Deep learning; Fixed-variant search; Network lifespan; Survivability network; Wireless sensor network; Dominant set; Energy; Graph neural networks; Lifespans; Minimal dominant set; State vector; Survivability networks; Electrical and Electronic Engineering
Abstract :
[en] Inadequate energy of sensors is one of the most significant challenges in the development of a reliable wireless sensor network (WSN) that can withstand the demands of growing WSN applications. Implementing a sleep-wake scheduling scheme while assigning data collection and sensing chores to a dominant group of awake sensors while all other nodes are in a sleep state seems to be a potential way for preserving the energy of these sensor nodes. When the starting energy of the nodes changes from one node to another, this issue becomes more difficult to solve. The notion of a dominant set-in graph has been used in a variety of situations. The search for the smallest dominant set in a big graph might be time-consuming. Specifically, we address two issues: first, identifying the smallest possible dominant set, and second, extending the network lifespan by saving the energy of the sensors. To overcome the first problem, we design and develop a deep learning-based Graph Neural Network (DL-GNN). The GNN training method and back-propagation approach were used to train a GNN consisting of three networks such as transition network, bias network, and output network, to determine the minimal dominant set in the created graph. As a second step, we proposed a hybrid fixed-variant search (HFVS) method that considers minimal dominant sets as input and improves overall network lifespan by swapping nodes of minimal dominating sets. We prepared simulated networks with various network configurations and modeled different WSNs as undirected graphs. To get better convergence, the different values of state vector dimensions of the input vectors are investigated. When the state vector dimension is 3 or 4, minimum dominant set is recognized with high accuracy. The paper also presents comparative analyses between the proposed HFVS algorithm and other existing algorithms for extending network lifespan and discusses the trade-offs that exist between them. Lifespan of wireless sensor network, which is based on the dominant set method, is greatly increased by the techniques we have proposed.
Disciplines :
Computer science
Author, co-author :
Sivakumar, Nithya Rekha; Department of Computer Sciences, College of Computer and Information Science, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
NAGARAJAN, Senthil Murugan ; University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Mathematics (DMATH)
Devarajan, Ganesh Gopal ; Department of Computer Science and Engineering, SRM Institute of Science and Technology, Uttar Pradesh, India
Pullagura, Lokaiah ; Department of Computer Science & Engineering, JAIN University, Bangalore, India
Mahapatra, Rajendra Prasad; Department of Computer Science and Engineering, SRM Institute of Science and Technology, Uttar Pradesh, India
External co-authors :
yes
Language :
English
Title :
Enhancing network lifespan in wireless sensor networks using deep learning based Graph Neural Network
University Grants Commission Princess Nourah Bint Abdulrahman University Department of Science and Technology, Ministry of Science and Technology, India
Funding text :
Authors thanks to Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia, for its support (Project Number PNURSP2022R194).Nithya Rekha Sivakumar received a grant from UGC and completed Ph.D., as a Full-Time Research Scholar in Periyar University awarded with ”UGC BSR Research Fellowship in Science for Meritorious Students” by University Grants Commission, New Delhi, Govt. of India from 2010 to 2013. She received Travel Grant from Department of Science and Technology (DST), Govt. of India to go to United Stated of America for her Ph.D. research. She received the ”BEST DISTINGUISHED RESEARCHER AWARD” for the year 2015-2016 from the College of Computer, Qassim Private Colleges, Buraydah, Kingdom of Saudi Arabia. She has received Research grant for Research Identity Fast-track Funding Program, from Deputyship for Research & Innovation, Ministry of Education and Researchers Supporting Project Award from Princess Nourah bint Adbulrahman University in Saudi Arabia. She is a Panel of External Examiner for Ph.D. more than 15 candidates have awarded Ph.D. She is the author of over 35 peer-reviewed articles. She has also 3 Patents. She is also the reviewer in reputed journal like IEEE Access and Springer. She is supervising several graduate (B.S. and M.S) students. Her research interests include the Mobile Computing, Artificial Intelligence, Internet of Things, Deep Learning, Machine Learning, Wireless networks, Network/Cyber security, Blockchain, VANET, Cognitive Radio Networks and Cloud computing. She is currently an Associate Professor in the Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia.
Mahapatra, C., Sheng, Z., Kamalinejad, P., Leung, V.C., Mirabbasi, S., Optimal power control in green wireless sensor networks with wireless energy harvesting, wake-up radio and transmission control. IEEE Access 5 (2016), 501–518.
Boyineni, S., Kavitha, K., Sreenivasulu, M., Mobile sink-based data collection in event-driven wireless sensor networks using a modified ant colony optimization. Phys. Commun., 52, 2022, 101600.
Sterbenz, J.P., Hutchison, D., Çetinkaya, E.K., Jabbar, A., Rohrer, J.P., Scholler, M., Smith, P., Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines. Comput. Netw. 54:8 (2010), 1245–1265.
