• 沒有找到結果。

Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage

N/A
N/A
Protected

Academic year: 2021

Share "Distributed deployment schemes for mobile wireless sensor networks to ensure multilevel coverage"

Copied!
15
0
0

加載中.... (立即查看全文)

全文

(1)

Distributed Deployment Schemes for Mobile

Wireless Sensor Networks to Ensure

Multilevel Coverage

You-Chiun Wang, Member, IEEE, and Yu-Chee Tseng, Senior Member, IEEE

Abstract—One of the key research issues in wireless sensor networks (WSNs) is how sensors can efficiently be deployed to cover an area. In this paper, we solve the k-coverage sensor deployment problem to achieve multilevelðkÞ coverage of the area of interest I . We consider two subproblems: the k-coverage placement problem and the distributed dispatch problem. The placement problem asks how the minimum number of sensors required and their locations inI can be determined to guarantee that I is k-covered and the network is connected, while the dispatch problem asks how mobile sensors can be scheduled to move to the designated locations according to the result computed by the placement strategy if they are not in the current positions such that the energy consumption due to movement is minimized. Our solutions to the placement problem consider both the binary and probabilistic sensing models and allow an arbitrary relationship between the communication distance and the sensing distance of sensors, thereby relaxing the limitations of existing results. For the dispatch problem, we propose a competition-based scheme and a pattern-based scheme. The competition-based scheme allows mobile sensors to bid for their closest locations, while the pattern-based scheme allows sensors to derive the target locations on their own. Our proposed schemes are efficient in terms of the number of sensors required and are distributed in nature. Simulation results are presented to verify their effectiveness.

Index Terms—Mobile sensors, network planning, pervasive computing, sensor coverage problem, topology control, wireless sensor networks.

Ç

1

I

NTRODUCTION

I

N recent years, with the rapid progress in embedded

microsensing MEMS and wireless communication tech-nologies, wireless sensor networks (WSNs) have been studied intensively for various applications such as environment monitoring, smart home, and surveillance. A WSN usually consists of numerous wireless devices deployed in a region of interest, each able to collect and process environmental information and communicate with neighboring devices.

Sensor deployment is an essential issue in WSN, because it not only determines the cost for constructing the network but also affects how well a region is monitored by sensors. In this paper, we consider the sensor deployment problem for a WSN with multilevel coverage. In particular, given a region of interest, we say that the region is k-covered if every location in that region can be monitored by at least ksensors, where k is a given parameter. A large amount of applications may impose the requirement of k > 1. For instance, military or surveillance applications with a stronger monitoring requirement may impose that k  2 to avoid leaving uncovered holes when some sensors are broken. Positioning protocols using triangulation [1] require at least three sensors (that is, k  3) to detect each location

where an object may appear. Moreover, several strategies are based on the assumption of k  3 to conduct data fusion [2] and to minimize the impact of sensor failure [3]. In addition, to extend a WSN’s lifetime, sensors are separated into k sets, each capable of covering the whole area, to work in shifts [4], [5], [6].

In this paper, we address the sensor deployment problem with the following requirements:

1. Multiple-level coverage of the area of interest is required.

2. Connectivity between sensors (in terms of their communications) should be maintained.

3. The area of interest may change over time.

4. Sensors are autonomous and mobile and thus can be dispatched to desired locations when being in-structed so.

We call this the k-coverage sensor deployment problem, where the k-level coverage of a given area of interest I is needed. We consider two subproblems: the k-coverage sensor placement problemand the distributed sensor dispatch problem. The placement problem asks how we can decide on the minimum number of sensors required and their locations in I to ensure that I is k-covered and that the network is connected. Note that coverage is affected by sensors’ sensing distance, while connectivity is determined by their commu-nication distance. Considering that sensors are mobile and the area I may change over time, the objective of the dispatch problem is to schedule sensors to move to the designated locations (according to the result computed by the placement

. The authors are with the Department of Computer Science, National Chiao Tung University, 1001 Ta Hsueh Road, Hsinchu, Taiwan 300, R.O.C. E-mail: {wangyc, yctseng}@cs.nctu.edu.tw.

Manuscript received 20 Apr. 2007; revised 8 Nov. 2007; accepted 14 Nov. 2007; published online 21 Nov. 2007.

Recommended for acceptance by J.-P. Sheu.

For information on obtaining reprints of this article, please send e-mail to: tpds@computer.org, and reference IEEECS Log Number TPDS-2007-04-0119. Digital Object Identifier no. 10.1109/TPDS.2007.70808.

(2)

strategy) such that the total energy consumption of sensors due to movement can be minimized.

In the literature, one related area is the art gallery problem [7] in computational geometry. It intends to use the minimum number of observers to monitor a polygon area. The problem assumes that an observer can watch any point, as long as line of sight exists, and it does not address the (wireless) communication issue between observers. An-other relevant issue is the base station (BS) placement problem. This problem discusses how we can determine the optimal number and locations of BSs within an environment so as to satisfy the coverage and throughput requirements [8]. To solve this problem, many studies propose their discrete optimization models by multiobjective genetic algorithms [8], [9], parallel evolutionary algorithms [10], and simulated annealing [11] to determine the optimal placement of BSs. However, these results cannot be directly applied to our sensor placement problem.

Sensor placements for 1-coverage have been studied in several works. For example, the works in [12] and [13] consider placing sensors in a gridlike fashion to satisfy some coverage requirements, while [14] suggests placing sensors strip by strip to achieve both coverage and connectivity. In [15], a 1-coverage sensor placement method for the sensing field with obstacles is proposed. Several studies have also considered the sensor placement problem of multilevel coverage. In [3], a hexagonlike placement is proposed to guarantee that the sensing field is k-covered, under the assumption that the communication distance of sensors rcis not smaller than twice their sensing distance rs.

The work in [16] models the sensing field by grids and considers two kinds of sensors with different costs and sensing capabilities to be deployed in the sensing field. The objective is to make every grid point k-covered, and the total cost is minimum. However, both [3] and [16] do not address the relationship between rc and rs. How the coverage level

of a given placement can be computed is addressed in [17]. Some works address the coverage and connectivity issue by assuming that there is redundancy in the initial deployment, and the goal is to select a minimal set of active sensors to achieve energy conservation and maintain complete coverage of the sensing field and connectivity of the network. References [4] and [18] address how some sensors can be arranged to go to sleeping modes to extend the network lifetime while maintaining 1-coverage of the sensing field. On the other hand, [19], [20], [21], [22], and [23] consider how these active sensors can be selected to maintain the k-coverage of the sensing field and the connectivity of the network.

The use of mobile sensors has also been discussed in several works. Basu and Redi [24] consider moving nodes to make the network biconnected. When events occur, Butler and Rus [25] discuss how some sensors can be moved to the event locations while still maintaining complete 1-coverage of the sensing field. The authors in [26], [27], [28], and [29] study how sensors can be moved to enhance the coverage of the sensing field by using the Voronoi diagram or attractive/repulsive forces between sensors. In [30], the sensing field is partitioned into grids, and sensors are moved from high-density grids to

low-density ones to achieve more uniform coverage. The work in [31] considers adding several mobile sensors into a stationary sensor network to improve the coverage and connectivity of the original network. As can be seen, the attention of prior works was mainly paid to the use of mobile sensors to improve the topology of an existing network, which is different from the sensor dispatch problem discussed in this paper. Actually, several studies [32], [33], [34] have proposed their design and implementa-tion of mobile sensors. Such mobile platforms are controlled by embedded computers and are mounted with sensors. These studies motivate us to investigate the sensor dispatch problem.

