the curve line will not be constant. According to Fig. 9a, CICR has a slow growth when DN > 150 and almost has a constant trend. Both DCR and PRACAR relocate the selected actor for relocation to the position of the failed actor.

Fig. 9
figure 9

The total traveled distance in the six partitions of network with varying (a) the number of actor s(Rc = 100), (b) the transmission radius (DN = 100)

In RTN approach, the negotiators of each cluster travels to the round table, then back to the cluster and estimates the final deployment destination of the relocated node. Negotiators move to the round table where the decision of reconnection paths and replacement nodes are made. In this method, the selected nodes do not move to the location of the failed nodes and are placed in the direct paths that exist between the partitions. These routes are selected by choice of path with random draw. One of the disadvantages of this method is that during selecting partition boundary nodes, the nodes that have lost one or more single-hop neighbors are identified as the boundary nodes. If the closest nodes are in the two partitions, they can be border nodes, but they are in the other side of the partition and cannot be recognized as the border nodes in RTN. Sometimes changing the connection of two partitions to a location that is not in the neighborhood of the failed node will significantly reduce the moving cost. For DN > 150, RTN has a more linear curve and even a slight increased trend because the distance between the partitions decreases due to the network density.

According to Theorem 1, all sponsor nodes in CICR relocate to closest positions such a way that results in the lowest total distance moved by mobile actors and lowest energy consumption.

The CICR curve trend is slow as shown in Fig. 9b and the DCR has the most total traveled distance with regards to the increasing Rc. In CICR, optimal sponsor nodes for jointing pathway nodes rarely affect other nodes and rarely results in restoration again. Affected area by relocation of the sponsor nodes is low and this is another reason for the minimal distance moved of the CICR. As shown in Fig. 9b, in RTN for higher Rc, as the transmission radius increases due to the long inter-node distance, the partitions are farther from each other and the number of nodes to create six partitions is greater. Therefore, the total traveled distance increases by the relocated nodes.

According to Fig. 9, the CICR presents the best performance. Based on the values of Table 2, the CICR method improved by 40.1%, 57.76%, and 61.54% compared to the PRACAR, RTN, and DCR, respectively.

Table 2 The total traveled distance in six partitions of network with varying the number of actors (Rc = 100)

6.3.2 Number of relocated actors

The number of relocated actors is evaluated on the issue of disjoint six partitions with growing of DN. Figure 10 shows the number of relocated actors with varying DN. It is true that the number of relocated nodes is less in DCR for DN < 125, but in DN > 150 the CICR outperforms the DCR, PRACAR, and RTN. The scalability of the CICR will be higher. The number of relocated actors is directly related to the number of partitions in the CICR. But in DN > 150, the density of the network will be higher and sometimes, selecting pathway and sponsor nodes from the multi-hop neighborhood of the failed node can reduce the number of relocated actors.

Fig. 10
figure 10

Average number of relocated actors in the six partitions of network with varying the number of actors (fixed Rc = 100)

Since the long distance of these disjoint six partitions in dense network, the DCR and PRACAR which select the relocated nodes based on the neighboring distance, move more actors. The PRACAR and DCR relocate non-critical nodes and it is not suitable for sparse networks if a moved node is selected at a distance away. In RTN, at high densities (DN > 175), the minimum number of nodes for restoration is 1 between two partitions. The number of relocated actors is equal to the minimum value of 5. The number of partitions is equal to 6, and the relocated actors are located between two partitions. Then, for DN > 175, the distance between the partitions is longer, also the number of nodes needed for restoration is greater.

6.3.3 Number of exchanged messages

Figure 11 shows the impact of DN and Rcon the performance of the message overhead. As shown in Fig. 11 in CICR, the number of exchanged messages remains almost constant and even decreases, because the number of relocated actors is less than 5 in the jointing of six partitions and the messaging in CICR is the same as relocated sponsor nodes.

