DOI QR코드

DOI QR Code

EBKCCA: A Novel Energy Balanced k-Coverage Control Algorithm Based on Probability Model in Wireless Sensor Networks

  • Sun, Zeyu (Department of Computer Engineering, Luoyang Institute of Science and Technology) ;
  • Zhang, Yongsheng (Department of Computer Engineering, Luoyang Institute of Science and Technology) ;
  • Xing, Xiaofei (School of Computer Science and Technology, Guangzhou University) ;
  • Song, Houbing (Department of Electrical and Computer Engineering, West Virginia University) ;
  • Wang, Huihui (Department of Engineering, Jacksonville University) ;
  • Cao, Yangjie (School of Software Technology, Zhengzhou University)
  • Received : 2015.12.26
  • Accepted : 2016.06.17
  • Published : 2016.08.31

Abstract

In the process of k-coverage of the target node, there will be a lot of data redundancy forcing the phenomenon of congestion which reduces network communication capability and coverage, and accelerates network energy consumption. Therefore, this paper proposes a novel energy balanced k-coverage control algorithm based on probability model (EBKCCA). The algorithm constructs the coverage network model by using the positional relationship between the nodes. By analyzing the network model, the coverage expected value of nodes and the minimum number of nodes in the monitoring area are given. In terms of energy consumption, this paper gives the proportion of energy conversion functions between working nodes and neighboring nodes. By using the function proportional to schedule low energy nodes, we achieve the energy balance of the whole network and optimizing network resources. The last simulation experiments indicate that this algorithm can not only improve the quality of network coverage, but also completely inhibit the rapid energy consumption of node, and extend the network lifetime.

Keywords

1. Introduction

Wireless sensor network [1-4] is a new type of network architecture, which is formed by thousands of sensor nodes [5,6]. Each node has the abilities of sensing, computing, communicating and storage [7,8]; the characteristic of behavior is that the data acquisition and communication transmission is completed by multi hop method in the physical word. The physical world and information world are organically integrated [9-11], which realizes data acquisition, data storage, data computing and communication transmission link network service system [12,13].

Coverage quality and energy consumption are two important index of evaluating system performance of wireless sensor networks. Coverage quality is directly reflected in the deployment of the monitoring area nodes [14-16]. Network lifetime directly affects the quality of the entire network service, which is mainly reflected in the deployment of the energy consumption of nodes. In general, by topography,environmental factors and many other constraints, on the deployment node mode selection is a random pattern. Random deployment process, due to the unpredictable node location information in advance, would make a monitoring node in the midst of multiple covers, namely k-coverage, in the case of military battlefield, as shown in Fig. 1. Another case, due to the randomness, it is possible to make a monitoring area in the blind area. In order to achieve complete coverage, more nodes can only be added to achieve the coverage. Although the above two conditions can achieve complete coverage of the target in a certain extent, there are still some shortcomings. First, because of k-coverage exists, in the process of collecting and calculating data and the data in the process of communication, it is necessary to produce a large amount of redundant data, which will lead to large error and uncertainty. Second, the real meaning of the cover is not the entire monitoring area completely covered, but the target node of a certain are completely covered; without considering the presence of the target node, In the process of the complete coverage of the whole monitoring area, it will consume a lot of energy, and accelerated the speed of the collapse of the whole network system. Third, deployment nodes, due to the randomness, will inevitably lead to a covered area node density is too large, bottlenecks, and will eventually generate information redundancy in the channel, but also reduce the network expansibility.

Fig. 1.Multi-objective coverage topology

Aiming at the shortage of the above, we proposed a novel energy balanced k-coverage control algorithm based on probability model. In this paper, the coverage probability and covering expectations of sensor nodes are solved by using the sector domains of the coverage area when the moving target node is passing through the monitoring area; in the energy, this paper gives the solution of multi point transmission and single point transmission. for the working of sensor nodes, under meet certain coverage, when the moving target node crosses the k-coverage area and the energy of a sensor node is within the threshold value or above the threshold limit, the node is placed in the sleep state by the sensor node adaptive transformation mechanism, and other sensor nodes use the node energy scheduling mechanism to complete the conversion of the energy of the sensor nodes to improve the network lifetime.

