DOI QR코드

DOI QR Code

WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks

  • Perumal, P.Shunmuga (Ramanujan Computing Centre, Anna University) ;
  • Uthariaraj, V.Rhymend (Ramanujan Computing Centre, Anna University) ;
  • Christo, V.R.Elgin (Ramanujan Computing Centre, Anna University)
  • Received : 2014.08.11
  • Accepted : 2014.12.26
  • Published : 2015.03.31

Abstract

Wireless Sensor Networks (WSNs) are widely used in geographically isolated applications like military border area monitoring, battle field surveillance, forest fire detection systems, etc. Uninterrupted power supply is not possible in isolated locations and hence sensor nodes live on their own battery power. Localization of sensor nodes in isolated locations is important to identify the location of event for further actions. Existing localization algorithms consume more energy at sensor nodes for computation and communication thereby reduce the lifetime of entire WSNs. Existing approaches also suffer with less localization coverage and localization accuracy. The objective of the proposed work is to increase the lifetime of WSNs while increasing the localization coverage and localization accuracy. A novel intelligent unmanned aerial vehicle anchor node (IUAN) is proposed to reduce the communication cost at sensor nodes during localization. Further, the localization computation cost is reduced at each sensor node by the proposed intelligent arc selection (IAS) algorithm. IUANs construct the location-distance messages (LDMs) for sensor nodes deployed in isolated locations and reach the Control Station (CS). Further, the CS aggregates the LDMs from different IUANs and computes the position of sensor nodes using IAS algorithm. The life time of WSN is analyzed in this paper to prove the efficiency of the proposed localization approach. The proposed localization approach considerably extends the lifetime of WSNs, localization coverage and localization accuracy in isolated environments.

Keywords

1. Introduction

Wireless sensor networks are used in many geographically isolated applications like natural disaster management systems, military applications, forest fire detection systems, deep ocean navigations, industrial automations, elder people health care systems, smart home automation applications, etc. Akyildiz.etl [1] explain the applications of sensor networks, factors influencing the design of sensor networks, architecture of sensor network communications and the sensor network protocol stack in detail. Ramesh [2] explored the design, development and deployment of a wireless sensor network for landslide detection with the capability of providing real time data via the internet and issuing warnings ahead of time using the innovative warning system.

Yick.etl [3] explain the types of sensor networks, operating systems and platforms, WSN standards, data storage methods, network services required to co-ordinate the power management, task distribution, and resource usage, data compression, data aggregation, security mechanisms in WSNs. WSN is a collection of sensor nodes and energy lack of a single sensor node causes severe impacts. Sensor node’s battery energy is consumed in active mode, idle mode and sleep modes as explored by Perumal.etl [4]. The Fig. 1 shows the various energy consuming modes of a sensor node.

Fig. 1.Energy consuming modes of a sensor node

Anastasi.etl [5] discusses the mobility based energy conservation schemes using mobile sink based and mobile relay based approaches. Aguiar.etl [6] proposed an integer programming model for optimizing energy consumption. The importance of energy conservation in WSNs is explained by Heinzelman.etl [7]. The process of estimating the physical location of sensor nodes is localization and it is very important as the sensed data becomes meaningless without the location of the event. The detailed classification of the localization algorithms is explained by Han.etl [8]. Pal [9] explains about the centralized and distributed localization schemes in detail. Existing localization algorithms consume more energy by heavy computation and communication overheads thereby dry the sensor node’s battery quickly. Ssu.etl [10] proposed a range free localization scheme using mobile anchor points equipped with the GPS that broadcasts its current location periodically to the sensor nodes, where sensor nodes compute their location using the data received from the mobile anchors. Ou & Ssu [11] proposed a range free localization scheme, that uses the location beacon messages transmitted by the flying anchor nodes. In this method, each sensor node is need to calculate their location with the help of the radio beacons received. Sheu.etl [12] proposed a localization scheme, which involves inter-sensor communication including sample selection phase, neighbour constraint exchange phase and refinement phase.

Xiao.etl in [13] proposed a localization scheme which involves anchor classification phase, distance estimation phase using different anchor distance estimator and location estimation phase. Ou [14] proposed a localization scheme with beacon scheduling, which forces each sensor node to execute the complex geometrical calculations to determine their locations. Mobile anchor node based position scheme is explained by Liao.etl [15] insists the inter-sensor communication, which causes unnecessary delay, data loss and high energy consumption. Johansson.etl [16] proposed a centralized spring based localization algorithm for large scale wireless sensor networks to reduce the computation cost at sensor nodes. This approach increases the communication overhead due to inter-sensor communication during localization. Bin.etl [17] proposed an improved weighted centroid localization algorithm to improve the location accuracy with minimum energy consumption. Arkin.etl [18] proposed an approach for the base station positioning to transmit the sensor data in an energy efficient way with low duty cycling and minimum end to end delay to maximize the sensor network lifetime. Carli.etl [19] proposed a new approach to tackle the routing and localization problems together for reducing the network signalling communication as maximum as possible which reduces power consumption in wireless sensor networks.