Fig. 11
figure 11

The number of exchanged messages in the six partitions of network with varying (a) the number of actors (fixed Rc = 100), (b) the transmission radius (fixed DN = 100)

MA sends messages containing the new location coordinates of the sponsor nodes. The DCR curve grows slowly too. But the slope of the PRACAR increases rapidly. It indicates PRACAR has not scalability and has high overhead. In this method, the relocated actor must send its ID and new location to all neighbors to know it. In the DCR, the first backup will not send any message, but if the cascading movements occurs and the number of moved backups be more than one during the restoration, the number of exchanged messages will be equal to Equation (23).

$$ \left(\mathrm{Moved}\ \mathrm{backups}-1\right)\times 2 $$
(23)

As the number of moved nodes increases, the message overhead also doubles. The number of exchanged messages in RTN is equal to the number of relocated backup nodes. In CICR the message overhead or communication cost is equal to the number of relocated actors.

6.4 Reliability of the proposed method

To evaluate the computational efficiency, the reliability of the proposed method has been compared with previous methods. Reliability determines the ability of a restoration algorithm to perform functions under-connected network and the ability to tolerate failure without partitioning for a specified period of time. All failed nodes that result in network partitioning in the region, also have an impact on the calculation of the network reliability. On the other hand, the network works well if all critical nodes properly work. Hence, a topology with n nodes in an area has reliability equal to the Equation (24) [37].

$$ R(t)=1-\prod \limits_{i=1}^n\left(1-{R}_i(t)\right) $$
(24)

where Ri(t) is the reliability of a node in an area of connectivity restoration at time t. n is the number of critical nodes for connecting the partitions and R(t) is the reliability of restored connectivity of partitions. For example, the reliability of a WSAN region with four required nodes to restore the partitions (each node has reliability set to 0.9) is 0.9999. It is assumed that all nodes are similar and have the same reliability.

HCR has cascaded motions, and in most cases, the number of nodes becomes the same as before. Therefore, reliability will not increase and is less than of CICR method as shown in Fig. 12. Like as HCR, CMH does not change the topology and the connection between nodes. Thus, the coverage does not increase. In HCARE method, since the backup node goes to a location that increases the coverage and connections of the nodes in the failed area, the reliability has been increased compared to the condition where the failure did not occur. Due to the total overlapping function calculated to select the backup node destination, the network becomes more resistant to the second failure. CICR also creates new connections in single-node failure and sponsor node covers two adjacent nodes as shown in Fig. 4. As shown in Fig. 12, the reliability of the region after restoration with HCR, CMH, HCARE, and CICR methods is plotted versus time. The CICR reliability has improved by 22%, 35%, and 38% in average compared to the HCARE, HCR, and CMH, respectively (refer to Table 3).

Fig. 12
figure 12

Reliability of the region versus time

Table 3 Reliability of the region versus time

Since same node goes exactly to the position of failed nodes in DCR and PRACAR, there are no changes in the number of nodes in the damaged location after the restoration and these methods do not change the reliability compared to pre-failure. But in CICR, at least k = p-1 actors are required to restore connectivity of partitions. As a result, the number of required nodes will double in comparison to the DCR and PRACAR methods. As a total result, CICR is more reliable than DCR and PRACAR methods, as shown in Fig. 13. CICR has fewer relocated nodes than RTN. The selected RTN paths are not optimal. As a result, the number of nodes between partitions and connections increases compared to CICR, and RTN reliability increases slightly compared to CICR. Also, in Fig. 13, four DCR, PRACAR, RTN, and CICR methods are evaluated and compared in terms of reliability versus time. The number of restored partitions has been 4.

Fig. 13
figure 13

Reliability of the restored region with four partitions versus time

The reliability of CICR has 61% and 20% improvement averagely over DCR and PRACAR, respectively, based on the values in Table 4. The reliability of RTN is about 3% higher than CICR reliability.

Table 4 Reliability of the restored region with four partitions versus time

6.5 Limitations of study

One of the limitations of this study is that if there is an obstacle in the movement path of sponsor nodes, then the movement path into the new coordinate of sponsor nodes is not direct, and proposed equations will not satisfy. Unless, in the equations under condition that each obstacle must be considered as a node, cannot be sponsor and pathway node. In practice, moveable actors are expensive equipment and it is a little difficult to implement this configuration in practice.

