Journal of Computer Networks and Communications

Volume 2017 (2017), Article ID 7348141, 10 pages

https://doi.org/10.1155/2017/7348141

## GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks

^{1}Department of Computer Science, Pondicherry University, Puducherry, India^{2}Department of Computer Science, KL University, Vaddeswaram, India

Correspondence should be addressed to R. Rajakumar

Received 16 November 2016; Revised 18 February 2017; Accepted 2 March 2017; Published 21 March 2017

Academic Editor: Arun K. Sangaiah

Copyright © 2017 R. Rajakumar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

#### Abstract

Seyedali Mirjalili et al. (2014) introduced a completely unique metaheuristic technique particularly grey wolf optimization (GWO). This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN) is localization problem. The objective of this problem is to search out the geographical position of unknown nodes with the help of anchor nodes in WSN. In this work, GWO algorithm is incorporated to spot the correct position of unknown nodes, so as to handle the node localization problem. The proposed work is implemented using MATLAB 8.2 whereas nodes are deployed in a random location within the desired network area. The parameters like computation time, percentage of localized node, and minimum localization error measures are utilized to analyse the potency of GWO rule with other variants of metaheuristics algorithms such as particle swarm optimization (PSO) and modified bat algorithm (MBA). The observed results convey that the GWO provides promising results compared to the PSO and MBA in terms of the quick convergence rate and success rate.

#### 1. Introduction

In real-time environment, wireless sensor networks (WSNs) are deployed in a sensor field to screen the physical environment behaviors. From the most recent decades, the greater part of the scientists was pulled in extraordinary enthusiasm for WSN because of its minimal effort and low preparing capacities. WSNs have incomprehensible applications, for example, checking natural angles and physical marvels like temperature, environment observing, activity control observing, submerged acoustic observing, and patient social insurance checking. WSNs have many research issues that influence outline and execution of general system, for example, sending, time synchronization, restriction, least cost directing, and nature of administration and system security. Most of the articles and research proposals are introduced to solve these issues but still the challenging problem in WSN is localization [1]. With an example, in a general scenario if an unexpected nature disaster is occurred, sensor nodes are placed through air craft in stochastic manner. Those sensor nodes might not know their current locations and placing of GPS to all the sensor nodes is very expensive [2]. Sensor nodes with GPS, known as anchor nodes, transmit beacon messages to estimate the position of unknown nodes, which requires much power. The unknown node position is estimated using the distance between the anchor node (with known location) and unknown node (with unknown location). The overall performance of the network degrades if one node location is wrong; as a result, wrong data of anchor node area is proliferated.

In the past literature, wide range of localization algorithms and techniques are implemented to minimize the communication cost and to improve energy efficiency; however, a large portion of the calculations are application particular and the majority of the arrangements are not proper for extensive variety of WSNs. By and large, confinement is characterized into two unique classes, namely, extend based and run free restriction. Range measurement techniques help to estimate the location of sensor nodes in range based localization [3, 4]. Range-free localization estimates the position of unknown nodes using the topology information and its connectivity with its adjacent nodes [5, 6]. In existing location awareness approaches are commonly employed into two techniques; first one is based on distance or angle measurement and second one is hybridization of distance and angle. Received Signal Strength Indicator (RSSI) is most frequently used technique, where the node position is measured by the distance of nodes. Other location awareness approaches are as Time of Arrival (ToA), Angle-of-Arrival (AoA), Triangulation, and maximum Likelihood (ML).

*Received Signal Strength Indicator (RSSI). *The identification of unknown node is processed based on the attenuation of radio signal. However, the signal strength is high and the node is near to the sender and vice versa [7, 8].

*Time of Arrival (ToA). *TOA figures the separation by the variety of propagation time between two sensors with foreordained speed of signal proliferation [9, 10].

*Angle-of-Arrival (AoA). *Also called Direction of Arrival (DoA) methods ascertain the area by geometric directions with the point from where signals are obtained [11, 12].

*Triangulation Method. *Sensor positions are dictated by trigonometry laws of sin*φ* and .

*Maximum Likelihood (ML). *ML ascertains the sensor position by diminishing the contrast between the computed distance and evaluated distance.

