DOI QR코드

DOI QR Code

CCAJS: A Novel Connect Coverage Algorithm Based on Joint Sensing Model for Wireless Sensor Networks

  • Sun, Zeyu (Department of Computer and Information Engineering, Luoyang Institute of Science and Technology) ;
  • Yun, Yali (Department of Computer and Information Engineering, Luoyang Institute of Science and Technology) ;
  • Song, Houbing (Department of Electrical and Computer Engineering, West Virginia University Montgomery) ;
  • Wang, Huihui (Department of Engineering, Jacksonville University)
  • Received : 2016.04.07
  • Accepted : 2016.07.06
  • Published : 2016.10.31

Abstract

This paper discusses how to effectively guarantee the coverage and connectivity quality of wireless sensor networks when joint perception model is used for the nodes whose communication ranges are multi-level adjustable in the absence of position information. A Connect Coverage Algorithm Based on Joint Sensing model (CCAJS) is proposed, with which least working nodes are chosen based on probability model ensuring the coverage quality of the network. The algorithm can balance the position distribution of selected working nodes as far as possible, as well as reduce the overall energy consumption of the whole network. The simulation results show that, less working nodes are needed to ensure the coverage quality of networks using joint perception model than using the binary perception model. CCAJS can not only satisfy expected coverage quality and connectivity, but also decrease the energy consumption, thereby prolonging the network lifetime.

Keywords

1. Introduction

The coverage Quality and connectivity are two important measurements of the QoS (Quality of Service, QoS) of the wireless sensor networks (WSNs) [1-2]. States of the node are scheduled with heuristic algorithm by taking advantage of node redundancy [3-5]. The nodes are powered off in turn on the premise of certain QoS, thereby effectively saving the network energy, prolonging the network lifetime. Almost all the existing coverage control strategies without geographic position are based on the binary perception model, namely when an object is located in the perception area of a node, the probability it can be monitored is always 1; whereas when it is outside of the perception area of a node, the probability it can be monitored is always 0. Which means whether an object can be detected is just determined by a single node in the network. However, in the real application scenario, whether an object can be detected is determined by the analysis and fusion of data perceived by multiple adjacent sensor nodes. Therefore, the probability an object can be detected is determined by multiple nodes instead of a single node. The probability an object can be detected is determined by the physical properties of the node and the distance from the node, and so on. Therefore the joint perception model [6-7], also known as the probability perception model, can describe the network coverage more accurately. To prevent the sensor nodes frombeing isolated,not being able to transmit information monitored to the base station, the network must be fully connected.

Aiming at the characteristics of randomly deployed sensor networks, as well as coverage quality and connectivity of the network, this paper proposes Connect Coverage Algorithm Based on Joint Sensing Model (CCAJS) The position and energy consumption of the nodes selected with this algorithm are both well-distributed, thereby effectively prolonging the network lifetime.

 

