Computer Communications
Computer Communications
Computer Communications
Multiple Objective Optimization-based DV-hop Localization for Spiral Deployed Wireless Sensor Networks using Non-
inertial Opposition-based Class Topper Optimization (NOCTO)
Dear Dr Das,
I am pleased to inform you that your manuscript has been accepted for publication.
We appreciate you submitting your manuscript to Computer Communications and hope you will consider us again for
future submissions.
Kind regards,
Carla Fabiana Chiasserini
Editor-in-Chief
Computer Communications
Reviewer #1: The requested corrections have been made. The article is acceptable in this form.
Reviewer #3: After carefully checking, I confirm that the authors have completely addressed all my concerns, I therefore
recommend accepting this paper for publication
You will find information relevant for you as an author on Elsevier’s Author Hub: https://www.elsevier.com/authors
#AU_COMCOM#
To ensure this email reaches the intended recipient, please do not delete the above code
__________________________________________________
In compliance with data protection regulations, you may request that we remove your personal registration details at any
time. (Use the following URL: https://www.editorialmanager.com/comcom/login.asp?a=r). Please contact the publication
office if you have any questions.
https://www.editorialmanager.com/comcom/ViewLetter.aspx?id=383335&lsid={8D4BE095-F3AF-4895-868A-2EA7A619E09C} 1/1
REVISED Manuscript (text UNmarked) Click here to view linked References
Abstract
The problem of localization is one of most important issues in wireless sen-
sor networks. Furthermore, it is critical to monitor and evaluate the data
gathered. For a variety of factors, such as upkeep, lifespan, and breakdown,
the fixed density of these beacons may be increased or decreased. Because
of its robustness, flexibility, and economic viability, a well-known technique
for locating wireless sensor network nodes is the Distance Vector-Hop (DV-
Hop) algorithm. As a result, researchers continue to look for ways to de-
velop it. A new Non-inertial Opposition based Class Topper Optimization
(NOCTO) based enhanced DV-Hop localization algorithm is proposed. It
also focuses through an optimized formulation to compute the average hop-
size with weight of beacon nodes in order to reduce the localization error with
estimated distance between the beacon and the dumb node, due to improved
localization accuracy. For spiral deployed 2D wireless sensor networks, this
paper proposes a multi-objective NOCTO-based DV-Hop localization. The
simulation results indicate that our suggested multi-objective function out-
performs some existing techniques.
Keywords: DV-Hop, Non-inertial Opposition based Class Topper
Optimization, Wireless Sensor Networks, Multiple objective
2
have demonstrated the importance of multiobjective optimization in solving
multiobjective complex issues [24]. Various biological techniques have been
presented in the past to reduce the localization error [25].
3
. An optimization algorithm is proposed for making node energy consump-
tion more uniform, lowering energy consumption and increasing net-
work lifetime in spiral deployed 2D wireless sensor networks.
. Six single objective functions are used in the proposed method, which were
then transformed into multiobjective functions for better accuracy.
. Experiment results show that our method not only significantly reduces
localization errors and increases network coverage, but it also signifi-
cantly improves accuracy.
2. Associated works
4
Table 1: The disadvantages and shortcomings of the previous methods
5
algorithm.
firefly algorithm and It had no effect on the stability All nodes are outfitted with GPS, which is
fuzzy logic [30] period and increased the delay. very expensive.
An energy-aware clus- High computational overload Sensor node energy resources are limited
tering and two-level
routing [31]
Dragonfly algorithm High overhead for updating the The impact of network abnormalities on the
[32] sink table and MS movement, se- localization algorithm is not demonstrated
lecting cluster heads close to the
sink and incorrectly distributing
them in the network.
Table 1: continued
6
a routing and data ag- High computational overhead In this paper, it is not clear how to update
gregation [36] the sink table and MS movement, as well as
how to select cluster heads near the sink and
distribute them improperly in the network.
Fractional order Class High computational complexity The implementation of beacon nodes at the
Topper Optimization sensor network’s boundary is insufficient for
(FCTO) [37] isolated areas in this paper
Because of its simplicity, feasibility, and low hardware requirements, DV-
Hop is a common choice among WSN localization algorithms. However, the
precision with DV-Hop is insufficient to meet more stringent requirements.