Many metaheuristics algorithms are applied to solve the localization issue in WSN, which drastically reduces the localization error. These algorithms belong to the family of trial and error problem solvers, which iteratively process the feasible solution and identify the nearest optimal solution to the various problems. In localization issues, various optimization algorithms like genetic algorithm, particle swarm optimization, shuffled frog leaping, cuckoo search, bat algorithms and so forth are aids to improvise the network performance by effective and efficient identification of unknown node position.

This paper is structured as follows: Section 2 discussed the literature survey of previous research in WSN localization. Section 3 presents a detailed review on grey wolf algorithm. Section 4 clarifies the localization issue moved toward utilizing the improvement strategies. Section 5 is about results and discussion based on the simulation work done and Section 6 presents conclusion and future direction for research path.

#### 2. Literature Survey

In general, various localization procedures [13] are introduced to solve the localization problems in wireless sensor networks. These procedures are arranged in view of the three categories, namely, (a) gradient search technique, (b) nonhybrid optimization technique, and (c) hybrid optimization technique.

##### 2.1. Gradient Search Technique

In gradient search techniques, identification of unknown node location is processed based on the first-order iterative methods. The following description explains the work carried out over past decades in solving localization issues. Firstly, DV-Hop Localization algorithm [14] utilizes the hop-based propagation model. In this algorithm distance of all nodes are shared with each other, whereas every unknown process a table to store the coordinates ( and ) of anchor nodes and the number of hop information from unknown node to the anchor node. Whenever neighbouring nodes provide the information of the unknown node, then the table is updated with the obtained positions; otherwise the table remains the same. The drawback of DV-Hop localization is whenever the size of network increases then the anchor nodes and unknown nodes are increased, respectively. This in turn returns the maximum cumulative error. This in turn provides the maximum localization error in finding unknown nodes. In addition, improved DV-Hop localization technique [15] is introduced to overcome the issues of DV-Hop algorithm. Mean correction factor of anchor nodes and average correction factor is computed in order to minimize the localization error. Later, Weighted DV-Hop localization algorithm is introduced with the slight modification in mean correction factor to obtain the mean hop distance error in the network and also to improve the accuracy of the unknown node position. In addition, weighted hyperbolic DV-Hop algorithm (WHDV-Hop) [16] presented with the combination of weighted DV-Hop and hyperbolic localization algorithms. WHDV-Hop algorithm requires a priori information of estimated position between the anchor nodes and node of interest and also requires the position of anchor nodes. This algorithm provides better accuracy with minimized mean square error and computational complexity.

Likewise, various techniques are presented to address the issues of localization problem. Some of them are as follows: Akyildiz et al. [17] and Boukerche et al. [18] provide a detailed survey of the significant literature. Niculescu and Nath [19] proposed an efficient localization system by extending the GPS capability with accurate positioning system (APS) to non-GPS nodes in ad hoc networks as anchors flow their location information to all nodes in the network. Bulusu et al. [20] introduced a refinement phase to improve the localization accuracy by measuring anchor distances from their adjacent nodes. Savvides et al. [21] addressed the issue of error accumulation which is solved with the aid of Kalman filter based on least square estimation [22] to concurrently discover the position of all sensor nodes.

Semidefinite programming depends on using convex optimization to address the node localization problem. Based on Biswas et al. [23] the slope seek strategy decides the utilization of an information examination procedure known as multidimensional scaling (MDS) in evaluating the position of obscure nodes. The calculation limits an individual fix by first figuring all match insightful most brief ways between sensors in the fix. At that point the MDS connected to these separations to get an underlying system. Positively, an outright guide is accomplished by utilizing the known node position. This methodology works well with some anchor and apparently high connectivity.