From the review of existing localization approaches, we observed that high communication and computation overhead at sensor nodes reduce the overall lifetime of WSNs. Any approach in WSNs must conserve the battery energy of the sensor nodes. We propose an IUAN approach with intelligent arc selection based localization algorithm to conserve energy in each sensor node to extend the life time of sensor networks deployed in geographically isolated location. The section 2 explains the IUAN assisted LDM construction approach. IAS algorithm for sensor node location computation is explained in section 3. Section 4 gives the simulation results and WSN lifetime analysis. Section 5 gives the conclusion.

 

2. Intelligent UAV Anchor Node (IUAN) Design and LDM Construction Approach

In the proposed work, unmanned aerial vehicles (UAVs) are used as IUANs by integrating the intelligence systems. The IUAN has its own energy to both fly and broadcast the beacon packets over the geographically isolated locations. Guerrero.etl [20] proposed an approach, where UAVs are used to carry self-positioning device and transmitter to localize the sensor nodes. Yadav.etl [21] explained about the localization method using global positioning system (GPS) enabled flying anchor nodes. Vincent.etl [22] employs the UAVs to distribute the energy burden across the WSNs. Our main idea is to construct the relevant location and distance data from the sensor nodes and compute their locations in the CS. In our approach, UAVs are utilized as flying anchor nodes and referred as intelligent UAV anchor nodes (IUANs). The novel design of the proposed IUAN is shown in the Fig. 2.

Fig. 2.Architecture of the proposed IUAN

A The IUAN contains IUAN Control Unit (ICU), sensor ID database (DBSID), visitor queue (VQ), signal strength-distance database (DBSSD), IUAN location database (DBILOC) and location-distance database (DBLD). The ICU controls the overall operation of the IUAN like receiving sensor id message (SID) from sensor nodes, activating GPS receivers, communication with CS, guiding the IUAN in an optimistic trajectory. When an IUAN enters into the transmission range of a sensor node, the sensor node transmits its SID to that IUAN and the ICU executes the sequence of processes to construct the location-distance message (LD message). IUAN receives the SIDs from sensor nodes and stores the SIDs along with their signal strength (SSSID) and corresponding time of reception TORSID in the VQ as shown in Fig. 3.

Fig. 3.Visitor Queue (VQ) Organization

TORSID is the time at which the IUAN receives the SID. Whenever, the IUAN receives the SID (at TORSID), it stores the SID, its own location (LOCIUAN) along with TORIUAN to the DBILOC where TORIUAN = TORSID. The Table 1 gives the structure of the DBILOC.

Table 1.Structure of the IUAN location database (DBILOC)

The proposed approach needs at least three Location-Distance Messages to compute the location of a sensor node. The IUAN moves continuously and collects the SIDs from sensor nodes deployed in the field. The Table 1 shows three different locations {(x1,y1), (x2,y2), (x3,y3)} of a single IUAN at three different time instants T1, T2 and T3 within the transmission range of a sensor node (say SID1). As the three different locations are observed within the transmission range of the same sensor node SID1 at different time instants, the Table 1 has different time instants T1, T2 and T3 with different locations {(x1,y1), (x2,y2), (x3,y3)} for same SID1.

The IUAN authenticates the SIDs in the VQ using the DBSID as DBSID contains valid sensor id numbers. The invalid SIDs are ignored and LD messages are constructed for only the valid sensor nodes. In our approach, the DBSID contains the identity of all valid sensor nodes deployed by the application user. Here SID1 is a valid SID for the sensor node (say SN-1). Each SID is identified by the predefined secret code (equivalent to password). For example, SID1 is interpreted as 1043. When an IUAN receives SID1 message from SN-1, it immediately extracts the secret code (1043), determines the signal strength and stores these details in the visitor queue along with the time of reception (TORSID). Then the IUAN control unit compares the secret code with the DBSID. As this secret code is matched with the database, then the IUAN understands that this SID1 belongs to valid group. Otherwise this will be ignored and removed from the visitor queue. The secret codes other than stored in the DBSID are considered as invalid SIDs.

The DBSSD is used to withstand with radio irregularity. The signal strength at the locations around the transmission range of a sensor node varies with the distance and environmental effects. The path loss effect causes the radio signal to attenuate variously in different directions. The proposed work assumes the radio irregularity model (RIM) given by Zhou.etl [23]. The Table 2 shows the structure of the DBSSD, where the sample values of the signal strengths (SS) at the receiver at 3.048 m away from the mica2 mote are measured by the series of radio beacon transmissions in four directions. The signal strength around each sensor node is calculated based on the signal strength-distance relation using RSSI measurements with the knowledge of degree of irregularity (DOI). For a valid SID, an IUAN fetches the distance (D) between itself and the a sensor node using the corresponding SSSID. In our approach, the computation cost for the signal strength and distance measurements are shifted from the sensor nodes to the powerful IUAN to conserve the energy at each sensor node. During the validation of SID and distance fetching process, the IUAN moves to different locations. Hence after fetching the distance, the IUAN fetches the corresponding location information (LOCIUAN) at which it received the SID, using the TORIUAN and TORSID.