Therefore, researchers have suggested a variety of improved DV-Hop-based
schemes. In this section, some enhanced algorithms based on multi-objective
DV-Hop are briefly mentioned.
7
based on residual energy, length from the BS, centrality, and the number
of neighbours. BCHs, as well as CHs, are chosen during this phase. Each
clustering-setup phase has two clustering-steady phases, as determined by
BCH selection. As a result, clustering’s overhead is minimised. Routing is
the second phase, which has 2 levels: intra-cluster routing and inter-cluster
routing. Each cluster is divided into 4 sections, each with a CH centrality,
and nodes are located in these 4 sections in intra-cluster routing. In inter-
cluster routing, CHs are layered according to their distance from the BS.
A safe data aggregation scheme is described in [32]. The goal of the data
patterns is to reduce redundant data in the network, decrease sensor node
energy consumption, and maintain data accuracy and precision. Intra-cluster
data aggregation, inter-cluster data aggregation, and data transfer are the
three phases of a secure data aggregation method. In [33], a binary tree is
used to organise the sensor nodes. After that, data aggregation is conducted
on the tree’s middle nodes, and an analysis of the data is sent to the root
node. They must first be approved in order to prevent unauthorised data ag-
gregation requests. The aggregation process then begins, with an enhanced
cyclic redundancy code (CRC) being used hop by hop to ensure data aggre-
gation accuracy and reliability. Meanwhile, the data packets obtained from
their children are subjected to cumulative functions imposed by intermediate
nodes. As a result, the workload of the sensors in the network is significantly
reduced. This pattern continues, and aggregated data is eventually sent to
the base station.
8
it to the lower layer of the same sector’s agent. The process is repeated until
all of the data has arrived at the base station.
9
shortcomings of the previous methods.
Step 1 The minimum hop amount is defined for unknown nodes and bea-
con nodes of step 1. By transmitting signals through beacon nodes by
vector protocol system, the neighbouring nodes can be shown their lo-
cation. Information exists in the form of Hi , aj and bj in which id will
be the identity. aj and bj have been coordinates, and Hi has been the
hop count for the i beacon node. First, 0 is set of the value for Hi [38].
The nodes obtain data from the broadcast and record the hop amount
and localization of the vector’s beacon nodes. The value of Hi must
be increased by 1 through this process [27]. In this update process,
if any node receives the same id group, the new received data will be
compared with the original value of Hi . The nodes obtain broadcast
data and keep track of the hop amount and localization for the beacon
nodes of the vector.
Step 2 Minimum hop count and average hop distance are determined to
find the distance between unknown nodes and beacon nodes. In this
method, the average hop distance for the entire network can be deter-
mined by obtaining the position and hop amount for nodes of beacons,
as described in the previous stage. Then this data is transmitted to the
entire network. Furthermore, most nodes require average hop distance
information from a beacon node that is nearer to them [26]. The fol-
lowing equation provides the typical distance of the hop (jpi ) and the
hop range (pi ) between the i(ai , bi ) beacon node and the other (beacon)
10
node j(aj , bj ) can just be computed as:
P q
i6=j (ai − aj )2 + (bi − bj )2
jpi = P , (1)
i6=j h(ij)
where jpi is the minimum hop distance and h(ij) is the number of hops
from beacon nodes i and j. The distance between beacon nodes and
dumb nodes is expressed in the following formula.
where jpiU is the step distance, Hopmin is the step count between the
i beacon nodes and piU denotes the estimated distance between the
dumb node U and the beacon node i.
Step 3 Let the U dumb node coordinates be (a, b), and the ith beacon node
coordinates be (ai , bi )(1 ≤ i ≤ n) analyzed in stage 3. Correspondingly,
the distance between the beacon node ith to the unknown or dumb
node U is pi (1 < i < n). The coordinates of the dumb node have been
determined as follows:
(a − a1 )2 + (b − b1 )2 = p21 ;
(a − a2 )2 + (b − b2 )2 = p22 ;
....................................... (3)
2 2
(a − an ) + (b − bn ) = p2n ;
SA = T, (5)
11
2(a1 − an ) 2(b1 − bn )
2(a2 − an ) 2(b1 − bn )
S=
................................. ,
(6)
2(an−1 − an ) 2(b1 − bn )
a21 − a2n + b21 − b2n + p2n − p21
a22 − a2n + b22 − b2n + p2n − p22
T = , (7)
..........................................
