Các thuật toán xấp xỉ tìm đường xâm nhập có khả năng bị phát hiện nhỏ nhất trong mạng cảm biến dây (approximate algorithms for solving the minimal exposure path problems in wireless sensor networks)
Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 191 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
191
Dung lượng
2,71 MB
Nội dung
MINISTRY OF EDUCATION AND TRAINING HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY NGUYEN THI MY BINH APPROXIMATE ALGORITHMS FOR SOLVING THE MINIMAL EXPOSURE PATH PROBLEMS IN WIRELESS SENSOR NETWORKS Hanoi, 2020 MINISTRY OF EDUCATION AND TRAINING HANOI UNIVERSITY OF SCIENCE AND TECHNOLOGY NGUYEN THI MY BINH APPROXIMATE ALGORITHMS FOR SOLVING THE MINIMAL EXPOSURE PATH PROBLEMS IN WIRELESS SENSOR NETWORKS Major : Computer Science Code : 9480101 SUPERVISORS: Associate Professor Huynh Thi Thanh Binh Associate Professor Nguyen Duc Nghia Hanoi, 2020 DECLARATION OF AUTHORSHIP I assure that this dissertation "Approximate algorithms for solving the minimal exposure path problems in wireless sensor networks" is my own work under the guidance of my cosupervisors, Associate Professor Huynh Thi Thanh Binh and Associate Professor Nguyen Duc Nghia All the research results are presented in the dissertation which have never been published by others Hanoi, October 16, 2020 Ph.D Student Nguyen Thi My Binh SUPERVISOR Asso Prof Huynh Thi Thanh Binh i ACKNOWLEDGEMENT This dissertation was completed during my doctoral course at the School of Information Communication and Technology (SoICT), Hanoi University of Science and Technology (HUST) I am so grateful for all the people who always support and encourage me to complete this study First, I would like to express my sincere gratitude to my co-supervisors, Associate Professor Huynh Thi Thanh Binh and Associate Professor Nguyen Duc Nghia I am indebted to have had advisors who gave me all the freedom, resources, guidance and support during the period that led up to this dissertation Their broad knowledge in di erent areas inspired me and helped me overcome many di culties in my research Furthermore, I would like to thank all the members of Modeling and Simulation Lab, Computer Science Department, SoICT, HUST, as well as all of my colleagues in the Faculty of Information Technology, Hanoi University of Industry They assisted me a lot in the research process and gave me helpful advice to overcome my own di culties Furthermore, attending at scienti c conferences has always been a great opportunity for me to receive many useful comments from the academic community Last but not least, I would like to express my utmost gratitude to my family, my parents, my husband and my children, for their unconditional love, support, understanding and encouragement I would not be able to achieve this accomplishment without their love and support Hanoi, October 16, 2020 Ph.D Student Nguyen Thi My Binh ii DECLARATION OF AUTHORSHIP ACKNOWLEDGEMENT CONTENTS SYMBOLS LIST OF TABLES LIST OF FIGURES INTRODUCTION BACKGROUND 1.1 Wireless sensor networks 1.1.1 1.1.2 1.1.3 1.1.4 1.1.5 1.1.6 Optimization problems Approximate algorithms 1.3.1 1.3.2 1.2 1.3 1.4 Conclusion MINIMAL EXPOSURE PATH PROBLEMS IN OMNI-DIRECTIONAL SENSOR NETWORKS 2.1 Minimal exposure path problem in mobile wireless s 2.1.1 2.1.2 2.1.3 iii 2.1.3 2.1.3 2.1.4 Expe 2.1.4 2.1.4 2.2 Minimal exposure path problem in probabilistic cove 2.2.1 Moti 2.2.2 Prel 2.2.2 2.2.2 2.2.3 Prop 2.2.3 2.2.3 2.2.4 Expe 2.2.4 2.2.4 2.3 Conclusion MINIMAL EXPOSURE PATH PROBLEM IN WIRELESS MULTIMEDIA SENSOR NETWORKS 3.1 Motivations 3.2 Preliminaries and problem formulation 3.2.1 Prel 3.2.1 3.2.1 3.2.1 3.2.1 3.2.1 3.2.2 Prob 3.3 Proposed algorithms 3.3.1 Indiv 3.3.2 Indiv 3.3.2 3.3.2 3.3.2 3.3.3 Evol 3.3.3 3.3.3 3.3.4 Sele 3.3.5 Com 3.4 Experimental results iv 3.4.1 Expe 3.4.2 3.4.1 3.4.1 Com 3.4.2 3.4.2 3.4.2 3.5 Conclusion OBSTACLES-EVASION MINIMAL EXPOSURE PATH PROBLEM IN WIRELESS SENSOR NETWORKS 4.1 Motivations 4.2 Preliminaries and problem formulation 4.2.1 Prel 4.2.1 4.2.1 4.2.1 4.2.1 4.2.2 Prob 4.3 Proposed algorithm 4.3.1 A no 4.3.1 4.3.1 4.3.2 Algo 4.3.2 4.3.2 4.3.2 4.3.2 4.3.2 4.3.2 4.3.2 4.3.3 Com 4.4 Experimental results 4.4.1 Data 4.4.2 Para 4.4.3 Com 4.4.3 4.4.3 4.4.3 v 4.4.3.4 Comparison between FEA and GA-MEP 130 4.5 Conclusion 133 CONCLUSIONS AND FUTURE WORKS PUBLICATIONS