• 沒有找到結果。

A simulated annealing algorithm for energy-efficient sensor network design

N/A
N/A
Protected

Academic year: 2021

Share "A simulated annealing algorithm for energy-efficient sensor network design"

Copied!
7
0
0

加載中.... (立即查看全文)

全文

(1)

A Simulated Annealing Algorithm for Energy-Efficient Sensor

Network Design

Frank Y.S. Lin

Department of Information Management

National Taiwan University

Taipei, Taiwan, R.O.C.

yslin@im.ntu.edu.tw

P.L. Chiu

Department of Information Management

National Taiwan University

Taipei, Taiwan, R.O.C.

d7725001@im.ntu.edu.tw

Abstract

In this paper, we develop an algorithm to deploy an energy efficient sensor network such that it provides surveillance and target-positioning services. We con-sider to place K independent sets of sensors on a sen-sor field. These sets monitor the field in turn and work together when intrusion events occur. The life-time of the sensor network is therefore prolonged up to K times. The problem is therefore a variant of the set K-cover problem, which is NP-complete. We formu-late such sensor deployment problem as a 0/1 integer programming problem. A Simulated Annealing based heuristic then is proposed for solving the optimization problem. The experimental results show that the pro-posed algorithm indicates a significant improvement in the sensor lifetime compared to the intuitive approach. Furthermore, the proposed algorithm is highly effective and efficient in terms of the overall deployment cost.

1

Introduction

The evolutions in sensor technology and wireless communication have led to the development of wire-less sensor networks (WSNs). A WSN comprises of a large number of tiny sensor nodes, which are low-cost and low power. Numerous sensors are ad hoc deployed in the interested area. These sensors collect physical in-formation, process it and forward the local information to the sink nodes. Therefore the back-ends can obtain global views according to the information provided by the sensors [2, 3].

Many applications of sensor networks have been dis-cussed in previous papers [2, 3]. Both surveillance and target positioning are the most important services of WSNs. However, the power efficiency, deployment

cost, and some physical limitations influence surveil-lance quality on a sensor field. In the most scenarios, it is difficult to replace or recharge the sensor battery particularly when the network operates in inhospitable or hostile fields. The quality of surveillance will be degraded once the sensor energy becomes exhausted. Therefore how to design an energy-efficient sensor net-work is really a major challenge.

A sensor network can be deployed in two ways: ran-dom or controlled placement. When the environment is unknown, random placement must be used and sen-sors may be randomly dropped from aircraft. Using the controlled placement approach, sensors can be carefully deployed on a sensor field, if the terrain properties are predetermined. Consequently, the placement can be planned to meet the requirements of various levels of services; for example, surveillance, target positioning and target tracking. If the planning process is subject to some resource constraints (such as, the deployment cost) and to achieve some specific goals, the sensor deployment will be considered to be an optimization problem.

Both sensor deployment and energy conservation are key issues for WSNs [2]. This work considers the prob-lem of constructing an energy-efficient sensor network for surveillance and target positioning services using the controlled placement approach. The design goals are to achieve target positioning as well as to prolong sensor network lifetime. To support positioning func-tionality, the sensor field must be completely covered and each unit in the field is discriminable. It requires to deploy more sensors than to support surveillance functionality. However, to keep all sensors in active to support the target positioning service is not neces-sary and waste sensors’ energy if intrusion events oc-cur infrequently. Actually, the surveillance service is enough when there isn’t any intruder in the sensor field.

(2)

Hence, we try to deploy K independent sets of sensors to support positioning service on a sensor field. Each of which, is called cover, can provide complete coverage of the field. Each set is activated in turn to monitor the field when no any intruder has existed. Once the intrusion event occurs, all sets of sensors are activated and work corporately to locate the intruder. Gener-ally, the power consumption for inactive sensors can be neglected, and the sensor lifetime can be effectively prolonged up to K times.

In this paper, we formulate the problem as a 0/1 in-teger programming problem where the objective func-tion is the minimizafunc-tion of the total deployment cost required to complete coverage and discrimination con-straints under a given amount of cover K. The problem is a variant of the set K-cover problem and thus is NP-complete [1, 11]. Then, the Simulated Annealing (SA) based heuristic is proposed to solve the optimization problem [8, 9].

