Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.

Slides:



Advertisements
Similar presentations
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Advertisements

Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
A Distributed Algorithm for the Dead End Problem of Location Based Routing in Sensor Networks Le Zou, Mi Lu, Zixiang Xiong, Department of Electrical Engineering,
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
1 An Energy-Efficient Unequal Clustering Mechanism for Wireless Sensor Networks Chengfa Li, Mao Ye, Guihai Chen State Key Laboratory for Novel Software.
Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage Problems Akshaye Dhawan, Ursinus College Aung Aung and Sushil K. Prasad Georgia.
Optimal Sleep-Wakeup Algorithms for Barriers of Wireless Sensors S. Kumar, T. Lai, M. Posner and P. Sinha, BROADNETS ’ 2007.
Energy-Efficient Target Coverage in Wireless Sensor Networks Mihaela Cardei, My T. Thai, YingshuLi, WeiliWu Annual Joint Conference of the IEEE Computer.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
SMART: A Scan-based Movement- Assisted Sensor Deployment Method in Wireless Sensor Networks Jie Wu and Shuhui Yang Department of Computer Science and Engineering.
1 TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks Nurcan Tezcan & Wenye Wang Department of Electrical.
Speaker: Li-Sheng Chen 1 Jan 2, 2012 EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing Protocol for Wireless Ad Hoc Networks.
LPT for Data Aggregation in Wireless Sensor networks Marc Lee and Vincent W.S Wong Department of Electrical and Computer Engineering, University of British.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Energy Aware Directed Diffusion for Wireless Sensor Networks Jisul Choe, 2Keecheon Kim Konkuk University, Seoul, Korea
An Energy-efficient Target Tracking Algorithm in Wireless Sensor Networks Wang Duoqiang, Lv Mingke, Qin Qi School of Computer Science and technology Huazhong.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
The Coverage Problem in Wireless Ad Hoc Sensor Networks Supervisor: Prof. Sanjay Srivastava By, Rucha Kulkarni
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
Protocols for Self-Organization of a Wireless Sensor Network K. Sohrabi, J. Gao, V. Ailawadhi, and G. J. Pottie IEEE Personal Comm., Oct Presented.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Preserving Area Coverage in Wireless Sensor Networks by using Surface Coverage Relay Dominating Sets Jean Carle, Antoine Gallais and David Simplot-Ryl.
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Prediction-based Object Tracking and Coverage in Visual Sensor Networks Tzung-Shi Chen Jiun-Jie Peng,De-Wei Lee Hua-Wen Tsai Dept. of Com. Sci. and Info.
Efficient Deployment Algorithms for Prolonging Network Lifetime and Ensuring Coverage in Wireless Sensor Networks Yong-hwan Kim Korea.
Maximum Network Lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Cardei, M.; Jie Wu; Mingming Lu; Pervaiz, M.O.; Wireless And Mobile.
On Energy-Efficient Trap Coverage in Wireless Sensor Networks Junkun Li, Jiming Chen, Shibo He, Tian He, Yu Gu, Youxian Sun Zhejiang University, China.
Design and Analysis of an MST-Based Topology Control Algorithm Ning Li, Jennifer C. Hou, and Lui Sha Department of Computer Science University of Illinois.
Xiaobing Wu, Guihai Chen
WEAR: A Balanced, Fault-Tolerant, Energy-Aware Routing Protocol for Wireless Sensor Networks Kewei Sha, Junzhao Du, and Weisong Shi Wayne State University.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Bounded relay hop mobile data gathering in wireless sensor networks
A Dead-End Free Topology Maintenance Protocol for Geographic Forwarding in Wireless Sensor Networks IEEE Transactions on Computers, vol. 60, no. 11, November.
Chinh T. Vu, Yingshu Li Computer Science Department Georgia State University IEEE percom 2009 Delaunay-triangulation based complete coverage in wireless.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Covering Points of Interest with Mobile Sensors Milan Erdelj, Tahiry Razafindralambo and David Simplot-Ryl INRIA Lille - Nord Europe IEEE Transactions on.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Shibo He 、 Jiming Chen 、 Xu Li 、, Xuemin (Sherman) Shen and Youxian Sun State Key Laboratory of Industrial Control Technology, Zhejiang University, China.
Adaptive Tracking in Distributed Wireless Sensor Networks Lizhi Yang, Chuan Feng, Jerzy W. Rozenblit, Haiyan Qiao The University of Arizona Electrical.
Energy-Aware Data-Centric Routing in Microsensor Networks Azzedine Boukerche SITE, University of Ottawa, Canada Xiuzhen Cheng, Joseph Linus Dept. of Computer.
Hole Detection and Boundary Recognition in Wireless Sensor Networks Kun-Ying Hsieh ( 謝坤穎 ) Dept. of Computer Science and Information Engineering National.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim, Dept. of Electrical & Electronic Eng., Yonsei University;
ICIIS Peradeniya, Sri Lanka1 An Enhanced Top-Down Cluster and Cluster Tree Formation Algorithm for Wireless Sensor Networks H. M. N. Dilum Bandara,
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee and Young- Bae Ko Ajou University.
Xiaoyuan Liang, Jie Tian, Guiling Wang New Jersey Institute of Technology Deploying Mobile Survivability-Heterogeneous Sensor Networks for Barrier Coverage.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Outline Introduction Network model Two-phase algorithm Simulation
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
Strong Barrier Coverage of Wireless Sensor Networks Benyuan Liu, Olivier Dousse, Jie Wang and Anwar Saipulla University of Massachusetts Lowell and Deutsche.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network You-Chiun Wang, Chun-Chi Hu, and Yu-Chee Tseng IEEE Transactions on Mobile Computing.
Energy-Aware Target Localization in Wireless Sensor Networks Yi Zou and Krishnendu Chakrabarty IEEE (PerCom’03) Speaker: Hsu-Jui Chang.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
1 Terrain-Constrained Mobile Sensor Networks Shu Zhou 1, Wei Shu 1, Min-You Wu 2 1.The University of New Mexico 2.Shanghai Jiao Tong University IEEE Globecom.
Wireless Access and Networking Technology (WANT) Lab. An Efficient Data Aggregation Approach for Large Scale Wireless Sensor Networks Globecom 2010 Lutful.
Scalable Coverage Maintenance for Dense Wireless Sensor Networks Jun Lu, Jinsu Wang, Tatsuya Suda University of California, Irvine Secon ‘ 06.
Barrier Coverage with Optimized Quality for Wireless Sensor Networks
Pouya Ostovari, Jie Wu, and Abdallah Khreishah
Presentation transcript:

