Presentation is loading. Please wait.

Presentation is loading. Please wait.

Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information.

Similar presentations


Presentation on theme: "Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information."— Presentation transcript:

1 Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA Mehdi Dehghan Department of Computer Engineering and Information Technology Amirkabir University of Technology Tehran, Iran Jie Wu Department of Computer and Information Siences Temple University Philadelphia, Pennsylvania, USA

2 Outline Introduction Related work Goal Assumption Proposed approach Simulation Results Conclusion

3 Introduction Coverage is one of the most important challenges in the area of sensor networks – Area coverage – Boundary coverage – Point coverage

4 Introduction The area coverage problem (Areas of Interest, AoI) – aims at covering the whole area. – Sensors are deployed to maximize the covered area.

5 The boundary coverage problem (Lines of Interest, LoI) – aims at detecting intrusion on a given area. – Sensors have to form a dense barrier in order to detect each event that crosses the barrier. Introduction USA Intruder

6 Introduction The point coverage problem (Points of Interest, PoI) – aims at monitoring specific points in the field of interest. MuseumCampusMilitary

7 Related work I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Sink Targets Sensing nodes Waiting nodes

8 Related work Every sensors calculates the back-off time – Residual energy – The number of uncovered targets it can cover I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Sink Targets Sensing nodes Waiting nodes

9 Related work Minimum Spanning Tree(MST) – Prim's Algorithm 5 -3 1 3 5 3 1 0 5 2 4 -3 1 3 3 1 0 2 GraphMST

10 Related work Minimum Spanning Tree(MST) – Prim's Algorithm I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Sink Targets Sensing nodes Waiting nodes Virtual links

11 Related work Every sensing nodes finds the path between virtual link(target,target’parent) I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

12 Related work Other nodes can go to sleep I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Sink Targets Sensing nodes Waiting nodes

13 Related work The sink does not have many branches. – In the case of failure, we lose a significant amount of data. I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Sink Targets Sensing nodes Waiting nodes

14 Cycle Formation Related work I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Targets Sensing nodes Virtual links Physical links 3 2 1

15 Cycle Formation Related work I. Cardei and M. Cardei, “Energy-efficient connected-coverage in wireless sensor networks,“ International Journal of Sensor Networks, Vol. 3, No. 3, pp. 201-210, May 2008 Targets Sensing nodes Virtual links Physical links 3 2 1

16 Goal To maintain connectivity, we propose a method to construct a balanced tree which is more robust against failure We consider and avoid cycle formation which might happen during converting virtual trees to physical trees.

17 Assumption Sensors and targets are stationary Each sensor knows the location of all targets and the sink

18 Our Approach Phase 1 : Sensing Nodes Selection Phase 2 : Relay Nodes Selection Avoiding Cycle Formation

19 Sensing Nodes Selection A set of efficient sensing nodes is selected to cover all the targets in the field – Residual energy – The number of uncovered targets it can cover

20 Sensing Nodes Selection Each sensor computes a waiting time – When the waiting time of sensor s u is finished, it is selected as a sensing node – The shorter the waiting time of sensor is, the more the priority among the others is

21 Sensing Nodes Selection The waiting time of a sensor s u is computed by the equation: E’ u : the residual energy of sensor s u E : the initial energy of sensor M : the number of targets in the network W 1 : the maximum waiting time α,β : weight values TargetS u : targets which are in sensing range of node s u and have not been covered by any sensing node yet T’ u : the waiting time which sensor s u has passed u v

22 Sensing Nodes Selection The waiting time of a sensor s u is computed by the equation: E’ u : the residual energy of sensor s u E : the initial energy of sensor M : the number of targets in the network W 1 : the maximum waiting time α,β : weight values TargetS u : targets which are in sensing range of node s u and have not been covered by any sensing node yet T’ u : the waiting time which sensor s u has passed u v

23 Sensing Nodes Selection When the waiting time of a sensor s u is finished u v r3r3 r2r2 r4r4 r1r1 r5r5 E’ u : the residual energy of sensor s u E 1 : active sensor consumes E 1 energy for sensing E 2 : active sensor consumes E 2 energy for communication TargetS u : targets which are in sensing range of node s u and have not been covered by any sensing node yet

24 Sensing Nodes Selection S u acts as the supervisor of all the targets in the set TargetS u u v r3r3 r2r2 r4r4 r1r1 r5r5

