- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Recently Accepted Articles ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents

International Journal of Distributed Sensor Networks

Volume 2013 (2013), Article ID 985410, 14 pages

http://dx.doi.org/10.1155/2013/985410

## A PSO-Optimized Minimum Spanning Tree-Based Topology Control Scheme for Wireless Sensor Networks

^{1}College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China^{2}College of Computer, National University of Defense Technology, Changsha 410073, China^{3}School of Computer Science, Colorado Technical University, Colorado Spring, CO 80907, USA

Received 6 January 2013; Accepted 15 March 2013

Academic Editor: Hongju Cheng

Copyright © 2013 Wenzhong Guo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

Wireless sensor networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Topology control is one of the most fundamental problems in WSNs. To overcome high connectivity redundancy and low structure robustness in traditional methods, a PSO-optimized minimum spanning tree-based topology control scheme is proposed in this paper. In the proposed scheme, we transform the problem into a model of multicriteria degree constrained minimum spanning tree (mcd-MST) and design a nondominated discrete particle swarm optimization (NDPSO) to deal with this problem. To obtain a better approximation of true Pareto front, the multiobjective strategy with a fitness function based on niche and phenotype sharing function is applied in NDPSO. Furthermore, a topology control scheme based on NDPSO is proposed. Simulation results show that NDPSO can converge to the non-dominated front quite evenly, and the topology derived under the proposed topology control scheme has lower total power consumption, higher robust structure, and lower contention among nodes.

#### 1. Introduction

A wireless sensor network (WSN) is a system of spatially distributed sensor nodes to collect important information in the target environment. WSNs have been envisioned for a wide range of applications, such as battlefield intelligence, environmental tracking, and emergency response. Each sensor node has limited computational capacity, battery supply, and communication capability [1]. Topology control and management—how to determine the transmission power of each node so as to maintain network connectivity while consuming the minimum possible power—are one of the most important issues in WSNs [2, 3]. Without proper topology control algorithms in placing a randomly connected multihop wireless sensor network may suffer from poor network utilization, high end-to-end delays, and short network lifetime. Topology control in WSNs is NP-hard [4], therefore approximate methods can be used to tackle it efficiently.

Generally, the topology control technologies can be divided into three types. One is to reduce the node redundancy in a given network that usually periodically let selected nodes enter energy-saving mode. Chen et al. [5] proposed a distributed algorithm in which each node makes its local decision on whether to sleep or not. Ding et al. [6] presented an adaptive partition scheme for node scheduling and topology control with the aim of reducing energy consumption. The second type of topology control is to use the clustering strategy such as the well-known LEACH [7]. It used rotation of the cluster head in order to evenly distribute the energy consumption. Cluster heads collected and aggregated all signals and then transmitted the fused information to the base station. Lindsay and Raghavendra [8] proposed PEGASIS which formed a chain including all nodes in the network. In PEGASIS, each node communicated only with a close neighbor and took turns transmitting to the base station. It was better than LEACH because it performed data aggregation at each chain node. The third type of topology control focuses on reducing link redundancy, and several topology control algorithms have been proposed. For example, Li et al. [9] introduced a cone-based topology control algorithm called CBTC which required only the availability of directional information. In this algorithm, each node tried to find the minimum power to ensure that the transmitting with could reach some node in every cone of degree . The algorithm had been analytically shown to be able to preserve the network connectivity if . Rodoplu and Meng [10] proposed a relay-region and enclosure-based approach (R and M) that introduced the notion of relay region and enclosures for the purpose of power control. It could guarantee connectivity of the entire network, and the resulted topology was a minimum power topology. However, the network topology given by this algorithm had a high degree of link redundancy, which would reduce the efficiency of the upper network protocols. To solve this problem, Li and Halpern [11] proposed an improved protocol called SMECN, which had lower link maintenance costs than R and M and could achieve a significant saving in energy consumption. Based on the local minimum spanning tree (MST), Li et al. [12] proposed a network topology control algorithm called LMST which could effectively reduce the power consumption. The topology derived under this algorithm could also preserve the network connectivity, and the degree of each node in the resulted topology was bounded by 6. However, this algorithm ignored the structure robustness and communication interference, so some network performance under LMST may be weaken.