##### 2.2. Nonhybrid Optimization Technique

Even though gradient method solves the localization problem in WSN, it lags in solving large scale scenarios; in order to overcome this issue localization problem is considered as an optimization one. Nowadays optimization algorithm [24] plays a vital role in solving the issues in WSN. WSN is considered as the multimodal and multidimensional problem which diminishes the drawback by addressing the population based random techniques. Various optimization algorithms are so far introduced but only limited algorithms are used to address the issue of localization problem. Nonhybrid optimization algorithms are also termed as metaheuristics. Metaheuristic algorithms are very popular algorithms helping in finding the optimal solution in combinatorial problems. Some of the algorithms are more popular thus they are simulated annealing, genetic algorithm, particle swarm optimization algorithm, cuckoo search, bat algorithm and so on.

Simulated annealing by Kannan et al. [25] was the primary calculation used to detail the restriction as an improvement issue. When all is said and done, SA has a place with Monte Carlo technique to tackle the combinatorial advancement issue. It copies the conduct of physical tempering strategy for liquid materials. It starts with high temperature of a material and step by step cools into a base vitality crystalline structure. This algorithm categorizes into two phases: in first phase, the unknown node positions are estimated. In second phase, it utilizes the neighbourhood information to mitigate the flip ambiguity. Centralized infrastructure based network scenario is used to test the SAL method, where all the sensors transmit their information of estimated positions to a central station. This technique lags in error accumulation due to initial random position assignment.

Particle swarm optimization (PSO) is a very popular algorithm which mimics the behavior of birds flocking and fish schooling. PSO for node localization [26] is introduced to fine-tune the estimated position and to minimize the localization error. Author in that paper classified the process into two different process: first process the estimation of unknown node position is computed based on the improved version of DV-distance based method. In subordinate process, PSO algorithm is used to fine-tune the estimated position. In addition, various techniques with two neighbouring nodes and node selection priority are carried out to address the main issues of localization such as flip ambiguity, collective translation, and error propagation problem. Genetic based optimization mimics the behavior of biological evolution technique such as natural selection and genetic mechanism. In this work, author combined genetic algorithm with improved DV-Hop technique to enhance the localization of unknown nodes with respect to generic DV-Hop technique. This algorithm suffers in providing localization accuracy [27]. Cuckoo search algorithm based localization is introduced by Goyal and Patterh, [28]. With the help of CS author identified the unknown node position and then compared it with other metaheuristics methods.

##### 2.3. Hybrid Optimization Technique

Hybrid optimization techniques determine that two or three metaheuristics algorithms are merged together to form a new optimization algorithm. These algorithms aid in efficient findings of optimal solution within the minimum computation time. Some of the researchers used the hybrid algorithm to solve the localization problem. Firstly, Niewiadomska-Szynkiewicz and Marks [29] proposed a hybrid algorithm with the combination of simulated annealing and genetic algorithm. This approach uses trilateration technique to improve the accuracy of unknown node position coordinates. At each generation, the computed objective value is measured if the obtained value is minimum the assumed threshold then stochastic selection is utilized to violate less proximity constraints. This technique lags in error accumulation due to gradual increase in trilateration. Modified bat algorithm based localization is presented by Goyal and Patterh, [30] which mimics the behavior of bats in finding prey and various kind of insects even at complete darkness. In general bats use ordinary sonar known as echolocation to distinguish prey and to dodge impediments. In this work, creator adjusted bat calculation with chemotactic development of bacterial scrounging calculation to enhance the restriction precision inside the short calculation time period.

To the best of our knowledge, so far, grey wolf optimization (GWO) algorithm was never used for localization problem. So, in this paper the grey wolf optimization algorithm is proposed to optimize the multimodal localization problem and it performs quite well in terms of identifying unknown node position and localization accuracy.