2 2 2 2 2 2
an−1 − an − bn−1 − bn + pn − pn−1
a
A= . (8)
b
Step 4 To correct the estimated positions of the unknown nodes, the multi-
objective NASG-II algorithm is used. The mathematical formulation of
NASG-objective II’s functions using DV-hop localization is as follows:
X q
f 1 = min( (a − ai )2 + (b − bi )2 − piu ), (10)
i=1,2..n
2×R
X q
f 2 = min( (a − ai )2 + (b − bi )2 − ). (11)
i=1,2..n
3
12
State
End
In accordance with their respective section topper (st ), each student (si )
in each section learns by section topper (st ):
st+1
i = sti + lt+1 . (13)
In order for the section topper (st ) to be the best student in the section, he
or she must be pleased to compete among the class topper (ct ) that section
topper (st ) learns for the class topper (ct ):
13
w is the inertial weight factor, which maintains the balance between global
and local exploration. w can be written as follows [37]:
E wmax − wmin
w = wmax − ×E , (16)
Emax
where wmin is the lowest weight factor; wmax is the highest weight factor.
Opposition-based learning (OBL) [41] is coupled with CTO in this study
to improve exploratory behavior while keeping the convergence rate high.
It successfully accelerates as well as increases the likelihood of reaching the
global optimum by employing an OBL strategy in CTO. After each updated
version, a fresh set of student solutions consisting of Class Topper (Ct ), Sec-
tion Topper (St ) and least fit student S. The difference between the given
vector z and the vector zct is determined using each aspect (i) with a given
vector z as well as the vector zct , the distinction among them is determined
with the following formula:
14
position (Ct ) (class topper) is generated [42]:
arctan(xm)
Ct∗ = Ct + sign.(C + Q ), (19)
Each student (s) in each section learns from section topper (st ):
l1t+1
i = w.(str1 − str2 ) + c1 φ1 (stt,i − sti ), (22)
l1t+1
i = w.(str1 − str2 ) + c2 φ2 (ctt,i − stt,i ). (23)
15
Each student (s) in each section learns from Section topper st :
l2t+1
i = w.(v t − v t−1 ) + c1 .φ1 (stt,i − sti ), (24)
l2t+1
i = w.(v t − v t−1 ) + c2 .φ2 (ctt,i − stt,i ). (25)
where v t and v t−1 are the average student positions of the tth and (t − 1)th
generations, respectively.
Each student (S) in each section learns from Section topper ((St )):
l3t+1
i = w.φw + c1 .φ1 (stt,i − sti ), (26)
Section Topper (St ) is taught by Class Topper (Ct ).
l3t+1
i = w.φw + c2 .φ2 (ctt,i − stt,i ), (27)
where φw is a random variable with a uniform distribution.
A model of student learning: Substitute Eqs (24) and (25) into Eqs. (13)
and (15), respectively, and the trajectory equation of students’ learning
is given as follows in the (t + 1)th iteration:
st+1
i = sti + ω(v t − v t−1 ) + β(stt,i − sti )
16
Assuming β = c1 φ1 .
Similarly,
t
st+1 t
t,i =(1-β1 )st,i + ω(v − v
t−1
) + β1 (ctt,i ), (29)
Assuming β1 = c2 φ1 .
As a result, (28) and (29) are easily deduced in the (t + 2)th iteration:
st+2
i =(1-β)st+1
i + ω(v t+1 − v t ) + β(st+1
t,i ), (30)
Assume
Pi1 = ω(v t+1 − v t ) + β(st+1
t,i ), (31)
Similarly,
t+1
st+1
t,i =(1-β1 )st,i + ω(v
t+1
− v t ) + β(ct+1
t,i ), (32)
Assume
Pi2 = ω(v t+1 − v t ) + β(ct+1
t,i ), (33)
P is referred as the ”stability point,” and the order-2 difference recur-
rence equation of student learning is denoted as follows:
st+2
i =(1-β)st+1
i + Pi1 , (34)
st+2
t+1
i si
st+1
i
= X . sti (35)
1 1 3×1
where
1−β 0 0
X = 1 0 0 , (36)
0 0 1
Solve the characteristic equation associated with coefficient matrix X:
⇒ γ1 = 0, γ2 = 1 − β, γ3 = 1 (37)
17
As a result, the following student trajectories can be obtained:
ω (v t − v t−1 )
Pi1 = + st+1
t,i ;
c1
ω (vt − v t−1 )
= + pi1 . (44)
c1
18
Similarly, in the case of the class topper
ω (v t − v t−1 )
Pi2 = + ct+1
t,i ;
c2
ω (vt − v t−1 )
= + pi2 , (45)
c2
where pi1 and pi2 denote the ”stability point” of the traditional CTO system
[40]. The non-inertial velocity formula (NIV) is used to replace the classic
CTO examination improvement velocity update formula, and a non-inertial
opposition-based class topper optimization, or NOCTO for short, is con-
structed using a combination of the OBL and AEM strategies. Fig. 2 shows
the NOCTO algorithm in detail.