The rest of this paper is organized as follows. Re-lated works are reviewed in section 2. The problem and mathematic model then are described in sections 3 and 4, respectively. Additionally, the SA-based al-gorithm is presented in section 5. Furthermore, the computational results are discussed in section 6, and conclusions are presented in section 7.

2

Related work

In general, the goals of sensor placement include: reducing the deployment cost, extension the coverage, prolonging the system lifetime and so on. Dhillon et al. [7, 6] take account the probabilistic detection model and propose some algorithms to address the homo-geneous sensor placement problem. The objective is to minimize the number of sensors required for ad-equate grid coverage under the terrain and coverage constraints. Their algorithms can construct a sensor network to support only surveillance service.

Chakrabarty et al. [4] formulated the heterogeneous sensor placement problem in terms of cost minimiza-tion under coverage constraints. Then the problem is solved by lpsolve package, and a divide-and-conquer approach is presented to cope with the large size prob-lem. Moreover, they propose the sensor placement ap-proaches based on identifying code theorem in graph theory to construct a sensor network providing target location service. However, their approaches cannot be applied to irregular sensor fields.

Our previous study formulated the sensor problem for target positioning as a min-max mathematical op-timization model with accurate discrimination as the objective [5, 10].

Figure 1. A complete coverage/discrimination sensor field.

From sensor placement perspective, the energy con-servation strategy can be considered in ”deployment phase” or ”post-deployment phase”. This study be-longs to the former, and focuses on energy efficient sensor network deployment.

A lot of papers consider energy conservation issue in post-deployment phase. Slijepcevic and Potkonjak [11] propose a heuristic that selects mutually exclusive sets of sensor nodes from a randomly deployed sensor net-work, where the sensors of each of sets collaborate to achieve complete coverage. The problem is known as the set K-cover problem. The study does not take tar-get positioning issue into account. In [1], the require-ment of complete coverage of cover is relaxed. Abrams et al. design three algorithms to maximize the number of clusters.

From papers review, we find that this study differs from prior works in several points. First, we consider both the energy conservation and lifetime extending during the sensor deployment phase for target position-ing. Second, we present a mathematical model to de-scribe the optimization problem. Third, the SA-based algorithm is proposed to solve the problem. Finally, the relationship between the deployment cost and the maximum extension of system lifetime is investigated.

3

Problem description

A. Sensor Placement

In this paper, we use the controlled deployment method to construct WSNs. The sensor field can be represented as a collection of two- or three-dimensional grid points [4, 5, 6, 7, 10], as illustrated in Fig. 1. This approach is called grid-based placement. The position-ing resolution requirement of application determines the granularity of grid point. In this paper, the dis-tance between two adjacent grid points is adopted as a length unit. Therefore the sensor field illustrated in Fig. 1 has 5 by 3 grid points. And six sensors are placed on grid point 4, 6, 7, 9, 10, and 12.

(3)

Figure 2. A grid-based sensor field with 3 cov-ers: (a) overall placement. (b) Cover 1. (c) Cover 2. (d) Cover 3.

is 0/1 model [4, 5, 10]. The coverage is assumed to be complete (1) if the distance between the grid point and the sensor is less than the detection radius of the sensor. Otherwise, the coverage is assumed to be incomplete (0). For example, the radius of the sensors illustrated in Fig. 1 is assigned to one. Therefore sensor 4 covers grid point 3, 4, 5, and 9, sensor 7 covers grid point 2, 6, 7, 8, and 12, sensor 9 covers grid point 4, 8, 9, 10, and 14, and so on. If any grid point in a sensor field can be detected by at least one sensor, the field is called completely covered sensor field.