Table 2.RSSI value and distance of signal strength-distance database (DBSSD)

This mechanism ensures the construction of valid location and distance information. The IUAN constructs the LD message (LDM) and stores in the DBLD database, where each LDM contains the location (L), distance (D) and the corresponding SID. The Table 3 shows the list of symbols used in the LDM construction Algorithm 1 and corresponding flow diagram is shown in Fig. 4.

Fig. 4.Flow diagram of the LD message construction algorithm

Table 3.List of symbols used in LD message construction algorithm

Algorithm 1: LDM Construction

Input: SID from Sensor Node

Output: LD Message (LDM)

1: Begin

2: Interrupt Process 1: Whenever SIDi is received from sensor node

3: measure SSSIDi

4: VQ ← enqueue (SIDi, SSSIDi, TORSIDi)

5: DBGLOC ← insert(LOCIUAN, SIDi, TORIUAN=TORSIDi)

6: end Interrupt Process 1

7: while(VQ != NULL)

8: if SIDi∉DBSID then

9: VQ← dequeue (SIDi, SSSIDi, TORSIDi)

10: else

11: D ←select D from DBSSD where SS=SSSIDi

12: L ←select LOCIUAN from DBILOC where TORIUAN = TORSIDi

13: LDM.x ← LOCIUAN.x

14: LDM.y ←LOCIUAN.y

15: LDM.d ←D

16: LDM.id ←SIDi

17: LDM ←ConstructLDMPacket (LDM.x, LDM.y, LDM.d, LDM.id)

18: insert LDM into DBLD

19: VQ←dequeue (SIDi, SSSIDi, TORSIDi)

20: delete LOCIUAN, SIDi, TORIUAN from DBILOC where TORIUAN=TORSIDi and SID = SIDi

21: end if

22: end while

23: End

After constructing the LDM, the ICU removes the corresponding entries from the VQ and DBILOC to manage the storage efficiency. The CS aggregates DBLD database of all IUANs and selects the sufficient LDMs to calculate the locations of the sensor nodes.

 

3. Intelligent Arc Selection (IAS) based Localization Algorithm

For the state-of-art, we propose a novel approach to completely remove the computation cost from individual sensor nodes during localization process with minimum communication overhead. Our approach computes the location of each sensor node in CS, where the computing and communication resources are not constraint. The proposed localization algorithm aggregates the LDM from different IUANs and computes the location of a sensor node with three relevant LD messages. Each LD message contains the LOCIUAN and the distance between the LOCIUAN and the corresponding sensor node’s location (LOCS). The proposed algorithm is an optimum version of the trilateration method. Our algorithm selects the boundary points and arc angles to construct the intelligent arc segments, where the intersection of these arcs gives the location of the sensor node. The algorithm starts with three LD message inputs, where these messages are constructed within the range of a sensor node as shown in the Fig. 5. The proposed algorithm has 6 phases.

Fig. 5.Three LDMs constrcued within the range of a sensor node

In phase 1, the LD messages are processed to extract the IUANCentres{C1,C2,C3} and the corresponding IUANDistances{r1,r2,r3}, where rI is the distance between IUAN centre Ci and the sensor node. In phase 2, the boundary points (BPoints) around each IUANCentre are calculated using the 2D translation as shown in the Fig. 6. All BPoints and IUANCentres contain the associated ‘x’ and ‘y’ co-ordinate values and based on these both the IUANCentres and BPoints are classified as the ‘x’ axis centre points (XCPoints), ‘x’ axis boundary points (XBPoints), ‘y’ axis centre points (YCPoints), ‘y’ axis boundary points (YBPoints). Each IUANCentre has four associated bounday points. Eg: {P1,P2,P3,P4}is the set of boundary points around the IUAN centre (C1). A complete circle around this centre can be constructed using these 4 boundary points and the corresponding distance/radius r1. Similarly, three circles can be constructed around the three centres. The intersection of these three circles gives the location of the sensor as these locations and distances are constructed within the range of the sensor node. This method is referred as trilateration. Our approach optimizes the trilateration method by constructing the intelligent arcs using the intelligent boundary points, instead of considering the complete circles, which reduces the computation cost significantly in the localization process of the large volume of sensor nodes.