In a word, all the algorithms mentioned previously have taken different approaches to study the topology control and management in WSNs. However, the structure robustness and the radio contention are often ignored. It is a challenge to design a novel topology control scheme which can overcome the defects (i.e., high redundancy of connectivity and low robustness of structure) of traditional methods. This challenge motivates us to integrate the MST method and particle swarm optimization (PSO) by developing a PSO-optimized minimum spanning tree-based topology control scheme in wireless sensor networks to prolong the network lifetime. In our previous work [13], we have transformed the problem of topology control into a model of multicriteria degree constrained minimum spanning tree (mcd-MST) and designed a MST-based topology control scheme with NDPSO called MCMST. Compared with [13], the major contributions of this study are summarized as follows.(1) Similar to [13], the topology control problem is also transformed into the model of mcd-MST with low power consumption, high structure robustness, and low node degree and the constraint of the node degree corresponds with the low ratio interference.(2) We do performance analysis of multiobjective PSO (MOPSO) in detailed and use three standard test functions (ZDT1, ZDT2, and ZDT6) to compare MOPSO with another two classical multiobjective evolutionary algorithms, NSGA and SPEA.(3) In this paper, we adopt NDPSO, which is a nondominated discrete particle swarm optimization, to solve this mcd-MST problem. It aims at obtaining a better approximation of true Pareto front by applying the multiobjective strategy with a fitness function based on niche and phenotype sharing function. Moreover, we further do some extended experiments to analyze the performance of NDPSO by varying the number of objectives, number of vertexes, the correlation, and maximum permissible degree constrained.(4) We introduce the MCMST topology control scheme in WSNs [13] and compare it with another two topology control schemes, SMECN and LMST, in different performance factors which include average link length, average radius, average link strong, average physical degree, and average logic degree.

The remainder of this paper is organized as follows. Section 2 describes the problem. In Section 3, we present the details of the proposed NDPSO algorithm for the mcd-MST problem. Section 4 introduces the proposed MCMST scheme based on NDPSO. In Section 5, we analyze the proposed NDPSO algorithm under a variety of scenarios. And the comparison of our proposed MCMST scheme and other existing schemes is carried out in the simulation. Finally, we make conclusions and discuss the future work in Section 6.

#### 2. Problem Description

##### 2.1. mc-MST

MST problem is to find a least-cost spanning tree in an edge-weighted graph, and multicriteria minimum spanning tree (mc-MST) problem is one of the extended formulations of the MST problem. In mc-MST, a vector of weights is defined for each edge, and the problem is to find all Pareto optimal spanning trees. Consider a connected and undirected graph , where is a finite set of vertices representing terminals or telecommunication stations, and so forth, and which is defined as follows:

Each edge has positive real numbers, representing attributes defined on it and denoted with . In practice, may represent the distance, cost, and so on.

Let be defined as follows:

Then a spanning tree of graph can be expressed as the vector . Let be the set of all such vectors corresponding to spanning trees in graph , and the mc-MST problem can be formulated as follows: where is the th objective to be minimized for the problem where denotes the maximum permissible degree.

If the degree constraint condition of formula (4) is further considered for the formula (3), the mc-MST problem will be transformed into a mcd-MST problem, thus the mcd-MST is a typical mc-MST.

Compared with the traditional MST problem, the mcd-MST problem has more than one objective. Because these multiple objectives exist and usually conflict with each other, we cannot determine which edge has the least weight and span one to form a spanning tree like the process of vertex growth or edge growth. If we transform the multiple objectives into a single objective according to some criteria, the problem can be easily solved by using any MST algorithm, but only one single solution can be obtained. Actually, this transformation is not an easy work both for the decision maker and the system analyzer in practice.

##### 2.2. Model Formulation

A wireless sensor network can be described as a directed graph in a two-dimensional plane, where is the set of nodes and is the set of edges. The relative neighbor graph of node is denoted as the subgraph located in the disk centered at node with a radius , where and . In this paper, a minimum spanning tree with low power consumption, high structure robustness, and low node degree in ) is constructed. The constraint of node degree corresponds with the low ratio interference. The low power consumption and high structure robustness can be described as follows.

*Objective 1 (low power consumption)*. One has
where and stands for the power consumption of node *k*.

*Objective 2 (high structure robustness)*. One has
where stands for the robustness value between node and node *k*.

Therefore, the mcd-MST problem with low power consumption and high structure robustness can be described as searching for sensor nodes with abundant surplus energy to communicate with each other, and avoiding too much interference among them. We denote an *m*-dimensional vector to describe the states of links. If an edge belongs to , then , otherwise . Additionally, the original model must be consistent with the features of MST, so the mathematical model can be described as follows:
where , correspond to the weight of the vectors implying low power consumption and high structure robustness, respectively. At the same time, the objectives must satisfy the node degree constraint in order to form a degreeconstrained tree structure.