To locate an intruder, we give a power vector for each grid point. The power vector of a grid point is constructed according to the deployment of sensors. If a sensor covers the grid point, constituent of the power vector of the grid point, which is corresponding to the sensor, is set to 1, otherwise 0. For example, as illus-trated in Fig. 1, the power vectors of grid point 1 and 8 are <0, 1, 0, 0, 0, 0> and <0, 0, 1, 1, 0, 0> correspond-ing to sensor 4, 6, 7, 9, 10, and 12, respectively. When the sensor deployment is finished, the power vectors for each grid point in the sensor field are constructed and store on the database at the back-end of the net-work. Once an intruder was detected, sensor has to report the information to the sink nodes. According to the received information, the back-end can obtain a power vector to determine the position of the intruder. If each grid point has a unique power vector in a sen-sor field, the sensen-sor field is called completely discrim-inated. The sensor field in Fig. 1 is completely cov-ered/discriminated by the sensor network, which can provide surveillance and target positioning services. B. Energy-Efficient Sensor Networks

The duplicate placement approach is an intuitive method to extend sensor network lifetime by deploying

K duplicate sensors at the same grid point. Sensors at

the same grid point work in relays, the sensor network lifetime is therefore prolonged by K. However, the cost is increased by K times.

This study attempts to construct the sensor network such that it includes K mutually exclusive sets (number

K is given). These sets are called cover [11]; they are

activated in turn to keep complete coverage of the sen-sor field when no any intruder has existed in the field. Once the intrusion event occurs, all sensors are acti-vated and work corporately to locate intruder. Gen-erally, the power consumption for inactive sensors can be neglected, thus the sensor lifetime can be effectively prolonged by K times. For example, if the lifetime of sensor network illustrated in Fig. 1 is prolonged by three times using duplicate placement approach, the number of sensors will be increased to 18. Our algo-rithm requires only 14 sensors in the same field and can also prolong sensor network lifetime by three. These sensors are divided into 3 covers (as illustrated in Fig. 2), each of which provides complete coverage. Obvi-ously the proposed algorithm provides an economical solution to deploy a energy efficient sensor network.

Afterwards this study discusses the possible number of covers in a sensor network. First the amount of covering grid points of sensor with a specific detection radius has been discussed and the following lemmas have been obtained.

Lemma 1: Suppose a sensor has detection radius r, then the number of covering grid points, Gr, for the sensor in an infinite sensor field can be represented as

Gr= 2r + 1 + 2 r  ∆y=1 (2r2− ∆y2 + 1) , as shown in Fig. 3.

Lemma 2: A grid point can be covered by a set of sensors. The maximum cardinality of the set exactly equals the number of covering grid points of a sensor that is allocated in the grid point.

For example, in an infinitive field, the radiuses of the sensor are 1, 2, 3, and the numbers of covering grid points are 5, 13, 29, respectively. Moreover, a grid point can be covered by 5, 13, 29 sensors at most.

Generally, it is impractical to use an infinite sensor field. This study focuses on the case of the rectangular sensor field with a finite area. For a finite sensor field,

(4)

Figure 3. Sensor and its coverage.

the upper bound of the number of covers is determined by critical grid points in the field. A critical grid point is a grid point, which is covered by a sensor set with smaller cardinality than other sensor sets.

Lemma 3: On a rectangular sensor field with a finite area, the critical grid points are located at the corner of the field. Therefore, the upper bound of the amount of covers, Ur, is Ur= 2r + 1 + r  ∆y=1 r2− ∆y2

, where r represents the detection radius of the sensor and ∆y is the distance from the sensor to a grid point in y axis.

In a sensor field with 3 by 5 grid points, as illus-trated in Fig. 2, the radius of sensor is assumed to be 1, while the critical grid points are 1, 5, 11 and 15. Ac-cording to Lemma 3, the upper bound of the number of covers, U1, is 3. In Fig. 2, grid point 1 can only be covered by sensors placed in grid points 1, 2 and 6. Meanwhile, the corner grid points are all covered by 3 sensors maximally. In the case, the sensor network can be partitioned into a maximum of 3 covers. Clearly, as shown in Fig. 2, we can found the maximum covers for the 3 by 5 sensor network.

4

Problem formulation

The notations used to model the problem are listed as follows.

Given Parameters:

• A = {1, 2, ..., m} : The set of the index for

candi-date locations where sensor can be allocated.

• B = {1, 2, ..., n} : The set of the index for

ser-vice points that can be covered and located by the sensor network, m≤ n.

• K : The number of covers required for the sensor

network.

• aij : Indicator function which is 1 if service point

i can be covered by sensor j and 0 otherwise. • cj: Cost function of sensor j.

Decision Variables:

• xjk : 1 if sensor j is allocated on cover k of the

sensor network.