Fig. 6.Computation of boundary points

Phase 3 selects the intelligent boundary points on ‘x’ axis and ‘y’ axis, which contribute to the construction of the intelligent arcs and they are referred as IXBPoints and IYBPoints respectively. Among the 6 boundary points {P2,P4,Q2,Q4,R2,R4} on ‘x’ axis, only 3 points contribute to the intelligent arcs. Similarly among the 6 boundary points {P1,P3,Q1,Q3,R1,R3}on ‘y’, only three points contribute to the intelligent arcs. The XCPoints and XBPoints are grouped as Points1 and Points2 respectively. The intelligent points IXBPoints are selected from Points2, where XCPoints lies between the range of first and last XCPoints in the Points2. This selection decision is taken based on the fact that, the boundary points lies out of this range are not contributing to the intelligent arcs. Similarly IYBPoints are selected. The Fig. 7 shows the intelligent boundary points IXBPoints and IYBPoints selected in phase 3.

Fig. 7.Selection of intelligent boundary points

Definition of an arc: An arc can be constructed with a centre point C(x,y) and radius (r). The points on the arc is defined as the set of points P(h,k) using the parametric equations (1) and (2), ∀ Ɵ, Ɵ1≤ Ɵ≤ Ɵ2 where 0 ≤ Ɵ1≤ 2π and Ɵ1< Ɵ2< (Ɵ1+2π). The point P1(x1,y1) with Ɵ = Ɵ1 is called the start point of the arc, and the point P2(x2,y2) with Ɵ = Ɵ2 is called the end point of the arc.

After selecting the intelligent boundary points, phase 4 identifies the starting and ending angles of each intelligent arc. The sensor node is positioned, where the three intelligent arcs intersect. So any two arbitrary arcs can be constructed, as the intersection of any two intelligent arcs gives the sensor node’s location. Phase 5 constructs any two arbitrary intelligent arcs using the parametric Equations (1) and (2). Phase 6 compares the points on the arbitrarily selected (two) intelligent arcs and identifies the common point, i.e. the intersection of the two arcs. This common point is the location of the sensor node S (LOCs.x, LOCs.y) as shown in the Fig. 8a and Fig. 8b. The Algorithm 2 explains the mathematical logic behind the proposed intelligent arc selection based centralized localization algorithm.

Algorithm 2: Intelligent Arc Selection based Centralized Localization Algotithm

Input: LDM1, LDM2, LDM3, where LDM1.id= LDM2.id= LDM3.id

Output: Sensor Node’s Location S (LOCS.x, LOCS.y)

Begin

End

Phase 1: Extracting Location Distance (LD) Messages

1: Procedure ExtractLDMessage

2: C(1).x ←LDM1.x

3: C(1).y ←LDM1.y

4: C(2).x ←LDM2.x

5: C(2).y ←LDM2.y

6: C(3).x ←LDM3.x

7: C(3).y ←LDM3.y

8: r1 ←LDM1.d

9: r2 ←LDM2.d

10: r3 ←LDM3.d

11: IUANCentres ←{C(1).x , C(1).y, C(2).x , C(2).y, C(3).x , C(3).y}

12: IUANDistances ←{r1, r2, r3}

13: return (IUANCentres, IUANDistances)

14: End

Phase 2: Computation of Boundary Points

1: Procedure BPoints (IUANCentres, IUANDistances)

2: B(i).x ← C(j).x; where B ∀ P, Q, R; i=1,3; j=1,2,3;

3: B(i).y ← C(j).y; where B ∀ P, Q, R; i=2,4; j=1,2,3;

4: B(i).x ← C(j).x - rk; where B ∀ P, Q, R; i=2; j=1,2,3; k=1,2,3;

5: B(i).x ← C(j).x + rk; where B ∀ P, Q, R; i=4; j=1,2,3; k=1,2,3;

6: B(i).y ← C(j).y + rk; where B ∀ P, Q, R; i=1; j=1,2,3; k=1,2,3;

7: B(i).y ← C(j).y - rk; where B ∀ P, Q, R; i=3; j=1,2,3; k=1,2,3;

8: XCPoints ← {C(1).x, C(2).x, C(3).x}

9: YCPoints ← {C(1).y, C(2).y, C(3).y}

10: XBPoints ← {P(2).x, P(4).x, Q(2).x, Q(4).x, R(2).x, R(4).x}

11: YBPoints ← {P(1).y, P(3).y, Q(1).y, Q(3).y, R(1).y, R(3).y}

12: return (XCPoints, XBPoints, YCPoints, YBPoints)

13: End

Phase 3: Selecting Intelligent Boundary Points on ‘X’ and ‘Y’ axis

1: Procedure IXBPoints (XCPoints, XBPoints)

2: Points1 ←{C(1).x , C(2).x , C(3).x, P(2).x , P(4).x , Q(2).x, Q(4).x , R(2).x, R(4).x}

3: Points2 ←Sort (Points1), where C(i).x < C(j).x < C(k).x; ∀ i,j,k = 1,2,3; i ≠ j ≠ k