Step 1. Dumb node locations are determined using the minimum hop dis-
tance calculated by each beacon (i.e., one-hop-size) from another bea-
con in the network. The greater the precision of this estimated distance,
the effective will be the approximate positions.
19
State
If max
Iteration
Yes
End
where p is the number of hops among beacon nodes. We solve the fol-
lowing equation to find its polynomial function to estimate the distance
among nodes:
−1
κ = (P T P ) P T R, (48)
Then, for each dumb node, the distance between itself and the beacon
node is calculated as follows:
20
tively. As a result, we get the following matrix form:
rest = hop × κ, (50)
The actual distance between beacon i and j shall be calculated by
q
rtrue = (ai − aj )2 + (bi − bj )2 . (51)
Error between nodes i and j of the beacon is given as:
rerror = rest − rtrue . (52)
Now, we have added a rectification factor, and this is defined as:
rerror
τ=
, (53)
s
where s is the number of beacon nodes. The τ rectification factor is
used by adding it to the previous hop size to change the hop size of
the beacon node. The adjusted distance between i beacon nodes and
k dumb node are determined as [37]:
M od
rik = (HopSize + τ ) × Hik . (54)
.
X q
f1 (a, b) = min( (a − ai )2 + (b − bi )2 − rik
M od
), (55)
i=1,2....M
21
where f2 (a, b) is the 2nd order objective function of f1 (a, b) that repre-
sents the distance error.
X q 2×R
f3 (a, b) = min( (a − ai )2 + (b − bi )2 − ), (57)
i=1,2..M
3
where f4 (a, b) is the 2nd order objective function of f3 (a, b) that repre-
sents the distance error.
X q
f5 (a, b) = min( (a − ai )2 + (b − bi )2 − ritM od ), (59)
i=1,2....M
where θ is the factor used to change the beacon node hop size by ap-
plying it to the previous hop size.
rappro − rtrue
θ= , (61)
s
X q
f6 (a, b) = min( (a − ai )2 + (b − bi )2 − ritM od )2 . (62)
i=1,2....M
where f6 (a, b) is the 2nd order objective function of f5 (a, b) that repre-
sents the distance error.
22
X q
m1 (a, b) = min( (a − ai )2 + (b − bi )2 − rik
M od
)
i=1,2....M
and
X q
min( (a − ai )2 + (b − bi )2 − rik
M od 2
), (63)
i=1,2....M
m2 = f3 and f4
2×R
X q
m2 (a, b) = min( (a − ai )2 + (b − bi )2 − )
i=1,2..M
3
and
2×R 2
X q
min( (a − ai )2 + (b − bi )2 − ), (64)
i=1,2..M
3
m3 = f5 and f6
X q
m3 (a, b, ) = min( (a − ai )2 + (b − bi )2 − ritM od );
i=1,2....M
and
X q
min( (a − ai )2 + (b − bi )2 − ritM od )2 . (65)
i=1,2....M
Fig. 2 depicts the flowchart of NOCTO and Table 2 lists the notations
used in the proposed method.