 

2. Related Work

In recent years, many domestic and foreign experts have done a lot of detailed and in-depth research on the various characteristics of the wireless sensor network. A method of preserving connected covering algorithm is put forward in [17],which is based on the relative adjacency graph and the node's own deployment characteristics, and gives the network connectivity and coverage in the mobile deployment of sensor nodes. The topology structure of the sensor nodes in any mobile direction is maintained by the network connectivity, and the coverage of the moving target node is mainly determined by the constraints of network connectivity. Although the algorithm can keep the connectivity of the network to a certain extent, it is mainly reflected in the locality. For global, when the target node is accumulated to a certain number, the coverage probability will show a clear declining trend, the algorithm has some limitations. A configuration protocol of centralized cluster k-coverage is proposed in [18], which is analyzed by using the constructed network model of coverage protocol. It is proved that when k is larger than or equal to 3 and coverage of the network model formed the sensing radius r, at least k sensor nodes; the relationship between the communication radius and the sensing radius is given, and the calculation formula of the minimum number of sensor nodes in the coverage and the density of the sensor nodes in the monitoring area are also given at the same time. Although the results of the study can achieve the effective coverage of the target nodes in the monitoring area with the least sensor nodes, the algorithm complexity is high, and the deployment of sensor nodes is very rigor. Paper [19] proposed network lifetime maximize of k discrete obstacles coverage algorithm. The algorithm analyzes the conditions of the upper bound and the lower limit of coverage probability of the network model, and completes the effective coverage of the mobile target node; in the energy, a sensor node scheduling algorithm is proposed, which is based on the greedy algorithm for sensor nodes. The state transition is achieved by using the scheduling mechanism of sensor nodes; ultimately achieve the purpose of maximizing the network lifetime. In this paper, the sensor nodes in the monitoring area are always kept connected or intersect when the moving target nodes are covered. Once the mobile target node appears in blind area, it can not complete the effective coverage of the mobile target node; the network model is too idealistic. Paper [20] Gives a heuristic algorithm by mixed integer programming approach, which is a heuristic coverage for the sensing radius of the sensor nodes. It has great computational quantity and poor adjustability. In order to improve the algorithm of [20], Yang S H [21] will the target node coverage area as the monitoring area, and use the high density deployment sensor nodes to complete the connected coverage of the target coverage area. On the basis of the above two documents, Liu H [22] has done a lot of research work on target coverage problem. When a sensor node can only cover a target node, the solution process of the target node coverage probability is given. But the coverage of the monitoring area is narrow, which is not suitable for the actual coverage. The problem of sensor node scheduling is optimized by using artificial bee colony algorithm and particle swarm algorithm in [23]. Through the heuristic scheduling configuration, the optimal deployment path is found out, and the calculation method of the upper bound of network lifetime is given. An energy-efficient coverage and connectivity preserving routing algorithm is proposed in [23], which uses the network model to construct a double coverage area, and calculates the coverage probability and the coverage expected value by the probability related knowledge. Finally, the upper bound of the coverage expected value and the minimum number of sensor nodes are determined. Paper [23,24] can effectively cover the monitoring area in a certain degree, which can suppress the energy consumption of sensor nodes, but the calculation of the two algorithms is relatively high, and the coverage time of the monitoring area is longer.

Based on the probability model as the research background, this paper proposes the calculation method of the coverage expected value, and gives the proof of the probability relationship between the sensor nodes. Meanwhile, it also gives the proof of the coverage expected value of sensor node's energy consumption. In the energy, the energy scheduling strategy is introduced to optimize the communication path between nodes. Its purpose is to reduce the unnecessary network connectivity between nodes, to improve the entire network work time, and then to achieve the purpose of prolonging the network lifetime. Finally, the effectiveness and stability of the EBKCCA algorithm are verified by simulation experiments.

 

3. Network Model and Coverage Quality

In order to study the coverage problem of wireless sensor networks, the EBKCCA algorithm is based on the following four assumptions [25]:

3.1 Basic Definition

Definition 1(complete coverage): In the monitoring region, all the target nodes are at least covered by a sensor node, namely: Euclidean distant is less than perception radius between sensor nodes and target nodes, d(i,t)≤Rs, it is called the complete coverage; sensor nodes that satisfy the condition are called the cover set.

Definition 2(k-coverage): In the monitoring region, any target node is covered by at least k sensor nodes, which is called the k-coverage of the target node; the monitoring region is called k-coverage area.

Definition 3(coverage quality): In the monitoring region, the ratio that the sensing area of all the sensor nodes and the monitoring area are called the coverage quality. To some extent, it reflects the degree of coverage of the target node.

Definition 4(Multi-level coverage): probability, that any target node is covered by at least one sensor node, is p; when the target node is covered by multiple sensor nodes, the coverage probability is:

pn is a multi-level coverage probability; p is the coverage of any sensor node; n is the number of sensor nodes.

3.2 Network Model

From the coverage angle of wireless sensor network, a network model is introduced, with a square for the monitoring area, with the sector for coverage area, as shown in Fig. 2.