#### 3. Grey Wolf Optimization Algorithm

Metaheuristic optimization algorithms are becoming more familiar in engineering applications because they (i) rely on rather easy concepts and being straightforward to implement; (ii) do not require gradient information; (iii) can bypass local optima; (iv) are often used in a wide range of issues covering different disciplines. Vast numbers of algorithms are introduced for different combinatorial optimization problems. Grey Wolf optimization is one of the new algorithms proposed by Mirjalili et al., [31] in 2016. This algorithm is inspired by the social behavior of grey wolves and it works on leadership hierarchy hunting strategy. Grey wolves are considered as the top-level predators; they live in a group size of 5–12 wolves. Based on the hunting strategy the grey wolves are classified into four categories such as alpha, beta, delta, and omega. Alpha wolves are leader of the bundle. This wolf has the authority to make decision for sleeping place, hunting, and so on. These wolves are otherwise called dominant wolves and they strictly instruct other wolves to follow his/her orders. An alpha wolf plays a major role in producing new solutions. Secondly, Beta wolves are second level of wolves next to the alpha wolves. These wolves are assistant wolves that guide the alpha wolves in decision-making. It also has certain rights to make decision whenever alpha wolves are passed away. These wolves listen to the alpha decision and provide response to the alpha. Thirdly, delta wolves are next level wolves which are also called subordinate wolves. These wolves are belonging to the categories of elders, sentinels, hunters, scouts, and caretakers. Deltas follow the instruction of alphas and betas and they manage next level wolves named omega. Finally, omega is the lowest ranking wolves and play the role of scapegoat. These wolves are must follow the instructions of all other dominant wolves. Omegas are not important wolves but, in some cases, they help others from facing internal problems.

GWO algorithm is one of the interesting algorithms due to the group hunting strategy. Based on Muro et al., grey wolf hunting is classified into three categories (i) tracking, chasing, and approaching the prey, (ii) pursuing, encircling, and harassing the prey until it stops moving, and (iii) attacking towards the prey. In GWO, symbolic representation of alpha, beta, and deltas is represented as , , and . Grey wolf optimization contributes in both the exploration and exploitation phase. Exploitation is to search optimal solution in a local search space. In grey wolf, encircling prey and attacking for prey are two exploitation phases used to explore the optimal solution in a local search space. Search for prey works as the exploration phase in which the grey wolves search for the prey in a global search space.

In encircling prey, grey wolves recognize the location of prey and encircle them. In this phase, the position vector of the prey is defined and other search agents adjust its position based on the best solution obtained. The equation of encircling prey is given below: where represents the current iteration, and are coefficient vectors, position vector of the prey is represented as , is the position vector, is the absolute value, and is an element-by-element multiplication.

The vectors and are computed as follows: where is linearly decreased from 2 to 0 in each iteration and is a random vector in . The position of the search agent is adjusted based on the position of the prey obtained so far . The coefficient vectors and are adjusted to achieve the best agent in different places.

In hunting phase, grey wolves are directed by alpha () and some contributions are also provided to beta () and delta (). Initially, the best optimum is not identifiable due to vast search space whereas in the hunting strategy the alpha is considered as the first best candidate solution, beta is the second-best candidate solution and finally delta is the third best candidate solution. In all iterations, these three solutions are saved and updated to adjust the position of the lowest ranking solution omega. The equation of hunting strategy is formulated as follows:where , , and are the modified distance vector between the alpha, beta, and delta position to the other wolves and , , and are three coefficient vector aids in adjust distance vector and it is computed using (3). position of vector of other grey wolf (omega). where is an obtained new position vector using alpha position and distance vector , denotes that new position vector obtained using beta position and distance vector , represents the new position vector computed using delta position and distance vector , and , , and are three coefficient vectors computed using (2).where is new finalized new position vector computed by average sum of all positions obtained using alpha beta and delta wolf, and represent the three wolves’ alpha, beta, and delta ().

Attacking prey phase helps candidate solution to identify the local solutions. In order to perform local search coefficient vector fluctuates its range in the interval of [-2a, 2a] whereas a is linearly decreasing its value from 2 to 0 over course of generations. If the value of coefficient vector is lesser than 1 then search agents perform the local search. With these GWO operators, search agents update their positions using the location of alpha, beta, and delta and attack toward the prey. This operator intent to stagnate in local optimum to overcome this issue search for prey phase is introduced. This phase helps to diverge from each other to find for prey and converge to attack prey. If the value of coefficient vector is greater than 1 then search agents diverges from the prey and finds the new prey. Likewise, the parameter vector is helpful in avoiding local optima, whereas vector value changes in a range of .

The parameters and guide GWO algorithm to identify the optimum solutions in a global search space. Algorithm 1 shows the pseudocode to implement the GWO algorithm. Figure 1 shows the algorithmic flows of GWO.