5. Metrics of Performance
The location performance of various objective functions has been analyzed
using the following metrics:
23
Table 2: Notations
Notation Description
lt+1 Learn from
lt Previous learn from
w Minimum weight factor
c Stochastic acceleration term
φ1 , φ2 and φw Random variables
s Student
st Section Topper
ct Class Topper
κ0 polynomial function
rest Estimation distance
rtrue True distance
τ Rectification factor
t number of dumb nodes
(ptr tr
i , qi ) Actual positions of dumb node i
(pest est
i , qi ) Estimated positions
R Communication range of sensor node
st d Standard deviation of fitness
λ Undetermined constant
iter Number of iteration
itermax Maximum number of iteration
rdi i0 th dimension of students
rdmax maximum value of rdi
Emax Number of examination
24
5.1. Localization error
We investigated the effect of the total number of nodes, beacon nodes,
and range on simulation results. The following is the localization error:
t q
tr 2 tr 2
(aest est
P
i − ai ) + (bi − bi )
LE = i=1 , (66)
t×R
v
u t q 2
u ( (aest
uP tr 2 est tr 2
t i=1 i − ai ) + (bi − bi ) − LE × R)
LEV = ,
t × R2
(67)
25
Table 3: Parameters for simulation.
Parameters Value
Border length 100 × 100m2 to 300 × 300m2
Number of sensor nodes 200 to 450
Beacon nodes (M) 20 to 160
Range (R) 25 to 50
Algorithm of Optimization NOCTO
Maximum iterations 50
Simulation Tool LabVIEW@2015
iv Communication Cost.
26
250
200
150
Meters
100
50
0
0 50 100 150 200 250
Meters
Figure 3: The distribution of sensor nodes was localized using spiral beacon nodes deploy-
ment
the number of hops between dumb and beacon nodes decreases, and the
network becomes more connected. We kept the number of dumb nodes and
the node’s message radius constant in this case. Fig. 4, 5, 6, and 7 show
how the total number of beacon nodes affects localization error, localization
error variance, localization accuracy, and localization coverage, respectively.
It is noted in Table 4 that the m1 has less localization error and localization
error variation. Table 5 shows that the multi-objective function m1 has the
improved Localization Accuracy and coverage.
27
0.45
S.O. f3 (spiral)
S.O. f4 (spiral)
S.O. f5 (spiral)
0.4 S.O. f6 (spiral)
M.O. m2 (spiral)
M.O. m3 (spiral)
M.O. m [25]
0.35 S.O. f2 (spiral)
S.O. f1 (spiral)
Localization Error
M.O. m1 (spiral)
0.3
0.25
0.2
0.15
0.1
20 40 60 80 100 120 140 160
The amount of beacon nodes
The number of beacon nodes ranges from 20 to 160. For example, the total
number of beacon nodes is set to 20. According to Table 4, the proposed
multi-objective function m1 has less localization error in f 1, f 2, m [26], m3,
m2, f 6, f 5, f 4 and f 3 by approximately 0.01%, 0.08%, 0.09%, 0.15%, 0.16%,
0.25%, 0.31%, 0.45%, and 0.51%, respectively.
28
0.035
S.O. f3 (spiral)
S.O. f4 (spiral)
S.O. f5 (spiral)
S.O. f6 (spiral)
0.03 M.O. m2 (spiral)
M.O. m3 (spiral)
Localization Error Variance
S.O. f2 (spiral)
M.O. m [25]
0.025 S.O. f1 (spiral)
M.O. m1 (spiral)
0.02
0.015
0.01
0.005
20 40 60 80 100 120 140 160
The amount of beacon nodes
Figure 5: The total number of beacon nodes used for LEV is changing
29
Table 4: A comparison of the effects of the proposed (multiobjective) algorithm on LE
and LEV beacon nodes with single-objective algorithms and multiple objective NASG-II
[26] were conducted.
30
Table 5: A comparison of the effects of the proposed (multiobjective) algorithm on LA and
Coverage beacon nodes with single-objective algorithms and multiple objective NASG-II
[26] were conducted.