2. Related Works

In recent years, many experts have done a lot of detailed and in-depth research of the features of wireless sensor networks. Literature [8] proposed a k-degree discrete barrier coverage algorithm with maximized network lifetime. The algorithm theoretically analyzes the conditions of the upper and lower limits of the coverage of the network model which has concrete barriers, and then effectively covers the concerned moving node; In terms of the network energy consumption, a sensor node scheduling algorithm is proposed, which redeploys the sensor nodes using greedy algorithm and completes sensor nodes state transition with scheduleing mechanism, ultimately achieves the goal of maximizing the network lifetime. When covering the mobile target nodes concerned using this algorithm, the sensor nodes distributed in the monitoring area are always connected or intersected. However, once the target mobile node appears on the coverage "blind area", the mobile target node can no longer be covered effectively, therefore the network model is too idealistic. A heuristic coverage algorithm is proposed in literature [9] by means of mixed integer programming. This algorithm studies heuristic coverage in which sensor nodes intersect and the sensor node perception radius is adjustable. This algorithm requires large amount of calculation with little adjustability. To improve the algorithm presented in literature [9], Yang SH [10] treated the target node coverage area in literature [9] approximately as monitoring area , and then completed the connected coverage over target area by building coverage set using high-density deployed sensor nodes set. On the basis of studies on the above two literatures, Liu H et al. [11] had done a lot of researches on target coverage, and put forward a solving process to find the coverage of the target node at any time in the condition that a sensor node can only cover a single target node. However, this constraint limited the application when covering the monitoring area, and made the solving process unsuitable to real coverage scenario. Literature [12] optimized the scheduling of sensor nodes with artificial colony algorithm and particle swarm algorithm, calculating the best deploy path using heuristic scheduling configuration. It also proposed a theoretical computing process for finding the positions of sensor nodes after the optimal deployment was finished, as well as a method to compute the upper limit of the network lifetime. Literature [13] put forward an Energy-Efficient Coverage and Connectivity Preserving Routing Algorithm(ECCRA) which constructed dual Coverage area using network model and calculated coverage probability and expectations using probability knowledge, then determined the upper limit of coverage expectation, finally achieved effective covering the monitoring area with least sensor nodes. Literature [12] and [13] can complete the effective coverage over the monitoring area to a certain extent, suppressing fast energy consumption of sensor nodes. However, both the two algorithms require large amount of computing and are highly complex, requiring a long time to complete the coverage over monitored area. A work team named after GreenOrbs in the Internet of Things Technology Center in National Laboratory of Information Science and Technology of Tsinghua University has done a lot of experiments on the application of wireless network in engineering and has gotten certain results. Those results are mainly about forestry ecological monitoring, urban environmental monitoring, and so on. The GreenOrbs team initiated a project named CitySee after more than two years of research. In that project, the sensor network is applied to carbon absorption and emission monitoring in cities and communities, providing technology and social security support for government decision making and city development. Meanwhile, the team of the project also published many influential papers. Literature [14] studied the large-scale sensor nodes deployed in forest, and pointed out the subordinate relationships between different levels of the network infrastructure. It studied how the radio signal intensity influenced the physical layer; how the packet loss rate, link quality and transmission rate affected the structure of the whole network in the link layer; the dynamic routing planning, flow control, node grouping, data exchange, topology characteristics and so on in the top layer of the network. In Literature [15], mass sensor nodes are deployed in the city center monitoring various performance indicators of carbon dioxide. this article introduced the function of each layer of the network infrastructure, then analyzed the software and hardware configuration in the network system, finally carried out a lot of experiments verifying the network connectivity and data acquisition, including such hierarchies as visual process of data acquisition, design and management of the wireless sensor network and locating in mobile network. The above large-scale sensor networks feature high applicability in practical. Literature [16] gives a coverage algorithm based on the event-probability-driven mechanism(EPDM), which is mainly driven by events probability-driven nodes to complete effective coverage over monitoring area. In the algorithm, the dependency relationship between the sensor nodes and target nodes is given, then the probability model is calculated, related theorem and reasoning are also proved; the conversions between different node status are also completed using the scheduling mechanism of the node itself. the algorithm can complete effective coverage over different size of networks with relative low cost, prolonging the lifetime of the whole network. Literature[17] presents an coverage algorithm based on energy-efficient multi-objective linear rules (energy-efficient target coverage algorithm, ETCA), which solves the problem of multi-target coverage using cluster structure system. By calculating the coverage ability of the sensors and their residual energy, this algorithm completes the optimal coverage over the target nodes in a linear fashion.

Zuckerman et al. put forward a distributed scheduling algorithm, the off-duty eligibility rule [18]. The node calculates the sponsored area of the neighbors according to the geographical position information, and then computes the coverage relations between nodes. Ye et al. put forward a detection-based node density control protocol, PEAS [19]. Based on the probability, Wu put forward a method to compute the node redundancy [20], with which the node was able to calculate its own redundancy independently. He also proposed a node scheduling protocol, LDAS, which needs no geographical position information. However, this method ignores the two-hop neighbors’ perception contribution to the sensing area of the node, Therefore there are still a large number of redundant nodes. Wang et al. studied the coverage problem of sensor networks where the nodes deployed submitted to two-dimensional Gaussian distribution [21].

There is a common problem in the above coverage control algorithms -- the network connectivity is not considered in these algorithms. There are mainly two mechanisms to research on the network connectivity: One is based on the hypothesis that the communication radius of the node is fixed [22]. CDS is built by scheduling the node state, accordingly the backbone nodes are reserved for communication. According to the connectivity between nodes, CPA algorithm [23] divides the nodes into different domains, and the connectivity of the network is guaranteed as long as there is one working node in each domain; the other mechanism is based on the hypothesis that the communication radius of a node is adjustable. The lifetime of the whole network is prolonged by dynamically adjusting the node’s transmission power (power control [24-25]) to minimize the energy consumption of the node on the premise of guaranteeing the connectivity of the network. LMST [24] guarantees the network connectivity by constructing a local minimum spanning tree for each node, saving the network energy.

In order to guarantee the coverage quality and connectivity of sensor networks, researchers turn to focus on how to guarantee connective coverage. Liu et al. proposed a joint scheduling algorithm [26] ensuring the connectivity of networks by adding additional communication nodes on the basis of guaranteeing coverage quality. Literature [27] put forward sleep scheduling and topology control. The algorithm divides all the nodes into several subsets, each subset being able to guarantee the coverage quality of specific target and the connectivity of the network [28].