In this paper, we consider more complete solutions to the k-coveragesensor deployment problem by addressing both the placement and dispatch subproblems. In particular, for the sensor placement problem, we allow an arbitrary relationship between sensors’ communication distance rc

and their sensing distance rs. We consider two types of

sensing models: binary and probabilistic. Under the binary sensing model [14], [15], [28], a location can be either monitored or not monitored by a sensor, depending on whether the location is within the sensor’s rsrange. Under

the probabilistic sensing model [12], [23], [35], a location will be monitored by a sensor according to some probability function. We first consider the binary sensing model of sensors and propose two solutions to the placement problem. The first one is based on an intuitive duplication idea, while the second one is based on a more complicated interpolating scheme and thus can save more sensors. Then, we adapt these solutions to the probabilistic sensing model by properly adjusting the sensing distances of sensors. For the sensor dispatch problem, we propose two distributed schemes to let sensors move to the designated locations (computed by the placement result) on their own. The first scheme assumes that sensors have the full knowledge of all target locations in the area of interest. Sensors will compete with each other to move toward their closest locations. The second scheme relaxes the above assumption in a way that sensors can derive other target locations based on several known locations according to the patterns in our placement strategies. Therefore, we can give several locations as seeds in the beginning, and sensors will then extend their range based on the placement pattern in a distributed manner.

In this paper, we consider that the area of interest I may change over time (based on users’ application requirements), so sensors may be dispatched in multiple rounds. Specifically, in each round, when a new I is generated, the sink first calculates the locations to be placed with sensors in I by the proposed placement solutions and announces the complete or partial locations to sensors. Sensors then can automatically move to these designated locations by the proposed dispatch solutions to ensure the k-coverage of I . Because the sink does not know the current statuses and positions of mobile sensors, it cannot determine which sensor should move to which location in a centralized manner. Therefore, distributed dispatch solu-tions are more desirable.

(3)

The major contributions of this paper are twofold. First, our schemes allow change of the monitoring region and coverage level of the WSN in an autonomous and distributed manner. This is quite important for those applications where the region of interest may change over time. For example, one can image that a wide area is contaminated by some hazardous material such as the leakage of nuclear or poisonous chemicals. By quickly providing multilevel coverage of these movable regions of pollution, the whole situation can be assessed immediately, and such information can be conveniently used by the rescue team. Second, our deployment solutions are helpful in conditions where the precise initial deployment (for example, by humans) is almost impossible, because the region of interest is very dangerous or even inaccessible to people. By introducing the concept of sensor dispatch, mobile sensors can automatically move to designated locations in an efficient way, and thus, the region of interest can be “self deployed” by these sensors.

The rest of this paper is organized as follows: Section 2 formally defines the sensor placement and dispatch problems. Sections 3 and 4 propose our solutions to these problems. Section 5 presents simulation results to evaluate the proposed schemes. Section 6 concludes this paper.

2

P

ROBLEM

S

TATEMENT

We are given a field A, an area of interest I inside A, and a set of mobile sensors S resident in A. For convenience, we assume that I is a rectangular region. Each sensor has a communication distance rcand a sensing distance rs. Sensors

are homogenous, but the relationship of rc and rs can be

arbitrary. For connectivity, we assume that two sensors can communicate with each other if their distance is not larger than rc. For coverage, we consider both the binary and

probabilistic sensing models of sensors. Under the binary sensing model, a location can be monitored by a sensor if it is within the sensor’s sensing region. Thus, a location in A is defined as k-covered if it is within k sensors’ sensing regions, where k is a given parameter. Under the probabilistic sensing model, the detection probability of a sensor will decay with the distance from the sensor to the monitored location. In particular, the detection probability of a location u by a sensor sican be evaluated as [12], [35]

pðu; siÞ ¼ e "dðu;siÞ; if dðu; s iÞ  rs; 0; otherwise;  ð1Þ where " is a parameter indicating the physical character-istics of the sensor, and dðu; siÞ is the distance between u

and si. Thus, a location in A is considered as k-covered if the

probability that there are at least k sensors that can detect this location is not smaller than a predefined threshold pth,

where 0 < pth< 1. With the above definitions, an area in A

is considered as k-covered if every location inside that area is k-covered. We assume that sensors can be aware of their own positions, which can be obtained by the Global Positioning System (GPS) [36] or other localization techni-ques [37], [38].

Given an integer k, the k-coverage sensor deployment problem can be divided into two subproblems: the

k-coverage sensor placement problem and the distributed sensor dispatch problem. The objective of the placement problem is to determine the minimum number of sensors required and their locations in the area of interest I to guarantee that I is k-covered and that the network is connected. Considering that mobile sensors are arbitrarily placed inside A and that there are sufficient sensors, the dispatch problem asks how sensors can be moved to designated locations (according to the result computed by the placement strategy) in a distributed manner such that the total energy consumption of sensors due to movement is minimized, that is, minPi2Semove

i  di, where emovei is the

energy cost for sensor i to move in one unit distance, and di

is the total distance that sensor i has traveled. Note that here, we assume that a sensor will move at a constant speed and will incur a constant rate of energy drain during its motion [30], [39]. However, the energy model may be defined in a different way from this one.

3

k-Coverage

S

ENSOR

P

LACEMENT

S

CHEMES

In this section, we deal with the k-coverage sensor placement problem. We first consider the binary sensing model of sensors and propose two placement solutions. The first solution is based on a naive duplication idea, while the second solution is inspired by a more complicated interpolating concept. Then, we discuss how these placement schemes can be adapted to the probabilistic sensing model.

3.1 The Naive Duplicate Placement Scheme

One intuitive idea to achieve a k-coverage placement is to use a good sensor placement method to determine the locations of sensors to ensure 1-coverage and connectivity in I and then duplicate k sensors on each designated location. For the 1-coverage placement, we adopt the method proposed in [15], which has been proved to be able to use the minimum number of sensors to achieve 1-coverage and connectivity [40]. In this 1-1-coverage place-ment, sensors are placed row by row, where each row of sensors will guarantee continuous coverage and connectiv-ity, while adjacent rows will guarantee continuous coverage of the whole area. According to the relationship of rcand rs,

we separate the discussion into two cases, as shown in Fig. 1. When rc<

ffiffiffi 3 p

rs, sensors on each row are separated

by a distance of rc, so the connectivity of sensors in each

row can be guaranteed. Since rc<

ffiffiffi 3 p

rs, each row of sensors

can cover a beltlike area of width 2, where  ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffir2 s14r2c

q

. Adjacent rows will be separated vertically by a distance of rsþ  and will be shifted horizontally by a distance ofr2c.

This guarantees the coverage of the whole area. When rc ffiffiffi3

p

rs, the aforementioned placement will use too many

sensors, so a common regular placement of triangular lattice [41] should be adopted, where adjacent sensors will be regularly separated by a distance ofpffiffiffi3rs.

After determining the 1-coverage placement, we can duplicate k sensors on each location to ensure k-coverage of the whole area. Note that in the case of rc<

ffiffiffi 3 p

(4)

distance between sensors on adjacent rows is larger than rc,

it is necessary to add some extra columns of sensors, where sensors on each column are separated by a distance not larger than rc, to connect adjacent rows.

3.2 The Interpolating Placement Scheme

The previous duplicate scheme may result in some subregions in I that have coverage levels much higher than k. Consequently, the following interpolating placement scheme will try to balance the coverage levels of subregions. Observe that in Fig. 1a, a large amount of subregions in a row are actually more than 1-covered. Thus, we can “reuse” these subregions when generating a multilevel coverage placement. Based on this observation, the interpolating placement scheme will first find out those insufficiently covered subregions and then place the least number of sensors to cover these regions. Note that these newly added

sensors should remain connected with the formerly placed sensors. According to the relationship of rc and rs, we

separate the discussion into three cases. The case of rc

ffiffi

3 p

2 rs. In Fig. 1a, we can observe

that the insufficiently covered subregions (that is, only 1-covered regions) are located between adjacent rows (marked by gray). If we add an extra row of sensors between each pair of adjacent rows in Fig. 1a, as Fig. 2a shows, the coverage level of the sensing field will directly become three. Here, each extra row is placed above the previous row by a distance of rs, and neighboring sensors in

each extra row are still separated by a distance of rc. Note

that in Fig. 2a, some sensors may be placed outside the area of interest I . This may lead to the failure of the interpolating scheme to calculate a feasible solution when I ¼ A. To solve this problem, we can place these outside sensors on the boundary of I, as shown in Fig. 2b. In this case, 3-coverage of I can still be achieved, because sensors are placed more compactly.

In the case of rc

ffiffi

3 p

2 rs, since the distance between

sensors on adjacent rows is rs (which is larger than rc),

we have to add at least one column of sensors, each separated by a distance not larger than rc, to connect

adjacent rows.