BIBLIOGRAPHY vi No Abbreviation WSNs IoT ROI BC MEP PSO NFE MWSN GPSO 10 HGA 11 FEA 12 HoWSNs 13 HeWSNs 14 SWSN 15 CO 16 TSP 17 QAP 18 ACO 19 EC 20 ILS 21 TS 22 GA 23 GLS 24 VNS 25 LS 26 HeWMSN vii Table Comparative table of re Table 1.1 Evolution process versu Table 2.1 uated disk model Experimental paramete Table 2.2 Parameters setting for G Table 2.3 Experimental paramete Table 2.4 Parameters setting for H Table 2.5 Di erent version of HPS Table 2.6 Computation results of HPSO-MMEP in comparison with GAMEP in uniform distribution of sensors (Mev: minimal exposure value, Sd: standard deviation) Table 2.7 Computation results of HPSO-MMEP in comparison with GAMEP in Gauss distribution of sensors (Mev: minimal exposure value, Sd: standard deviation) Table 2.8 Experimental paramete Table 2.9 Experimental paramete Table 2.10 Experimental Paramete Table 2.11 The comparison minimal exposure value, computation time and saw-tooth degree between GA-MEP and GB-MEP when using di erent subinterval s, the topology used is u time per unit second; Dst: saw-tooth degree) Table 2.12 The minimal exposure value obtain from GB-MEP and the best solution of GA-MEP when threshold A varies from to on the topology used is u Mev: the minimal exposure value obtains by GB-MEP; GA-Mev: the minimal exposure value obtains by GA-MEP) Table 2.13 Computation time comparison of OGB and GB-MEP when subinterval s varies from down-to 0.2 on instance u viii Figure 4.12 The computational time (sec) comparison between FEA and GA-MEP on some noble topologies not have to remove invalid individuals, but also search for more paths that move along the boundaries of obstacles As a common sense, the paths along the boundaries of the obstacles often have fairly low exposure value since the sensing wave is being absorbed by obstacles This setting also allows FEA to nd path through narrow alleys between obstacles which are usually critical weak point in security The minimal exposure paths are obtained by FEA in Figure 4.13 for example, have many paths go along obstacle boundaries or through narrow passages that emit very low exposure value Secondly, the crossover operator in FEA is much more e ective since it can discover individuals with backward path which signi cantly enlarge the search space Since the obstacles in the region is non-cross-able, the intruder in many case will require a backward way to reach the best penetration path In many topologies, the solution gives by FEA contains backward paths that allow the exposure value to get even lower than the one gives by GA-MEP In the minimal exposure path example showed in Figure 4.13, the MEP found by FEA in data 0:5 30 has backward paths while the one found by GA-MEP only contains forward paths In this particular case and also very usually, the backward paths contains valuable genes with very low exposure, thus, the Mev of FEA is better than the Mev of GA-MEP Thirdly, the family system and the dynamic population size of FEA help improve the diversity of the population and reduce the chance of local optima Therefore, FEA can be more stable than GAMEP does, especially when performing on a highly complex search space such as OE-MEP problem For the computational time, GA-MEP is more or less faster than FEA which is fair and rea131 Data 0:3 30 FEA Data 0:3 60 Mev: 0.1497 Data 0:5 30 Mev: 3.6252 Mev: 1.4978 Sensor Figure 4.13 The Minimal Exposure Path is achieved by FEA, GA-MEP and Grid-based method on some noble topologies 132 sonable due to FEA has more complex operator than GA-MEP does However, the gain on computational time is acceptable since the di erence is not high In summaries, performance of FEA is better than GA-MEP when performing on the OE-MEP problem 4.5 Conclusion This Chapter proposes to investigate the OE-MEP problem in WSN where obstacles are presented in their arbitrary shapes, and can be used as a tool to determine the weaknesses in coverage level of a given sensor network The goal of the OE-MEP problem is to nd out a path that penetrates through the eld with the minimal exposure value and does not cross any obstacles.This problem is substantially bene cial for network designers who can apply established formulas to evaluate the quality of coverage of the provided WSN without costly deployment and test The OE-MEP is formulated and presented as