 

3. Preparation Knowledge

3.1 Node Perception Model and Related Definitions

The analysis in this paper is based on joint perception model [20], namely in the monitoring area M, the perception intensity of the node s to any position q is:

In which d(s,q) stands for the Euclidean distance between s and q, α is a parameter of the equipment reflecting the physical property of the perception module of the node. Rs is the maximum effective perception radius. Assuming node set s contains all the working nodes deployed in monitoring area M, then the intensity of joint perception [20] in point q is:

Definition 1: For any point q in the area of M, if the intensity of the joint perception of q satisfies I(q)≥Ith, then q is covered (namely, events at q can be detected); otherwise q is not covered. In which, the Ith is the threshold of perception intensity (its value is set by the user according to node characteristics and application requirements). Therefore the coverage of q can be expressed as:

In binary perception model, the perception area of a node is a circle centered in s, with radius rs (the circle is denoted with C(s,rs), in which rs≤Rs). All the points in region C(s,rs) are covered by s, but none of the nodes outside of C(s,rs) can be covered by s. Therefore, in the binary perception model, rs satisfies e-αd=Ith, namely rs=-ln(Ith)/α.

Definition 2: The ratio of the covered area of M to the whole area of M is known as the network coverage quality, namely:

A sensor network can be abstracted as an undirected graph G=(V, E), in which V and E are the set of nodes and the collection of undirected edges, respectively.

Definition 3: For undirected graph G=(V, E), the connectivity degree of node pair of (u, v) (u,v∈V) is defined as the number of independent paths connecting u and v. Graph Connectivity degree is defined as the minimum connectivity of all the node pairs within V, namely dc(G)=min∀(u,v)∈V{d(u,v)}. The concept that a graph is interconnected is equivalent to dc(G)≥1.

Definition 4: network lifetime refers to the time span from when the network starts up to when one of the target nodes is not able to be covered by any sensor node, or the whole network connectivity can't be guaranteed.

3.2 Network Model

Assume sensor nodes are deployed Randomly and well-distributed in a square region M, the side length being L. Now assume the network has the following properties:

(1) Joint perception model and binary communication model are used for the node.

(2) The network can be homogeneous or heterogeneous, but the perception radius of all the nodes submit to normal distribution N(R0,λ2), with R0≥3.3λ (guaranteeing the perception radius of the node is in[0,2R0]).

(3) L>>Rcm and L>>Rs, namely the boundary effect of the monitoring area M can be ignored.

(4) The communication equipment of a node can adjust its own transmission power and has m number of different communication range (denoted as Rc1

3.3 Problem Description

Assume large volumes of nodes (the number of nodes is n) are deployed randomly in the monitoring area M. For communication module, presetting the adjustable communication radius level of the nodes to Rc1, Rc2, Rc3,…,Rcm; while for the perception module, presetting the related parameter α of the perception device, threshold of perception intensity Ith(0

 

4. Problem Analysis

4.1 Coverage Problem Analysis

By defined 1, the probability of any point q being covered is P{Ith≤I(q)≤1} in area M. By definition 2, the expectation value of the coverage quality of the network, denoted by η, is:

Demanded coverage quality (η0) is guaranteed in the monitoring area M as long as E(η)≥η0 is guaranteed, namely:

Let ln(1-I(q))=x, then P{Ith≤I(q)≤1}=P{ln(1-Ith)≥x>-∞}, in which pr(x) denotes the probability density function of random variable x, namely:

In the monitoring area(M), Kv nodes are randomly selected as working nodes. By formula (2), we have Therefore the characteristic function of random variable x is:

In which i is the imaginary unit. Because all the nodes in M obeys uniform random distribution, the probability of the node in any position within M is 1/ area(M). In addition, the position relationships among all the nodes within M are independent of each other, therefore

Let ln(1-exp(-αr))=l then:

In which f(l)=([2πln(1-exp(l)2)]/-α2(1-exp(l)))⋅[1-(l-ln(1-exp(-αRs)))]. Thus the probability density function of random variable x can be formulated as:

By (6), (7) and (11), we get:

As long as formula (12) works, the randomly selected Kv working nodes are able to guarantee the coverage quality of monitoring area M, meeting the demand for specific coverage quality. The minimum Kv can be calculated using MATLAB to satisfy formula (12). Using binary perception model without considering boundary effect, Literature [29] came up with the relation between the expectation of obtained coverage quality Ku and the number of working nodes, namely E[η]=1-[(1-πR2)/area(M)]Ku, where R is calculated from formula R=-ln(Ith)/α. By 1-[(1-πR2)/area(M)]Ku≥η0, the minimum amount of working nodes Ku necessary to ensure the quality of network coverage can be deduced using binary perception model. Table 1 shows the amount of working nodes required to ensure the network coverage quality using the joint perception model (Rs=10M) and the binary perception model. As can be seen from Table 1, with the requirements of the same coverage quality, the amount of working nodes needed to guarantee the coverage quality in networks is much greater using binary perception model than using the joint perception model. Hence the joint perception model is better than binary perception model in reflecting the combination perception characteristic of sensor networks.

Table 1.Relation-ships between required coverage quality and the amount of working nodes

4.2 Connectivity Problem Analysis

To transmit the data which are monitored by sensors to the base station (Sink node), the network constituted by working nodes must be fully connected. In terms of probability theory, the connectivity of the network can be guaranteed as long as the probability the network is connected is not less than the threshold value τ1(τ1is the threshold for a big probability event, and in this paper, τ1=0.98), namely P{dc(G)≥1}≥τ1. The mathematical relationship between the number of working nodes and the communication radius of the nodes ensuring the connectivity of the network is analyzed in the following.