To summarize, the previous duplicate scheme uses 3x rows of sensors to ensure 3-coverage of a beltlike area of width ðx  1Þrsþ ðx þ 1Þ, while this interpolating scheme

uses only 2x þ 1 rows of sensors to ensure 3-coverage of the same region. In general, for k > 3, we can apply k

3

 

times of the above 3-coverage placement and apply ðk mod 3Þ times of the 1-coverage placement to achieve k-coverage in I . Therefore, while the duplicate placement requires kx rows of sensors to cover a region, this interpolating placement requires only k

3   ð2x þ 1Þ þ ðk mod 3Þ  x   rows of sensors. The case of pffiffi3 2 rs< rc 2þpffiffi3

3 rs. In this case, if the

desired coverage level k is two, we can directly apply the

WANG AND TSENG: DISTRIBUTED DEPLOYMENT SCHEMES FOR MOBILE WIRELESS SENSOR NETWORKS TO ENSURE MULTILEVEL... 1283

Fig. 1. The 1-coverage sensor placement method proposed in [15]. (a) The case of rc<

ffiffiffi 3 p rs. (b) The case of rc ffiffiffi 3 p rs.

Fig. 2. The interpolating placement scheme in the case of rc

ffiffi

3 p

(5)

same placement in the previous case. The result is shown in Fig. 3a. However, because the sensing distance rsis relatively smaller (as opposed to the case of rc

ffiffi

3 p

2 rs),

there are some subregions that are only 2-covered but not 3-covered (marked by gray in Fig. 3a). Therefore, if the desired k is three, we need to add one extra row of sensors (marked as new’ i) between each new row i and old row i, as Fig. 3b shows. Note that these extra rows are shifted horizontally by a distance ofrc

2 from the previous rows and

neighboring sensors are separated regularly by a distance of 2rc. Also, note that each new’ row i can connect with its

adjacent new row i and old row i, as shown in Fig. 3c. In particular, because jsnsaj ¼ jsnsbj ¼ jsnscj ¼ jsnsdj ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 1 2rs  2 þ 1 2rc  2 s <1 2 ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 ffiffiffi 3 p rc  2 þr2 c s < rc;

the sensor sn in a new’ row i can communicate with its

four neighbors sa, sb, sc, and sd in the adjacent new and

old rows.

In the case of pffiffi3

2 rs< rc< rs, because the distance

between sensors on adjacent rows may be larger than rc,

we have to add extra sensors between them to maintain the network connectivity. There are two cases to be discussed. When k ¼ 2, we need to add at least one column of sensors between every two adjacent rows to connect them. When

k 3, because a new’ row has already connected with its adjacent new and old rows, we only have to add these extra columns of sensors between each old row i and new row i þ 1 to maintain the network connectivity.

To summarize, the previous duplicate scheme uses 3xrows of sensors to ensure 3-coverage of a beltlike area of width ðx  1Þrsþ ðx þ 1Þ, while this interpolating scheme

can use only 2:5x þ 1 rows of sensors to ensure 3-coverage of the same region (the third addition of rows only needs about 0:5xextra sensors). In general, for k > 3, we can also apply k

3

  times of the above 3-coverage placement and apply ðk mod 3Þ times of the 1-coverage placement to achieve k-coverage in I. Therefore, while the duplicate placement requires kx rows of sensors to cover a region, this interpolating placement only requires k 3   ð2:5x þ 1Þ þ ðk mod 3Þ  x   rows of sensors. The case of rc>2þ ffiffi 3 p

3 rs. In the previous case, when rc

increases, the areas of these only 2-covered regions in Fig. 3a also increase. To achieve the 3-coverage placement using fewer sensors, each sensor sn in a new’ row should

completely cover two only 2-covered regions (marked by gray), as shown in Fig. 3d. In this case, we should make jxsnj  rs, so we can obtain jxsnj ¼ jxyj þ jysnj ¼ rc ffiffiffi 3 p 2 rs  þ1 2rc rs ) rc 2þpffiffiffi3 3 rs:

Fig. 3. The interpolating placement scheme in the case of pffiffi3

2rs< rc2þ

ffiffi

3 p

3 rs. (a) The placement for k¼ 2. (b) The placement for k ¼ 3.

(6)

Clearly, when rc>2þ

ffiffi

3 p

3 rs, sensor sn can no longer cover

the nearest two 2-covered regions. Thus, we need to add one extra sensor in the new’ row to cover every 2-covered region. In this case, if the duplicate scheme uses 3x rows of sensors to ensure 3-coverage of a beltlike area of width ðx  1Þrsþ ðx þ 1Þ, this interpolating scheme should use

3xþ 1 rows to achieve the same goal. Since the interpolat-ing placement will not save sensors compared to the duplicate placement, we adopt the duplicate scheme in the case of rc>2þ

ffiffi

3 p 3 rs.

3.3 Adapting to the Probabilistic Sensing Model In this section, we discuss how the previous two placement schemes can be adapted to the probabilistic sensing model, where the detection probability of a sensor to any location follows that specified in (1). To simplify the presentation, we call the probability that a location u can be detected by at least k sensors as the k-covered probability of location u. To adapt our placement schemes, we first find the minimum k-covered probability pmin in our placement.

Then, we calculate a pseudo sensing distance rp

s according

to pmin and pth and replace the original sensing distance rs

by rp

s in the placement to guarantee that every location

inside I is still k-covered under the probabilistic sensing model. In this section, we assume that I  A and the desired coverage level k  3.

3.3.1 Adaptation of the Duplicate Placement Scheme Observing in Fig. 1, there must be a location u covered by only one sensor with a distance approximate to rs. Such a

location u is very close to the sensing boundary of the sensor placed at location a but not inside the sensing ranges of sensors placed at locations b and c. Thus, we can derive the detection probability of location u by the sensor sa

located at a as pðu; saÞ ¼ e"dðu;saÞ e"rs. Because the

duplicate scheme places k sensors on each location specified in Fig. 1, location u will have the minimum k-covered probability pmin. In particular, location u will be

detected by a set Sa of k sensors placed at location a with

the probability

pmin¼ pðu; SaÞ ¼

Y

si2Sa

pðu; siÞ  ek"rs:

Therefore, the duplicate scheme can guarantee a k-covered probability of at least ek"rs in any location of the area of

interest I . On the other hand, if we want to guarantee that every location inside I has a k-covered probability not smaller than the given threshold pth, we can calculate the

pseudo sensing distance rp sby

ek"rps  p

th) rps

 ln pth

k" :

With the above argument, if we replace rs by rps when

executing the duplicate scheme, we can guarantee that I is still k-covered under the probabilistic sensing model. 3.3.2 Adaptation of the Interpolating Placement Scheme According to the relationship of rc and rs, we separate the

discussion into three cases.

The case of rc

ffiffi

3 p

2 rs. We first consider the case of k ¼ 3.

Observing in Fig. 2a, there are some subregions covered by exactly three sensors (marked by gray). Among these regions, there will be a location u with a minimum 3-covered probability. In particular, such a location u will be covered by sensors sa, sb, and sc located at a, b, and c,

respectively. Since dðu; saÞ ¼ rs, we have pðu; saÞ ¼ e"rs. In

addition, because dðu; sbÞ ¼ dðu; scÞ < ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 1 2rc  2 þ 1 2rs  2 s 1 2 ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 3 p 2 rs  2 þr2 s s ¼ ffiffiffi 7 p 4 rs; we can obtain pðu; sbÞ ¼ pðu; scÞ > e

ffiffi

7 p

4"rs. Thus, the 3-covered

probability of location u is

pabc¼ pðu; saÞ  pðu; sbÞ  pðu; scÞ > e

2þpffiffi7 2 "rs:

In the interpolating scheme, when k  3 is a multiple of three, we will placek

3 sensors on each location specified in

Fig. 2a. Therefore, we can obtain pmin¼ ðpabcÞ k 3> e2þ ffiffi 7 p 6 k"rs: ð2Þ

When k is not a multiple of three, we will add extra ðk mod 3Þ sensors on each location in the old rows in Fig. 2a. Thus, we have pmin¼ ðpabcÞ k 3 pðu; s cÞ ð Þðk mod 3Þ: ð3Þ By combining (2) and (3), we can derive that

pmin> e 2þpffiffi7 6 kþ ffiffi 7 p 4ðk mod 3Þ   "rs: ð4Þ

To calculate the pseudo sensing distance rp

s, we can make e 2þ ffiffi7 p 6 kþ ffiffi 7 p 4ðk mod 3Þ   "rps  p th ) rps  ln pth 2þpffiffi7 6 kþ ffiffi 7 p 4 ðk mod 3Þ " : The case of pffiffi3 2 rs< rc 2þpffiffi3

3 rs. Again, we first

con-sider the case of k ¼ 3. Observing in Fig. 3b, there are some subregions covered by exactly three sensors (marked by gray). Among these regions, there will be a location u that has the minimum 3-covered probability. In particular, such a location u is covered by sensors sa, sb,

and sc at locations a, b, and c, respectively. Because

dðu; saÞ ¼ dðu; scÞ ¼12rs, we have pðu; saÞ ¼ pðu; scÞ ¼ e

1 2"rs.