a generic mathematical model which then is converted into an optimization problem with constraints We create a family system based evolutionary algorithm (FEA) in an attempt to solve this OE-MEP problem e ciently We consider obstacles with arbitrary shapes (to match realistic scenarios) and we model these obstacles as convex polygons and create random data sets to e ectively measure the performance of the OE-MEP approach We then conduct numerous systematic simulations to test the performance of our proposed FEA algorithm with a variety of network scenarios and obstacles The results show evidence that FEA is strongly suitable for solving the OE-MEP problem and more e cient than prior approaches regarding solution quality and computational time 133 CONCLUSIONS AND FUTURE WORKS Contributions This dissertation surveys the approximation algorithms for dealing with the barrier coverage problem in wireless sensor networks Especially, it has studied and proposed some new models of the MEP problem in Dimensions which is roof of barrier coverage problem, devised the e cient heuristic/metaheuristic algorithms to solve the proposed MEP problems The dis-sertation has addressed the MEP problem in WSNs completely, and achieved the highlight research results as follows: The main results of the dissertation include: For omni-directional mobile wireless sensor networks, the MEP problem in mobile wireless sen-sor networks with several di erent sensor coverage models (MMEP problem) is studied and has been obtained some emphasized results as follows: Regarding omni-directional static wireless sensor networks, we have investigated the MEP problem based on probabilistic coverage model with noise (PM-based-MEP), and accomplished some results as follows: Formulating a minimal exposure path problem under the probabilistic coverage model with noise in a WSN, called PM-based-MEP A new de nition of exposure measure for this model is also introduced Converting the PM-based-MEP into an optimization problem with a objective function and constraints which permit the use of mathematical optimization methods to solve Proposing the GB-MEP algorithm to obtain the solution based on the traditional grid-based method incorporated with several improvements To enhance the search space and more e ciently solve the problem, we design a new individual representation, an e cient crossover and a suitable mutation operator to form a genetic algorithm called GA-MEP Conducting experiments in various scenarios to examine the proposed algorithms Quality of solutions and computation time are compared with existing methods and analyzed to give insights into the use of each algorithm in the PM-based-MEP In term of heterogeneous directional wireless sensor networks, the MEP problem in HWDSNs (HM-MEP) is focused, and has been obtained the main results: Establish mathematical models to represent the HM-MEP problem Propose two e cient meta-heuristic algorithms: HEA - a hybrid evolutionary algorithm in combination with local search and GPSO - a novel particle swarm optimization based on the gravity force theory Analysis, evaluate and compare the experimental results and show that our proposed 134 algorithms outperform the previous methods for most cases regarding quality solution and computation time With respect to the MEP problem in real-world WSN scenarios, the MEP problem in WSNs with arbitrary-shape obstacles is addressed successfully, and has been achieved the results as follows: Formulate a generic mathematical model to represent the arbitrary shape obstacles- evade MEP problem in WSNs, called OE-MEP and convert OEMEP into an optimization prob-lem Model the obstacles as convex polygons to match realistic scenarios and devise a method to randomly generate obstacles in di erent forms The newly created data set can serve as an e ective measurement for the performance of OE-MEP approaches Propose a new algorithm called Family System based Evolutionary Algorithm (FEA) for solving the OE-MEP problem e ciently Conduct a number of systematic simulations to study the performance of FEA under a variety of network scenarios as well as obstacles Analyze the experimental results to prove that FEA adapts to the OEMEP problem and outperforms prior approaches regarding solution quality and computational time Limitations Although the