Assume n nodes are randomly selected as working nodes in the monitoring area M (denoted as s1,s2,s3,…sn). Using undirected graph G to denote the network consists of V={s1,s2,s3,…sn}. Using ρ(V,dn(G)≥k) and ρ(V,dc(G)≥k) to denote the minimum communication radius of the node when dn(G)≥k and dc(G)≥k (where k≥1) are satisfied, respectively:

Literature [13] proves that for k ≥1, we have:

Namely when n is large enough, the node degree and the connectivity of graph increase from (k-1) to k, the probability of the connectivity of G increasing from k-1 to k increases with the increase of communication radius of the node approaches 1.when n is large enough, by formula (13) and (14),we get:

In which ε→0+. Therefore, when ρ(V,dn(G)≥k) approaches 1, we have:

According to formula (18), when ρ(V,dn(G)≥k)→1, the probability the network is interconnected satisfies ρ(dn(G)≥k)≈ρ(dc(G)≥k). Because ρ(dn(G)≥1)=P{∩(d(sj)≥1)}, although the event d(sj)≥1 and event d(sh)≥1 are not independent to each other (for example, if sj is the neighbor of sh, then sh must also be the neighbor of sh, in which 1≤j, h≤n, j≠h, The correlation between them is rather slight, therefore P{∩(d(sj)≥1)}≈ΠP{d(sj)≥1}. Moreover, because the position of all the nodes are independent to each other, so P{d(sj)≥1}=P{d(sh)≥1} (In which 1≤j, h≤n, j≠h). Therefore, when P{dn(G)≥1}→1, we have:

Denoting the node communication radius with Rc, we have:

Substitute the result in formula (18) into formula (17), we get According to the practical significance of big probability event, as long as the probability a network is interconnected reaches τ1, it is interconnected from the perspective of probability. So in order to guarantee the connectivity of the network, the amount of working nodes and the communication radius of the node should satisfy:

When Rc is set, the minimum n which satisfies formula (19) can be calculated using MATLAB; on the contrary, if n is set, the minimum Rc which satisfies formula (19) can also be figured out.

4.3 Redundancy Node Analysis

Theorem 1:Randomly select k working nodes within M, then the expectation of the coverage quality is:

Proof: In M, the nodes subject to random uniform distribution, so the probability a node is located in any position in M is 1/area(M). If any point q is covered by a sensor node a (the perception radius is denoted with Ra), then sensor node a must be locate in a circle centered in q (the circle is denoted as O(q,Ra) of radius Ra). Therefore, the probability q is covered by sensor node a is:

Because the perception radius of sensor node a conforms to normal distribution and R0≥3.3λ, the probability that any point is covered by a working node is:

Let x=(Ra-R0)/λ, then:

The calculation is:

For all the position of the nodes in M are independent of each other, the probability that any node is covered by at least k working nodes in M is:

Assuming the area covered by at least k nodes is M′, then the expectation of the area for M′ is:

Therefore:

By Theorem 1, we can get the expectation of the minimum number of required working nodes satisfying demanded coverage quality ηd of applications, namely:

Theorem 2: After the redundant nodes are powered-off randomly and conflict-freely, if the rest working nodes are able to provide accurate coverage quality ηd demanded by applications, the expectation of the number of covered neighbors of redundant node satisfies:

Proof: Assuming the number of the remaining working nodes is N after the redundant nodes are powered off, then the n working nodes still follow random and uniform distribution. Because the remaining working nodes can still accurately provide the coverage quality required in applications, so by formula (28), we get:

Denote the perception radius of node as Ra, Rb, which represents the perception radius of node b. If b is the coverage neighbor of a, then b must be located in a circle centered on a of radius Ra+Rb (denoting the circle as O(a,Ra+Rb)). Therefore, the probability that b is a coverage neighbor of a is:

Because the perception radius of all nodes obey normal distribution N(R0,λ2), and R0≥3.3λ, the probability that a node is the coverage neighbor of another node is:

Calculation:

According to the computation process in formula (33), we have:

Because

So

Then we have:

The expectation of the number of coverage neighbor sensor nodes for each of the remaining N working nodes is:

Therefore the expectation of the number of redundant coverage neighboring sensor nodes satisfies:

4.4 CCAJS Protocol Control

By formula (14),the minimum amount of working nodes Kv ensuring the coverage quality can be calculated. Substitute n with Kv in formula (19), the minimum radius of communication Rc satisfying formula (19) can then be figured out. If Rc≤Rcm, set the actual communication radius of the node Rcom to not less than the minimum communication level of Rc, as well as set the actual working node K to Kv; otherwise set the actual communication radius of the node Rcom to Rcm, then substitute Rcm with Rc in formula (19), thus find out the minimum number of working node n which satisfies formula (19), and then set the number of the working node k to n. In order that the selected working nodes are well-distributed better in geography, the density control mechanism for working nodes is used locally in the protocol. Namely, the number of the working neighbor of node n satisf ies