31
60
50
M.O. m1 (spiral)
Localization Accuracy(%)
M.O. m2 (spiral)
M.O. m [25]
40 M.O. m3 (spiral)
S.O. f1 (spiral)
S.O. f2 (spiral)
S.O. f5 (spiral)
S.O. f6 (spiral)
30 S.O. f4 (spiral)
S.O. f3 (spiral)
20
10
0
20 40 60 80 100 120 140 160
The amount of beacon nodes
Figure 6: The total number of beacon nodes used for error LA is changing
32
1
0.9
0.8
M.O. m1 (spiral)
M.O. m2 (spiral)
0.7 M.O. m [25]
M.O. m3 (spiral)
S.O. f1 (spiral)
0.6
Coverage
S.O. f2 (spiral)
S.O. f5 (spiral)
S.O. f6 (spiral)
0.5 S.O. f4 (spiral)
S.O. f3 (spiral)
0.4
0.3
0.2
0.1
0
20 40 60 80 100 120 140 160
The amount of beacon nodes
Figure 7: The total number of beacon nodes used for Coverage is changing
This is due to the fact that as the number of nodes increases, the average
number of neighbours for each node grows, resulting in a well-connected net-
work. In this case, we kept the number of beacon nodes and the message
radius of each node constant. Fig. 8, 9, 10, and 11 depict the effect of the
total number of nodes on localization error and variance, respectively.
33
0.95
S.O. f3 (spiral)
S.O. f4 (spiral)
0.9 S.O. f5 (spiral)
S.O. f6 (spiral)
M.O. m2 (spiral)
0.85 M.O. m3 (spiral)
M.O. m [25]
Localization Error
S.O. f2 (spiral)
0.8 S.O. f1 (spiral)
M.O. m1 (spiral)
0.75
0.7
0.65
0.6
0.55
200 250 300 350 400 450
The amount of nodes
0.085%, 0.059%, 0.058%, 0.013%, 0.012%, and 0.011% less localization error
in f 3, f 4, f 5, f 6, m2, m3, m [26], f 2 and f 1, respectively.
34
Table 6: A comparison of the effects of the proposed (multiobjective) algorithm on LE and
LEV number of nodes with single-objective algorithms and multiple objective NASG-II
[26] were conducted.
35
0.08
S.O. f3 (spiral)
S.O. f4 (spiral)
0.07 S.O. f5 (spiral)
S.O. f6 (spiral)
M.O. m2 (spiral)
Localization Error Variance
M.O. m3 (spiral)
0.06 S.O. f2 (spiral)
M.O. m [25]
S.O. f1 (spiral)
M.O. m1 (spiral)
0.05
0.04
0.03
0.02
0.01
200 250 300 350 400 450
The amount of nodes
Figure 9: The total number of beacon nodes used for error LEV is changing
36
40
M.O. m1 (spiral)
M.O. m2 (spiral)
M.O. m [25]
35 M.O. m3 (spiral)
S.O. f1 (spiral)
S.O. f2 (spiral)
30
Localization Accuracy(%)
S.O. f5 (spiral)
S.O. f6 (spiral)
S.O. f4 (spiral)
25 S.O. f3 (spiral)
20
15
10
0
200 250 300 350 400 450
The amount of nodes
Figure 10: The total number of beacon nodes used for LA is changing
35 beacon nodes and a message radius of 25m. Total nodes vary from 100
to 350. For example, the total number of nodes is set to 200. Table 7 shows
that, multi-objective function m1 has increased coverage by approximately
9%, 8%, 7%, 6%, 3.7%, 2.6%, 1.5%, 1%, and 0.4% in f 3, f 4, f 6, f 5, f 2, f 1,
m3, m [26], and m2, respectively,
37
Table 7: A comparison of the effects of the proposed (multiobjective) algorithm on LA
and Coverage number of nodes with single-objective algorithms and multiple objective
NASG-II [26] were conducted.