MEP problems in WSNs have been studied under several sensing coverage models e ciently, the dissertation has still some limitations as follows: The MEP problem has not addressed in WSNs under modern sensing coverage models such as full-view sensing coverage, k-angle sensing coverage yet The MEP problem has not solved in 3-Dimensions WSNs yet The MEP problem has not taken into account rotating capability of sensor nodes Future works Although barrier coverage has been actively studied by academic community, there is still a long way to go before it can be applied into large-scale practical systems In our future work, we would like to focus on applying barrier coverage into real systems Three-dimension barrier coverage Most prior researches studied on the barrier coverage problem in two-dimensional spaces The gap between theory and practice will cause that laboratory researches cannot be applied in large-scale practical systems However, in many practical scenarios, sensors deployed in the 135 atmosphere, in underwater or in the sea, and the outer space may need to guarantee the barrier covered in three-dimensional space, or referred to shell coverage It is not straightforward to extend the approaches proposed for two-dimensional barrier coverage to adapt to three-dimensional barrier coverage, and new algorithms need to be designed Practical sensing coverage model Most of existing barrier coverage solutions, the directional sensing model models are simple and ideal such as binary sensing model, attenuated sensing model, etc Recently, practical sensing coverage model, full-view coverage model, and some application-oriented barrier coverage, bring new re ection and enlightenment to the design of barrier coverage solutions Sensor with rotating capabilities In directional sensing coverage models, a sensor can only sense in the direction of its orientation A rotating directional sensor can change the orientation of its sensor at a certain rotational speed to provide good coverage When these sensors are randomly deployed in the ROI, one interesting problem is how to select appropriate rotating directional sensors and their working orientations to guarantee barrier coverage 136 PUBLICATIONS [1] Binh, N.T.M., Thang, C.M., Nghia, N.D and Binh, H.T.T., 2017, Genetic algorithm for solving minimal exposure path in mobile sensor networks In 2017 IEEE Symposium Series on Computational Intelligence (SSCI) (pp.1-8) [2] Binh, H.T.T., Binh, N.T.M., Ngoc, N.H., Ly, D.T.H and Nghia, N.D., 2019 E cient approximation approaches to minimal exposure path problem in probabilistic coverage model for wireless sensor networks Applied Soft Computing, 76, pp 726-743 (SCIE, Q1, IF 4.873) [3] Binh, N.T.M., Binh, H.T.T., Le Loi, V., Nghia, V.T., San, D.L and Thang, C.M., 2019, An e cient approximate algorithm for achieving (k !) barrier coverage in camera wireless sensor networks In Arti cial Intelligence and Machine Learning for Multi-Domain Operations Applications (Vol 11006, p 1100613) International Society for Optics and Photonics [4] Binh, N.T.M., Binh, H.T.T., Van Linh, N and Yu, S., 2020, E cient meta-heuristic approaches in solving minimal exposure path problem for heterogeneous wireless multimedia sensor networks in Internet of Things Applied Intelligence, 50, pp 1889{1907 (SCIE, Q2, IF 3.325) [5] Binh, N.T.M., Abdelhamid Mellouk, Binh, H.T.T., Loi, L.V, San, D.L, Anh, T.H, 2020, An elite hybrid particle swarm optimization for solving minimal exposure path problem in mobile wireless sensor networks Sensors, 9, pp 2586-2611 (SCIE, Q1, IF 3.275) BIBLIOGRAPHY [1] Ian F Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Wireless sensor networks: a survey Computer networks, 38(4):393{422, 2002 [2] Luigi Atzori, Antonio Iera, and Giacomo Morabito The internet of things: A survey Computer networks, 54(15):2787{2805, 2010 [3] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami Internet of things (iot): A vision, architectural elements, and future directions Future generation computer systems, 29(7):1645{1660, 2013 [4] Shancang Li, Li Da Xu, and Xinheng Wang Compressed sensing signal and data acquisi-tion in wireless sensor networks and internet of things IEEE Transactions on Industrial Informatics, 9(4):2177{2186, 2012 [5] Nacer Khalil, Mohamed Riduan Abid, Driss Benhaddou, and Michael Gerndt