Moreover, since dðu; sbÞ ¼12rc2þ

ffiffi 3 p 6 rs, we can obtain pðu; sbÞ  e 2þpffiffi3

6 "rs. Thus, the 3-covered probability of

location u will be

pabc¼ pðu; saÞ  pðu; sbÞ  pðu; scÞ  e

8þpffiffi3 6 "rs:

Similar to (4), when k  3, we can derive the minimum k-coveredprobability pmin as

ðpabcÞ k 3 pðu; s cÞ ð Þðk mod 3Þ e 8þ ffiffi3 p 18kþ 1 2ðk mod 3Þ   "rs:

(7)

Again, the pseudo sensing distance rp scan be derived as e 8þ ffiffi 3 p 18 kþ 1 2ðk mod 3Þ   "rps  p th ) rp s  ln pth 8þpffiffi3 18 kþ 1 2ðk mod 3Þ " : The case of rc>2þ ffiffi 3 p

3 rs. In this case, since the duplicate

scheme is adopted, we can obtain pmin ek"rs and

rps ln pth

k" .

Table 1 summarizes the approximate threshold values of the minimum k-covered probability pmin and the pseudo

sensing distance rp

sin the interpolating scheme.

4

D

ISTRIBUTED

S

ENSOR

D

ISPATCH

S

CHEMES

After determining the locations to be placed with sensors, the next issue is how we can move existing sensors in the field A to the designated locations in I such that the energy consumption of sensors due to movement can be minimized. Since we cannot obtain the current statuses and positions of sensors, it is impossible to compute an optimal solution to dispatch sensors in a centralized manner. Thus, we propose two distributed dispatch schemes in this section.

4.1 The Competition-Based Dispatch Scheme In this scheme, when an area of interest I is determined, the sink will first calculate a set of locations L ¼ fðx1; y1; n1Þ; ðx2; y2; n2Þ;    ; ðxm; ym; nmÞg to be placed

with sensors in I according to our placement schemes in Section 3. Here, each element ðxj; yj; njÞ, j ¼ 1 . . . m,

indi-cates that nj sensors need to be placed on location ðxj; yjÞ.

The sink then broadcasts L to all sensors.

On receiving L from the sink, sensors will compete with each other to move toward these locations. In particular, each sensor si will construct a table OCC½1 . . . m such that

e v e r y e n t r y OCC½j ¼ fðsj1; dj1Þ; ðsj2; dj2Þ; . . . ; ðsj; djÞg,

 nj, contains the set of sensors that have already moved

into or are still on their way moving toward location ðxj; yjÞ

and their corresponding distances to ðxj; yjÞ. Specifically,

each record ðsj; djÞ,  ¼ 1 . . . , indicates that sensor sjhas

chosen to cover location ðxj; yjÞ, and its current estimated

distance to ðxj; yjÞ is dj. When dj¼ 0, it means that sensor

sjhas already arrived at ðxj; yjÞ. Initially, OCC½j ¼ ; for all

j¼ 1 . . . m. To simplify the presentation, we say that a location ðxj; yjÞ is covered if a sufficient number njof sensors

have committed to move toward ðxj; yjÞ (that is,

jOCC½j j ¼ nj); otherwise, ðxj; yjÞ is uncovered. A sensor si

is engaged if it has chosen to move to or has already moved into any location in L; otherwise, it is free or terminated. The initial state of each sensor is free. A free sensor will try to

become engaged and move toward a destination. When the free sensor finds that there is no location that it can cover, it will enter the terminated state. Fig. 4 illustrates the state transition diagram of a sensor.

When the state of a sensor si is free, it will check its

OCC½1 . . . m table to select a location in L as its destination. The selection is given as follows:

1. The first priority is to consider uncovered locations. Specifically, if there is a location ðxj; yjÞ such that

jOCC½j j < nj;ðxj; yjÞ will be considered first. If

multiple locations are qualified, the location ðxj; yjÞ

such that dðsi;ðxj; yjÞÞ is minimized will be selected,

where dðsi;ðxj; yjÞÞ is the distance between si’s

current position to ðxj; yjÞ. In this case, si will add

a record ðsi; dðsi;ðxj; yjÞÞÞ in its OCC½j entry and

enter the engaged state.

2. If all locations in L are already covered (that is, jOCC½j j ¼ nj, 8j ¼ 1 . . . m), si selects a location

ðxj; yjÞ such that there is a record ðsk; dkÞ 2 OCC½j

and emove

i  dðsi;ðxj; yjÞÞ < emovek  dk. If multiple

locations are qualified, the location ðxj; yjÞ such

that emove

k  dk emovei  dðsi;ðxj; yjÞÞ is maximized

will be selected. In this case, si will replace the

original record ðsk; dkÞ 2 OCC½j by the new record

ðsi; dðsi;ðxj; yjÞÞÞ in its OCC½j entry and enter the

engaged state. Here, both sensors si and sk are

competing for the same location ðxj; yjÞ. Because si

can consume less energy to move to ðxj; yjÞ, we

should replace sk’s mission by sito reduce the total

moving energy. Note that sensor sk will realize that

it loses the competition when it receives an update message originated from si later.

When sensor sibecomes engaged, it begins moving toward

its destination. Otherwise, siwill enter the terminated state,

because it does not need to cover any location.

TABLE 1

Approximate Threshold Values of pmin and rps in the Interpolating Placement Scheme

Fig. 4. The state transition diagram of each sensor siin the

(8)

For maintenance purposes, each sensor si will

periodi-cally perform the following actions:

1. Update the content of its OCC½1 . . . m table. Speci-fically, for each ðsj; djÞ 2 OCC½j , j ¼ 1 . . . m, we

decrease dj by the expected moving distance of sj

during the last period of time, unless dj¼ 0.

2. Broadcast si’s current status to its one-hop neighbors,

including its ID, its moving energy cost emove i , its

OCC½1 . . . m table, and its current position and state. The above actions can be controlled by setting two timers Tupdate OCC and Tbroadcast. Note that the update of the

OCC½1 . . . m table is based on the assumption that sensors all move in the same constant speed. If this assumption is not valid, dj is only an estimated distance for sensor sj to

location ðxj; yjÞ. In this case, we can make an extension by

including each sensor’s moving speed in its broadcast message.

When a sensor si receives an update message from

another sensor sk, two actions will be taken:

1. First, si has to update its OCC½1 . . . m table as

follows: Let us denote by OCCi½1 . . . m and

OCCk½1 . . . m the tables of si and sk, respectively.

For each j ¼ 1 . . . m, we calculate the union Uj¼ OCCi½j [ OCCk½j . If jUjj  nj, we will replace

OCCi½j by Uj. Otherwise, it means that there are too

many sensors scheduled to cover ðxj; yjÞ, in which

case we will truncate those records ðsk; dkÞ in Ujthat

have more moving energy (that is, a large value of emove

k  dk) until the size jUjj ¼ nj. Then, we replace

OCCi½j by the truncated Uj. Note that the above

merge of two sets may lead to a special case that si

was in the original OCCi½j entry but is not in the

new OCCi½j entry. In this case, it means that sihas

been replaced by some other sensors with a lower moving energy to ðxj; yjÞ. If so, sensor si should

change its state from engaged to free and then reselect another destination.