7 Conclusions

In this paper, a comprehensive, distributed, hybrid, localized, and energy-efficient method based on computational intelligence (CICR) has been proposed to implement an efficient restoration process in a partitioned WSAN. A WSAN is prone to be failed due to the energy depletion, explosions, or stay in the harsh environment. It may break network connectivity into the disjoint partitions. The CICR solves problem of both single and multiple nodes failure through the simultaneous selection of pathway and sponsor nodes in such a way that the travel distance is minimum. CICR solves the selection of the sponsor and pathway nodes through a novel enhanced Lagrangian based with metaheuristic sequential improved GWO (SIGWO) search space algorithm to find the optimal solution. The CICR has a low runtime and low computational complexity. The performance of the CICR is analyzed mathematically and approved through simulations and is compared to the previous methods. The CICR outperforms in terms of all performance evaluation metrics.

The CICR has been used for all single or multiple nodes failure in sparse or dense networks. The CICR has stable performance in all densities. As a result, the computational complexity of the sponsor and pathway nodes selection is independent of the network density and density does not have much effect on the time required for restoration. CICR forms a topology with robustness against second failure and if another failure occurs, moving cost and number of moved nodes decreases relative to the former.

Finally, the reliability of the CICR method is evaluated and compared with other methods. It is obtained that the CICR reliability has improved by 38%, 35%, 22%, over CMH, HCR, and HCARE in single-node failure (refer to Table 3). In the case of multiple nodes failure, the CICR reliability has been increased by 61% and 20% over DCR and PRACAR, respectively (refer to Table 4).

In terms of total traveled distance, the CICR has 37.19%, 44.71%, and 71.47% improvement in two partitioned networks resulted from single-node failure in comparison to HCR, CMH, and HCARE and 61.54%, 57.76%, and 40.1% improvement averagely in multiple partitions resulted from single or multiple nodes failure in comparison to DCR, RTN, and PRACAR respectively (refer to Tables 1 and 2).

In the future works, it is possible to research for connectivity restoration in a WSAN with heterogeneous actors and various transmission radius. Also, future research could be obstacle aware algorithms.

Availability of data and materials

Not applicable

Abbreviations

WSANs:

Wireless sensor and actor networks

CICR:

Computational intelligence based connectivity restoration

SIGWO:

Sequential improved grey wolf optimizer

HCR:

Hybrid connectivity restoration

HCARE:

Hybrid coverage-aware perception-based connectivity restoration

CMH:

k-connectivity maintenance and restoration algorithm for heterogeneous WSANs

PRACAR:

Permanent relocation algorithm for centralized actor recovery

RTN:

Round-table negotiation

WSNs:

Wireless sensor networks

RPSNC:

Connectivity restoration in wireless sensor networks via space network coding

DARA:

Distributed actor recovery algorithm

RIM:

Recovery through inward motion

IDCRWSN:

Intelligent on-demand connectivity restoration for wireless sensor networks

DCR:

Distributed connectivity restoration algorithm

RAM:

Recovery algorithm for the failure of multiple nodes failure

SRRA:

Self-route recovery algorithm

RCR:

Restoring connectivity in a resource-constrained WSN

DCRMF:

Distributed autonomous connectivity restoration method based on finite state machine

CPSO:

Co-evolutionary particle swarm optimization

CDE:

Co-evolution differential evolution

ABC:

Artificial bee colony

GWO:

Grey wolf optimizer

MA:

Master actor

R c :

Transmission radius

MAC:

Medium access control

ACK:

Acknowledgement

FPGAs:

Field programmable gate arrays

DN:

Deployed nodes

References

  1. I.F. Akyildiz, I.H. Kasimoglu, Wireless sensor and actor networks: research challenges. J Ad Hoc Networks 2, 351–367 (2004)

    Article  Google Scholar 

  2. O. Kaiwartya, A.H. Abdullah, Y. Cao, J. Lloret, S. Kumar, R.R. Hah, M. Prasad, S. Prakash, Virtualization in wireless sensor networks: fault tolerant embedding for internet of things. IEEE Internet Things J 5(2), 571–580 (2018)

    Article  Google Scholar 

  3. A. Cerpa, D. Estrin, ASCENT: Adaptive self-configuring sensor networks topologies. IEEE Trans On Mobile Computing 3(3), 272–285 (2004). https://doi.org/10.1109/INFCOM.2002.1019378

    Article  Google Scholar 

  4. H. Sharma, A. Haque, Z.A. Jaffery, Solar energy harvesting wireless sensor network nodes: a survey. J Renewable and Sustainable Energy 10(2), 023704 (2018)

    Article  Google Scholar 

  5. M. Younis, I.F. Senturk, K. Akkaya, S. Lee, F. Senel, Topology management techniques for tolerating node failures in wireless sensor networks: a survey. J Comput Netw 58(254–283) (2014)

  6. L. Sitanayah, K.N. Brown, C.J. Sreenan, A fault-tolerant relay placement algorithm for ensuring k vertex-disjoint shortest paths in wireless sensor networks. Ad Hoc Netw 23(145–162) (2014)

  7. G Wang, G Cao, T La Porta, W Zhang, Sensor relocation in mobile sensor networks. Proc. 4th Ann. INFOCOM’05, Miami, FL, 2302–2312 (2005).