Fig. 2.k-Coverage network model

As you can see from Fig. 2, for the sensor nodes, square with L side length is the monitoring area, coverage area is a sector. At the same time it also gives different included angles of four sectors in radians. Tanks and soldiers as target nodes are placed in the k=4 coverage, and formed the target nodes. If the perception radius of sensor nodes is Rs, the area of sector is:

Set θ=α1+α2+α3+α4,

For a square with L side length of the monitoring area, when the target node is always in the coverage area of sensor nodes, the entire network coverage probability was:

Theorem 1: In the monitoring area, the expected value that the target node is covered by the sensor nodes is: E(X)= πθ(σ2+l2)/l2

Prove: Fig. 2 network models as the research object. Assumes that perception radius of sensor nodes is Rs, which is randomly deployed in the monitoring area of a square with L side length. Sector is effective coverage area, and θ is the sum of included angles;Because the sensor node's perception radius Rs obeys the Normal Distribution, for the monitoring area of a square, the coverage expected value is:

set:

Bring formula (4)and (5) to formula (6):

Inference 1: Meet certain coverage probability, the use of a minimum number of sensor nodes to complete the monitoring area of multi-level coverage, the corresponding of the coverage expected value is: (1-ε)/ln(1-πβ(σ2+l2)/l2)

Prove: All sensor nodes are relatively independent, which are randomly deployed in the monitoring area. According to the definition 4 and theorem 1, we can see that the coverage expected value, that any target node is covered by at least one sensor node from covering set, is:

If the covering set exist n working nodes, the multi-level coverage expected value of any target nodes is:

When it satisfies a certain coverage quality, it is necessary to exist a minimal number ε, and it makes the multi-level coverage expected value is less than ε, limit existence.

Solving:

Namely, when the effective coverage of the monitoring area is completed, the coverage expected value of the minimum number of sensor nodes is: ln(1-ε)/ln(1-πβ(σ2+l2)/l2).

The calculation process of the coverage expected value and the multi-level coverage expected value are given in theorem 1 and inference 1. Generally, the moving trajectory of the target node is a fan shape. The probability theory and the method of mathematical geometry theory are used to accomplish the calculation of the coverage expected value. But, for the first time, when the moving target node enters the monitoring area, the problem that we must solve is how to get the first coverage expected value. Therefore, this paper introduces the theorem 2.

Theorem 2: When the target node is first entered into the monitoring area, the first coverage expected value of the moving target is: E(X)=[1-(1-p)N]p-1, N is the maximum number of transfer for mobile target nodes, p is the coverage probability of sensor nodes.

Prove: According to the probability theory, if X is the maximum number of transfer for mobile target nodes, the range of possible values for the X is X∈[1,2,3…N], When X=m and 1≤m≤N-1, namely: moving target nodes of the former n-1 times are not covered by the sensor nodes, the distribution density function of X:

By the coverage expected formula:

Set q=1-p, , each side of the equation is multiplied by q, , namely:

Bring formula (14) to formula (13):

Theorem 3: The sensor nodes are randomly deployed in the monitoring area according with the Poisson distribution with node density as parameter, N(s) as random variables. s is the network coverage area of any sensor node, and S is the area of the whole monitoring area.

Prove: The probability of any sensor nodes in the monitoring area is p, p=|s|/S. By the binomial theorem, when the k numbers of sensor nodes are in the monitoring area, the joint probability is:

For the entire monitoring area, sensor node density is λ=N/S, bring λ and p into formula (16):

According to calculations:

When the number of sensor nodes in the monitoring area increase indefinitely, namely: N→∞,

3.3 Energy Conversion

The working sensor nodes will have certain energy consumption in a square monitoring area after a time t [26-27]. Because of the energy consumption of the sensor nodes, the coverage area is changed correspondingly. In order to inhibit the energy consumption of sensor nodes, and prolong the network lifetime, the energy consumption of multilateral and unilateral transmission is analyzed by using the node energy model in this paper, and the energy consumption of the computing, storage, and control, is ignored. The energy consumption model of the sender node is:

The energy consumption model of the receiver node is:

L is bits of transmitting data, d represents the Euclidean distance between the sensor nodes and the neighbor nodes, d0 is the threshold of the distance between the communications nodes, when the distance between the communication nodes is less than d0, the energy decay index is 4. On the contrary, decay index is 2; ET-elec represents the energy consumption of the communication node between the receiving and sending module.