#### 3. Proposed Algorithm

The MST problem has been well studied, and many efficient polynomial-time algorithms [14] have been developed by Dijkstra, Kruskal, Prim. Although the basic MST problem is in polynomial time, the addition of one or more constraints often transforms it into a multiobjective problem (MOP), and so approximate methods must be used if one is to tackle it efficiently. In [15], Zhou and Gen described a Prufer-encoded genetic algorithm (GA), which used Srinivas and Deb’s Nondominated Sorting method and a Prufer based encoding [16, 17]. And an algorithm for enumerating all Pareto optimal spanning trees was put forward to evaluate their proposed GA. However, Knowles [18] pointed out that the proposed enumeration algorithm was not correct. In our previous work [19], we put forward a nongenerational multiobjective GA (MOGA) to deal with the mc-MST and presented an improved enumeration algorithm to evaluate our proposed MOGA. In [19], the improved enumeration algorithm was proved to be able to find out all true Pareto optimal solutions, so it can be used to replace the algorithm of Zhou and Gen for evaluating the quality of mc-MST solutions generated by an approximate method such as the GA in [15] or [19].

*Definition 1 (dominance [20]). *A vector ,) is said to dominate ) if and only if is partially less than *V*, that is, .

*Definition 2 (pareto optimal [20]). *A solution is said to be Pareto optimal if and only if there is no for which dominates .

PSO is a relatively recent heuristic optimization technique developed by Kennedy and Eberhart [21]. Ease of implementation, high quality of solutions, computational efficiency, and speed of convergence are strengths of the PSO. In the past several years, PSO has been successfully applied in many researches and applications such as [22–27]. WSN issues such as node deployment, localization, energy-aware clustering, data aggregation, and topology control are often formulated as optimization problems, and PSO has been applied to address these WSN issues. Kulkarni and Venayagamoorthy [28] introduce PSO and discuss its suitability for WSN applications. They also present a brief survey of how PSO is tailored to address these issues.

##### 3.1. Basic PSO

PSO is a population based search problem where individuals, referred to as particles, are grouped into a swarm. In PSO, each particle is defined as a potential solution to a problem in a *D*-dimensional space, with the th particle represented as ). The particle adjusts its position in search space according to its own experience and that of neighboring particles. Each particle also maintains a memory (best) of its previous best position represented as ) and a velocity along each dimension represented as ). In each generation, the *pbest *vector of the particle with the best fitness in the local neighborhood designated .

In each generation of the early versions of PSO, the particles were manipulated according to the following equation: where is the number of dimensions (variables), is the inertia weight, and are two positive constants, called acceleration constants, and and are two random numbers within the range . A constant is often used to limit the velocities of the particles and improve the resolutions of the search space.

##### 3.2. NDPSO

As (8) mentioned in the previous section, it is obvious that the basic PSO cannot be directly used to generate a discrete combinatorial solution of the MST problem. Since the PSO algorithm was proposed by Kennedy and Eberhart in 1995, attempts have been made to apply the PSO algorithm to discrete combinatorial problems lately [29–35]. In this section, inspired by the [32] and our previous work [29], NDPSO is applied to deal with mc-MST problem. In the proposed algorithm, the phenotype sharing function of the objective space is applied in the definition of fitness function to obtain a better approximation of true Pareto front.

###### 3.2.1. Representation of Particles

Here we also adopt the method of [15, 19] to build the representation scheme of particles.

*Procedure: Encoding*

*Step *1*.* Let vertex be the smallest labeled leaf vertex in a labeled tree .

*Step *2*.* Set to be the first digit in the permutation if vertex is incident to vertex.

*Step *3*.* Remove vertex and the edge from to ; we have a tree with vertices.

*Step *4*.* Repeat the previously steps until one edge is left, and produce the Prufer number or permutation with digits in order.

*Procedure: Decoding*

*Step *1. Let be the original Prufer number, and let be the set of all vertices not included in .

*Step *2. Let be the vertex with the smallest label in , and let be the leftmost digit of . Add the edge from to into the tree. Remove from and from . If does not occur anywhere in the remainder of *P*, put it into .

*Step *3. Repeat the process until no digits left in .

*Step *4. If no digits remain in , there are exactly two vertices, and , in . Add edge from to into the tree and form a tree with -1edges.

###### 3.2.2. Discrete Procedure of PSO

Here, the position of the th particle at iteration can be updated as follows:

The update equation consists of three components as follows, where , and are uniform random numbers generated between 0 and 1.(a) represents the velocity of the particle,
where indicates the insert (mutation) operator with the probability of *w*.(b) is the “cognition” part of the particle for the private thinking of the particle itself,
where represents the crossover operator with the probability of . (c) is the “social” part of the particle representing the collaboration among particles,
where represents the crossover operator with the probability of .