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Mehdi Dehghan Department of Computer Engineering and Information Technology Amirkabir University of Technology Tehran, Iran Jie Wu Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA

Outline Introduction Related work Goal Assumption Proposed approach Simulation Results Conclusion

Introduction Coverage is one of the most important challenges in the area of sensor networks – Area coverage – Boundary coverage – Point coverage

Introduction The area coverage problem (Areas of Interest, AoI) – aims at covering the whole area. – Sensors are deployed to maximize the covered area.

The boundary coverage problem (Lines of Interest, LoI) – aims at detecting intrusion on a given area. – Sensors have to form a dense barrier in order to detect each event that crosses the barrier. Introduction USA Intruder

Introduction The point coverage problem (Points of Interest, PoI) – aims at monitoring specific points in the field of interest. MuseumCampusMilitary

Related work I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Sink Targets Sensing nodes Waiting nodes

Related work Every sensors calculates the back-off time – Residual energy – The number of uncovered targets it can cover I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Sink Targets Sensing nodes Waiting nodes

Related work Minimum Spanning Tree(MST) – Prim's Algorithm GraphMST

Related work Minimum Spanning Tree(MST) – Prim's Algorithm I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Sink Targets Sensing nodes Waiting nodes Virtual links

Related work Every sensing nodes finds the path between virtual link(target,target’parent) I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Related work Other nodes can go to sleep I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Sink Targets Sensing nodes Waiting nodes

Related work The sink does not have many branches. – In the case of failure, we lose a significant amount of data. I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Sink Targets Sensing nodes Waiting nodes

Cycle Formation Related work I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Targets Sensing nodes Virtual links Physical links 3 2 1

Cycle Formation Related work I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp , May 2008 Targets Sensing nodes Virtual links Physical links 3 2 1

Goal To maintain connectivity, we propose a method to construct a balanced tree which is more robust against failure We consider and avoid cycle formation which might happen during converting virtual trees to physical trees.