2. After the above merge, if si remains engaged, say,

with ðxj; yjÞ being its destination, we will conduct

the following optimization. We will check if emovei  d sð i;ðxl; ylÞÞ þ emovek  d s k;ðxj; yjÞ

< emovei  d si;ðxj; yjÞ

  þ emove

k  d sð k;ðxl; ylÞÞ;

where ðxl; ylÞ is the current destination of sk. If so, it

means that the total moving energy of si and skcan

be reduced if we exchange their destinations. In this case, siwill communicate with skfor this trade. Once

the trade is confirmed, si will replace the records

ðsi; diÞ and ðsk; dkÞ in OCCi½j and OCCi½l by the new

records ðsk; dðsk;ðxj; yjÞÞÞ and ðsi; dðsi;ðxl; ylÞÞÞ,

re-spectively. Note that sk will also update its OCCk½j

and OCCk½l entries with the same records.

In the above steps, if any entry in the OCCi½1 . . . m table has

been changed, si will broadcast the modified content to its

direct neighbors.

When a sensor si is in the engaged state, it will keep

moving toward its destination ðxj; yjÞ. When si arrives at

ðxj; yjÞ, it will change its state to terminated and begin its

monitoring job at the designated location. Meanwhile, it still executes the maintenance actions until the sink commands it to stop. Since the sink will eventually observe that I is k-covered(by receiving the sensing reports from sensors), it can notify all sensors to exit from the dispatch algorithm. Fig. 5 summarizes the main steps of the competition-based scheme. Theorem 1 shows that the competition-based scheme can guarantee I to be k-covered if there are sufficient sensors.

Theorem 1. Given an area I A, the competition-based dispatch scheme guarantees that I will be eventually k-coveredif there are sufficient mobile sensors inside A. Proof.Since the proposed placement schemes in Section 3

can compute a set of locations L inside I to be placed with sensors to ensure that I is k-covered, we only have to show that every location ðxj; yjÞ 2 L will

eventually be covered by nj sensors. Observe that in

the competition-based scheme, it is guaranteed that an engaged sensor si will eventually arrive at location

ðxj; yjÞ if the record ðsi; diÞ remains in si’s OCC½j entry.

However, if the record ðsi; diÞ is removed during si’s

movement toward ðxj; yjÞ, it means that either another

sensor sktrades its current destination ðxl; ylÞ with sior si

loses the competition. In the former case, the locations ðxj; yjÞ and ðxl; ylÞ will be covered by sk and si,

respectively. In the latter case, it means that ðxj; yjÞ has

already been committed by more than njsensors, so it is

safe for sensor si to give up the location ðxj; yjÞ. In this

case, sihas to reselect another destination. If sifinds that

jOCC½j j ¼ njfor all j ¼ 1 . . . m, then every location in L

has been committed by sufficient sensors, so all locations will be eventually covered by nj sensors. Therefore, the

competition-based dispatch scheme guarantees that I will be eventually k-covered if there are sufficient mobile sensors. tu Remark 1.Theorem 1 also shows that the competition-based scheme can converge when there are sufficient sensors. However, when the number of sensors is not sufficient to cover I , the competition-based scheme still guarantees that each sensor can eventually find a location to cover. In this case, if the sink knows in advance the total number of mobile sensors, it can also notify all sensors to exit from the dispatch algorithm earlier. If this assumption is not valid, a time-out mechanism should be applied to guarantee the convergence of this dispatch scheme. In this case, the sink

WANG AND TSENG: DISTRIBUTED DEPLOYMENT SCHEMES FOR MOBILE WIRELESS SENSOR NETWORKS TO ENSURE MULTILEVEL... 1287

(9)

can maintain a timer to decide when to terminate the dispatch algorithm.

Remark 2. There is a hidden assumption that the initial deployment of the network is connected, so sensors can receive the target locations L from the sink safely. For those sensors isolated from the initial network, they can only receive L when other sensors with L move close to them (by step 4). However, to alleviate the worst situation that some sensors may be always isolated from other sensors, we can enforce sensors to roam around randomly from time to time to increase the probability of information exchange.

Remark 3. Most message exchanges in the competition-based scheme rely on broadcast mechanism (steps 1 and 4). Since sensors will periodically broadcast their statuses and OCC tables, this scheme can tolerate the slight loss of messages. Thus, no extra acknowledgment mechanism is required to ensure proper operations of the competition-based scheme. In addition, to ensure that sensors correctly update their OCC tables, a time-stamp or a sequence number is needed in each message to distinguish new from old messages.

Remark 4. In the competition-based scheme, sensors will find out and move to their destinations on their own, without any interaction with the sink. The sink only announces available target locations in the begin-ning. Thus, the competition-based scheme is essentially distributed.

4.2 The Pattern-Based Dispatch Scheme

The previous competition-based scheme assumes that every sensor has full knowledge of all target locations inside I . This requires the sink to execute the placement scheme for I and then to broadcast all target locations to every sensor. Consequently, in this section, we propose a pattern-based dispatch scheme, which allows sensors to derive the target locations on their own, thus relaxing the above limitation.

Observe that our placement schemes in Section 3 actually place sensors with some regular patterns. Specifically, in the duplicate placement scheme, sensors will be placed in a hexagonlike fashion. Thus, each sensor at the location ðx; yÞ can derive its potential six neighbors’ positions according to Table 2. When the interpolating placement scheme is adopted, the pattern will be changed according to the relationship of rc and rs:

1. rc

ffiffi

3 p

2 rs. Recall the placement in Fig. 2a. There are

two patterns A and B, which will be repeated in each

old row and new row, as shown in Fig. 6a. Therefore, a sensor silocated at ðx; yÞ can derive its five neighbors’

positions according to its pattern. Moreover, si can

also derive the patterns of its neighbors, depending on its own pattern (indicated by the letters inside circles in Fig. 6a).

2. pffiffi3

2 rs< rc 2þpffiffi3

3 rs. In this case, if the desired

coverage level k is two, we can directly apply patterns A and B in the previous case. However, when k  3, there is an extra row (marked as new’) between each new and old rows in Fig. 3b. This will result in four placement patterns C, D, E, and F, as Fig. 6b shows, depending on a sensor’s position and its row number. Thus, a sensor silocated at ðx; yÞ can

derive its six neighbors’ positions based on its pattern. In addition, si can also derive the patterns

of its neighbors according to its own pattern (indicated by the letters inside circles in Fig. 6b). Note that we do not derive the patterns for sensors at the extra new’ rows (although this is feasible, deriving these patterns will complicate the problem a lot). That is why sensors marked by double circles are not assigned with any pattern letter.

3. rc>2þ

ffiffi

3 p

3 rs. In this case, since the duplicate

place-ment scheme is adopted, a sensor can compute its neighbors’ positions according to Table 2.

To summarize, the above observations allow a sensor to derive its direct neighbors (within the rs range) and the

patterns that they will use. This property allows us to expand from a partial deployment to a full deployment of sensors in I . Note that since the values of rc and rs are

known, each sensor can maintain a small table to record the related positions of its neighbors in each pattern. Thus, the calculation of neighbors’ positions can be translated to a simple table lookup procedure.

With the above property, the pattern-based dispatch scheme works as follows: Each sensor initially keeps a set of seed locations L0¼ fðx1; y1; n1; 1Þ; ðx2; y2; n2; 2Þ;    ;

ðx; y; n; Þg, which is a partial list of locations to be

placed with sensors in I, where jis the pattern used by the

sensor at location ðxj; yjÞ. Clearly, L0can be considered as a

subset of L. Note that these seed locations should be sparsely distributed over I so that sensors may not crowd into only few locations in the beginning. Each sensor then executes the competition-based scheme to contend for their closest locations in L0. However, the original steps 3 and 5 in the competition-based scheme should be modified as follows:

. Step 3’: A free sensor siwill try to select a location in

L0 as its destination. If si cannot find any available

location from its current OCC½ table, it will calculate some new locations based on the known locations and their patterns in the OCC½ table. Then, siwill try to select a destination among these

newly derived locations. However, if si cannot

calculate any new location from its current L0(which means that L0¼ L), siwill enter the terminated state,

since it does not need to cover any location. . Step 5’: When an engaged sensor si arrives at its

destination, it will derive some new locations from

TABLE 2

Coordinates of the Six Neighbors of a Sensor Located atðx; yÞ in the Duplicate Placement Scheme

(10)

its current L0and add the corresponding new entries in its OCC½ table.