This implies that there are enough working nodes in the communication area, so that the node can be powered off to save the network energy [30-31]. In the CCAJS, each node has three states during its operation: active, back off and asleep. The transformation relationships between the states are as shown in Fig. 1. When the network is initialized, the base station figures out K, Rcom and according to the user-defined coverage quality, performance parameters of the sensor nodes and the whole detection area, then sends the information to all the nodes within the area(M). Each node within M sets its own communication radius according to the information coming from the base station. After that, all the nodes broadcast Hello message to obtain the information of the neighboring nodes and then store the information in their neighboring table, then enter active state. When the number of the neighboring nodes which are in active state satisfies formula (40), the node enters back off state, the time the node stays in that state being random. After the back off time span is over, the node once more determines whether the number of its active neighboring nodes satisfies formula (13). If dissatisfied, it returns to working state, otherwise, it broadcasts asleep message informing the other working neighbors to update their neighboring table, then it enters asleep state and stays in that state for a fixed time span before entering active state again. The node broadcasts a Probe message to detect its working neighbors after transforming from sleeping state into active state. Those nodes which are not in asleep state received the probe message will update their neighboring table, and broadcast Hello messages.

Fig. 1.The node state transition diagram

CCAJS also uses a working node selection mechanism based on residual energy of the node, by which the nodes with less energy have more opportunity to enter asleep state. The retreat time span of a node is randomly generated in [0,T]. The formula to compute T is:

In which T0 is a fixed base value of time, w is the residual energy of the node, Wmin is the minimum value of the residual energy of the node and its neighbors, and Wth is the threshold of the energy adjustment. As can be seen from formula (43), the more the remaining energy of the node is greater than that of its coverage neighbors, the greater T would be, and the less chance the node will enters asleep state, thereby realizing the load balancing of energy consumption of the node.

4.5 Complexity Analysis

The three kinds of control message in CCAJS have a uniform format. The operation cycle of each node consists of two parts: work time Tw and sleep time Ts. Initially, the number of nodes deployed in the network is N, and all nodes work in turn. While anytime the actual number of working nodes is Kw. By formula (38), we get In an operation cycle, N⋅E[Tw]=E[Kw]⋅(E[Tw]+Ts). By formula (40), the expectation of the number (denoted with n) of the working neighbors of each node that transforms from sleeping state into work state is Therefore, a node emitting a Probe message will trigger E[N] nodes to emit Hello messages. Each node will send an asleep message and a Probe message in its life cycle. Therefore, the number of the control messages sent out is (2+E[N])/(E[Tw]+Ts) per unit time.

 

5. Performance Evaluation

To verify the validity of the effectiveness and performance, we carried out the experiments and analysis using MATLAB as the simulation platform. The energy model and parameters used are of the same as those in literature [14].The wireless communication model for data sending and receiving are as follows, respectively

Where l represents the number of bits in packets, d is the emission distance, Eelec represents the energy dissipation of the radio transceiver circuit, ξfs and ξmp represent the energy dissipation of the amplifier using free space model and multiple energy attenuation models, respectively. The experimental parameters are as shown in Table 2:

Table 2.Simulation parameter list

Fig. 2 illustrates the relationship between the quality of obtained coverage and that of the required coverage when different amount of nodes are deployed. As can be seen in this figure, regardless of the initial number of nodes deployed, CCAJS can always guarantee the quality of required coverage and has some coverage redundancy. Small amount of coverage redundancy is essential to enhance the fault tolerance of the network, furthermore, to accurately provide coverage quality is not realistic in the absence of geography information.

Fig. 2.The relationship between obtained QoC and required QoC

Fig. 3 reflects the relationship between the number of working nodes and the number of nodes deployed. As can be seen from Fig. 3, regardless of the initial number of node deployed, the number of the working nodes only associated with required coverage quality, which indicates that the protocol is highly extensible. Detailed observation shows that, with the same coverage quality requirements, the actual number of working nodes is greater than that of the theoretical ones. This is because the number of the working neighboring nodes must be integer, so that the number of the actual working nodes is greater than the theoretical calculated values, therefore the coverage quality is slightly higher than the required coverage quality.

Fig. 3.The relationship between the number of working nodes and the required QOC

When selecting working nodes with CCAJS, energy is consumed to receive and transmit control messages, and the working nodes consume large amount of energy when receiving and transmiting perceived data. The ratio of the energy consumption in transmitting or receiving control messages to the overall energy consumption of the network is used to denote control overhead.

Fig. 4 reflects the relationship among the number of deployed nodes, the sleep interval of nodes and the control overhead as the required coverage quality is 95%. As can be seen from Fig. 4, the control overhead of the CCAJS algorithm is quite little. On the other hand, the longer the node sleeps, the less the control overhead is. That is because in unit time, the greater Ts is, the less the control messages transmitted or received are. We can also see from Fig. 4 that with the same Ts, the greater the density of the working node is, the more the control overhead is.