Assumption Sensors and targets are stationary Each sensor knows the location of all targets and the sink

Our Approach Phase 1 : Sensing Nodes Selection Phase 2 : Relay Nodes Selection Avoiding Cycle Formation

Sensing Nodes Selection A set of efficient sensing nodes is selected to cover all the targets in the field – Residual energy – The number of uncovered targets it can cover

Sensing Nodes Selection Each sensor computes a waiting time – When the waiting time of sensor s u is finished, it is selected as a sensing node – The shorter the waiting time of sensor is, the more the priority among the others is

Sensing Nodes Selection The waiting time of a sensor s u is computed by the equation: E’ u : the residual energy of sensor s u E : the initial energy of sensor M : the number of targets in the network W 1 : the maximum waiting time α,β : weight values TargetS u : targets which are in sensing range of node s u and have not been covered by any sensing node yet T’ u : the waiting time which sensor s u has passed u v

Sensing Nodes Selection The waiting time of a sensor s u is computed by the equation: E’ u : the residual energy of sensor s u E : the initial energy of sensor M : the number of targets in the network W 1 : the maximum waiting time α,β : weight values TargetS u : targets which are in sensing range of node s u and have not been covered by any sensing node yet T’ u : the waiting time which sensor s u has passed u v

Sensing Nodes Selection When the waiting time of a sensor s u is finished u v r3r3 r2r2 r4r4 r1r1 r5r5 E’ u : the residual energy of sensor s u E 1 : active sensor consumes E 1 energy for sensing E 2 : active sensor consumes E 2 energy for communication TargetS u : targets which are in sensing range of node s u and have not been covered by any sensing node yet

Sensing Nodes Selection S u acts as the supervisor of all the targets in the set TargetS u u v r3r3 r2r2 r4r4 r1r1 r5r5

Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes

Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes

Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

Relay Nodes Selection Prim's Algorithm – Cost = edge’s length Sink Targets Sensing nodes Waiting nodes

Relay Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Prim's Algorithm – Cost = edge’s length

Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

Relay Nodes Selection In VRST algorithm, cost is computed as follows : which λ is a function of the depth of a vertex : hop count : number of hops to the sink weight of path i : sum of the edge’s cost which connect vertex i to the sink ε 1 : depth of the MST h i : depth of vertex i z i,j : length of edge (i,j) hihi λiλi r1r1 r2r2 r3r3 r4r4 - (2) - (3) - (4) hihi λiλi i j

Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

Relay Nodes Selection MSTVRST

Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

Relay Nodes Selection Select some relay nodes to connect the supervisors of targets Targets Sensing nodes Waiting nodes Virtual links u v (t i, π(t i )) titi π(ti)π(ti) r

Relay Nodes Selection Every sensing node s u broadcasts a control message Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) RELAY_REQ Location of sensing node s u Location of destination target π(t i ) The maximum distance from sensing node s u to the supervisor of target π(t i ) r

Relay Nodes Selection Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) RELAY_REQ Location of sensing node s u Location of destination target π(t i ) The maximum distance from sensing node s u to the supervisor of target π(t i ) r If r is not the supervisor of π(t i ) and RELAY_REQ

Relay Nodes Selection Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) r RELAY_REP 1. Relay sensor closest to the node s u 2. The first relay node which delivered the message 3. Relay node with the most residual energy RELAY_REP

Relay Nodes Selection Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) r Physical links

Relay Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

Relay Nodes Selection In VRST algorithm, cost is computed as follows : which λ is a function of the depth of a vertex : hop count : number of hops to the sink weight of path i : sum of the edge’s cost which connect vertex i to the sink ε 1 : depth of the MST h i : depth of vertex i z i,j : length of edge (i,j) - (2) - (3) - (4)

Relay Nodes Selection In MVRST algorithm, cost is computed as follows : which λ is a function of the depth of a vertex : hop count : number of hops to the sink weight of path i : length of edge(i,j) ε 1 : depth of the MST h i : depth of vertex i z i,j : length of edge (i,j) - (2) - (3) - (4)

Relay Nodes Selection VRSTMVRST

Avoiding Cycle Formation Targets Sensing nodes Virtual links Physical links 3 2 1

Avoiding Cycle Formation Targets Sensing nodes Virtual links Physical links 3 2 1

Simulation Results EnvironmentMATLAB Square field500m*500m Number of sensor500 Number of target50 Sensing energy consumption in a range of 50m 60mW/s Communication energy consumption in a range of 80m 60mW/s

Simulation Results Effect of sensing range on energy consumption : R c = 120m

Simulation Results Effect of sensing range on the maximum data loss : R c = 120mEffect of sensing range on the average data loss : R c = 120m

Simulation Results Effect of communication range on the maximum data loss : R s = 70mEffect of communication range on the average data loss : R s = 70m

Simulation Results Average depth : R s = 70m

Conclusion Propose a point coverage mechanism in addition to two connectivity mechanisms Our approach has less data latency and energy consumption

Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection-VRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection-VRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection-MST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection-MST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection-MVRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

Sensing Nodes Selection-MVRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links