Corollary 1. Given an area I A, the pattern-based dispatch scheme guarantees that I can be k-covered if there are sufficient mobile sensors inside A.

Proof. From Theorem 1, we know that the competition-based dispatch scheme can ensure that I is k-covered if there are sufficient sensors. Since the pattern-based scheme works similarly to the competition-based one, we only need to show that the complete information of L can be eventually known by all sensors. Observing in the pattern-based scheme, since a sensor can either derive new locations by itself (according to steps 3’ and 5’) or learn new locations from other sensors (by step 4 in the competition-based scheme), the complete information of L can be propagated throughout the whole network. Therefore, the pattern-based scheme also guarantees I to be k-covered when there are sufficient mobile sensors. tu

5

E

XPERIMENTAL

R

ESULTS

In this section, we present some experimental results to evaluate the performances of the proposed schemes. The

evaluation includes three parts. First, we measure the numbers of sensors required by different placement schemes discussed in Section 3. Second, we verify the effectiveness of our sensor dispatch schemes proposed in Section 4. Finally, we study the effect of seed locations on the pattern-based dispatch scheme.

5.1 Evaluations of the Sensor Placement Schemes The first experiment measures the numbers of sensors required by different placement schemes. We design an area of interest I as a 1,000 m  1,000 m square region to be placed with sensors. The communicate distance rc is set to

10 m, which is approximate to that specified in the IEEE 802.15.4 Standard [42] in an indoor environment. To reflect the relationships of rc<

ffiffi 3 p 2 rs, rc ffiffi 3 p 2 rs (boundary case),pffiffi3 2 rs< rc< 2þpffiffi3 3 rs, rc 2þpffiffi3

3 rs(boundary case), and

rc>2þ

ffiffi

3 p

3 rs, we set the sensing distance rsto 15, 11.55, 10,

8.04, and 6 m, respectively. We mainly compare the results of the duplicate and interpolating placement schemes discussed in Section 3. For baseline reference, we also calculate the theoretical lower bound of the number of sensors required by rjI j2

s

l m

 k, where jI j is the area of I

WANG AND TSENG: DISTRIBUTED DEPLOYMENT SCHEMES FOR MOBILE WIRELESS SENSOR NETWORKS TO ENSURE MULTILEVEL... 1289

Fig. 6. The repeated patterns in the interpolating placement scheme. (a) The case of rc

ffiffi 3 p 2 rs. (b) The case of ffiffi 3 p 2 rs< rc 2þpffiffi3

3 rswhen the desired

(11)

(that is, 106m2 in this experiment). Note that the above

lower bound can never be achieved, because it does not consider the connectivity and coverage overlapping between sensors.

Fig. 7 illustrates the numbers of sensors required when the desired coverage level k increases from two to seven. When k ¼ 2, the interpolating scheme requires slightly more sensors compared with the duplicate scheme, because the former needs an extra row of sensors to ensure 2-coverage of I’s boundary. However, when k  3, the interpolating scheme can save approximately 19.4 percent 32.5 percent and 10.1 percent 16.8 percent of sensors as opposed to the duplicate scheme in the case of rc

ffiffi 3 p 2 rs andpffiffi3 2 rs< rc 2þpffiffi3 3 rs, respectively. When rc> 2þpffiffi3 3 rs, the

interpolating scheme works the same as the duplicate scheme, so they require the same number of sensors. Note that when rcbecomes larger, our placement schemes will be

dominated by the value of rs, so the numbers of sensors

required by the duplicate and interpolating schemes are closer to the theoretical lower bound as rc increases.

5.2 Performances of the Sensor Dispatch Schemes In the second experiment, we estimate the total moving energy and average moving distance of sensors when different dispatch schemes are adopted. We design a field A as a 600 m  600 m square region. The area of interest I is a 300 m  300 m square region located at the center of A. Three scenarios, namely, hollow, right, and central, are considered. In the hollow scenario, sensors are randomly distributed inside the region of A  I. In the right scenario, sensors are arbitrarily placed inside a 150 m  600 m rectangle region located at the right side of A  I . In the central scenario, sensors are initially concentrated inside a 100 m  100 m square region located at the center of I . With the setting of ðrc; rsÞ ¼ ð34:7 m; 20:0 mÞ;

ð24:1 m;13:9 mÞ; ð19:3 m;11:1 mÞ; ð16:7 m;9:62 mÞ; ð14:9 m; 8:6 mÞ;

ð13:4 m;7:71 mÞ; and ð12:5 m; 7:16 mÞ, we can obtain 100, 200, 300, 400, 500, 600, and 700 locations to be placed with sensors inside I , respectively, according to the interpolating placement scheme (in the case of rc>2þ

ffiffi

3 p

3 rs). We set the

desired coverage level k ¼ 3 so that there will be 300, 600, 900, 1,200, 1,500, 1,800, and 2,100 sensors needed to be dispatched to I. The moving speed of each sensor is set to 1 m/s. The moving energy cost emove

i of a sensor i is

randomly selected as [0.8 J, 1.2 J] per meter. For our sensor dispatch schemes, the two timers Tupdate OCC and

Tbroadcastare set to 5 s. In the pattern-based dispatch scheme,

we randomly select 10 percent, 20 percent, and 30 percent of target locations inside I as the seed locations. For comparison purposes, we design a greedy dispatch scheme, where sensors are assumed to know all target locations inside I, and they will simply move toward their closest locations without exchanging any information with other sensors. In this case, a sensor can realize that its destination has been occupied by sufficient sensors only when the sensor moves close to its destination (that is, not larger than the communication distance rc). For baseline reference, we

also design a centralized dispatch scheme. In this scheme, we assume that the sink knows the positions and statuses of all sensors and thus can calculate an optimal dispatch.

Fig. 8 shows the total moving energy and average moving distance of sensors under the greedy, competition-based, and centralized dispatch schemes. As can be seen, when the number of sensors increases, the average moving distances of the greedy and competition-based schemes also increase. This is because each sensor has to compete with more other sensors and thus increases its moving distance. Nevertheless, the greedy scheme will lead sensors to move much longer distances (and thus consumes more energy) compared with the competition-based scheme. This is because sensors just blindly move toward their nearest locations without exchanging necessary information to avoid moving to the same locations. In the hollow and right scenarios, the situation becomes worse as the number

Fig. 7. Comparison on the numbers of sensors required under different coverage levels k. (a) rc<

ffiffi 3 p 2rs. (b) rc ffiffi 3 p 2 rs. (c) ffiffi 3 p 2rs< rc<2þ ffiffi 3 p 3 rs. (d) rc2þ ffiffi 3 p 3 rs. (e) rc>2þ ffiffi 3 p 3 rs.

(12)

of sensors increases, since the number of unnecessary contests also increases in the greedy scheme. In the central scenario, the average moving distance of the greedy scheme is always kept very high (as compared with the other two dispatch schemes), because sensors are initially concen-trated in a small region. Thus, in Fig. 8, we can observe that simply taking a greedy strategy to dispatch sensors will make them exhaust much energy, thereby greatly short-ening the network lifetime. On the other hand, by properly exchanging and maintaining necessary information of sensors, our competition-based scheme can consume slightly more energy compared with the centralized scheme (especially in the hollow and right scenarios). Note that in the central scenario, since sensors have similar initial positions, there will be more sensors that compete for the same destinations. Thus, the competition-based scheme will cause sensors to move longer distances compared with the centralized scheme.

Fig. 9 illustrates the total moving energy and average moving distance of sensors under the pattern-based and

based dispatch schemes. The competition-based scheme outperforms the pattern-competition-based scheme, because sensors have full knowledge of target locations. In the pattern-based scheme, the average moving distance will arise as the number of sensors increases. This is because sensors have to compete for those few known locations in the beginning, thus increasing their moving distances. However, the average moving distance (and the total moving energy) of the pattern-based scheme can decrease when there are more target locations selected as seeds.

