Performance Evaluation of Metaheuristic Algorithms for IIoT Device Deployment in Obstacle-Constrained Environments
Keywords:
Coverage optimization, Device deployment, Industrial Internet of Things (IIoT), Metaheuristic algorithms, Obstacle-constrained environmentsAbstract
The Industrial Internet of Things (IIoT) has transformed industrial systems through the integration of sensing technologies and automation. Despite these advantages, inadequate device placement leads to coverage holes that degrade system performance in complex environments. Optimizing IIoT device deployment is therefore essential to ensure reliable monitoring and communication. Due to the NP-hard nature of the problem, metaheuristic algorithms have been adopted for exploring complex search spaces. This paper presents a simulation-based performance evaluation of seven metaheuristic algorithms, including Antlion Optimization (ALO), Artificial Bee Colony (ABC), Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Water Cycle Algorithm (WCA), Bat Algorithm (BA), and PSO with Learning Strategy and Crossover (PSOLC) for IIoT device deployment in obstacle-constrained industrial environments. The experimental environment is designed to simulate the characteristics of a factory layout. All experiments are conducted on a 100 × 100 m area under two obstacle configurations corresponding to 14% and 44% obstacle density to ensure statistical robustness. Coverage is defined as the percentage of the deployable area covered by the sensing range of at least one device, excluding obstacle regions, and is computed using a grid-based spatial coverage model. Algorithm performance is evaluated in terms of average coverage and the number of function evaluations required for convergence. The results indicate that ALO achieves the highest coverage (91.13%) with rapid convergence, outperforming the others, whereas BA exhibits the weakest performance. The study also outlines future research directions for improving metaheuristic-based IIoT deployment strategies in industrial environments.References
[1] Y. Hu, Q. Jia, Y. Yao, Y. Lee, M. Lee, C. Wang, X. Zhou, R. Xie and F. R. Yu, Industrial internet of things intelligence empowering smart manufacturing: A literature review, IEEE Internet of Things Journal, 11, 2024, 19143-19167.
[2] E. Dritsas and M. Trigka, A survey on the applications of cloud computing in the industrial internet of things, Big Data and Cognitive Computing, 9, 2025, 44.
[3] S. Yousefi, H. Karimipour and F. Derakhshan, Data aggregation mechanisms on the internet of things: a systematic literature review, Internet of Things, 15, 2021, 100427.
[4] S. Khan, P. A. Ferreira Lopes Martins, B. Sousa and V. Pereira, A comprehensive review on lightweight cryptographic mechanisms for industrial internet of things systems, ACM Computing Surveys, 58, 2026, 1-37.
[5] S. Yousefi, F. Derakhshan and H. Karimipour, Applications of big data analytics and machine learning in the internet of things, Handbook of Big Data Privacy, Cham: Springer International Publishing, 2020, 77-108.
[6] B. X. Chai, M. Gunaratne, M. Ravandi, J. Wang, T. Dharmawickrema, A. Di Pietro, J. Jin and D. Georgakopoulos, Smart industrial internet of things framework for composites manufacturing, Sensors, 24, 2024, 4852.
[7] X. Fernando and G. Lăzăroiu, Energy-efficient industrial internet of things in green 6G networks, Applied Sciences, 14, 2024, 8558.
[8] M. Adil, M. K. Khan, N. Kumar, M. Attique, A. Farouk, M. Guizani and Z. Jin, Healthcare internet of things: Security threats, challenges, and future research directions, IEEE Internet of Things Journal, 11, 2024, 19046-19069.
[9] M. Soori, F. K. G. Jough, R. Dastres and B. Arezoo, Blockchains for Industrial internet of things in sustainable supply chain management of industry 4.0: A review, Sustainable Manufacturing and Service Economics, 3, 2024, 100026.
[10] S. Najjar-Ghabel, S. Yousefi and H. Karimipour, Blockchain applications in the industrial internet of things, AI-Enabled Threat Detection and Security Analysis for Industrial IoT, Cham: Springer International Publishing, 2021, 41-76.
[11] V. Demertzi, S. Demertzis and K. Demertzis, An overview of privacy dimensions on the industrial internet of things (IIoT), Algorithms, 16, 2023, 378.
[12] S. Yousefi, F. Derakhshan, H. S. Aghdasi and H. Karimipour, An energy-efficient artificial bee colony-based clustering in the internet of things, Computers & Electrical Engineering, 86, 2020, 106733.