###### 3.2.3. Fitness Value Function

*Definition 3. *Target distance : is the distance between the two particles and . Supposed that the distance has dimensions which are noted as , respectively, and
where.

*Definition 4. * Dominance measure *D*(*i*): *D*(*i*) expresses the state of domination the th particle with respect to the current population, and
where *nd*(*i*, *j*) is one if particle dominate particle *i*, and zero otherwise.

*Definition 5 5. *Sharing function :
where is a sharing parameter.

*Definition 6. *The neighbor density measure associated with particle is defined as

*Definition 7. *The fitness of given particle is then defined as

Compared with the single-object PSO, during the search process of multiobjective PSO (MOPSO), particles often have more than one personal best and global best value. We save these information into an external archive [36]. A proper mechanism of choosing leader particles can help to find more Pareto solutions in a shorter time. So it is very important to decide how to choose the proper leader particles to direct the movement of particles. In order to avoid the external archive growing too big, we adopt dominance [37] to reduce the external archive.

###### 3.2.4. Algorithm Overview

The details of NDPSO algorithm can be described as follows.

*NDPSO Algorithm for mcd-MST*

*Step *1. Initialize swarm.

*Step *2*.* Modify degree if not satisfied.

*Step *3. Calculate the fitness value.

*Step *4. Initialize leaders in an external archive.

*Step *5. Filter (leaders).

*Step *6. Iteration = 0.

*Step *7. For each particle: mutation; select leader;

SelfCross; SocialCross; modify degree;

update Position; update pbest.

*Step *8. Update leaders in the external archive.

*Step *9. Filter (leaders).

*Step *10. Iteration++.

*Step *11. If iteration iterationMax, go to Step 7.

*Step *12. Output results.

#### 4. Topology Control Scheme

As mentioned in the previous sections, we constructed the multiobjective minimum spanning tree model according to characteristics of problem and designed a NDPSO algorithm to deal with the model. Sensor nodes are usually presented in the intersection of many node adjacency coverage graphs, because the local topology is needed to adjust overall after deployed. Then the node selects the one whose requirement for coverage is maximum from a number of the spanning trees. Inspired by the idea of local minimum spanning tree structure and topology adjustment strategy of [12], a topology control scheme based on NDPSO called MCMST is proposed in this section, and the details of the MCMST are described as follows.

*Topology Control Scheme Based on (MCMST)*

*Step *1. Each wireless sensor node collects the local information of its own reachable neighborhood graph through broadcasting a HELLO message using its maximal transmission power periodically.

*Step *2. According to the information collected in the previously step and the performance evaluation function, each node computes the minimum spanning tree with degree constraints in the graph using the NDPSO algorithm independently in the previously section.

*Step *3. Each node has to adjust its transmission power according to its local minimum spanning tree , where , *E*(*T*) . At this time, node requires a power lever that can reach the farthest one-hop neighbor in .

#### 5. Simulation Results

In this section, we first conduct simulations to compare the performance of PSO under our multiobjective strategy (MOPSO) with two classic multiobjective evolutionary algorithms in three standard test functions. Furthermore, the solution sets generated by NDPSO are also compared with solution sets from the enumerating algorithm [19] which is proved to find all Pareto optimal spanning trees. Finally, we conduct extensive simulations to compare the performance of our proposed MCMST scheme with other existing schemes.

##### 5.1. Performance Analysis of MOPSO

###### 5.1.1. Experimental Setup

We use three standard test functions (ZDT1, ZDT2, and ZDT6) [38] and compare MOPSO with two classic multiobjective evolutionary algorithms (NSGA [39] and SPEA [40]). The three test functions represent some typical function types of noninferior front in multiobjective optimization problem, respectively. ZDT1 is a convex function, ZDT2 is a nonconvex function, and ZDT6 is noncontiguous function. In order to avoid algorithm randomness of a singular run, we independently run each algorithm for 20 times and compare the results of 20 experiments based on the statistical methods of hypothesis testing [41]. The experimental parameters are set as , and . In addition, denotes the scale of population of all algorithms, and the maximum iteration times is 500 in each run.

To evaluate the performance of those multiobjective algorithms, Zitzler et al. developed several indicators [42]. Here, we adopt three quantitative indicators (unary additive EPS indicator , HYP indicator , and unary R2 indicator ) in this paper.

###### 5.1.2. Results and Analysis

As to the three test functions ZDT1, ZDT2, and ZDT6, in most cases, the proposed algorithm in this paper (MOPSO) can converge to the Pareto front within 100 iterations and have a small computational cost. Figure 1 shows the distribution situation of Pareto solution at a certain run. From the figure, we can infer that for each function, algorithm can obtain a well distribution of Pareto front. The results of detailed performance parameters are shown in Figure 2, and the Kruskal Wallis test results of statistical analysis are shown in Table 1.