Fig. 4.relationship between control overhead and sleep interval of the node

Fig. 5 illustrates the relationship between coverage quality and time when 800 nodes are randomly deployed. Fig. 6 shows the proportional relationship of simulation time to the network lifetime. Although scheduling the nodes using CCAJS slightly increases control overhead compareding with those algorithms without node scheduling, the network lifetime is greatly prolonged because the nodes works in turn. After the network lifetime is over, the coverage quality declines rapidly from the required coverage quality of applications, which indicates that he overall energy consumption of the network is well-distributed. We can also conclude from Fig. 5 and Fig. 6 that CCAJS algorithm has relatively high coverage at the beginning of the network operation, but the coverage drops down as time elapse. The reason for this lies for the dissipation of the node energy, or more nodes are needed to guarantee high coverage. But the higher the network coverage quality is, the more working nodes are needed and more rapidly the energy is consumed, therefore the shorter the network lifetime is, which also reflects the transform relationship between coverage quality and network lifetime.

Fig. 5.relationship between obtained QOC and time

Fig. 6.the proportional relationship of simulation time to the network lifetime

On simulation platforms of different monitoring area, comparisons of the coverage rate between the number of redundant nodes among CCAJS algorithm for this paper and those for literature [16] and [17] are as shown in Fig. 7 - 12.

Fig. 7.100*100m2, comparison between the number of sensor nodes and the number of working nodes

Fig. 8.200*200m2, the network coverage change curve

Fig. 9.300*300m2, the comparison of CCAJS algorithm with different coverage

Fig. 10.300*300m2, comparison between the number of redundant sensor nodes and network coverage

Fig. 11.300*300m2, comparison between the number of sleeping redundant nodes and network coverage

Fig. 12.300*300m2, comparison between the number of redundant nodes and sleeping redundant nodes

Fig. 7 to 12 show the changing curve of coverage with different parameters and network scale, as well as the changing curve of the coverage with different number of redundant nodes. Fig. 7 shows the changing curve of the number of working nodes and the number of sensor nodes of CCAJS algorithm for this paper and SCA algorithm in a simulation area of 100*100m2. As can be seen from Fig. 8, the CCAJS algorithm needs less working nodes with different parameters, while the EPDM needs more sensor nodes. The reason for this is that when λ=1.2, the area covered by the sensor nodes and their neighboring nodes is greater than the coverage area when λ=0.8, while the SCA and EPDM algorithms achieve effective coverage over monitoring area by increasing the number of sensor nodes. Fig. 8 illustrates the changing curve of the coverage with different number of the working nodes in a simulation area of 200*200m2. The monitoring area in Fig. 9 and 10 is 300*300m2. As can be seen from Fig. 9 and Fig. 10, with the increase of sensor nodes, the coverage of the three algorithms all increases. Because the CCAJS adjusts the coverage with dynamic parameter, the coverage is higher than the other two algorithms at the initial stage. When the number of sensor nodes reaches 137, the algorithm for this paper has completed effective coverage, while the SCA algorithm and EPDM algorithm achieve effective coverage when the numbers are 180 and 199, respectively. The algorithm for this paper improves the average coverage by 11.02% comparing with the other two algorithms. Fig. 11 shows the proportional relation between the redundant dormancy nodes and the coverage. As can be seen from f Fig. 11, with the increase of redundant dormant nodes, the coverage of the three algorithms increases, too. In CCAJS, when redundant nodes increases, the number of working nodes keeps constant while completing effective coverage over monitoring area using conversion scheduling strategy. Whereas the other algorithms adopt uninterrupted continuous coverage methods to complete effective coverage over monitoring area. Fig. 12 shows the proportional relation between the redundant nodes and the redundant dormant nodes. As can be seen from Fig. 12, the redundant nodes and the redundant dormant nodes shows a linear relationship, and the curve amplitude change is relative small, which suggests that under the premise of certain coverage, this kind of network architecture has good scalability.

 

6. Conclusion

In order to cover the network effectively and connectively in the absence of node location information, this paper discussed the relationships between the coverage quality of networks, network connectivity and the number of working nodes, area of the monitored region, and the performance parameters as the nodes are randomly deployed. We also analyzed the random deployment problem of redundant nodes in the heterogeneous sensor network, as well as presented a decision model of the redundant node. This model needs no geographic location information and is suitable for both homogeneous and heterogeneous network. It should be pointed out that the joint perception model is used for the perception module of the node, because joint perception model can describe the coverage of the network more accurately than the binary perception model. Node scheduling control algorithm is designed to choose least nodes to guarantee the coverage quality and connectivity of networks according to the result of analysis. We also proposed heterogeneous sensor network coverage preserving protocol with maximum network lifetime. The protocol adopts election strategy based on residual energy of the nodes, so that the energy consumption of the nodes can distribute more uniformly. The simulation results show that CCAJS not only effectively provides satisfied QOS and connectivity, but also realizes load balancing of the network energy consumption, thereby achieves saving network energy. The energy equilibrium strategy balances energy consumption, thereby prolonging the network lifetime effectively.