25 Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes

26 Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes

27 Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

28 Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

29 Relay Nodes Selection Prim's Algorithm – Cost = edge’s length Sink Targets Sensing nodes Waiting nodes

30 Relay Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Prim's Algorithm – Cost = edge’s length

31 Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

32 Relay Nodes Selection In VRST algorithm, cost is computed as follows : which λ is a function of the depth of a vertex : hop count : number of hops to the sink weight of path i : sum of the edge’s cost which connect vertex i to the sink ε 1 : depth of the MST h i : depth of vertex i z i,j : length of edge (i,j) hihi λiλi r1r1 r2r2 r3r3 r4r4 - (2) - (3) - (4) hihi λiλi i j

33 Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

34 Relay Nodes Selection MSTVRST

35 Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

36 Relay Nodes Selection Select some relay nodes to connect the supervisors of targets Targets Sensing nodes Waiting nodes Virtual links u v (t i, π(t i )) titi π(ti)π(ti) r

37 Relay Nodes Selection Every sensing node s u broadcasts a control message Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) RELAY_REQ Location of sensing node s u Location of destination target π(t i ) The maximum distance from sensing node s u to the supervisor of target π(t i ) r

38 Relay Nodes Selection Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) RELAY_REQ Location of sensing node s u Location of destination target π(t i ) The maximum distance from sensing node s u to the supervisor of target π(t i ) r If r is not the supervisor of π(t i ) and RELAY_REQ

39 Relay Nodes Selection Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) r RELAY_REP 1. Relay sensor closest to the node s u 2. The first relay node which delivered the message 3. Relay node with the most residual energy RELAY_REP

40 Relay Nodes Selection Targets Sensing nodes Waiting nodes Virtual links u v titi π(ti)π(ti) r Physical links

41 Relay Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

42 Relay Nodes Selection Step 1 : Make a virtual tree (MST) based on the set of targets and sink Step 2 : Compute the new cost for all of the target by using VRST(Virtual Robust Spanning Tree) algorithm Step 3 : Construct the new virtual tree(VRST) Step 4 : Convert the virtual tree to a physical tree of sensors Extend : MVRST(Modified Virtual Robust Spanning Tree) algorithm

43 Relay Nodes Selection In VRST algorithm, cost is computed as follows : which λ is a function of the depth of a vertex : hop count : number of hops to the sink weight of path i : sum of the edge’s cost which connect vertex i to the sink ε 1 : depth of the MST h i : depth of vertex i z i,j : length of edge (i,j) - (2) - (3) - (4)

44 Relay Nodes Selection In MVRST algorithm, cost is computed as follows : which λ is a function of the depth of a vertex : hop count : number of hops to the sink weight of path i : length of edge(i,j) ε 1 : depth of the MST h i : depth of vertex i z i,j : length of edge (i,j) - (2) - (3) - (4)

45 Relay Nodes Selection VRSTMVRST

46 Avoiding Cycle Formation Targets Sensing nodes Virtual links Physical links 3 2 1

47 Avoiding Cycle Formation Targets Sensing nodes Virtual links Physical links 3 2 1

48 Simulation Results EnvironmentMATLAB Square field500m*500m Number of sensor500 Number of target50 Sensing energy consumption in a range of 50m 60mW/s Communication energy consumption in a range of 80m 60mW/s

49 Simulation Results Effect of sensing range on energy consumption : R c = 120m

50 Simulation Results Effect of sensing range on the maximum data loss : R c = 120mEffect of sensing range on the average data loss : R c = 120m

51 Simulation Results Effect of communication range on the maximum data loss : R s = 70mEffect of communication range on the average data loss : R s = 70m

52 Simulation Results Average depth : R s = 70m

53 Conclusion Propose a point coverage mechanism in addition to two connectivity mechanisms Our approach has less data latency and energy consumption

54 Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

55 Sensing Nodes Selection Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

56 Sensing Nodes Selection-VRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

57 Sensing Nodes Selection-VRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

58 Sensing Nodes Selection-MST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

59 Sensing Nodes Selection-MST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

60 Sensing Nodes Selection-MVRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links

61 Sensing Nodes Selection-MVRST Sink Targets Sensing nodes Waiting nodes Virtual links Physical links


Download ppt "Connected Point Coverage in Wireless Sensor Networks using Robust Spanning Trees IEEE ICDCSW, 2011 Pouya Ostovari Department of Computer and Information."

Similar presentations


Ads by Google