From Figure 2 and Table 1, we can see that as to ZDT2 issue, MOPSO proposed in this paper is better than other multiobjective evolutionary algorithms in three indicators under the circumstance of same dominance rank distribution. So MOPSO algorithm is good at solving nonconvex Pareto front function. For ZDT6, MOPSO algorithm is superior to HSGA II and SPEA 2 on both R2 and HYP indicator, while MOPSO is little inferior to them on EPS indicator. According to [42], it also shows that if the results from multiple Pareto compliant indicators are different, it is hard to know which algorithm is better. It is obvious that MOPSO algorithm can obtain a better result in the front nonuniform ZDT6. As to ZDT1, although MOPSO is inferior to NSGA II and SPEA 2 on three parameters, the value of overall difference is small. Considering that it is unable to find manifest difference from other evolutionary algorithm on dominance rank distribution of solution and MOPSO can converge to Pareto front within few number of iteration times, MOPSO algorithm can obtain a satisfying solution in convex Pareto font optimization function. According to the results of three test function, we can see that MOPSO algorithm proposed in this paper has strong global search ability, and it can converge to the Pareto front by less computing cost. Furthermore, its distribution of solution is quite good. What we have mentioned previously demonstrates that MOPSO is worth being studied in the field of multiobjective optimization problem.

##### 5.2. Performance Analysis of NDPSO

###### 5.2.1. Experimental Setup

Let us consider a complete graph , where and each edge has weights, the problem’s goal is to find all Pareto optimal solutions of . The coordinate of vertexes in and the weights of each edge are generated randomly. Suppose each edge in the graph has two weights, we propose generations for the following types: (a) random: random (uncorrelated) real number weighted graphs;(b) correlated: random correlated real number weighted graphs;(c) anticorrelated: random anticorrelated real number weighted graphs.

In [18], Knowles proposed an algorithm to generate correlated (and anticorrelated) graphs. Knowles declared that all subsequent weights are either positively or negatively correlated with respect to the first component, and the values of the weights are within a same range. All the weights are of course not negative, but we find that the algorithm will generate negative value when , and we presented an improved algorithm in [19] to generate correlated (and anticorrelated) graphs. The results of the improved algorithm can be seen in [19].

###### 5.2.2. Results and Analysis

In [19], we proposed an improved enumeration algorithm which is proved to be able to find all the optimal solutions. So it can be a tool for evaluating the performances of other heuristic algorithms instead of the enumeration algorithm of Zhou and Gen [15]. In the first simulation, to evaluate the NDPSO algorithm, the solution sets generated by it are compared with solution sets from the improved enumeration [19], and the results are displayed from Figures 3, 4, and 5. Here, we consider 2-objective optimal problem. And the parameters are set as follows: the number of vertices is 10 and 15, respectively, population size is 50, and maximum generation is 1000.

From the results, we can draw a conclusion that the NDPSO algorithm has similar performance with increased size compared with the MOGA in [19]. However, the population size and the maximum generation in MOGA are set as 400 and 20000, respectively. Thus, the NDPSO is superior to MOGA in space and time complexity, and it is really effective to deal with the mc-MST problem.

In real network environmental, to satisfy the requirement of lifetime objective in wireless sensor networks and aim at the defect that high redundancy of connectivity or low robust of structure in traditional schemes, the model of topology control in WSNs can be transformed into a problem of mcd-MST. So in the second simulation, the problem’s goal is to find mcd-MST solutions of . The coordinate of vertexes in and the weights of each edge are generated randomly. For simplicity, however, we suppose each edge in the graph has only two weights, which can be easily extended. We display the results from Figures 6 and 7. Figure 6 shows that the NDPSO algorithm converges to the real Pareto optimal solutions better than the MOGA in [19] under the same parameters setting no matter *d *= 3 or . From Figure 7, as a direct representation, we can find that the proposed NDPSO algorithm dominate the MOGA algorithm.

##### 5.3. Performance Analysis of MCMST

###### 5.3.1. Experimental Setup

Our simulation is done for a network of nodes that are placed uniformly at random in a rectangular region of 100 by 100 meters. We assume that all nodes have the same maximum emission radius *R*, and the Euclidean distance between node and node is . The transmission power between node and node is defined as, the robustness of an edge between node and node is defined as, the maximal transmission range is for all the nodes, and the initial energy of each node is equivalent to a random value between 20 and 40 Joule.