5.3 Effect of Seed Locations on the Pattern-Based Dispatch Scheme

The third experiment evaluates the effect of seed locations on the average moving energy of sensors in the pattern-based dispatch scheme. In this experiment, we set the number of sensors as 600 and 1,500 and randomly select 5 percent to 70 percent of target locations inside I as the seed locations.

WANG AND TSENG: DISTRIBUTED DEPLOYMENT SCHEMES FOR MOBILE WIRELESS SENSOR NETWORKS TO ENSURE MULTILEVEL... 1291

Fig. 8. Comparison on the total moving energy and average moving distance of sensors under the greedy, competition-based, and centralized dispatch schemes. (a) Hollow scenario. (b) Right scenario. (c) Central scenario.

(13)

Fig. 10 shows the effect of seed locations. As can be seen, the average moving energy of sensors can be reduced when the number of seed locations increases. When the percen-tage of seed locations arrives at 100 percent, the pattern-based scheme will work the same as the competition-pattern-based scheme. In Fig. 10a, we can observe that in the hollow scenario, the difference between the average moving

energies of the pattern-based scheme and the competition-based scheme can be smaller than 10 J when there are more than 40 percent 45 percent of target locations selected as seeds. In the right scenario (that is, Fig. 10b), when the number of sensors is 600 (respectively, 1,500), such a difference can be achieved if there are more than 15 percent 20 percent (respectively, 35 percent 40 percent) of

Fig. 10. Effect of seed locations on the average moving energy of sensors in the pattern-based dispatch scheme. (a) Hollow scenario. (b) Right scenario. (c) Central scenario.

Fig. 9. Comparison on the total moving energy and average moving distance of sensors under the pattern-based and competition-based dispatch schemes. (a) Hollow scenario. (b) Right scenario. (c) Central scenario.

(14)

target locations selected as seeds. On the other hand, in the central scenario (that is, Fig. 10c), such a difference can be achieved if we select at least 45 percent 50 percent of seed locations. To summarize, in Fig. 10, we can observe that the performance of the pattern-based scheme can be signifi-cantly improved by selecting 40 percent 50 percent of target locations as seeds.

6

C

ONCLUSIONS AND

F

UTURE

W

ORK

In this paper, we have proposed systematical solutions to the k-coverage sensor placement problem and distributed sensor dispatch problem. Our placement solutions allow an arbitrary relationship of sensors’ communication distance and their sensing distance and can work properly under both binary and probabilistic sensing models. It is verified that the interpolating placement scheme requires fewer sensors to ensure k-coverage of the sensing field and connectivity of the network as compared with the duplicate placement scheme. Our dispatch solutions are based on the competitive nature of a distributed network. Simulation results have shown that the competition-based dispatch scheme performs better than the greedy and pattern-based dispatch schemes. However, by selecting sufficient seed locations, the pattern-based scheme can work as efficiently as the competition-based scheme.

As to future work, sensor deployment in arbitrary-shaped regions for multilevel coverage deserves further study. When the area of interest I is of an arbitrary shape, one potential approach is to form a rectangle region that can fully cover I . Then, we can apply our solution to this rectangle and remove those sensors that are outside the area of interest. Another way is to approximate I by multiple smaller rectangles. In our model, sensors’ energy drain is at a constant speed when moving around. More sophisticated energy consumption models of mobile sensors can be defined, and this deserves further investigation. For example, a start-up energy cost may be incurred when first moving a sensor, and a cost may be incurred to enforce a sensor to turn around. In addition, variable moving speeds can be considered too.

A

CKNOWLEDGMENTS

Y.-C. Tseng’s research is cosponsored by Taiwan MoE ATU Program, by NSC Grants 93-2752-E-007-001-PAE, 96-2623-7-009-002-ET, 95-2221-E-009-058-MY3, 95-2221-E-009-060-MY3, 95-2219-E-009-007, 95-2218-E-009-209, and 94-2219-E-007-009,by Realtek Semiconductor Corp., by MOEA under Grant 94-EC-17-A-04-S1-044, by ITRI, Taiwan, by Microsoft Corp., and by Intel Corp.

R

EFERENCES

[1] D. Nicules and B. Nath, “Ad-Hoc Positioning System (APS) Using AoA,” Proc. IEEE INFOCOM ’03, pp. 1734-1743, 2003.

[2] L.A. Klein, “A Boolean Algebra Approach to Multiple Sensor Voting Fusion,” IEEE Trans. Aerospace and Electronic Systems, vol. 29, no. 2, pp. 317-327, Apr. 1993.

[3] T. Sun, L.J. Chen, C.C. Han, and M. Gerla, “Reliable Sensor Networks for Planet Exploration,” Proc. IEEE Int’l Conf. Networking, Sensing and Control (ICNSC ’05), pp. 816-821, 2005.

[4] D. Tian and N.D. Georganas, “A Coverage-Preserving Node Scheduling Scheme for Large Wireless Sensor Networks,” Proc. First ACM Int’l Workshop Wireless Sensor Networks and Applications (WSNA ’02), pp. 32-41, 2002.

[5] Z. Abrams, A. Goel, and S. Plotkin, “Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks,” Proc. Third IEEE Int’l Symp. Information Processing in Sensor Networks (IPSN ’04), pp. 424-432, 2004.

[6] M. Cardei, M.T. Thai, Y. Li, and W. Wu, “Energy-Efficient Target Coverage in Wireless Sensor Networks,” Proc. IEEE INFOCOM ’05, pp. 1976-1984, 2005.

[7] T.C. Shermer, “Recent Results in Art Galleries,” Proc. IEEE, vol. 80, no. 9, pp. 1384-1399, Sept. 1992.

[8] M.D. Adickes, R.E. Billo, B.A. Norman, S. Banerjee, B.O. Nnaji, and J. Rajgopal, “Optimization of Indoor Wireless Communica-tion Network Layouts,” IIE Trans., vol. 34, no. 9, pp. 823-836, Sept. 2002.

[9] K.S. Tang, K.F. Man, and K.T. Ko, “Wireless LAN Design Using Hierarchical Genetic Algorithm,” Proc. Seventh Int’l Conf. Genetic Algorithms (ICGA ’97), pp. 629-635, 1997.

[10] L. Raisanen, R.M. Whitaker, and S. Hurley, “A Comparison of Randomized and Evolutionary Approaches for Optimizing Base Station Site Selection,” Proc. 19th Ann. ACM Symp. Applied Computing (SAC ’04), pp. 1159-1165, 2004.

[11] H.R. Anderson and J.P. McGeehan, “Optimizing Microcell Base Station Locations Using Simulated Annealing Techniques,” Proc. 44th IEEE Vehicular Technology Conf. (VTC ’94), pp. 858-862, 1994. [12] S.S. Dhillon and K. Chakrabarty, “Sensor Placement for Effective Coverage and Surveillance in Distributed Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’03), pp. 1609-1614, 2003.

[13] F.Y.S. Lin and P.L. Chiu, “A Near-Optimal Sensor Placement Algorithm to Achieve Complete Coverage/Discrimination in Sensor Networks,” IEEE Comm. Letters, vol. 9, no. 1, pp. 43-45, Jan. 2005.

[14] K. Kar and S. Banerjee, “Node Placement for Connected Coverage in Sensor Networks,” Proc. First Int’l Symp. Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2003. [15] Y.C. Wang, C.C. Hu, and Y.C. Tseng, “Efficient Deployment Algorithms for Ensuring Coverage and Connectivity of Wireless Sensor Networks,” Proc. First IEEE Int’l Conf. Wireless Internet (WICON ’05), pp. 114-121, 2005.

[16] K. Chakrabarty, S.S. Iyengar, H. Qi, and E. Cho, “Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks,” IEEE Trans. Computers, vol. 51, no. 12, pp. 1448-1453, Dec. 2002.

[17] C.F. Huang and Y.C. Tseng, “The Coverage Problem in a Wireless Sensor Network,” Mobile Networks and Applications, vol. 10, no. 4, pp. 519-528, Aug. 2005.

[18] F. Ye, G. Zhong, J. Cheng, S. Lu, and L. Zhang, “PEAS: A Robust Energy Conserving Protocol for Long-Lived Sensor Networks,” Proc. 23rd IEEE Int’l Conf. Distributed Computing Systems (ICDCS ’03), pp. 28-37, 2003.