  8. X Han, X Cao, EL Lloyd, , C-C Shen, Fault-tolerant relay node placement in heterogeneous wireless sensor networks. IEEE Trans on Mobile Computing 9(5), 643–656 (2010).

    Article  Google Scholar 

  9. SK Gupta, P Kuila, PK Jana, Genetic algorithm for k-connected relay node placement in wireless sensor networks. Proc. Second International Conf. Computer and Communication Technologies, Advances in Intelligent Systems and Computing. 379, 721-729 (2016).

  10. A. Hashim, B.O. Ayinde, M.A. Abido, Optimal placement of relay nodes in wireless sensor network using artificial bees colony algorithm. J Netw Comput Appl 64(3), 239–248 (2016)

    Article  Google Scholar 

  11. D.R. Dandekar, P.R. Deshmukh, Relay node placement for multi-path connectivity in heterogeneous wireless sensor networks. Procedia Technology 4, 732–736 (2012)

    Article  Google Scholar 

  12. A. Uwitonze, J. Huang, Y. Ye, W. Cheng, Connectivity restoration in wireless sensor networks via space network coding. Sensors. 17(4), 1–21 (2017)

    Article  Google Scholar 

  13. A. Abbasi, M. Younis, K. Akkaya, Movement-assisted connectivity restoration in wireless sensor and actor networks. IEEE Trans Parallel and Distributed Systems 20(9), 1366–1379 (2009)

    Article  Google Scholar 

  14. M. Younis, S. Lee, A. Abbasi, A localized algorithm for restoring internode connectivity in networks of moveable sensors. IEEE Trans Computers 59(12), 1669–1682 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  15. M. Khalid, A.K. Muhammad, U.H. Mahmood, M.S. Ansar, A. Shahzad, K.S. Muhammad, Intelligent on-demand connectivity restoration for wireless sensor networks. Wirel Commun Mob Comput 2018(1-10) (2018)

  16. K. Yan, G. Luo, L. Tian, Q. Jia, C. Peng, Hybrid connectivity restoration in wireless sensor and actor networks. EURASIP J Wireless Com Network 138(1–16) (2017)

  17. Y Zhang,Z Zhang, B Zhang, A novel hybrid optimization scheme on connectivity restoration processes for large scale industrial wireless sensor and actuator networks. Processes 2019, 7, 939., 7(12), 939 (2019).

  18. V K. Akram, O Dagdeviren and B Tavli, Distributed k-connectivity restoration for fault tolerant wireless sensor and actuator networks: algorithm design and experimental evaluations, in IEEE Transactions on Reliability. 1-14 (2020).

  19. P A Humblet, An adaptive distributed Dijkstra shortest path algorithm Tech. Rep. LIDS-P-1775, Lab. Inf. Decision Syst., Massachusetts Inst. Technol., Cambridge, MA, USA, 1988.

  20. M. Imran, M. Younis, A.M. Said, H. Hasbullah, Localized motion-based connectivity restoration algorithms for wireless sensor and actor networks. J Netw Comput Appl 35(2), 844–856 (2012)

    Article  Google Scholar 

  21. K. Mahmood, M. Hassan, M. Mahmood, Permanent relocation and self-route recovery in wireless sensor and actor networks. (IJACSA) International J. Advanced Computer Science and Applications 9(3), 83–89 (2018)

    Google Scholar 

  22. S Shriwastav, D Ghose, Round-table negotiation for fast restoration of connectivity in partitioned wireless sensor networks, Ad Hoc Networks 77. 11–27 (2018).