38
1
M.O. m1 (spiral)
0.9 M.O. m2 (spiral)
M.O. m [25]
M.O. m3 (spiral)
0.8 S.O. f1 (spiral)
S.O. f2 (spiral)
0.7 S.O. f5 (spiral)
S.O. f6 (spiral)
S.O. f4 (spiral)
0.6 S.O. f3 (spiral)
Coverage
0.5
0.4
0.3
0.2
0.1
0
200 250 300 350 400 450
The amount of nodes
Figure 11: The total number of beacon nodes used for Coverage is changing
39
Table 8: The proposed (multiobjective) algorithm and multiple objective NASG-II [26]
were compared to single-objective DV-Hop algorithms in terms of range effects on LE and
LEV
Transmission 25 30 35 40 45 50
Range (m)
[S.O. spiral] LE (%) 0.29 0.49 1.15 0.9 0.89 0.75
f3 LEV (%) .627 2.5 3.35 5.27 7.29 0.3
[S.O. spiral] LE (%) 0.28 0.48 1.13 0.85 0.88 0.74
f4 LEV (%) .626 2.4 3.34 5.26 7.28 0.2
[S.O. spiral] LE (%) 0.27 0.47 1.1 0.88 0.87 0.73
f5 LEV (%) 0.625 2.2 3.33 5.25 7.26 0.1
[S.O. spiral] LE (%) 0.22 0.37 1.3 0.86 0.84 0.6
f6 LEV (%) 0.5 2.1 3.1 5.14 7.12 0.7
[M.O. spiral] LE (%) 0.166 0.27 1.1 0.82 0.81 0.26
m2 LEV (%) 0.37 1.9 2.2 4.13 6.2 0.05
[M.O. spiral] LE (%) 0.165 0.25 1.08 0.85 0.8 0.24
m3 LEV (%) 0.35 1.5 2.1 4.11 6.1 0.03
M.O. [26] LE (%) 0.162 0.26 1.08 0.72 0.71 0.2
m LEV (%) 0.33 1.8 2.1 4.11 6.1 0.03
[S.O. spiral] LE (%) 0.11 0.21 1.06 0.62 0.61 0.13
f2 LEV (%) 0.25 1.6 1.8 3.10 5.1 0.02
[S.O. spiral] LE (%) 0.04 0.08 0.2 0.11 0.1 0.21
f1 LEV (%) 0.23 2.62 2.7 4.1 5.1 0.018
[S.O. spiral] LE (%) 0.02 0.06 0.1 0.09 0.08 0.11
m1 LEV (%) 0.2 1.62 1.7 3.1 4.1 0.017
40
0.5
S.O. f3 (spiral)
S.O. f4 (spiral)
S.O. f5 (spiral)
0.45 S.O. f6 (spiral)
M.O. m2 (spiral)
M.O. m3 (spiral)
0.4 M.O. m [25]
S.O. f2 (spiral)
S.O. f1 (spiral)
Localization Error
0.3
0.25
0.2
0.15
0.1
25 30 35 40 45 50
Range
41
Table 9: The proposed (multiobjective) algorithm and multiple objective NASG-II [26]
were compared to single-objective DV-Hop algorithms in terms of range effects on LA and
Coverage .
Transmission 25 30 35 40 45 50
Range (m)
[M.O. spiral] LA (%) 3.1 2.53 1.74 1.54 0.90 0.05
m1 Coverage 9.5 5 1.2 0.28 1.2 0.8
(%)
[M.O. spiral] LA (%) 3 2.03 1.64 1.34 0.80 0.03
m2 Coverage 9 4 1 0.25 1 0.5
(%)
M.O. [26] LA (%) 2.9 2.71 2.73 1.64 0.75 0.04
m Coverage 8.9 3.9 0.95 0.24 0.45 0.37
(%)
[M.O. spiral] LA (%) 2.6 2.01 2.53 1.24 0.70 0.05
m3 Coverage 8.6 3.5 0.9 0.23 0.5 0.33
(%)
[S.O. spiral] LA (%) 2.2 0.9 0.85 0.74 0.09 0.025
f1 Coverage 4 1.5 0.8 0.5 0.01 0
(%)
[S.O. spiral] LA (%) 2 0.8 0.76 0.72 0.07 0.012
f2 Coverage 3 0.9 0.3 0.09 0.125 0.142
(%)
[S.O. spiral] LA (%) 1.9 0.7 0.66 0.62 0.06 0.011
f5 Coverage 2 0.8 0.2 0.08 0.124 0.141
(%)
[S.O. spiral] LA (%) 1.8 0.6 0.65 0.61 0.05 0.011
f6 Coverage 1 0.7 0.1 0.07 0.122 0.14
(%)
[S.O. spiral] LA (%) 0.66 0.52 0.46 0.44 0.08 0.025
f4 Coverage 0 0 0 0 0 0
(%)
[S.O. spiral] LA (%) 0.4 0.3 0.25 0.4 0.07 0.024
f3 Coverage 0 0 0 0 0 0
(%)
42
0.35
S.O. f3 (spiral)
S.O. f4 (spiral)
S.O. f5 (spiral)
0.3 S.O. f6 (spiral)
M.O. m2 (spiral)
M.O. m3 (spiral)
Localization Error Variance
S.O. f2 (spiral)
0.25 M.O. m [25]
S.O. f1 (spiral)
M.O. m1 (spiral)
0.2
0.15
0.1
0.05
0
25 30 35 40 45 50
Range
43
40
M.O. m1 (spiral)
M.O. m2 (spiral)
35 M.O. m [25]
M.O. m3 (spiral)
S.O. f1 (spiral)
Localization Accuracy(%)
S.O. f2 (spiral)
30 S.O. f5 (spiral)
S.O. f6 (spiral)
S.O. f4 (spiral)
S.O. f3 (spiral)
25
20
15
10
5
25 30 35 40 45 50
Range
44
1