###### 5.3.2. Result and Analysis

In the first simulation, 50 nodes are uniformly distributed in the region. Figure 8(a) shows the initial topology generated using the maximum transmission power, and the topology generated by different topology control schemes is shown in Figures 8(b), 8(c), and 8(d), respectively. As shown in Figure 8, SMECN, LMST and MCMST all dramatically reduce the average node degree while maintaining network connectivity. Moreover, LMST, and MCMST outperform SMECN in the sense that few edges formed in the final network topology, because they take the demand for low-power consumed into account and try to reduce nodes’ transmission powers. However, the network topology generated by MCMST is slightly different form the one derived by LMST because LMST has not considered the robustness of topology structures, and at the same time MCMST has taken the edge coverage and node degree constrained into consideration.

In the second simulation, we vary the number of nodes in the region from 40 to 70. The average radius and the average link length for the topologies generated using the SMECN, LMST, and MCMST with link removal are shown, respectively, in Figures 9(a) and 9(b). MCMST and LMST outperform SMECN in the both two cases, and MCMST scheme has similar performance with LMST scheme. However, with the size of nodes increasing, MCMST has better performances than LMST in terms of the average link length. The results imply that our proposed scheme can provide a better spatial reuse and is power-efficient. As shown in Figure 9(c), the average link strong for the topologies generated using our scheme outperforms than that of SMECN and LMST because the structure robustness of network is considered in our proposed MCMST scheme. The average physical degree and the average logic degree for the topologies using SMECN, LMST, and MCMST are shown, respectively, in Figures 9(d) and 9(e). From Figure 9(d), we can know that MCMST, and LMST outperform SMECN and MCMST is little inferior to LMST. As shown in Figure 9(e), the average logical degree for the topologies generated using the MCMST has better performance than LMST and SMECN with the size of nodes increasing. It implies that our proposed scheme can get a better network topology with low radio interference.

In a word, MCMST scheme proposed in this paper has made a tradeoff among the energy consumption, radio interference, and structure robustness, and the performance of the resulting network topology has been greatly improved.

#### 6. Conclusions

Due to the demand for the optimization of the network lifetime, this paper adopts the idea of a local minimum spanning tree, transforms the model into a multicriteria degreeconstrained minimum spanning tree, and proposes a NDPSO algorithm. The phenotype sharing function of the objective space is applied in the definition of fitness function to obtain a better approximation of true Pareto front, and the global convergence of the algorithm is proved using the theorem of Markov chain. Then, a topology control scheme based on NDPSO is put forward. Simulation results show that the obtained topology in this paper has low overall power consumption, high structural robustness, and controllable internode communication interference characteristics and can effectively prolong the lifetime of WSNs. And our algorithm can obtain a better approximation of true Pareto front.

Future work will cover the following problem of the proposed MCMST scheme: consider the reliability in wireless sensor networks effectively; how to reduce the complexity and improve the convergence efficiency of our NDPSO.

#### Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grant no. 61103175 and no. 61103194, the Key Project of Chinese Ministry of Education under Grant no. 212086, the Technology Innovation Platform Project of Fujian Province under Grant no. 2009J1007, the Key Project Development Foundation of Education Committee of Fujian province under Grant no. JA11011, and the Fujian Province High School Science Fund for Distinguished Young Scholars under Grant no. JA12016.