EBKCCA algorithm regards network running time round number as the basic unit. Each round contains coverage control information and node state stable information two aspects. In the work stage, the working nodes always remain open, and in order to save the network energy all the redundant nodes are closed. Each node has a total of five kinds of running state which respectively are: judgment, competition, waiting, starting and sleeping state. The transformation relationship among the five kinds of states, are as shown in Fig. 3. When node density of a monitoring area is too large, the vast majority of the nodes in the region will meet the redundant nodes judging conditions. At this time, the nodes will enter a dormant state. Although this state can inhibit the node energy consumption, there also exists some shortage. The reason for this is that the perceived neighbor nodes once enter into a dormant state, it can cause large cover blind area in monitoring area, thus reduce the coverage quality. In order to avoid the happening of this kind of situation, EBKCCA algorithm uses that once a node enters into a sleeping state, wake up the neighbor nodes immediately, and let the neighbor nodes in the waiting state. The aim is that, first, reduce the density of nodes which may work, namely, select a node as a candidate working nodes directly. The rest nodes which are not chosen enter into sleeping state directly. Then in a candidate working nodes, we conduct the redundant nodes scheduling. Each candidate node elects itself into preliminary work state by probability. The candidate nodes which are failed to elect enter into the preliminary sleeping state. Fig. 3 shows the node scheduling relationship in the covering control phase.

Fig. 3.State transition of nodes

A is a series of target area, S(A) represent the coverage area which is covered by the sensor nodes. Under the condition of coverage, the target coverage area is reconstructed by using the data acquisition of sensor nodes. Assuming that the target coverage area is based on the basic signal field and gives the specific spatial relation, when a sensor node receives a signal from the point (x,y), it can form a circular area with (x,y) as the center, with R as the radius and reconstructed every nodes in the circular area. In this case, it is more suitable for data acquisition in wireless sensor networks. The first case is suitable for some simple problems, namely, each sensor nodes in wireless sensor networks have perception region with the point as the center, with r as the radius. In a certain precision, each sensor nodes can collect or retrieve every target node from signal field in this area. The second case is suitable for some complex problems; this paper considers a random field of space homology. In the first case, all the target nodes S(A) have a mean value μ which is subject to the variance σ2; the relation of any two sensor nodes are determined by the Euclidean distance in the second case:

Measured value S(x,y) is implemented at the target node (x,y), and the data which needs to be transmitted to the access point is achieved, which contains some of the measurement data. M represents measurement data is collected in information retrieval for all the nodes. M was used to reconstruct a random field S(A). Using M, a sensor node of the closest point (x,y) is used to calculate the measured values to estimate the signal field in complementary set A. Therefore, the estimated value Ŝ(x0,y0) of the signal field at the point (x,y) is:

(u,v) is the closest (x,y) in M, meeting the quality requirements of network services, we set that the maximum distortion is D, defined as:

Theorem 5: The distance between adjacent nodes (u,v) and (x,y)should be less than or equal to the difference between the variance and the half of maximum distortion.

Prove: According to formula (31) and formula (32):

Bring the formula (32) into the formula (33): 2σ2 – 2R(d((x,y),(u,v)))≤D, namely:

Therefore, we set that the distance between two nodes is:

Considering the remaining energy of the node and the connection of signal field space at the same time, in order to prolong the network lifetime in each data information retrieval operation, a subset of the available sensor nodes is selected to collect data [29-31]. Therefore, the subset of the sensor nodes is selected to ensure the quality of the network service. So far, the problem of this paper is how to select the subset of the optimal sensor nodes in each data collection. If the subset of the optimal sensor nodes can be determined, the network can be reconstructed in the maximum and the network lifetime can be maximized.

 

4. Description and Analysis of Algorithms

4.1 EBKCCA Algorithm

The EBKCCA algorithm is based on a set of neighbor nodes in the Perception radius, the nodes are divided into several sub sets, and the nodes with high energy, computing power and communication ability are administrator nodes, other nodes are member node. In the network initialization, since the attributes of node are the same, we randomly select a node as the administrator node. First the member node sends a "Coverage" message to the administrator node. The administrator node sets up a certain storage space according to their own characteristics, and the information is stored in a list CL, the "Coverage" message mainly contains the attributes of the sending node and the current state, such as: the energy of the sending node, the ID information and the coverage of nodes and so on. After one or several cycles, the administrator node collects the sending information of all the nodes. According to the collected information, the administrator can sort the member nodes with the remaining energy and the coverage expected value, and it is stored in the list, all nodes are given a certain weight, so that the weight of the top node is higher than that of the rear node. According to the coverage of target node, the administrator node seeks member nodes from the list which are qualified to meet the conditions, and the member nodes are labeled. The administrator node sends a "Notice" message to the member node which schedules other member nodes to complete the corresponding coverage task.

4.2 EBKCCA Algorithm Description

EBKCCA algorithm is mainly divided into seven steps:

Step1: The coverage expected value of each member node is calculated, namely: E(X)∪{(si,L)|siN(l,σ2)/l2}.

Step2: The administrator node stores the information of member nodes in a list CL; the "Coverage" message mainly contains the energy of the sending node, the ID information and the coverage expected value and so on.

Step3: After one or several cycles, the administrator can sort the member nodes with the remaining energy and the coverage expected value, and the higher weights are given to the top of the member nodes.

Step4: According to the coverage of target node, the administrator node seeks member nodes from the list which are qualified to meet the conditions, and the member nodes are labeled.