Wireless sensors networks for internet of things In 2014 IEEE ninth international conference on Intelligent sensors, sensor networks and information processing (ISSNIP), pages 1{6 IEEE, 2014 [6] Li Da Xu, Wu He, and Shancang Li Internet of things in industries: A survey IEEE Transactions on industrial informatics, 10(4):2233{2243, 2014 [7] Andrew Whitmore, Anurag Agarwal, and Li Da Xu The internet of things|a survey of topics and trends Information Systems Frontiers, 17(2):261{274, 2015 [8] Ian F Akyildiz, Tommaso Melodia, and Kaushik R Chowdhury A survey on wireless multimedia sensor networks Computer networks, 51(4):921{960, 2007 [9] Paolo Santi Topology control in wireless ad hoc and sensor networks ACM computing surveys (CSUR), 37(2):164{194, 2005 [10] Jennifer Yick, Biswanath Mukherjee, and Dipak Ghosal Wireless sensor network survey Computer networks, 52(12):2292{2330, 2008 [11] Th Arampatzis, John Lygeros, and Stamatis Manesis A survey of applications of wireless sensors and wireless sensor networks In Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005., pages 719{724 IEEE, 2005 [12] Neiyer Correal and Neal Patwari Wireless sensor networks: Challenges and opportunities In MPRG/Virgina Tech Wireless Symposium, 2001 [13] Daniel G Costa and Luiz A onso Guedes The coverage problem in video-based wireless sensor networks: A survey Sensors, 10(9):8215{8247, 2010 [14] Daniele Puccinelli and Martin Haenggi Wireless sensor networks: applications and chal- lenges of ubiquitous sensing IEEE Circuits and systems magazine, 5(3):19{31, 2005 138 [15] Emad Felemban Advanced border intrusion detection and surveillance using wireless sensor network technology 2013 [16] Hanjiang Luo, Kaishun Wu, Zhongwen Guo, Lin Gu, and Lionel M Ni Ship detection with wireless sensor networks IEEE Transactions on Parallel and Distributed Systems, 23(7):1336{1343, 2011 [17] Zhi Sun, Pu Wang, Mehmet C Vuran, Mznah A Al-Rodhaan, Abdullah M Al-Dhelaan, and Ian F Akyildiz Bordersense: Border patrol through advanced wireless sensor networks Ad Hoc Networks, 9(3):468{477, 2011 [18] Ashish Mishra, Komal Sudan, and Hamdy Soliman Detecting border intrusion using wireless sensor network and arti cial neural network In 2010 6th IEEE international conference on distributed computing in sensor systems workshops (DCOSSW), pages 1{6 IEEE, 2010 [19] Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kulathumani, Hongwei Zhang, Vinayak Naik, Vineet Mittal, Hui Cao, Murat Demirbas, Mohamed Gouda, et al A line in the sand: a wireless sensor network for target detection, classi cation, and tracking Computer Networks, 46(5):605{634, 2004 [20] Ahmed M Mahdy Marine wireless sensor networks: Challenges and applications In Seventh International Conference on Networking (icn 2008), pages 530{535 IEEE, 2008 [21] Peter Rothenpieler, Daniela Kruger, Dennis P sterer, Stefan Fischer, Denise Dudek, Chris-tian Haas, Andreas Kuntz, Martina Zitterbart, Carsten Buschmann, Christian Wiesche-brink, et al Flegsens-secure area monitoring using wireless sensor networks Proceedings of the 4th Safety and Security Systems in Europe, pages 136{139, 2009 [22] Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani B Srivastava Coverage problems in wireless ad-hoc sensor networks In Proceedings IEEE INFOCOM 2001 Conference on computer communications Twentieth annual joint conference of the IEEE computer and communications society (Cat No 01CH37213), volume 3, pages 1380{ 1387 IEEE, 2001 [23] Raymond Mulligan and Habib M Ammari Coverage in wireless sensor networks: A survey Network Protocols & Algorithms, 2(2):27{53, 2010 [24] Anju Sangwan and Rishi Pal Singh Survey on coverage problems in wireless sensor net-works Wireless Personal Communications, 80(4):1475{1500, 2015 [25] M Amac Guvensan and A Gokhan Yavuz On coverage issues in directional sensor net-works: A survey Ad Hoc Networks, 9(7):1238{1255, 2011 [26] Chi-Fu Huang and Yu-Chee Tseng The coverage problem in a wireless sensor network Mobile networks and Applications, 10(4):519{528, 2005 139 [27] Shiri Chechik, Matthew P Johnson, Merav Parter, and David Peleg Secluded connectivity problems Algorithmica, 79(3):708{741, 2017 [28] Yi Zou and Krishnendu Chakrabarty A distributed coverage-and connectivity-centric technique for selecting active nodes in wireless sensor networks IEEE