4: IXBPoints ⊂ Points2, where C(i).x < {IXBPoints} < C(k).x

5: IXBPoints ←{P(m).x , Q(n).x , R(o).x}, wher m,n,o are either 2 or 4

6: return (IXBPoints)

7: End

8: Procedure IYBPoints (YCPoints, YBPoints)

9: Points1 ←{C(1).y , C(2).y , C(3).y, P(1).y , P(3).y , Q(1).y, Q(3).y , R(1).y, R(3).y}

10: Points2 ←Sort (Points1), where C(i).y < C(j).y < C(k).y; ∀ i,j,k = 1,2,3; i ≠ j ≠ k

11: IYBPoints ⊂ Points2, where C(i).y < {IYBPoints} < C(k).y

12: IYBPoints ←{P(m).y , Q(n).y , R(o).y}, wher m,n,o are either 1 or 3

13: return (IYBPoints)

14: End

Phase 4:

1: Procedure Start_End_ArcAngles (IXBPoints, IYBPoints)

2: if P(m).y = P(1).y then Ɵ1 ←π/2

3: else Ɵ1 ←3π/2

4: end if

5: if P(m).x = P(4).x then Ɵ2 ←0π

6: else Ɵ2 ←π

7: end if

8: if Q(m).y = Q(1).y then Ɵ3 ←π/2

9: else Ɵ3 ←3π/2

10: end if

11: if Q(m).x = Q(4).x then Ɵ4 ←0π

12: else Ɵ4 ←π

13: end if

14: return (Ɵ1, Ɵ2, Ɵ3,Ɵ4)

15: End

Phase 5

1: Procedure Arc_Segments (XCPoints, YCPoints, St_End_Angles, IUANDistances)

2: A1(i).x ←C(1).x+r1.cos (Ɵ), where Ɵ1 ≤ Ɵi ≤Ɵ2 ∀ i=1,2,…n

3: A1(i).y ←C(1).y+r1.sin (Ɵ), where Ɵ1 ≤ Ɵi ≤Ɵ2 ∀ i=1,2,…n

4: A2(j).x ←C(2).x+r2.cos (Ɵ), where Ɵ3 ≤ Ɵj ≤Ɵ4 ∀ j=1,2,…n

5: A2(j).y ←C(2).y+r2.sin (Ɵ), where Ɵ3 ≤ Ɵj ≤Ɵ4 ∀ j=1,2,…n

6: A1 ←{(A1(i).x, A1(i).y) ∀ i=1,2,…n }: set of points on arc A1

7: A2 ←{(A2(j).x, A2(j).y) ∀ j=1,2,…n }: set of points on arc A2

8: return (A1, A2)

9: End

Phase 6

1: Procedure Sensor_Location (A1, A2)

2: Compare {(A1(1).x, A1(1).y), ... (A1(n).x, A1(n).y)} and {{(A2(1).x, A2(1).y), ... (A2(n).x, A2(n).y)}

3: if ((A1(i).x, A1(i).y) = (A2(j).x, A2(j).y)) then

4: LOCs.x ←A1(i).x

5: LOCs.y ←A1(i).y

6: end if

7: return S(LOCs.x, LOCs.y)

8: End

The control station stores the location of sensor nodes in the sensor position database (DBSP) along with the SID. This database is used to identify the location of event as each sensor node sends the sensed information along with their identification.

 

4. Simulation Results and Analysis

The performance of the proposed IUAN assisted LDM construction approach and existing localization approaches [10,11,16,17] are evaluated by considering the parameters localization-communication cost and localization-coverage. The performance of the proposed localization approach and existing approaches are evaluated in a series of simulations using ns-2 simulator and compared. The Table 4 shows the list of parameters used in the simulation.

Table 4.Simulation parameters

4.1 Localization Communication Cost

An energy efficient localization algorithm shall not consume more communication cost at each sensor node to transmit and receive many beacons during localization period, since high communication cost reduces the lifetime of the sensor nodes and WSNs. The IUAN assisted LDM construction approach significantly reduces the localization-communication cost at each sensor node and its performance is compared with the existing localization approaches proposed by [10,11,16,17]. The simulation assumes of first order radio model, where 60nJ of energy is consumed for transmitting one bit and 50nJ of energy is consumed for receiving one bit as explained by Heinzelman.etl [7]. Each SID and acknowledgement packet has the size of 3 byte. Using the equations (3.4) and (3.5), it is calculated that each sensor node consumes 480nJ of energy for transmitting 3 byte of message and 400nJ of energy for receiving 3 byte of message. The simulation is performed with the number of sensor nodes ranging from 300 to 1500 and the corresponding localization-communication cost is tabulated in Table 5.

Table 5.Localization communication cost (Ecomm)

The values in the Table 5 clearly show that the proposed localization approach consumes less communication cost than the existing localization approaches. The proposed approach conserves an average of 3393x103nJ energy in localization communication cost than the existing approaches. This energy conservation is achieved by the proposed IUAN assisted LDM construction approach by reducing the communication overhead at each sensor node during localization. The pictorial representation of the localization-communication cost of proposed and existing localization approaches is shown in the Fig. 9.