Step5: The administrator node seeks member nodes from the list. When the remaining energy of member node is higher than the threshold Ethr, a "Notice" message is sent to a member node, and then when a member node receives the message, the monitoring area is covered by the perception module.

Step6: If there is a target node that is covered by k member nodes, the administrator node will traverse the list once again to seek the member nodes that meet the coverage, and close them.

Step7: First the administrator node completes the list of traversal, if it can find out the best node by adaptive scheduling, the coverage of the monitoring area is completed, else go to Step 2.

4.3 Complexity of EBKCCA algorithm

Theorem 6: the complexity of algorithm is O(n) in best case; the complexity of algorithm is O(n2) in worst case.

Prove: EBKCCA algorithm completes the conversion between member nodes by sending and receiving different types of information, and it can get the best nodes to complete the coverage by finding the list. If the EBKCCA algorithm completes the coverage of monitoring area is in a cycle or less than one cycle, the complexity of the algorithm is O(n); if the EBKCCA algorithm is more than one cycle or less than the maximum number of cycles, it needs to complete the coverage of N cycles, and the complexity of the algorithm is O(n2).

 

5. System Evaluations

In order to verify the effectiveness and stability of the EBKCCA algorithm, this paper selects MATLAB7 as the simulation platform, the algorithms were compared with the four algorithms of [32] (Energy-Efficient Target Coverage Algorithm, ETCA), [33] (Linear programming maximum lifetime coverage with energy harvesting, LP_MLCEH), [26] (Optimization Strategy Coverage Control, OSCC). And [28] (Event Probability Driven Mechanism, EPDM) Experimental environment is WIN XP; RAM 2G, Dual-core CPU 1.7 G, the simulation parameters are shown in Table 1.

Table 1.Parameters of the simulation table

Experiment 1: the simulation area is 300*300, this paper gives the coverage probability of different k values.

In experiment 1, Fig. 4 reflects a schematic diagram which shows the sensor nodes and the coverage probability of different k values in the 300*300 monitoring area. As it can be seen from Fig. 4, when the monitoring area is determined, coverage probability is increasing with the increasing number of sensor nodes. When k=2, Coverage Probability (CP) is increasing with the increasing number of sensor nodes. When CP=99.9%, it can be considered that the wireless sensor network achieves effective coverage, at this time, the number of sensor nodes are 280; when k=3 and the effective coverage is achieved, the number of sensor nodes are 231; when k=4, the number of sensor nodes is 183. When the coverage probability is between 85% and 99.9%, the coverage probability is increased obviously, and the main reason is that the greater the k value, the greater the coverage area [34,35].

Fig. 4.Curves of k-coverage

Nodes are randomly deployed in different monitoring area. The communication path is optimized by the sensor node scheduling strategy, which reduces the energy consumption of sensor nodes, as shown in Fig. 5.

Fig. 5(a).100*100m2, Randomly deployed

Fig. 5(b).100*100m2, Optimization Schematic

Fig. 5(c).200*200m2, Randomly deployed

Fig. 5(d).200*200m2, Optimization Schematic

Fig. 5(e).300*300m2, Randomly deployed

Fig. 5(f).300*300m2, Optimization Schematic

Fig. 5 reflects a state diagram which shows the initial distribution of the sensor nodes is in different monitoring area and communication path of sensor nodes is optimized. This paper takes 300*300 as an example. As it can be seen from Fig. 5, at the initial moment, the random deployment of 260 sensor nodes constitutes a large number of communication paths. Because of the existence of a large number of communication paths, the energy consumption of sensor nodes is very fast. If the sensor node energy is greater than or equal to the threshold of energy E, the EBKCCA algorithm shows that sensor node which the coverage probability is less than p enters the waiting state; sensor node which the coverage probability is more than or equal to p enters the competitive state. Once the competition is successful, the node becomes the starting node, and enters the working state. When sensor nodes sense a target node, they wake up the neighbor nodes, and continue to estimate whether the target node is selected as a working node by wake-up nodes with probability p. If the probability of acquisition is greater than or equal to p, they enter the working state; otherwise, they enter the waiting state. After some cycles, the energy of the nodes reaches balance; at this time, the number of sensor nodes is 188, and the total number of 72.3%. If the energy of sensor nodes is less than the energy thresholdε, the node is in the "death" state and it will not enter the scheduling state. The algorithm can suppress the energy consumption of a large number of sensor nodes, and prolong the network lifetime; at the same time, it also ensures the communication link between any sensor nodes.

Experiment 2: In the network lifetime, the EBKCCA algorithm is compared with the ETCA algorithm and the LP_MLCEH protocol. The experimental data is the mean of the 200 simulation data, as shown in Fig. 6 to Fig. 8.