Khan, M.A., Saeed, N., Ahmad, A.W., Lee, C., Location awareness in 5G networks using RSS measurements for public safety applications. IEEE Access 5 (2017), 21753–21762.
Pham, T.-M., Fdida, S., Chu, H.-N., et al. Modeling and analysis of robust service composition for network functions virtualization. Comput. Netw., 166, 2020, 106989.
Peng, S.-c., Wang, G.-j., Hu, Z.-w., Chen, J.-p., Survivability modeling and analysis on 3D mobile ad-hoc networks. J. Central South Univ. Technol. 18:4 (2011), 1144–1152.
Ouyang, D., Zhao, R., Li, Y., Analysis and optimization of wireless powered untrusted relay system with multiple destinations. Phys. Commun., 42, 2020, 101161.
Wang, H., Zhu, S., Yan, L., Song, L., Zhang, G., Survivability evaluation index systems and evaluation models for wireless sensor networks. 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD, 2015, IEEE, 2203–2207.
Pino, T., Choudhury, S., Al-Turjman, F., Dominating set algorithms for wireless sensor networks survivability. IEEE Access 6 (2018), 17527–17532.
Ratnam, K., Gurusamy, M., Zhou, L., Differentiated survivability with improved fairness in IP/MPLS-over-WDM optical networks. Comput. Netw. 53:5 (2009), 634–649.
Song, K., Wang, Q., Peng, L., Li, C., Wu, X., Secrecy energy efficiency optimization for DF relaying IoT systems with passive eavesdropping terminal. Phys. Commun., 44, 2021, 101254.
B. Liu, O. Dousse, J. Wang, A. Saipulla, Strong barrier coverage of wireless sensor networks, in: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2008, pp. 411–420.
Kumar, S., Lai, T.H., Posner, M.E., Sinha, P., Maximizing the lifetime of a barrier of wireless sensors. IEEE Trans. Mob. Comput. 9:8 (2010), 1161–1172.
Kernighan, B.W., Lin, S., An efficient heuristic procedure for partitioning graphs. Bell Syst. Tech. J. 49:2 (1970), 291–307.
Zhang, Z., Zhou, J., Mo, Y., Du, D.-Z., Performance-guaranteed approximation algorithm for fault-tolerant connected dominating set in wireless networks. IEEE INFOCOM 2016-the 35th Annual IEEE International Conference on Computer Communications, 2016, IEEE, 1–8.
Yu, J., Wang, N., Wang, G., Yu, D., Connected dominating sets in wireless ad hoc and sensor networks–A comprehensive survey. Comput. Commun. 36:2 (2013), 121–134.
Shi, T., Cheng, S., Cai, Z., Li, J., Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks. IEEE INFOCOM 2016-the 35th Annual IEEE International Conference on Computer Communications, 2016, IEEE, 1–9.
Wei, W., Qi, Y., He, X., Wang, W., Li, R., He, H., Improving the survivability of WSNs with biological characters based on rejuvenation technology. 2008 IEEE Asia-Pacific Services Computing Conference, 2008, IEEE, 644–649.
Mohanty, J.P., Mandal, C., Reade, C., Das, A., Construction of minimum connected dominating set in wireless sensor networks using pseudo dominating set. Ad Hoc Netw. 42 (2016), 61–73.
Parvin, S., Hussain, F.K., Park, J.S., Kim, D.S., A survivability model in wireless sensor networks. Comput. Math. Appl. 64:12 (2012), 3666–3682.
Xie, L., Heegaard, P.E., Jiang, Y., Survivability analysis of a two-tier infrastructure-based wireless network. Comput. Netw. 128 (2017), 28–40.
Al-Awami, L., Hassanein, H.S., Distributed data storage systems for data survivability in wireless sensor networks using decentralized erasure codes. Comput. Netw. 97 (2016), 113–127.
Ren, Y., Liu, W., Liu, A., Wang, T., Li, A., A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning. Future Gener. Comput. Syst. 127 (2022), 56–69.
Yi, M., Yang, P., Chen, M., Loc, N.T., A DRL-driven intelligent joint optimization strategy for computation offloading and resource allocation in ubiquitous edge IoT systems. IEEE Trans. Emerg. Top. Comput. Intell., 2022.
Jain, K., Mehra, P.S., Dwivedi, A.K., Agarwal, A., SCADA: Scalable cluster-based data aggregation technique for improving network lifetime of wireless sensor networks. J. Supercomput., 2022, 1–29.
Liu, J., Su, S., Lu, Y., Dong, J., Multiple layers uneven clustering algorithm based on residual energy for wireless sensor networks. J. Eng. 2018:16 (2018), 1555–1560.
Jain, K., Kumar, A., Jha, C.K., Probabilistic-based energy-efficient single-hop clustering technique for sensor networks. International Conference on Communication and Intelligent Systems, 2019, Springer, 353–365.