Fig. 9.Localization communication cost

4.2 Localization Coverage

The trajectory of the IUAN significantly influences the localization coverage while it constructs the location-distance messages for unknown sensor nodes. The IUAN aims to construct at least three location-distance messages for each sensor node to calculate their location. The proposed LDM construction approach gives better localization coverage. In existing localization schemes, sensor nodes are insisted to receive many beacon messages from single flying anchor node to compute their location which is not possible always.

In the proposed approach even if a single IUAN is not able to receive three SIDs and construct three LDMs for a sensor node, another IUAN may receive the balance SIDs and construct the LDMs for that sensor node. This flexibility increases the localization coverage even with the minimum level of anchor guiding mechanisms, where the existing localization approaches need highly complex anchor guiding mechanisms to guide the flying anchor nodes in the efficient trajectory to localize maximum number of sensor nodes.

The localization coverage performance of the proposed LDM approach is compared with the localization algorithms proposed by [10,11,16,17]. The simulation is performed in ns-2 simulator by assuming the snake like walk model and random walk model. The Fig. 10 shows the scenario where three different IUANs receive SIDs from a single sensor node and construct LDMs using the proposed LDM approach.

Fig. 10.Three different IUANs constructing LDMs for a single sensor node

The proposed approach prevents the IUANs from receiving more than three SIDs from a single sensor node thereby conserves the localization-communication cost at each sensor node. The simulation is performed to observe the localization-coverage in the snake like walk model and random walk model, where 30, 60, 90, 120, 150 IUANS are used to interact with the sensor nodes ranging from 300, 600, 900, 1200 and 1500 respectively. The localization coverage results of the proposed and existing localization approaches in snake like walk model and random walk model are given in Table 6 and Table 7 respectively.

Table 6.Localization coverage in snake like walk model

Table 7.Localization coverage in random walk model

The simulation values in Table 6 and Table7 show that the proposed localization approach gives an average of 12.15%, 10.86% extra coverage than the existing approaches respectively.

4.3 Localization Computation Cost

The existing localization algorithms [10,11,17] insist each sensor node to execute computations to find their location, which consumes huge energy from sensor node battery. The centralized localization algorithm proposed by [16] calculates the location of the sensor nodes in anchor nodes. The proposed IAS based localization algorithm removes the localization-computation cost at individual sensor node. The proposed IAS based localization approach also reduces the energy consumption in the control station by minimizing the localization-computation cost. The proposed approach significantly conserves energy thereby increases the life time of the WSNs. The simulation assumes 2.25 nJ energy consumption for single multiplication operation. The Table 8 shows the localization-computation cost of the proposed localization approach and existing localization approaches

Table 8.Localization computation cost (Ecomp)

The tactice of selecting the intelligent arcs in the proposed IAS approach reduces the localization-computation cost and conserves energy than the exixting localization approaches. The pictorial representation of the localization-computaion cost of the proposed and existing localization approaches is shown in the Fig. 11. This clearly demosntrates that the proposed energy efficient localization approach consumes less localization-compuation cost than the existing localization approaches.

Fig. 11.Localization computation cost

4.4 Localization Accuracy

Location error is the measure of the distance between the estimated location and the actual location of the sensor node. The radio propagation patterns are not isotropic. Radio irregularity is caused primarily by the non-isotropic properties of the propagation media and the heterogeneity of the components. The irregular radio propagation patterns potentially interfere with the localization mechanisms thereby reduce the localization accuracy. The RIM model proposed by Zhou et al (2005) has been used in the proposed localization approach to estimate a realistic radio propagation pattern in a two dimensional plane and improve the localization accuracy.

The performance of the proposed localization scheme is evaluated and compared with the localization schemes proposed by [10,11,16,17]. The simulation of the localization accuracy is performed with 900 sensor nodes for radio ranges of 10 m, 15 m, 20 m, 25 m and 30 m. The Table 9 shows the average localization error obtained by both the proposed and existing localization approaches. The Fig. 12. shows the pictorial representation of average localization error with various transmission ranges for proposed and existing localization approaches.

Table 9.Average localization error (m) for 900 sensor nodes with various transmission ranges

Fig. 12.Average localization error versus radio range

From the graph shown in Fig. 12, it is observed that the proposed localization approach outperforms the existing localization approaches in terms of accuracy. The simulation results show that the proposed approach gives an average of 0.89 m accuracy than the existing approaches.

4.5 Analysis of WSNs Lifetime

One of the fundamental design challenges in designing a wireless sensor network is to maximize the network lifetime. Each sensor node of the network is equipped with a limited power battery. Once the sensor nodes are deployed, it is often infeasible or undesirable to recharge sensor nodes or replace their batteries with manual intervention. These physical constraints make energy as a crucial consideration to design a long life time sensor network.