• yj : Sensor allocation decision variable which is 1

if sensor j is allocated in the sensor network. Problem (IP): ZIP = min m  j=1 K  k=1 cjxjk (IP ) Subject to : m  j=1 aijxjk≥ 1 ,∀i ∈ B, 1 ≤ k ≤ K (1) K  k=1 xjk≤ 1 ,∀j ∈ A (2) yj = K  k=1 xjk ,∀j ∈ A (3) m  j=1 (aij− aj)2yj≥ 1 , ∀i,  ∈ B, i =  (4) xjk, yj = 0 or 1 ,∀j ∈ A, 1 ≤ k ≤ K (5)

Physical meanings of the constraints are briefly de-scribed as follows. Constraint (1) requires that each service point must be covered in every cover of the sensor network. Constraint (2) and (3) ensure that each sensor only belong to one cover of the sensor net-work. The discrimination constraint is mj=1(aijyj ajyj)2 ≥ 1 that requires the Hamming distance be-tween each pair of service points in the sensor network must be greater than one. And the discrimination con-straint can be rewritten as concon-straint (4). Concon-straint (5) requires integer property of the decision variables with respect to xjk and yj.

(5)

Table 1. The SA pseudo code for sensor placement. 1. Let xjk← 1, ∀j ∈ A, if (j mod K) + 1 = k.

2. Calculate S0, S1, and s1k, 1≤ k ≤ K.

3. zold← E.

4. Let zmin← zold and save the current configuration as the solution. 5. t← t0, r← r0.

6. While t > tf do 7. Repeat r times

8. If S0= ∅ then choose snew∈ S0 randomly. 9. Choose sold∈ S1 randomly.

10. Choose covers c1 and c2, c2= c1, in [1, K] randomly. 11. Choose action ac, ac∈ {1, 2, 3}, randomly.

12. If ac= 1 and S0= ∅ then S1← S1∪ snew, s1k|k=c2← s1k|k=c2∪ snew, S0← S0− snew. 13. If ac= 2 and S1= ∅ then S1← S1− sold, s1k|k=c1− sold, S0← S0∪ sold.

14. zzew ← E, ∆E ← znew− zold.

15. Generate random variable γ uniformly distributed in (0, 1). 16. If ∆E≤ 0 or γ < e(−∆E/t) then

17. zold← znew.

18. If znew< zmin then zmin ← znew, save the current configuration as the solution.

19. else recover the change for S0, S1, and s1k, 1≤ k ≤ K, that were made in step (12) and (13).

20. End

21. r← r ∗ β; If zold< m then t← t ∗ α1else t← t ∗ α2. 22. End

5

Algorithm

Simulated annealing (SA) is a highly reliable method for solving hard combinatorial optimization problems. The concept of SA is applied to derive an efficient method for solving the problem approximately. To sim-plify the solution procedure, we try to relax the cover-age and discrimination constraints (i.e., constraints (1) and (4)) by penalizing objective function ZIP.

The penalty for constraint (1) is 1 +

pKk=1ni=1gik, where p, p ≥ m, is a constant. Variable gik, ∀i ∈ B, 1 ≤ k ≤ K, indicates whether grid point i was covered by sensors in cover k. gikcan be calculated as following:

gik= 

1, ifmj=1aijxjk= 0. 0, otherwise.

The penalty for constraint (4) is 1 + p2(1− dmin). Variable dmin represents the minimum Hamming dis-tance between each pair of service points,

dmin=  1, if min ∀i, ∈B, i= m j=1(aij− aj)2yj≥ 1. 0, otherwise.

Hence, energy, E, can be defined as

E =(1 + p K  k=1 n  i=1 gik) (1 + p2(1− dmin)) m  j=1 K  k=1 cjxjk.

Table 1 shows a pseudo code of the algorithm. We will use the following symbols regarding any feasible solution x: S0={j| K  k=1 xjk= 0, ∀j ∈ A}, s1k={j|xjk= 1, ∀j ∈ A}, S1= K  k=1 s1k.

Initially, we assume the sensors are deployed at all grid points. In each loop, one of three actions (i.e., remove, add, and exchange) will be chosen randomly. Each ac-tion attempts to change the deployment status of one sensor. The solution with the minimum energy, zmin, is saved as the best found solution. While frozen temper-ature, tf, is reached, the algorithm stops. If zmin≤ m, the best found solution is the feasible solution to this problem.