Transactions on Computers, 54(8):978{991, 2005 [29] Bang Wang Coverage problems in sensor networks: A survey ACM Computing Surveys (CSUR), 43(4):1{53, 2011 [30] Fan Wu, Yang Gui, Zhibo Wang, Xiaofeng Gao, and Guihai Chen A survey on barrier coverage with sensors Frontiers of Computer Science, 10(6):968{984, 2016 [31] Dan Tao and Tin-Yu Wu A survey on barrier coverage problem in directional sensor networks IEEE sensors journal, 15(2):876{885, 2014 [32] Anwar Saipulla, Benyuan Liu, and Jie Wang Barrier coverage with airdropped wireless sensors In MILCOM 2008-2008 IEEE Military Communications Conference, pages 1{7 IEEE, 2008 [33] Santosh Kumar, Ten H Lai, and Anish Arora Barrier coverage with wireless sensors In Proceedings of the 11th annual international conference on Mobile computing and networking, pages 284{298, 2005 [34] Shibo He, Jiming Chen, Xu Li, Xuemin Sherman Shen, and Youxian Sun Mobility and intruder prior information improving the barrier coverage of sparse sensor networks IEEE transactions on mobile computing, 13(6):1268{1282, 2013 [35] Seapahn Meguerdichian, Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak Expo-sure in wireless ad-hoc sensor networks In Proceedings of the 7th annual international conference on Mobile computing and networking, pages 139{150, 2001 [36] Giacomino Veltri, Qingfeng Huang, Gang Qu, and Miodrag Potkonjak Minimal and maximal exposure path algorithms for wireless embedded sensor networks In Proceedings of the 1st international conference on Embedded networked sensor systems, pages 40{50, 2003 [37] Seapahn Megerian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani B Srivastava Worst and best-case coverage in sensor networks IEEE transactions on mobile computing, 4(1):84{92, 2005 [38] S Meguerdichian, S Slijepcevic, V Karayan, and M Potkonjak Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pages 106{116, 2001 140 [39] Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Giacomino Veltri, and Miodrag Potkon-jak Exposure in wireless sensor networks: Theory and practical solutions Wireless Networks, 8(5):443{454, 2002 [40] Yuning Song, Liang Liu, and Huadong Ma A physarum-inspired algorithm for minimal exposure problem in wireless sensor networks In 2012 IEEE Wireless Communications and Networking Conference (WCNC), pages 2151{2156 IEEE, 2012 [41] Liang Liu, Xi Zhang, and Huadong Ma Percolation theory-based exposure-path preven-tion for wireless sensor networks coverage in internet of things IEEE Sensors Journal, 13(10):3625{3636, 2013 [42] Yuning Song, Liang Liu, Huadong Ma, and Athanasios V Vasilakos A biology-based algorithm to minimal exposure problem of wireless sensor networks IEEE Transactions on Network and Service Management, 11(3):417{430, 2014 [43] Li Liu, Guangjie Han, Hao Wang, and Jiafu Wan Obstacle-avoidance minimal exposure path for heterogeneous wireless sensor networks Ad Hoc Networks, 55:50{61, 2017 [44] G Arfken, H J Weber, and F.E Harris Mathematical methods for physicists 7th edn orlando, FL: Acadamic Press, 2013 [45] Ye Miao, Yuping Wang, and Wei Jing-Xuan Hybrid particle swarm algorithm for minimum exposure path problem in heterogeneous wireless sensor network International Journal of Wireless and Mobile Computing, 8(1):74{81, 2015 [46] Miao Ye, Yuping Wang, Cai Dai, and Xiaoli Wang A hybrid genetic algorithm for the min-imum exposure path problem of wireless sensor networks based on a numerical functional extreme model IEEE Transactions on Vehicular Technology, 65(10):8644{8657, 2015 [47] Lili Zhang, Xiaoqiang Chen, Jianxi Fan, Dajin Wang, and Cheng-Kuan Lin The minimal exposure path in mobile wireless sensor network In 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pages 73{79 IEEE, 2015 [48] Hristo N Djidjev Approximation algorithms for computing minimum exposure paths in a sensor eld ACM Transactions on Sensor Networks (TOSN), 7(3):1{25, 2010 [49] Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen Fu, and Jie Wang Barrier cover-age with sensors of limited mobility In Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing, pages 201{210, 2010 [50] Linghe Kong, Xuemei Liu, Zhi Li, and M-Y Wu Automatic barrier coverage formation with mobile sensor networks In 2010 Communications, pages 1{5 IEEE, 2010 141 IEEE International Conference on [51] Dongsong Ban, Jie Jiang, Wei Yang, Wenhua