Fig. 6.100*100m2, Curves of network lifetime

Fig. 7.200*200m2, Curves of network lifetime

Fig. 8.300*300m2, Curves of network lifetime

The second experiment is in the different monitoring area, EBKCCA algorithm and ETCA algorithm and LP_MLCEH protocol in the contrast experiment of the network lifetime. In the experiment, k selects different numerical value; the network scale is changed by the number of nodes in the monitoring area. For the smaller scale of the monitoring area, the initial value of the number of nodes is 20, and gradually increases. It can be seen from the simulation that the lifetime of the wireless sensor network is a linear rising trend with the increase of the number of sensor nodes. The main reason is that the member nodes in the node set cover the target node by scheduling mechanism of nodes. In the same environment, compared with the ETCA algorithm and the LP_MLCEH protocol, the network lifetime of the EBKCCA algorithm is increased by 10.11%, 7.17%; for the larger scale of the monitoring area, the initial value of the number of nodes is 50, and gradually increases. The lifetime of the wireless sensor network is a linear rising trend with the increase of the number of sensor nodes. The rise is more than that of the smaller monitoring area, compared with the ETCA algorithm and the LP_MLCEH protocol, the network lifetime is increased by 15.23%, 12.79%.

Experiment 3: The EBKCCA algorithm is compared with the OSCC algorithm and the EPDM algorithm in the coverage probability. The simulation area is 300*300, the experimental data is the mean of the 200 simulation data, as shown in Fig. 9 to Fig. 11.

Fig. 9.200*200m2, Curves of network coverage probability

Fig. 10.200*200m2, Curves of network running time

Fig. 11.Working nodes and sensor nodes contrast

The coverage probability of the three algorithms is increasing with the number of sensor nodes in Fig. 8. When CP=99.9% and k=2, the number of sensor nodes is 185; when k=3, the number of sensor nodes is 152; when k=4 and the number of sensor nodes is 185, the algorithm has reached 99.9%, namely, it has completed the k-degree coverage. However the EPDM algorithm and EBKCCA algorithm has not yet reached 100%, it shows that the coverage of the EBKCCA algorithm is higher than the EPDM algorithm and the EBKCCA algorithm, and the effectiveness of the algorithm is verified. In Fig. 9, the coverage probability of the two algorithms is quite in the initial, the coverage probability of two algorithms is declining trend with the time increasing. The main reason is that the EPDM algorithm and EBKCCA use uninterrupted coverage of the sensor nodes in the running time. That is, the target node is covered constantly in the monitoring area until the energy is consumed. When t=150, the coverage probability of three algorithms declines obviously. When k=2,3,4, CP_EBK2CCA=77.83%, CP_EBK3CCA=86.83%, CP_EPDM=88.52%, CP_OSCC=94.58%, CP_EBK4CCA=97.26%. When k=4, the coverage probability is higher than the mean coverage probability of EPDM and EBKCCA algorithm, which shows the coverage probability of EBKCCA algorithm is obviously higher than the two algorithms in the same node. The effectiveness of the algorithm is verified. When Fig. 10 gives the same coverage probability, the number of working nodes of the EBKCCA algorithm is compared with that of the EPDM algorithm and the EBKCCA algorithm. When the number of sensor nodes is maintained between 140 and 180, the number of sensor nodes basically tends to be stable. When k=2,3,4, the number of nodes for this algorithm is maintained between 121 and 146, while the number of nodes in EBKCCA and EPDM algorithm is maintained between 134 and 152. Therefore, the mean value of the number of sensor nodes for this algorithm is less than the average of the number of nodes in the other algorithms, that is, the number of sensor nodes is reduced by 5.49%.

 

6. Conclusion

Based on the analysis of the coverage in wireless sensor network, this paper proposes a novel energy balanced k-coverage control algorithm based on probability model (EBKCCA). The algorithm gives the calculation method of the coverage expected value with the sector, and proves the solving process which uses the least sensor node to complete the monitoring area of the expected value. At the same time, the first coverage expected value of the moving target node is calculated and deduced in this algorithm. In the energy, this paper gives a detailed algorithm for restraining the energy consumption of nodes, and through the corresponding calculation, it is proved that the energy consumption of the multi transmission is less than that of the single transmission. Finally, in the network lifetime and coverage probability, the EBKCCA algorithm is compared with the ETCA algorithm, the LP_MLCEH protocol and the EPDM algorithm. The effectiveness and stability of the EBKCCA algorithm is verified.