(6)

Table 2. Comparison of Urbetween the theo-retical and best found values.

r 1 2 3 4 5 6 7

Ur 3 6 11 17 26 35 45

Ur∗∗ 3 6 11 17 26 34 44

D 0% 0% 0% 0% 0% 2.9% 2.2%

: the theoretic upper bound. ∗∗ : the best found upper bound.

D : degradation.

The SA-based algorithm is a stochastic process. Computing time for the algorithm is relative to the selection of the cooling schedule, the desired solution quality, and the optimization problem itself. Hence, as the size of the problem increases, the time complexity of the problem will become increasingly irrelevant [9]. In the proposed problem, the evaluation for discrim-ination constraint (i.e., constraint (4)) dominates the solution time of the algorithm. To check whether the constraint is satisfied, we have to calculate the Ham-ming distance of power vectors for each pair of grid points in a sensor field. Therefore, the time complex-ity for the evaluation is O(n3), where n is number of grid points in the field.

6

Computational results

The algorithm was tested on a 10 by 10 service area. The sensor radius r ranges between 1 and 7. According to Lemma 3, each set of experiments is investigated under a given K cover which ranges between 1 and the theoretic upper bound on maximum number of covers,

Ur, as listed in Table 2.

The parameters of the cooling schedule are α1= 0.5,

α2 = 0.75, and β = 1.3. The initial values of r and t are 20n and 100, respectively; and n is the number of grid points in the sensor field. The frozen temperature,

tf, is set to t0/10000. p is m, m = n, and the cost of

sensor, cj,∀1 ≤ j ≤ m, is set to one.

In this paper, we evaluate the performance of the SA algorithm in terms of sensor lifetime as well as deploy-ment cost. We first investigate whether the theoretic upper bound of covers, Ur, can be found. The exper-imental results are listed in Table 2. In the first five cases, the SA algorithm can always obtain the solution under the given upper bound of cover. Moreover, in the last two cases, the degradation of the solution quality is less than 2.9%. From this perspective, the proposed algorithm is very effective for maximizing the network lifetime.

Table 3. The increased deployment cost by the SA approach (compared to the deploy-ment with one cover).

r 1 2 3 4 5 6 7

K 3 6 11 17 26 34 44

CI 3 6 11 17 26 34 44

CSA 2.00 3.17 3.85 5.18 4.63 4.67 4.57

K: number of covers.

CI: the increased cost by intuitive approach.

CSA: the increased cost by the SA approach.

Figure 4. Proportion of the lifetime extending times to average sensor density per cover.

Second, this study shows the best found for the minimum deployment cost by the proposed algorithm. Since all sensors have the same deployment cost, the overall deployment cost can be simplified as the amount of deployed sensors. This section instead uses a nor-malized term, average sensor density, as a perfor-mance metric. The average sensor density (%) is

1

K(n1

m

j=1yj)× 100%. Due to the space limitation,

we only illustrates parts of experimental results in Fig. 4. From average sensor density perspective, the aver-age sensor density per cover is higher while the num-ber of covers is few. But while the cover quantity in-creases the average sensor density per cover dein-creases progressively and achieves stability. Therefore the pro-posed sensor placement algorithm is extremely effective for minimizing the sensor density increase in extending lifetime.

Moreover, from the energy efficiency and deploy-ment cost perspectives, the proposed algorithm can sig-nificantly reduce the deployment cost when the amount of covers are increased, as listed in Table 3. Com-pared with an intuitive approach that duplicates K sets of sensor for prolonging network lifetime K times.

(7)

Each set of sensors can completely support the cover-age/discrimination on the sensor field. The times of cost increase for the proposed approach is lower than for the intuitive approach. For sensor radius 7, the re-quired number of sensors is as low as 10.39% of the intuitive approach.