Dou, and Huizhan Yi Strong k-barrier cover-age with mobile sensors In Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, pages 68{72, 2010 [52] Binay Bhattacharya, Mike Burmester, Yuzhuang Hu, Evangelos Kranakis, Qiaosheng Shi, and Andreas Wiese Optimal movement of mobile sensors for barrier coverage of a planar region Theoretical Computer Science, 410(52):5515{5528, 2009 [53] Tracy Camp, Je Boleng, and Vanessa Davies A survey of mobility models for ad hoc network research Wireless communications and mobile computing, 2(5):483{502, 2002 [54] Amit Jardosh, Elizabeth M Belding-Royer, Kevin C Almeroth, and Subhash Suri Towards realistic mobility models for mobile ad hoc networks In Proceedings of the 9th annual international conference on Mobile computing and networking, pages 217{229, 2003 [55] Amit P Jardosh, Elizabeth M Belding-Royer, Kevin C Almeroth, and Subhash Suri Real-world environment models for mobile network evaluation IEEE Journal on Selected Areas in Communications, 23(3):622{632, 2005 [56] Prachi Uplap and Preeti Sharma Review of heterogeneous/homogeneous wireless sensor networks and intrusion detection system techniques In Proceedings of Fifth International Conference on Recent Trends in Information, Telecommunication and Computing, pages 22{29, 2014 [57] Chun-Hsien Wu and Yeh-Ching Chung Heterogeneous wireless sensor network deployment and topology control based on irregular sensor model In International Conference on Grid and Pervasive Computing, pages 78{88 Springer, 2007 [58] Christos H Papadimitriou and Kenneth Steiglitz Combinatorial optimization: algorithms and complexity Courier Corporation, 1998 [59] Michael R Garey and David S Johnson Computers and intractability, volume 174 freeman San Francisco, 1979 [60] David P Williamson and David B Shmoys The design of approximation algorithms Cambridge university press, 2011 [61] Amir Hossein Gandomi, Xin-She Yang, Siamak Talatahari, and Amir Hossein Alavi Meta-heuristic algorithms in modeling and optimization Metaheuristic applications in structures and infrastructures, pages 1{24, 2013 [62] Fred Glover Future paths for integer programming and links to arti cial intelligence Computers operations research, 13(5):533{549, 1986 [63] Ibrahim H Osman and Gilbert Laporte Metaheuristics: A bibliography, 1996 [64] Satyasai Jagannath Nanda and Ganapati Panda A survey on nature inspired metaheuristic algorithms for partitional clustering Swarm and Evolutionary computation, 16:1{18, 2014 142 [65] Xin-She Yang Nature-inspired metaheuristic algorithms Luniver press, 2010 [66] Iztok Fister Jr, Xin-She Yang, Iztok Fister, Janez Brest, and Dusan Fister A brief review of nature-inspired algorithms for optimization arXiv preprint arXiv:1307.4186, 2013 [67] Frank Neumann and Carsten Witt Bioinspired computation in combinatorial optimiza-tion: Algorithms and their computational complexity In Proceedings of the 15th annual conference companion on Genetic and evolutionary computation, pages 567{590, 2013 [68] Ke-Lin Du, MNS Swamy, et al Search and optimization by metaheuristics Techniques and Algorithms Inspired by Nature; Birkhauser: Basel, Switzerland, 2016 [69] Teodor Gabriel Crainic and Michel Toulouse Parallel strategies for meta-heuristics In Handbook of metaheuristics, pages 475{513 Springer, 2003 [70] Jir Ocenasek and Josef Schwarz The parallel bayesian optimization algorithm In The State of the Art in Computational Intelligence, pages 61{67 Springer, 2000 [71] Emile Aarts, Emile HL Aarts, and Jan Karel Lenstra Local search in combinatorial optimization Princeton University Press, 2003 [72] Heikki Maaranen, Kaisa Miettinen, and Antti Penttinen On initial populations of a genetic algorithm for continuous Optimization, 37(3):405, 2007 optimization problems Journal of Global [73] Thomas Back, David B Fogel, and Zbigniew Michalewicz Handbook of evolutionary computation CRC Press, 1997 [74] Gunter Rudolph Convergence analysis of canonical genetic algorithms IEEE transactions on neural networks, 5(1):96{101, 1994 [75] Rafael S Parpinelli and Heitor S Lopes New inspirations in swarm intelligence: a survey International Journal of Bio-Inspired Computation, 3(1):1{16, 2011 [76] Keisuke Kameyama Particle swarm optimization-a survey IEICE transactions on information and systems, 92(7):1354{1361, 2009 [77] James Kennedy and