  23. Y.K. Joshi, M. Younis, Restoring connectivity in a resource constrained WSN. J Netw Comput Appl 66, 151–165 (2016)

    Article  Google Scholar 

  24. Y. Zhang, J. Wang, G. Hao, An autonomous connectivity restoration algorithm based on finite state machine for wireless sensor-actor networks. Sensors 18, 1 (2018)

    Article  Google Scholar 

  25. H. Liu, Z. Cai, Y. Wang, Hybridizing particle swarm optimization with differential evolution for constrained numerical and engineering optimization. Appl Soft Comput 10(2), 629–640 (2010)

    Article  Google Scholar 

  26. Q. He, L. Wang, An effective co-evolutionary particle swarm optimization for constrained engineering design problem. Eng Appl Artif Intell 20(1), 89–99 (2007)

    Article  Google Scholar 

  27. F.Z. Huang, L. Wang, Q. He, An effective co-evolutionary differential evolution for constrained optimization. Appl Math Comput 186(1), 340–356 (2007)

    MathSciNet  MATH  Google Scholar 

  28. I Brajevic, Crossover-based artificial bee colony algorithm for constrained optimization problems. Neural Computing and Applications. 26 (7) (2015).

  29. S.A. Mirjalili, S.M. Mirjalili, A Lewis, Grey wolf optimizer. Adv Eng Softw 69, 46–61 (2014)

    Article  Google Scholar 

  30. M.C. Metz, J.A. Vucetich, D.W. Smith, D.R. Stahler, R.O. Peterson, Effect of sociality and season on gray wolf (Canis lupus) foraging behavior: implications for estimating summer kill rate. PLoS One 6(3), 1–10 (2011)

    Article  Google Scholar 

  31. K Luo, Enhanced grey wolf optimizer with a model for dynamically estimating the location of the prey. Applied Soft Computing Journal. 77 (2019).

  32. M Jorgic, M Hauspie, D. I Stojmenovic, Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks. Mediterranean Ad Hoc Networking Workshop, Turkey.12. (2004).

  33. A. Liu, M. Dong, K. Ota, J. Long, PHACK: an efficient scheme for selective forwarding attack detecting in WSNs. Sensors 15, 30942–30963 (2018)

    Article  Google Scholar 

  34. J.F. Bonnans, J. Ch Gilbert, C. Lemarechal, C.A. Sagastiz’abal, Numerical optimization: theoretical and practical aspects (Springer-Verlag, Berlin, 2006)

    Google Scholar 

  35. Zhi-jun Teng, Jin-ling Lv, Li-wen Guo, An improved hybrid grey wolf optimization algorithm. Springer-Verlag GmbH Germany, part of Springer Nature. 23(15), 6617–6631 (2019). https://doi.org/10.1007/s00500-018-3310-y.

  36. S Rajopadhye, M Mills Strout, Languages and compilers for parallel computing, (24th International Workshop, LCPC 2011 Fort Collins, CO, USA, September 8-10, (2011).

  37. M Rausand, System Reliability Theory, 2nd edition. Wiley, (2003).

Download references

Acknowledgements

Not applicable

Funding

Not applicable

Author information

Authors and Affiliations

Authors

Contributions

SM designed and analyzed the proposed method. GF performed the interpretation of data and drafted the work. All authors read and approved the final manuscript.

Authors’ information

Solmaz Mohammadi received his BSc degree in electrical engineering from Shariaty Technical College, Tehran, Iran, in 2012. She is currently an MSc student in the Electrical Engineering and Information Technology Department, Iranian Research Organization for Science and Technology (IROST), Iran. She is interested in IOT especially wireless sensor networks.

Gholamreza Farahani received his BSc degree in electrical engineering from Sharif University of Technology, Tehran, Iran, in 1998, and MSc and PhD degrees in electrical engineering from Amirkabir University of Technology (Polytechnic), Tehran, Iran in 2000, and 2006, respectively. Currently, he is an associate professor with the Electrical Engineering and Information Technology Department, Iranian Research Organization for Science and Technology (IROST), Iran. One of his research interests is wireless sensors and data communication in the network.

Corresponding author

Correspondence to Gholamreza Farahani.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mohammadi, S., Farahani, G. Computational intelligence-based connectivity restoration in wireless sensor and actor networks. J Wireless Com Network 2020, 198 (2020). https://doi.org/10.1186/s13638-020-01831-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-020-01831-0

Keywords