7

Conclusions

In this paper, a SA-based algorithm is proposed to design an energy efficient sensor deployment problem. The proposed algorithm is truly novel as has not been discussed in any previous research. The proposed ap-proach can almost prolong the lifetime of sensor net-work up to the theoretical upper bound without de-grading quality of surveillance. The required average sensor density of a cover is effectively minimized. More-over, the deployment cost is just 10.39% of that using the duplicate sensor placement approach. The compu-tational results indicate that the sensor placement ap-proach is effective and the proposed algorithm is highly efficient and effective. Obviously, this work contributes to deploying a sensor network for target positioning with maximum lifetime.

References

[1] Z. Abrams, A. Goel, and S. Plotkin, ”Set K-cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks”, in the 3rd International

Symposium on Information Processing in Sensor Networks, April 26-27, 2004, pp. 424-432.

[2] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ”Wireless sensor networks: a survey,”

Elsevier Journal of Computer Networks, vol. 38,

March 2002, pp. 393-422.

[3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ”A Survey on Sensor Networks”, IEEE

Communications Magazine, August 2002, pp.

102-114.

[4] K. Chakrabarty, S.S. Iyengar, H. Qi, and E. Cho, ”Grid Coverage for Surveillance and Target Loca-tion in Distributed Sensor Networks,” IEEE Trans.

on Computers, vol. 51, no. 12, Dec. 2002, pp.

1148-1153.

[5] P.L. Chiu and Frank Y.S. Lin, ”A Simulated An-nealing Algorithm to Support the Sensor Placement for Target Location,” in IEEE CCECE, May 2-5, 2004, pp. 867-870.

[6] S.S. Dhillon, K. Chakrabarty, ”Sensor Placement for Effective Coverage and Surveillance in Distrib-uted Sensor Networks,” in IEEE WCNC, vol. 3, March 2003, pp. 1609-1614.

[7] S.S. Dhillon, K. Chakrabarty, and S.S. Iyengar, ”Sensor Placement for Grid Coverage under Impre-cise Detections,” in the 15-th International

Confer-ence on Information Fusion, vol. 2, July 2002, pp.

1581-1587.

[8] R.W. Eglese, ”Simulated Annealing: A tool for Op-erational Research,” European Journal of

Opera-tional Research, vol. 46, 1990, pp. 271-281.

[9] S. Kirkpatrick, C.D. Gelatt, Jr., and M.P. Vecchi, ”Optimization by Simulated Annealing,” Science, vol. 220, no. 4596, May 1983, pp. 671-680.

[10] Frank Y.S. Lin and P.L. Chiu, ”A Near-optimal Sensor Placement Algorithm to Achieve Complete Coverage/Discrimination in Sensor Net-works,” IEEE Communications Letters, vol. 9, no. 1, January 2005, pp 43-45.

[11] S. Slijepcevic and M. Potkonjak, ”Power Effi-cient Organization of Wireless Sensor Networks”,

in IEEE International Conference on Communica-tions (ICC), vol. 2, June 11-14, 2001, pp. 472 - 476.

數據

Figure 2. A grid-based sensor field with 3 cov- cov-ers: (a) overall placement. (b) Cover 1
Figure 3. Sensor and its coverage.
Table 1. The SA pseudo code for sensor placement.
Figure 4. Proportion of the lifetime extending times to average sensor density per cover.

參考文獻

相關文件

In this paper, we have studied a neural network approach for solving general nonlinear convex programs with second-order cone constraints.. The proposed neural network is based on

In BHJ solar cells using P3HT:PCBM, adjustment of surface energy and work function of ITO may lead to a tuneable morphology for the active layer and hole injection barrier

We propose a primal-dual continuation approach for the capacitated multi- facility Weber problem (CMFWP) based on its nonlinear second-order cone program (SOCP) reformulation.. The

„ An adaptation layer is used to support specific primitives as required by a particular signaling application. „ The standard SS7 applications (e.g., ISUP) do not realize that

This option is designed to provide students an understanding of the basic concepts network services and client-server communications, and the knowledge and skills

SDP and ESDP are stronger relaxations, but inherit the soln instability relative to measurement noise. Lack soln

• Compare ρESDP as solved by LPCGD method with ESDP as solved by Sedumi 1.05 Sturm (with the interface to Sedumi coded by Wang et al )... Left: Soln of ρESDP found by

The purpose of this thesis is to propose a model of routes design for the intra-network of fixed-route trucking carriers, named as the Mixed Hub-and-Spoke