Russell Eberhart Particle swarm optimization In Proceedings of ICNN’95-International Conference on Neural Networks, volume 4, pages 1942{1948 IEEE, 1995 [78] Javad Rezazadeh Mobile wireles sensor networks overview International Journal of Computer Communications and Networks (IJCCN), 2(1), 2012 [79] Sameera Poduri and Gaurav S Sukhatme Constrained coverage for mobile sensor net-works In IEEE International Conference on Robotics and Automation, 2004 Proceedings ICRA’04 2004, volume 1, pages 165{171 IEEE, 2004 143 [80] Maxim A Batalin and Gaurav S Sukhatme Coverage, exploration and deployment by a mobile robot and communication network Telecommunication Systems, 26(2-4):181{196, 2004 [81] Isaac Amundson and Xenofon D Koutsoukos A survey on localization for mobile wireless sensor networks In International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments, pages 235{254 Springer, 2009 [82] Jorge Cortes, Sonia Martinez, Timur Karatas, and Francesco Bullo Coverage control for mobile sensing networks IEEE Transactions on robotics and Automation, 20(2):243{255, 2004 [83] Shansi Ren, Qun Li, Haining Wang, Xin Chen, and Xiaodong Zhang A study on ob- ject tracking quality under probabilistic coverage in sensor networks ACM SIGMOBILE Mobile Computing and Communications Review, 9(1):73{76, 2005 [84] Yi Zou and Krishnendu Chakrabarty Sensor deployment and target localization in dis- tributed sensor networks ACM Transactions on Embedded Computing Systems (TECS), 3(1):61{91, 2004 [85] Thomas Clouqueur, Kewal K Saluja, and Parameswaran Ramanathan Fault tolerance in collaborative sensor networks for target detection IEEE transactions on computers, 53(3):320{333, 2004 [86] Nadeem Ahmed, Salil S Kanhere, and Sanjay Jha Probabilistic coverage in wireless sensor networks In The IEEE Conference on Local Computer Networks 30th Anniversary (LCN’05) l, pages 8{pp IEEE, 2005 [87] Thomas Clouqueur, Veradej Phipatanasuphorn, Parameswaran Ramanathan, and Kewal K Saluja Sensor deployment strategy for detection of targets traversing a region Mobile Networks and Applications, 8(4):453{461, 2003 [88] B Nakisa and M N Rastgoo A survey: Particle swarm optimization based algorithms to solve premature convergence 10(9):1758{1765, 2014 problem Journal of Computer Science, [89] G EP Box A note on the generation of random normal deviates Ann Math Stat., 29:610{611, 1958 [90] Thomas Clouqueur, Veradej Phipatanasuphorn, Parameswaran Ramanathan, and Kewal K Saluja Sensor deployment strategy for target detection In Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, pages 42{48, 2002 [91] Joaqu n Derrac, Salvador Garc a, Daniel Molina, and Francisco Herrera A practical tuto-rial on the use of nonparametric statistical tests as a methodology for comparing evolution-ary and swarm intelligence algorithms Swarm and Evolutionary Computation, 1(1):3{18, 2011 144 [92] Yan Sun, Hong Luo, and Sajal K Das A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks IEEE Transactions on Dependable and Secure Computing, 9(6):785{797, 2012 [93] Huadong Ma and Yonghe Liu Some problems of directional sensor networks International Journal of Sensor Networks, 2(1/2):44, 2007 [94] B Schutz Gravity from the ground up Cambridge University Press, 2003 [95] Ioannis Chatzigiannakis, Georgios Mylonas, and Sotiris Nikoletseas A model for obstacles to be used in simulations of wireless sensor networks and its application in studying routing protocol performance Simulation, 83(8):587{608, 2007 [96] Ioannis Chatzigiannakis, Georgios Mylonas, and Sotiris Nikoletseas Modeling and eval-uation of the e ect of obstacles on the performance of wireless sensor networks In 39th Annual Simulation Symposium (ANSS’06), pages 11{pp IEEE, 2006 145 ... sensing eld beginning at the point B and ending at the point E is a path for any point on the path }, the distance from } to the closest sensor is maximum They then designed an algorithm using... application, the requirements in solving the BC problem are different Finding penetration path, especially the minimal exposure path problem is the superior version of the barrier coverage [29] The minimal. .. Proposing the practical and useful models of the minimal exposure path problem in wireless sensor networks Pro ering e cient metaheuristic algorithms to solve the proposed minimal exposure path problems