References

  1. Amitabha Ghosh, Sajal K.Das, “Coverage and Connectivity Issues in Wireless Sensor Networks: A Survey,” Pervasive and Mobile Computing, vol.4, no.3, pp.303-334, June, 2008. Article (CrossRef Link) https://doi.org/10.1016/j.pmcj.2008.02.001
  2. Zeyu Sun, Wuguo Wu, Huanzhao Wang, Heng Chen, Wei Wei, “An Optimization Strategy Coverage Control Algorithm for WSN,” International Journal of Distributed Sensor Networks, vol.24, no.3, pp.1-11, March, 2014. Article (CrossRef Link)
  3. Yuchee Tseng,Poyu Chen, Wentsuen Chen, “k-Angle object coverage problem in a wireless sensor network,” IEEE Sensors Journal, vol.12, no.12, pp.3408-3416, December, 2012. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2012.2198054
  4. Xingfei Xing, Guojun Wang, Jie Li, “Collaborative target tracking in wireless sensor networks,” Ad-Hoc & Sensor Wireless Networks, vol.23, no.1/2, pp.117-135, 2014. Article (CrossRef Link)
  5. Linghe Kong, Mingchen Zhao, Xiaoyang Liu, Jialiang Lu, Yunhuai Liu, Minyou Wu, Wei Shu, “Surface coverage in sensor network,” IEEE Transactions on Parallel and Distributed Systems, vol.25, no.1, pp.234-243, January, 2014. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2013.35
  6. Changlin Yang, Kwanwu Chin, “Novel algorithm for complete targets coverage in energy harvesting wireless sensor networks,” IEEE Communications Letters, vol.18, no.1, pp.118-124, January, 2014. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2013.111513.132436
  7. Zeyu Sun, Xiaogunag Li, “Research on Localization Algorithm Based on Improved Bayesian Filtering Model,” International Journal of Hybrid Information Technology, vol.8, no.8, pp.1-12, August, 2015. Article (CrossRef Link) https://doi.org/10.14257/ijhit.2015.8.8.01
  8. Junzhao Du, Kai Wang, Deke Guo, “Maximizing the lifetime of k-discrete barrier coverage using mobile sensors,” IEEE Sensors Journal, vol.13, no.12, pp.4690-4701, December, 2013. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2013.2270555
  9. Mihaela Cardei, Dingzhu Du, “Improving wireless sensor network lifetime through power aware organization,” Wireless Networks, vol.11, no.3, pp.333-340, March, 2005. Article (CrossRef Link) https://doi.org/10.1007/s11276-005-6615-6
  10. Qun Zhao, Gurusamy Mohan, “Lifetime maximization for connected target coverage in wireless sensor networks,” IEEE/ACM Transactions on Networking, vol.16, no.6, pp.1378-1391, December, 2008. Article (CrossRef Link) https://doi.org/10.1109/TNET.2007.911432
  11. Hai Liu, Pengjun Wan, Chihwei Yi, Xiaohua Jia, Sam Makki, Pissinou Niki, “Maximal lifetime scheduling in sensor surveillance networks,” in Proc. of 24th. Annual Joint Conference of the IEEE Computer and Communications Societies. USA Miami: IEEE Proceedings, pp.2482-2491, March 13-17, 2005. Article (CrossRef Link)
  12. Mini S, Udgata S, Sabat S, “Sensor Deployment and Scheduling for Target Coverage Problem in Wireless Sensor Networks,” IEEE Sensors Journal, vol.14, no.3, pp.636-644, March, 2014. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2013.2286332
  13. Yan Jin, Juyeon Jo, Yoohwan Kim, Yintao Jiang, Mei Yang, “ECCRA: An energy-efficient coverage and connectivity preserving routing algorithm under border effects in wireless sensor networks,” Computer Communications, vol.31, no.10, pp.2398-2407, October, 2008. Article (CrossRef Link) https://doi.org/10.1016/j.comcom.2008.03.001
  14. Yunhao Liu, Yuan He, Mo Li, Jiliang Wang, Kebin Liu,Lufeng Mo, Wei Dong, Zheng Yang, Min Xi, Jizhong Zhao, Xiangyang Li, “Does wireless sensor network scale? A measurement study on Greenorbs,” IEEE Transactions on Parallel and Distributed Systems, vol.24, no.10, pp.1983-1993, October, 2013. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2012.216
  15. Yunhao Liu, Xufei Mao, Yuan He, Kebin Liu, Wei Gong, Jiliang Wang, “CitySee: Not only a wireless sensor network,” IEEE Network, vol.27, no.5, pp.42-47, May, 2013. Article (CrossRef Link) https://doi.org/10.1109/MNET.2013.6616114
  16. Zeyu Sun, Weiguo Wu, Huanzhao Wang, Heng Chen, Xiaofei Xing, “A novel coverage algorithm based on event-probability-driven mechanism in wireless sensor network,” EURASIP Journal on Wireless Communications and Networking, vol.2014, no.1, pp.1-17, April, 2014. Article (CrossRef Link) https://doi.org/10.1186/1687-1499-2014-1