References

  1. X. Xing, G. Wang, J. Li, "Collaborative target tracking in wireless sensor networks," Ad-Hoc & Sensor Wireless Networks, vol.23, no.1/2, pp.117-135, 2014. Article (CrossRef Link)
  2. L. Kong, M. Zhao, X. Liu, J. Lu, Y. Liu, M. Wu, W. Shu, "Surface coverage in sensor network," IEEE Transactions on Parallel and Distributed Systems, vol.25, no.1, pp.234-243, 2014. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2013.35
  3. C. Yang, K. Chin, "Novel algorithm for complete targets coverage in energy harvesting wireless sensor networks," IEEE Communications Letters. vol.18, no.1, pp.118-121, 2014. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2013.111513.132436
  4. M. Senouci, A. Mellouk, L. Oukhellou, A. Aissani, "An evidence based sensor coverage model," IEEE Communicaions Letters. vol.16, no.9, pp.1462-1464, 2012. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2012.070512.120999
  5. J. Seok, J. Lee, W. Kim, J. Lee, "A Bipopulation-based evolutionary algorithm for solving full area coverage problems," IEEE Sensor Journal, vol.13, no.3, pp.4796-4807, 2014. Article (CrossRef Link)
  6. Z. Sun, X. Li, "Research on Localization Algorithm Based on Improved Bayesian Filtering Model," Internation Journal of Hybrid Information Technology, vol.8, no.8, pp.1-12, 2015. Article (CrossRef Link) https://doi.org/10.14257/ijhit.2015.8.8.01
  7. Y. Jin, L. Wang, J. Jo, Y. Kim, M. Yang, Y Jiang, "EECCR: An Energy-Efficient m-Coverage and n-Connectivity Routing Algorithm Under Border Effects in Heterogeneous Sensor Networks," IEEE Transactions on Vehicular Technology, vol.58, no.3, pp.142-1442, 2009. Article (CrossRef Link)
  8. H. Ammari, S. Das, "Critical Density for Coverage and Connectivity in Three-Dimensional Wireless Sensor Networks Using Continuum Percolation," IEEE Transactions on Parallel and Distributed Systems, vol.20, no.6, pp.872-885, 2009. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2008.146
  9. A. Chen, S. Kumar, T. Hai, "Local Barrier Coverage in Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol.9, no.4, pp.491-504, 2010. Article (CrossRef Link) https://doi.org/10.1109/TMC.2009.147
  10. X. Yang, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun, C. Liu, "Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks," IEEE Transactions on Computers, vol.59, no.4, pp.507-521, 2010. Article (CrossRef Link) https://doi.org/10.1109/TC.2009.170
  11. Y. Tseng, P. Chen, W. Chen, "k-Angle Object Coverage Problem in a Wireless Sensor Networks," IEEE Sensor Journal, vol.12, no.12, pp.3408-3416, 2012. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2012.2198054
  12. M. Senouci, A.Mellouk, L. Oukhellou, A. Aissani, "An Evidence-Based Sensor Coverage Model," IEEE Communications Latters, vol.16, no.9, pp.1462-1465, 2012. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2012.070512.120999
  13. C. Jian, L. Zhang, Y. Kuo, "Coverage-Enhancing Algorithm Based on Overlap-Sense Ratio in Wireless Sensor Multimedia Sensor Networks," IEEE Sensor Journal, vol.13, no.6, pp.2077-2083, 2013. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2013.2248144
  14. S. He, X. Gong, J. Zhang, "Curve-Based Deployment for Barrier Coverage in Wireless Sensor Networks," IEEE Transaction Communications, vol.13, no.2, pp.724-735, 2014. Article (CrossRef Link) https://doi.org/10.1109/TWC.2013.121813.130198
  15. C. Cheng, K. Tsai, "Distributed Barrier Coverage in Wireless Visual Sensor Networks With β-QoM," IEEE Sensors Journal, vol.12, no.6, pp.1726-1735, 2012. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2011.2177966
  16. A. Hossain, S. Chakrabarti, P. Biswas, "Impact of Sensor Model on Wireless Sensor Network Coverage," IET Wireless Sensor Systems. vol.2, no.3, pp.272-281, 2012. Article (CrossRef Link) https://doi.org/10.1049/iet-wss.2011.0101
  17. T. Razafindralambo, D. Simplot-Ryl, "Connectivity preservation and coverage schemes for wireless sensor networks," IEEE Trans. on Automatic Control, vol.56, no.10, pp.2418-2428, 2011. Article (CrossRef Link) https://doi.org/10.1109/TAC.2011.2163885
  18. H. Ammari, S. Das, "Centralized and clustered k-coverage protocols for wireless sensor networks," IEEE Trans. on Computers, vol.61, no.1, pp.118-132, 2012. Article (CrossRef Link) https://doi.org/10.1109/TC.2011.82
  19. J. Du, K. Wang, D. Guo, "Maximizing the lifetime of k-discrete barrier coverage using mobile sensors," IEEE Sensors Journal, vol.13, no.12, pp.4690-4701, 2013. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2013.2270555