[13] A. Adel, The convergence of intelligent tutoring, robotics, and IoT in smart education for the transition from industry 4.0 to 5.0, Smart Cities, 7, 2024, 325-369.
[14] S. Yousefi, F. Derakhshan, H. Karimipour and H. S. Aghdasi, An Efficient route planning model for mobile agents on the internet of things using Markov decision process, Ad Hoc Networks, 98, 2020, 102053.
[15] C. Qiu, H. Shen and K. Chen, An energy-efficient and distributed cooperation mechanism for coverage hole detection and healing in wireless sensor networks, IEEE Transactions on Mobile Computing, 17, 2018, 1247-1259.
[16] C. -F. Cheng, Y. -C. Dong, M. -H. Hsu and H. -Y. Chang, The carrier-based sensor deployment problem in industrial internet of things with mesh topologies, IEEE Internet of Things Journal, 11, 2024, 41137-41150.
[17] F. Medina, H. Ruiz, J. Espíndola and E. Avendaño, Deploying industrial internet of things systems for long-term planning in underground mining: A focus on the monitoring of explosive atmospheres, Applied Sciences, 14, 2024, 1116.
[18] A. Chai, L. Wang, C. Guo, M. Li, W. Yin and Z. Fang, AS-MPCA: An adaptive scheduling algorithm for industrial internet of things based on multi-population co-evolution, Internet of Things, 31, 2025, 101596.
[19] S. Ghorpade, M. Zennaro and B. Chaudhari, Survey of localization for internet of things nodes: Approaches, challenges and open issues, Future Internet, 13, 2021, 210.
[20] M. Sadeghi Ghahroudi, A. Shahrabi, S. M. Ghoreyshi and F. A. Alfouzan, Distributed node deployment algorithms in mobile wireless sensor networks: survey and challenges, ACM Transactions on Sensor Networks, 19, 2023, 1-26.
[21] M. Almasabi, A. B. Alkhodre, M. Khemakhem, F. Eassa, A. A. Abi Sen and A. Harbaoui, Internet of things-based anomaly detection hybrid framework simulation integration of deep learning and blockchain, Information, 16, 2025, 406.
[22] M. Adawy, O. Almomani, M. Tahboush and A. Althunibat, Integrated boolean sensing and event radius model on data aggregation in wireless sensor networks, Proceedings of the 2023 International Conference on Information Technology, Amman, Jordan, 2023, 613-619.
[23] S. Molaei, H. Moazen, S. Najjar-Ghabel and L. Farzinvash, Particle swarm optimization with an enhanced learning strategy and crossover operator, Knowledge-Based Systems, 215, 2021, 106768.
[24] T. Kaur, J. Singh and M. Singh, Optimization-driven localization in wireless sensor networks: A comprehensive review of single and hybrid metaheuristic approaches, International Journal of Communication Systems, 38, 2025.
[25] F. Kiani, A multi-objective metaheuristic method for node placement in dynamic internet of things environments, Discover Internet of Things, 5, 2025, 60.
[26] S. Mirjalili, The ant lion optimizer, Advances in Engineering Software, 83, 2015, 80-98.
[27] D. Karaboga, An Idea Based on Honey Bee Swarm for Numerical Optimization, Ph.D. Dissertation, Erciyes University, Kayseri, Turkey, 2005.
[28] J. Kennedy and R. Eberhart, Particle swarm optimization, Proceedings of the International Conference on Neural Networks, Perth, Australia, 1995, 1942-1948.
[29] S. Mirjalili, Genetic algorithm, Evolutionary Algorithms and Neural Networks, Cham: Springer, 2019, 43-55.
[30] H. Eskandar, A. Sadollah, A. Bahreininejad and M. Hamdi, Water cycle algorithm - Aanovel metaheuristic optimization method for solving constrained engineering optimization problems, Computers & Structures, 110-111, 2012, 151-166.
[31] X. -S. Yang, A new metaheuristic bat-inspired algorithm, Nature-Inspired Metaheuristic Algorithms, Springer, 2010, 65-74.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Samad Najjar-Ghabel, Shamim Yousefi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:Authors hold and retain copyright, and grant the journal right of first publication, with the work after publication simultaneously licensed under a Creative Commons Attribution 4.0 License CC BY that permits any use, reproduction and distribution of the work and article without further permission provided that the original work is properly cited.
Authors are permitted and encouraged to post their work online in institutional repositories, website and other social media before and after publication, as it can lead to productive exchanges, as well as earlier and greater citation of published work.