The WSN lifetime is analyzed with the proposed and existing localization approaches and compared. In the proposed approach, IUANs are utilized to collect SIDs from sensor nodes and to construct LDMs. Each IUAN has own power to fly and communicate with sensor nodes. Whenever an IUAN need energy, it can recharge its battery backup in control station as explained by Perumal.etl [24]. Hence energy is not a scarce resource for IUAN and energy consumption of IUAN does not affect the WSNs lifetime. Hence the analysis is performed only for the wireless sensor network and the energy requirements of control station and IUANs are ignored. Each sensor node has 0.001J of initial energy. Each sensor node consumes 200x103nJ of average energy per day for usual tasks like sensing, executing security algorithms, routing process, etc. Both the proposed localization approach and [16] calculate the sensor node location at control station and anchor node respectively. Hence their localization-computation cost is not consumed at the sensor nodes. For the localization approaches [10], [11] and [17], the localization-computation cost is consumed at sensor nodes. The Table 10 shows the total energy consumption.

Table 10.Total energy consumption

From Table 10, it is observed that the proposed localization approach consumes less computation cost than the existing approaches. The proposed approach conserves an average of 435.38x103nJ energy in computation cost than the existing approaches. The lifetime of the WSNs depends on the sensor node’s remaining energy, which is the energy left over with sensor nodes after localization process. The Fig. 13 shows the lifetime of 1500 sensor nodes for the remaining energy.

Fig. 13.Life time of the WSN with 1500 sensor nodes for the remaining energy

The Fig. 13 clearly shows that both the proposed localization approach and [16] provides longer lifetime for the WSN than [10,11,17]. This performance is achieved as these two approaches calculate the location of sensor nodes in control station and anchor node. Further, the proposed energy efficient localization approach gives extra lifetime than [16] due to the IUAN assisted LDM construction approach and IAS based location computation.

 

5. Conclusion

A novel IUAN assisted localization approach is proposed to conserve the energy at each sensor node in geographically isolated applications. The proposed localization approach uses RIM model to withstand the radio irregularity nature for better location accuracy. The proposed IUAN assisted LDM construction approach conserves an average of 3393x103nJ energy in localization-communication cost than the existing localization approaches. The LDM construction approach also increases the localization-coverage. In snake like walk model, the proposed LDM construction approach gives an average of 12.15 % extra localization coverage than existing localization approaches. In random walk model, the proposed LDM construction approach gives an average of 10.86 % extra localization coverage than existing localization approaches.

The proposed intelligent arc selection approach removes the localization-computation overhead at each sensor node thereby the energy is conserved significantly at sensor nodes. The proposed energy efficient IAS localization approach conserves an average of 435.38x103nJ energy in localization-computation cost than the existing localization approaches. The proposed localization approach also increases the localization accuracy. For 900 sensor nodes with transmission ranges of 10 m, 15 m, 20 m, 25 m and 30 m, the proposed localization scheme gives an average of 0.89 m accuracy than the existing localization schemes. The analysis of WSN lifetime clearly shows that the IUAN assisted LDM construction and IAS based location computation of the proposed energy efficient localization approach significantly conserves energy at sensor nodes. The proposed approach prolongs the WSN lifetime by an average of 34 minutes than the existing localization approaches.