M.O. m1 (spiral)
0.9 M.O. m2 (spiral)
M.O. m [25]
M.O. m3 (spiral)
0.8 S.O. f1 (spiral)
S.O. f2 (spiral)
S.O. f5 (spiral)
0.7 S.O. f6 (spiral)
S.O. f4 (spiral)
0.6 S.O. f3 (spiral)
Coverage
0.5
0.4
0.3
0.2
0.1
0
25 30 35 40 45 50
Range
45
900 M.O. m [25]
M.O. m2 (spiral)
M.O. m3 (spiral)
800 M.O. m1 (spiral)
S.O. f1 (spiral)
S.O. f2 (spiral)
700 S.O. f3 (spiral)
S.O. f4 (spiral)
S.O. f5 (spiral)
Elapsed Time(s)
S.O. f6 (spiral)
600
500
400
300
200
100
100 150 200 250 300 350
Total number of dumb nodes
functions take less time to compute than the traditional method. As a result,
our proposed multiobjective localization scheme has a lower communication
cost.
7. Conclusion
In this paper, we present a range-free DV-Hop localization method in 2D
spiral space using Non-inertial Opposition-based Class Topper Optimization.
The suggested approach converts six single objective functions based on the
DV-Hop localization algorithm into three multiobjective functions in order
to reduce localization errors. The goal of multiobjective localization is to
reduce localization errors while also increasing positional precision. The re-
sults show that among all proposed objective functions, the multi-objective
function m1 has the least localization error and localization error variance
46
and also improves LA(Localization Accuracy) and coverage. The simula-
tion results reveal that among all single and multiobjective functions and
NASG-II [26], the multi-objective function m1 has greater placement accu-
racy. Development of the circular and spiral beacon nodes deployment of
the multi-hop-based approach in a 3D system and on the physical staging
ground is also one of the potential research topics to be worked out.
References
[1] J. V. Capella, J. C. Campelo, A. Bonastre, R. Ors, A reference model
for monitoring iot wsn-based applications, Sensors 16 (11) (2016) 1816.
[4] J.-H. Huh, K. Seo, An indoor location-based control system using blue-
tooth beacons for iot systems, Sensors 17 (12) (2017) 2917.
47
[9] G. Song, D. Tam, Two novel dv-hop localization algorithms for randomly
deployed wireless sensor networks, International Journal of Distributed
Sensor Networks 11 (7) (2015) 187670.
[14] L.-z. Zhao, X.-b. Wen, D. Li, Amorphous localization algorithm based on
bp artificial neural network, International Journal of Distributed Sensor
Networks 11 (7) (2015) 657241.
48
[19] J. Du, J.-F. Diouris, Y. Wang, A rssi-based parameter tracking strategy
for constrained position localization, EURASIP Journal on Advances in
Signal Processing 2017 (1) (2017) 1–10.
[22] S. He, X. Dong, W.-S. Lu, Localization algorithms for asynchronous time
difference of arrival positioning systems, EURASIP Journal on Wireless
Communications and Networking 2017 (1) (2017) 1–14.
49
wireless sensor networks, Wireless Personal Communications 101 (1)
(2018) 567–582.
50
[39] P. Das, D. K. Das, S. Dey, A new class topper optimization algorithm
with an application to data clustering, IEEE Transactions on Emerging
Topics in Computing.
[42] L. Kang, R.-S. Chen, N. Xiong, Y.-C. Chen, Y.-X. Hu, C.-M. Chen,
Selecting hyper-parameters of gaussian process regression based on non-
inertial particle swarm optimization in internet of things, IEEE Access
7 (2019) 59504–59513.
51