  20. M. Cardei, D. Du, "Improving wireless sensor network lifetime through power aware organization," Wireless Networks, vol.11, no.3, pp.333-340, 2005. Article (CrossRef Link) https://doi.org/10.1007/s11276-005-6615-6
  21. S. Yang, F. Dai, M. Cardei, J.Wu, "On multiple point coverage in wireless sensor networks," in Proc. of IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, pp.760-764, Nov 7-7, 2005. Article (CrossRef Link)
  22. H. Liu, P. Wan, C. Yi, X. Jia, S. Makki, N. Pissinou, "Maximal lifetime scheduling in sensor surveillance networks," in Proc. of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, pp.2482-2491, March 13-17, 2005. Article (CrossRef Link)
  23. S. Mini, S. Udgata, S. Sabat, "Sensor Deployment and Scheduling for Target Coverage Problem in Wireless Sensor Networks," IEEE Sensors Journal, vol.14, no.3, pp.636-644, 2014. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2013.2286332
  24. Y. Jin, L. Wang, J. Jo, Y. Kim, M. Yang, Y. Jiang, "EECCR: An energy-efficient m-coverage and n-connectivity routing algorithm under border effects in Heterogeneus sensor networks," IEEE Transactions on Vehicular Technology, vol.58, no.3, pp.1429-1442, 2009. Article (CrossRef Link) https://doi.org/10.1109/TVT.2008.926216
  25. R. Falcon, X. Li, A. Nayak, "Carrier-based focused coverage formation in wireless sensor and robot networks," IEEE Transactions on Automatic Control, vol.56, no.10, pp.2406-2417, 2011. Article (CrossRef Link) https://doi.org/10.1109/TAC.2011.2163989
  26. Z. Sun, W. Wu, H. Wang, H. Chen, W. Wei, "An optimized strategy coverage control algorithm for WSN," International Journal of Distributed Sensor Network, vol.2014, no.2014, pp.1-12, 2014. Article (CrossRef Link)
  27. T. Cheng, A. Savkin, "A distributed self-deployment algorithm for the coverage of mobile wireless sensor networks," IEEE Communications Letters, vol.13, no.11, pp.877-879, 2009. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2009.091178
  28. Sun ZY, Wu WG, Wang HZ, Chen H, Xing XF, "A novel coverage algorithm based on event-probability-driven mechanism in wireless sensor network," EURASIP Journal on Wireless Communications and Networking, vol.2014, no.2014, pp.1-17, 2014. Article (CrossRef Link) https://doi.org/10.1186/1687-1499-2014-1
  29. J. Su, W. Guo, C. Yu, G. Chen, "Fault-tolerance clustering algorithm with load-balance aware in wireless sensor network," Chinese Journal of Computers, vol.37, no.2, pp.445-456, 2014. Article (CrossRef Link)
  30. X. Xing, G. Wang, J. Wu J, J. Li, "Square region-based coverage and connectivity probability model in wireless sensor networks," in Proc. of 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-8, 2009. Article (CrossRef Link)
  31. G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless R, C. Gill, "Integrated coverage and connectivity configuration for energy conservation in wireless sensor networks," ACM Transcation. on Sensor Networks, vol.1, no.1, pp.36-72, 2005. Article (CrossRef Link) https://doi.org/10.1145/1077391.1077394
  32. X. Xing, G. Wang, J. Li, "Polytype target coverage scheme for heterogeneous wireless sensor network using linear programming," Wireless Communications and Mobile Computing, vol.14, no.8, pp.1397-1408, 2014. Article (CrossRef Link) https://doi.org/10.1002/wcm.2269
  33. C. Yang, K. Chin, "Novel algorithm for complete targets coverage in energy harvesting wireless sensor network," IEEE Communications Letter, vol.18, no.1, pp.118-121, 2014. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2013.111513.132436
  34. H. Mahboubi, K. Moezzi, A. Aghdam, K. Pour, V. Marbukh, "Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors," IEEE Transactions on Industrial Informatics, vol.10, no.1, pp.163-174, 2014. Article (CrossRef Link) https://doi.org/10.1109/TII.2013.2280095
  35. S. Temel, N. Unaldi, O. Kaynak, "On Deployment of Wireless Sensor on 3D Terrains to Maximize Sensing Coverage by Utilizing Cat Swarm Optimization with Wavelet Transform," IEEE Transactions on Systems, Man and Cybernetics: Systems, vol.44, no.1, pp.111-120, 2014. Article (CrossRef Link) https://doi.org/10.1109/TSMCC.2013.2258336

Cited by

  1. A Novel Random Scheduling Algorithm based on Subregions Coverage for SET K-Cover Problem in Wireless Sensor Networks vol.12, pp.6, 2016, https://doi.org/10.3837/tiis.2018.06.012