  17. Xiaofei Xing, Guojun Wang, Jie Li, “Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming,” Wireless Communications and Mobile Computing, vol.14, no.14, pp.1397-1408, October, 2014. Article (CrossRef Link) https://doi.org/10.1002/wcm.2269
  18. Tian Di, Georganas Nicolas, “A coverage preserving node scheduling scheme for large wireless sensor networks,” in Proc. of 1th Int. ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, USA: ACM Press, pp:32-41, September 28-30, 2002. Article (CrossRef Link)
  19. Ye Fan, Zhong Gary, Cheng Jesse, Lu Songwu, Zhang Lixia, “PEAS: a robust energy conserving protocol for long-lived sensor network,” in Proc. of 23th. Conference on Distributed Computing System, Providence USA, IEEE Press, May 19-22, pp.28-37, 2003. Article (CrossRef Link)
  20. Kui Wu, Yong Cao, Fulu Li, Yang Xiao, “Lightweight deployment aware scheduling for wireless sensor networks,” ACM Mobile Networks and Applications, vol.10, no.6, pp.837-852, December, 2005. Article (CrossRef Link) https://doi.org/10.1007/s11036-005-4442-8
  21. Demin Wang, Bin Xie, Aqrawal D.P, “Agrawal. Coverage and lifetime optimization of wireless sensor networks with Gaussian distribution,” IEEE Transaction on Mobile Computing, vol.7, no.12, pp. 1444-1458, December, 2008. Article (CrossRef Link) https://doi.org/10.1109/TMC.2008.60
  22. Yi Zou, Krishnendu Chakrabarty, “A distributed coverage and connectivity centric technique for selecting active nodes in wireless sensor networks,” IEEE Transactions on Computers, vol.54, no.8, pp.978-991, August, 2005. Article (CrossRef Link) https://doi.org/10.1109/TC.2005.123
  23. Zorbas Dimitrios, Glvnos Dimitris Kotzanikolaou Panayiotis, Douligeris Christos, “Solving coverage problems in wireless sensor networks using cover sets,” Ad Hoc Networks, vol.8, no.4, pp.400-415, April,2010. Article (CrossRef Link) https://doi.org/10.1016/j.adhoc.2009.10.003
  24. Ning Li, Jennifer. C. H, Lui Sha, “Design and analysis of an MST Based topology control algorithm,” IEEE Transaction on Wireless Communication, vol.4, no.3, pp.1195-2005, March, 2005. Article (CrossRef Link) https://doi.org/10.1109/TWC.2005.846971
  25. Himanshu Gupta, Zongheng Zhou, Samir. R. Das, Quinyi Gu, “Connected sensor cover: Self-organization of sensor networks for efficient query execution,” IEEE/ACM Transactions on Networking, vol.14, no.1, pp.55-67, January, 2006. Article (CrossRef Link) https://doi.org/10.1109/TNET.2005.863478
  26. Chong Liu, Kui Wu, Yang Xiao, Bo Sun, “Random coverage with guaranteed connectivity: joint scheduling for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol.17, no.6, pp.562-575, June,2006. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2006.77
  27. Yong Ding, Chen Wang, Li Xiao, “An adaptive partitioning scheme for sleep scheduling and topology control in wireless sensor networks,” IEEE Transactoins on Parallel and Distributed System, vol.20, no.9, pp.1352-1365, September, 2016. Article (CrossRef Link) https://doi.org/10.1109/TPDS.2008.230
  28. Huanzhao Wang, Fanzhi Meng, Zengzhi Li, “Useful lifetime maximization for partial coverage conserve in wireless sensor networks,” Journal of Xi’an Jiaotong University, vol.43, no.10, pp.66-70, October, 2009. Article (CrossRef Link)
  29. Ammari Habib, Das Sajal. K, “Centralized and clustered k-coverage protocols for wireless sensor networks,” IEEE Transactions on Computers, vol.61, no.1, pp.118-132, January, 2012. Article (CrossRef Link) https://doi.org/10.1109/TC.2011.82
  30. JoonHong Seok, Joonyong Lee, Jujang Lee, “A Bipopulation-based evolutionary algorithm for solving full area coverage problems,” IEEE Sensor Journal, vol.13, no.12, pp.4796-4807, December, 2013. Article (CrossRef Link) https://doi.org/10.1109/JSEN.2013.2274693
  31. Senouci Mustapha Reda, Mellouk Abdelhamid, Oukhellou Latifa, Aissani Amar, “An evidence based sensor coverage model,” IEEE Communications Letters, vol.16, no.9, pp.1462-1464, September, 2012. Article (CrossRef Link) https://doi.org/10.1109/LCOMM.2012.070512.120999