Coverage Improvement In Wireless Sensor Networks Based On Fuzzy-Logic And Genetic Algorithm

Authors

Abstract:

Wireless sensor networks have been widely considered as one of the most important 21th century technologies and are used in so many applications such as environmental monitoring, security and surveillance. Wireless sensor networks are used when it is not possible or convenient to supply signaling or power supply wires to a wireless sensor node. The wireless sensor node must be battery powered.Coverage and network lifetime are major problems in WSNs so in order to address this difficulty we propose a combinational method consists of fuzzy-logic and genetic algorithms. The proposed scheme detects the coverage holes in the network and selects the most appropriate hole's neighbor to move towards the blank area and compensate the coverage loss with fuzzy-logic contribution and above node new coordinate is determined by genetic algorithm. As fuzzy-logic will be so effective if more than one factor influence on decision making and also genetic algorithms perform well in dynamic problems so our proposed solution results in fast, optimized and reliable output

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

coverage improvement using gla (genetic learning automata) algorithm in wireless sensor networks

coverage improvement is one of the main problems in wireless sensor networks. given a finite number of sensors, improvement of the sensor deployment will provide sufficient sensor coverage and save cost of sensors for locating in grid points. for achieving good coverage, the sensors should be placed in adequate places. this paper uses the genetic and learning automata as intelligent methods for...

full text

Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

full text

cluster-head election in wireless sensor networks using fuzzy logic

a wireless sensor network consists of many inexpensive sensor nodes that can be used toconfidently extract data from the environment .nodes are organized into clusters and in each cluster all non-cluster nodes transmit their data only to the cluster-head .the cluster-head transmits all received data to the base station .because of energy limitation in sensor nodes and energy reduction in each d...

full text

Efficient Fuzzy Logic-Based Clustering Algorithm for Wireless Sensor Networks

Clustering is one of the main techniques used to increase the scalability of wireless sensor networks (WSNs). Furthermore, clustering can help to improve the energy efficiency of resource limited ad hoc network and increase the lifetime of sensor network. In this paper, we present a fuzzy clustering algorithm which improves the energy efficiency of LEACH protocol by using a better cluster head ...

full text

intrusion detection in wireless sensor networks using genetic algorithm

wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...

full text

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 3  issue 4

pages  11- 20

publication date 2017-11-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023