References

  1. Akyildiz.I.F., W.Su, Y.Sankarasubramaniam, and E.Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002. https://doi.org/10.1016/S1389-1286(01)00302-4
  2. Ramesh, MV 2014, "Design, Development, and Deployment of a Wireless Sensor Network for Detection of Land slides," Ad Hoc Networks, vol. 13, pp. 2-18, 2014. https://doi.org/10.1016/j.adhoc.2012.09.002
  3. J. Yick, B. Mukherjee, D. Ghosal, "Wireless sensor network survey," Computer Networks 52, Elsevier, pp. 2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
  4. S. Perumal, P, R. Uthariaraj, R & Ajay Khanna, A, "A survey on active mode energy consuming factors of sensor Nodes in WSN," International Journal of Electronics Communication and Computer Engineering (IJECCE), vol. 4, no. 1, pp. 1507-1510, 2013.
  5. Giuseppe Anastasi, Marco Conti, Mario Di Francesco, Andrea Passarella, "Energy conservation in wireless sensor networks: A survey," Ad Hoc Networks 7, Elsevier, pp. 537-568, 2009. https://doi.org/10.1016/j.adhoc.2008.06.003
  6. A. Barbosa de Aguiar, Alvaro de M. S. Neto, P. R. Pinheiro, Andre L. V. Coelho, "Applicability of a Novel Integer Programming Model for Wireless Sensor Networks," International Journal of Computer Science and Information Security, vol. 3, no. 1, 2009.
  7. W. Rabiner Heinzelman, A. Chandrakasan, and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," in Proc. of the 33rd Hawaii International Conference on System Sciences, 2000.
  8. G. Han, H. Xu, Trung Q. Duong, J. Jiang, and Takahiro Hara, "Localization algorithms of Wireless Sensor Networks: a survey," Telecommunication Systems, vol. 52, no. 4, pp. 2419-2436, 2013. https://doi.org/10.1007/s11235-011-9564-7
  9. A. Pal, "Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges," Network Protocols and Algorithms, vol. 2, no. 1, 2010.
  10. K. F. Ssu, C. H. Ou, and H. C. Jiau, "Localization with Mobile Anchor Points in Wireless Sensor Networks," IEEE Transactions on Vehicular Technology, vol. 54, no. 3, 2005.
  11. C. H. Ou, and K. Ssu, "Sensor position determination with flying anchor in three dimensional wireless sensor networks," IEEE Transactions on Mobile Computing, pp. 1084-1097, 2008.
  12. J. P Sheu, W. K. Hu, and J. C. Lin, "Distributed Localization Scheme for Mobile Sensor Networks," IEEE Transactions on Mobile Computing, vol. 9, no. 4, 2010.
  13. Q. Xiao, B. Xiao, J. Cao, and J. Wang, "Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme," IEEE Transactions On Mobile Computing, vol. 9, no. 11, 2010.
  14. C. H. Ou, "A Localization Scheme for Wireless Sensor Networks Using Mobile Anchors With Directional Antennas," IEEE Sensors Journal, vol. 11, no. 7, 2011.
  15. W.H. Liao, Y.-C. Lee, S.P. Kedia, "Mobile anchor positioning for wireless sensor networks," IET Communications, vol. 5, no. 7, pp. 914-921, 2011. https://doi.org/10.1049/iet-com.2010.0336
  16. A. Johansson, C. Roberg, U. Heinkel, "Centralized Spring-Based Localization Algorithm for Large Scale Wireless Sensor Networks," in Proc. of 9th International Multi-Conference on Systems, Signals and Devices, pp. 1-6, 2012.
  17. L. Bin, D. Zheng, N. Yu and L. Yun, "An Improved Weighted Centroid Localization Algorithm," International Journal of Future Generation Communication and Networking, vol.6, no.5, pp. 45-52, 2013. https://doi.org/10.14257/ijfgcn.2013.6.5.05
  18. Arkin, EM, Efrat, A, Mitchell, JSB, Polishchuk, V, Ramasubramanian, S,Sankararaman, S &Taheri, J, "Data Transmission and Base-Station Placement for Optimizing the Lifetime of Wireless Sensor Networks," Ad Hoc Networks, vol. 12, pp. 201-218, 2014. https://doi.org/10.1016/j.adhoc.2011.09.010
  19. M. Carli, S. Panzieri, F. Pascucci, "A Joint Routing and Localization Algorithm for Emergency Scenario," Ad Hoc Networks, vol. 13, pp. 19-33.
  20. E. Guerrero, Q. Gao, and H. G. Xiong, "Employing Unmanned Aerial Vehicles for Localization of Sensor Nodes in Wireless Sensor Networks," Journal of Networking Technology, vol. 1, no. 1, pp. 44-57, 2010.
  21. V. Yadav, M. Kumar Mishra, A. K. Sngh, and M. M. Gore, "Localization Scheme for Three Dimensional Wireless Sensor Networks Using GPS Enabled Mobile Sensor Nodes," International Journal of Next Generation Networks (IJNGN), vol. 1, no. 1, pp. 60-72, 2009.
  22. P. Vincent, M. Tummala, J. McEachen, "A new method for distributing power usage across a sensor network," Ad Hoc Networks 6, pp. 1258-1280, 2008. https://doi.org/10.1016/j.adhoc.2007.11.014
  23. G. Zhou, H. E. Tian, S. krishnamurthy and John A. Stankovic, "Models and Solutions for Radio Irregularity in Wireless Sensor Networks," ACM 0000-0000/2005/0000-0001, 2005.
  24. S. Perumal, P, R. Uthariaraj, V & Elgin Christo, "Novel steam powered gravity assisted standalone power system (SP-GA-SP System) design for remote wireless sensor networks," Advanced Materials Research, vol. 440, pp. 248-253, 2013.

Cited by

  1. Forest Environment Monitoring Application of Intelligence Embedded based on Wireless Sensor Networks vol.10, pp.4, 2015, https://doi.org/10.3837/tiis.2016.04.005
  2. Dynamic Adjustment Strategy of n-Epidemic Routing Protocol for Opportunistic Networks: A Learning Automata Approach vol.11, pp.4, 2015, https://doi.org/10.3837/tiis.2017.04.011
  3. A many-objective optimization WSN energy balance model vol.14, pp.2, 2015, https://doi.org/10.3837/tiis.2020.02.003