#### References

- T. Laukkarinen, J. Suhonen, and M. Hannikainen, “A survey of wireless sensor network abstraction for application development,”
*International Journal of Distributed Sensor Networks*, vol. 2012, Article ID 740268, 12 pages, 2012. View at Publisher · View at Google Scholar - N. Ababneh, “Performance evaluation of a topology control algorithm for wireless sensor networks,”
*International Journal of Distributed Sensor Networks*, vol. 2010, Article ID 671385, 16 pages, 2010. View at Publisher · View at Google Scholar - L. Lobello and E. Toscano, “An adaptive approach to topology management in large and dense real-time wireless sensor networks,”
*IEEE Transactions on Industrial Informatics*, vol. 5, no. 3, pp. 314–324, 2009. View at Publisher · View at Google Scholar · View at Scopus - S. Zarifzadeh, N. Yazdani, and A. Nayyeri, “Energy-efficient topology control in wireless ad hoc networks with selfish nodes,”
*Computer Networks*, vol. 56, no. 2, pp. 902–914, 2012. View at Publisher · View at Google Scholar - B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks,”
*Wireless Networks*, vol. 8, no. 5, pp. 481–494, 2002. View at Publisher · View at Google Scholar · View at Scopus - Y. Ding, C. Wang, and L. Xiao, “An adaptive partitioning scheme for sleep scheduling and topology control in wireless sensor networks,”
*IEEE Transactions on Parallel and Distributed Systems*, vol. 20, no. 9, pp. 1352–1365, 2009. View at Publisher · View at Google Scholar · View at Scopus - W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in
*Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS-33 '00)*, pp. 1–10, January 2000. View at Scopus - S. Lindsay and C. Raghavendra, “PEGASIS: power-efficient gathering in sensor information systems,” in
*Proceedings of IEEE Aerospace Conference*, pp. 1125–1130, 2002. - L. Li, J. Y. Halpern, P. Bahl, Y. M. Wang, and R. Wattenhofer, “Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks,” in
*Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing*, pp. 264–273, August 2001. View at Scopus - V. Rodoplu and T. H. Meng, “Minimum energy mobile wireless networks,”
*IEEE Journal on Selected Areas in Communications*, vol. 17, no. 8, pp. 1333–1344, 1999. View at Publisher · View at Google Scholar · View at Scopus - L. Li and J. Y. Halpern, “A minimum-energy path-preserving topology-control algorithm,”
*IEEE Transactions on Wireless Communications*, vol. 3, no. 3, pp. 910–921, 2004. View at Publisher · View at Google Scholar · View at Scopus - N. Li, J. C. Hou, and L. Sha, “Design and analysis of an mst-based topology control algorithm,” in
*Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communication Scocieties*, pp. 1702–1712, 2003. - W. Z. Guo, J. H. Park, L. T. Yang, A. V. Vasilakos, N. X. Xiong, and G. L. Chen, “Design and analysis of a MST-based topology control scheme with PSO for wireless sensor networks,” in
*Proceedings of IEEE Asia-Pacific Services Computing Conference*, pp. 360–367, December 2011. - Y. H. Chen, “Polynomial time approximation schemes for the constrained minimum spanning tree problem,”
*Journal of Applied Mathematics*, vol. 2012, Article ID 394721, 8 pages, 2012. View at Publisher · View at Google Scholar - G. Zhou and M. Gen, “Genetic algorithm approach on multi-criteria minimum spanning tree problem,”
*European Journal of Operational Research*, vol. 114, no. 1, pp. 141–152, 1999. View at Scopus - J. Gottlieb, B. A. Julstrom, G. R. Raidl, and F. Rothlauf, “Prufer numbers: a poor representation of spanning trees for evolutionary search,” in
*Proceedings of the Genetic and Evolutionary Computation Conference*, pp. 343–350, 2001. - N. Srinivas and K. Deb, “Multi-objective optimization using nondominated sorting in genetic algorithms,”
*Evolutional Computation*, vol. 2, no. 3, pp. 221–248, 1994. View at Publisher · View at Google Scholar - J. D. Knowles,
*Local-search and hybrid evolutionary algorithms for Pareto optimization [thesis]*, University of Reading, West Berkshire, UK, 2002. - G. Chen, S. Chen, W. Guo, and H. Chen, “The multi-criteria minimum spanning tree problem based genetic algorithm,”
*Information Sciences*, vol. 177, no. 22, pp. 5050–5063, 2007. View at Publisher · View at Google Scholar · View at Scopus - D. A. van Veldhuizen and G. B. Lamont, “Multiobjective evolutionary algorithm test suites,” in
*Proceedings of the 14th ACM Symposium on Applied Computing (SAC '99)*, pp. 351–357, March 1999. View at Scopus - J. Kennedy and R. Eberhart, “Particle swarm optimization,” in
*Proceedings of the IEEE International Conference on Neural Networks*, vol. 4, pp. 1942–1948, December 1995. View at Scopus - X. Li and X. Yao, “Cooperatively coevolving particle swarms for large scale optimization,”
*IEEE Transactions on Evolutionary Computation*, vol. 16, no. 2, pp. 210–224, 2012. View at Publisher · View at Google Scholar · View at Scopus - S. S. Jiang, Z. W. Zhao, S. Mou, Z. S. Wu, and Y. Luo, “Linear decision fusion under the control of constrained PSO for WSNs,”