[19] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks,” Proc. First ACM Int’l Conf. Embedded Networked Sensor Systems (SenSys ’03), pp. 28-39, 2003.

[20] Z. Zhou, S. Das, and H. Gupta, “Connected K-Coverage Problem in Sensor Networks,” Proc. 13th IEEE Int’l Conf. Computer Comm. and Networks (ICCCN ’04), pp. 373-378, 2004.

[21] S. Yang, F. Dai, M. Cardei, and J. Wu, “On Multiple Point Coverage in Wireless Sensor Networks,” Proc. Second IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS), 2005.

[22] A. Gallais, J. Carle, D. Simplot-Ryl, and I. Stojmenovic, “Ensuring Area k-Coverage in Wireless Sensor Networks with Realistic Physical Layers,” Proc. Fifth IEEE Conf. Sensors, pp. 880-883, 2006. [23] J.P. Sheu and H.F. Lin, “Probabilistic Coverage Preserving Protocol with Energy Efficiency in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC ’07), pp. 2631-2636, 2007.

[24] P. Basu and J. Redi, “Movement Control Algorithms for Realization of Fault-Tolerant Ad Hoc Robot Networks,” IEEE Network, vol. 18, no. 4, pp. 36-44, July-Aug. 2004.

[25] Z. Butler and D. Rus, “Event-Based Motion Control for Mobile-Sensor Networks,” IEEE Pervasive Computing, vol. 2, no. 4, pp. 34-42, Oct.-Dec. 2003.

(15)

[26] Y. Zou and K. Chakrabarty, “Sensor Deployment and Target Localization Based on Virtual Forces,” Proc. IEEE INFOCOM ’03, pp. 1293-1303, 2003.

[27] G. Wang, G. Cao, and T.L. Porta, “Movement-Assisted Sensor Deployment,” Proc. IEEE INFOCOM ’04, pp. 2469-2479, 2004. [28] N. Heo and P.K. Varshney, “Energy-Efficient Deployment of

Intelligent Mobile Sensor Networks,” IEEE Trans. Systems, Man and Cybernetics Part A, vol. 35, no. 1, pp. 78-92, Jan. 2005. [29] K. Akkaya and M. Younis, “C2AP: Coverage-Aware and

Connectivity-Constrained Actor Positioning in Wireless Sensor and Actor Networks,” Proc. 26th IEEE Int’l Performance, Computing, and Comm. Conf. (IPCCC ’07), pp. 281-288, 2007.

[30] G. Wang, G. Cao, T.L. Porta, and W. Zhang, “Sensor Relocation in Mobile Sensor Networks,” Proc. IEEE INFOCOM ’05, pp. 2302-2312, 2005.

[31] X. Du and F. Lin, “Improving Sensor Network Performance by Deploying Mobile Sensors,” Proc. 24th IEEE Int’l Performance, Computing, and Comm. Conf. (IPCCC ’05), pp. 67-71, 2005. [32] T.A. Dahlberg, A. Nasipuri, and C. Taylor, “Explorebots: A

Mobile Network Experimentation Testbed,” Proc. ACM SIG-COMM Workshop Experimental Approaches to Wireless Network Design and Analysis (E-WIND ’05), pp. 76-81, 2005.

[33] D. Johnson, T. Stack, R. Fish, D.M. Flickinger, L. Stoller, R. Ricci, and J. Lepreau, “Mobile Emulab: A Robotic Wireless and Sensor Network Testbed,” Proc. IEEE INFOCOM, 2006.

[34] Y.C. Tseng, Y.C. Wang, K.Y. Cheng, and Y.Y. Hsieh, “iMouse: An Integrated Mobile Surveillance and Wireless Sensor System,” Computer, vol. 40, no. 6, pp. 60-66, June 2007.

[35] Y. Zou and K. Chakrabarty, “A Distributed Coverage and Connectivity-Centric Technique for Selecting Active Nodes in Wireless Sensor Networks,” IEEE Trans. Computers, vol. 54, pp. 978-991, Aug. 2005.

[36] B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System: Theory and Practice, fourth ed. Springer Verlag, 1997.

[37] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-Less Low-Cost Outdoor Localization for Very Small Devices,” IEEE Personal Comm., vol. 7, no. 5, pp. 28-34, Oct. 2000.

[38] L. Hu and D. Evans, “Localization for Mobile Sensor Networks,” Proc. ACM MobiCom ’04, pp. 45-57, 2004.

[39] R. Rao and G. Kesidis, “Purposeful Mobility for Relaying and Surveillance in Mobile Ad Hoc Sensor Networks,” IEEE Trans. Mobile Computing, vol. 3, no. 3, pp. 225-231, July-Aug. 2004. [40] X. Bai, S. Kumar, D. Xuan, Z. Yun, and T.H. Lai, “Deploying

Wireless Sensors to Achieve Both Coverage and Connectivity,” Proc. ACM MobiHoc ’06, pp. 131-142, 2006.

[41] R. Kershner, “The Number of Circles Covering a Set,” Am. J. Math., vol. 61, pp. 665-671, July 1939.

[42] IEEE Standard for Information Technology—Telecomm. and Informa-tion Exchange between Systems—Local and Metropolitan Area Net-works Specific Requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), 2003.

You-Chiun Wang received the BEng degree in computer science and information engineering from the National Chung Cheng University in 2001 and the MEng degree in computer science and information engineering and the PhD degree in computer science from the National Chiao Tung University, Hsinchu, Taiwan, Re-public of China, in 2003 and October 2006, respectively. He is currently a postdoctoral research associate in the Department of Com-puter Science, National Chiao Tung University. His research interests include wireless network and mobile computing, communication proto-cols, and wireless sensor networks. He is a member of the IEEE.

Yu-Chee Tseng received the PhD degree in computer and information science from the Ohio State University in January 1994. Since 2000, he has been a professor in the Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China, where he has also been the chairman since 2005. Since 2006, he has also been an adjunct chair professor at the Chung Yuan Christian University. He has been an associate editor for Telecommunication Systems and the IEEE Transactions on Vehicular Technology since 2005 and the IEEE Transactions on Mobile Comput-ing since 2006. His research interests include mobile computComput-ing, wireless communication, network security, and parallel and distributed computing. He is a senior member of the IEEE. He received the Outstanding Research Awards from the National Science Council, Taiwan, in 2001-2002 and 2003-2005, the Best Paper Award in the 32nd International Conference on Parallel Processing (ICPP 2003), the Elite IT Award in 2004, and the Distinguished Alumnus Award from the Ohio State University in 2005.

. For more information on this or any other computing topic, please visit our Digital Library at www.computer.org/publications/dlib.

數據

Fig. 2. The interpolating placement scheme in the case of r c 
Fig. 3. The interpolating placement scheme in the case of p ffiffi 3
Table 1 summarizes the approximate threshold values of the minimum k-covered probability p min and the pseudo
Fig. 6. The repeated patterns in the interpolating placement scheme. (a) The case of r c 
+4

參考文獻

相關文件

“IEEE P1451.2 D2.01 IEEE Draft Standard for A Smart Transducer Interface for Sensors and Actuators - Transducer to Microprocessor Communication Protocols

The scenarios fuzzy inference system is developed for effectively manage all the low-level sensors information and inductive high-level context scenarios based

Kyunghwi Kim and Wonjun Lee, “MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks,” The 16th IEEE International Conference on Computer Communications

In many WSN applications, the main task is the surveillance of certain geographical areas [9]. Target location can be simplified considerably if the sensors are placed in such a

Many kinds of sensors like sound sensor, light sensor, temperature/humidity sensor and infrared sensor are used in the hardware system to imitate the sense organs of

Kyunghwi Kim and Wonjun Lee, “MBAL: A Mobile Beacon-Assisted Localization Scheme for Wireless Sensor Networks”, the 16th IEEE International Conference on Computer Communications

To solve this kind of problems, the attempt to use embedded sensors in conjunction with the sonic echo method for assessing the length of a capped pile was

Given the fact that there are few mathematical models for service quality evaluation, this study aims to develop a new research dimension in applying Kano graphical model; that is