*International Journal of Distributed Sensor Networks*, vol. 2012, Article ID 871596, 11 pages, 2012. View at Publisher · View at Google Scholar - Y. Morsly, N. Aouf, M. S. Djouadi, and M. Richardson, “Particle swarm optimization inspired probability algorithm for optimal camera network placement,”
*IEEE Sensors Journal*, vol. 12, no. 5, pp. 1402–1412, 2012. View at Publisher · View at Google Scholar - Y. Shen, G. Wang, and C. Tao, “Particle swarm optimization with novel processing strategy and its application,”
*International Journal of Computational Intelligence Systems*, vol. 4, no. 1, pp. 100–111, 2011. View at Scopus - D. Caputo, F. Grimaccia, M. Mussetta, and R. E. Zich, “Genetical swarm optimization of multihop routes in wireless sensor networks,”
*Applied Computational Intelligence and Soft Computing*, vol. 2010, Article ID 523943, 14 pages, 2010. View at Publisher · View at Google Scholar - K. Zielinski, P. Weitkemper, R. Laur, and K. D. Kammeyer, “Optimization of power allocation for interference cancellation with particle swarm optimization,”
*IEEE Transactions on Evolutionary Computation*, vol. 13, no. 1, pp. 128–150, 2009. View at Publisher · View at Google Scholar · View at Scopus - R. V. Kulkarni and G. K. Venayagamoorthy, “Particle swarm optimization in wireless-sensor networks: a brief survey,”
*IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews*, vol. 41, no. 2, pp. 262–267, 2011. View at Publisher · View at Google Scholar · View at Scopus - W. Z. Guo, H. L. Gao, G. L. Chen, and L. Yu, “Particle swarm optimization for the degree-constrained MST problem in WSN topology control,” in
*Proceedings of International Conference on Machine Learning and Cybernetics*, vol. 3, pp. 1793–1798, July 2009. View at Publisher · View at Google Scholar · View at Scopus - W. N. Chen, J. Zhang, H. S. H. Chung, W. L. Zhong, W. G. Wu, and Y. H. Shi, “A novel set-based particle swarm optimization method for discrete optimization problems,”
*IEEE Transactions on Evolutionary Computation*, vol. 14, no. 2, pp. 278–300, 2010. View at Publisher · View at Google Scholar · View at Scopus - G. Lapizco-Encinas, C. Kingsford, and J. Reggia, “Particle swarm optimization for multimodal combinatorial problems and its application to protein design,” in
*Proceedings of IEEE Congress on Evolutionary Computation*, pp. 1–8, July 2010. View at Publisher · View at Google Scholar · View at Scopus - Q. K. Pan, M. F. Tasgetiren, and Y. C. Liang, “A discrete particle swarm optimization algorithm for the permutation flowshop sequecing problem with Makespan criteria,” in
*Proceedings of the 26th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence*, pp. 19–31, 2006. - S. H. Ling, F. Jiang, H. T. Nguyen, and K. Y. Chan, “Hybrid fuzzy logic-based particle swarm optimization for flow shop scheduling problem,”
*International Journal of Computational Intelligence and Applications*, vol. 10, no. 3, pp. 335–356, 2011. View at Publisher · View at Google Scholar - R. M. Aliguliyev, “Clustering techniques and discrete particle swarm optimization algorithm for multi-document summarization,”
*Computational Intelligence*, vol. 26, no. 4, pp. 420–448, 2010. View at Publisher · View at Google Scholar · View at Scopus - W. Z. Guo, N. X. Xiong, A. V. Vasilakos, G. L. Chen, and C. L. Yu, “Distributed k-connected fault-tolerant topology control algorithms with PSO in future autonomic sensor systems,”
*International Journal of Sensor Networks*, vol. 12, no. 1, pp. 53–62, 2012. View at Publisher · View at Google Scholar - R. Balling, “The maximin fitness function: multi-objective city and regional planning,” in
*Proceedings of the 2nd International Conference on Evolutionary Multi-Criterion Optimization*, vol. 2632, pp. 1–15, 2003. - F. Neumann and M. Laumanns, “Speeding up approximation algorithms for NP-hard spanning forest problems by multi-objective optimization,” in
*Electronic Colloquium on Computational Complexity*, Report no. 29, 2005. - E. Zitzler,
*Evolutionary Algorithms for Multi-Objective Optimization: Methods and Applications*, Swiss Federal Institute of Technology, Zurich, Switzerland, 1999. - R. E. Steuer,
*Multiple Criteria Optimization: Theory, Computation, and Application*, John & Wiley Sons, New York, NY, USA, 1986. - E. Zitzler, M. Laumanns, and L. Thiele, “SPEA2: improving the strength pareto evolutionary algorithm,” in
*Proceedings of Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems (EUROGEN '01)*, September 2001. - W. J. Conover,
*Practical Nonparametric Statistics*, John Wiley & Sons, New York, NY, USA, 3rd edition, 1999. - E. Zitzler, L. Thiele, M. Laumanns, C. M. Fonseca, and V. G. da Fonseca, “Performance assessment of multiobjective optimizers: an analysis and review,”
*IEEE Transactions on Evolutionary Computation*, vol. 7, no. 2, pp. 117–132, 2003. View at Publisher · View at Google Scholar · View at Scopus