2 % v4.0 released April 2013
5 %\usepackage[linesnumbered,ruled,vlined,commentsnumbered]{algorithm2e}
6 %\renewcommand{\algorithmcfname}{ALGORITHM}
7 \usepackage{indentfirst}
8 \usepackage[algo2e,ruled,vlined]{algorithm2e}
11 %\jvol{00} \jnum{00} \jyear{2013} \jmonth{April}
15 \title{{\itshape Perimeter-based Coverage Optimization to Improve Lifetime \\
16 in Wireless Sensor Networks}}
18 \author{Ali Kadhum Idrees$^{a}$, Karine Deschinkel$^{a}$$^{\ast}$\thanks{$^\ast$Corresponding author. Email: karine.deschinkel@univ-fcomte.fr}, Michel Salomon$^{a}$ and Rapha\"el Couturier $^{a}$
19 $^{a}${\em{FEMTO-ST Institute, UMR 6174 CNRS, University of Franche-Comte,
25 The most important problem in a Wireless Sensor Network (WSN) is to optimize the
26 use of its limited energy provision, so that it can fulfill its monitoring task
27 as long as possible. Among known available approaches that can be used to
28 improve power management, lifetime coverage optimization provides activity
29 scheduling which ensures sensing coverage while minimizing the energy cost. We
30 propose such an approach called Perimeter-based Coverage Optimization protocol
31 (PeCO). It is a hybrid of centralized and distributed methods: the region of
32 interest is first subdivided into subregions and the protocol is then
33 distributed among sensor nodes in each subregion. The novelty of our approach
34 lies essentially in the formulation of a new mathematical optimization model
35 based on the perimeter coverage level to schedule sensors' activities.
36 Extensive simulation experiments demonstrate that PeCO can offer longer lifetime
37 coverage for WSNs in comparison with some other protocols.
40 Wireless Sensor Networks, Area Coverage, Energy efficiency, Optimization, Scheduling.
46 \section{Introduction}
47 \label{sec:introduction}
49 The continuous progress in Micro Electro-Mechanical Systems (MEMS) and wireless
50 communication hardware has given rise to the opportunity to use large networks
51 of tiny sensors, called Wireless Sensor Networks
52 (WSN)~\citep{akyildiz2002wireless,puccinelli2005wireless}, to fulfill monitoring
53 tasks. A WSN consists of small low-powered sensors working together by
54 communicating with one another through multi-hop radio communications. Each node
55 can send the data it collects in its environment, thanks to its sensor, to the
56 user by means of sink nodes. The features of a WSN made it suitable for a wide
57 range of application in areas such as business, environment, health, industry,
58 military, and so on~\citep{yick2008wireless}. Typically, a sensor node contains
59 three main components~\citep{anastasi2009energy}: a sensing unit able to measure
60 physical, chemical, or biological phenomena observed in the environment; a
61 processing unit which will process and store the collected measurements; a radio
62 communication unit for data transmission and receiving.
64 The energy needed by an active sensor node to perform sensing, processing, and
65 communication is supplied by a power supply which is a battery. This battery has
66 a limited energy provision and it may be unsuitable or impossible to replace or
67 recharge it in most applications. Therefore it is necessary to deploy WSN with
68 high density in order to increase reliability and to exploit node redundancy
69 thanks to energy-efficient activity scheduling approaches. Indeed, the overlap
70 of sensing areas can be exploited to schedule alternatively some sensors in a
71 low power sleep mode and thus save energy. Overall, the main question that must
72 be answered is: how to extend the lifetime coverage of a WSN as long as possible
73 while ensuring a high level of coverage? These past few years many
74 energy-efficient mechanisms have been suggested to retain energy and extend the
75 lifetime of the WSNs~\citep{rault2014energy}.
77 This paper makes the following contributions.
79 \item We have devised a framework to schedule nodes to be activated
80 alternatively such that the network lifetime is prolonged while ensuring that
81 a certain level of coverage is preserved. A key idea in our framework is to
82 exploit spatial and temporal subdivision. On the one hand, the area of
83 interest is divided into several smaller subregions and, on the other hand,
84 the time line is divided into periods of equal length. In each subregion the
85 sensor nodes will cooperatively choose a leader which will schedule nodes'
86 activities, and this grouping of sensors is similar to typical cluster
88 \item We have proposed a new mathematical optimization model. Instead of trying
89 to cover a set of specified points/targets as in most of the methods proposed
90 in the literature, we formulate an integer program based on perimeter coverage
91 of each sensor. The model involves integer variables to capture the
92 deviations between the actual level of coverage and the required level.
93 Hence, an optimal schedule will be obtained by minimizing a weighted sum of
95 \item We have conducted extensive simulation experiments, using the discrete
96 event simulator OMNeT++, to demonstrate the efficiency of our protocol. We
97 have compared the PeCO protocol to two approaches found in the literature:
98 DESK~\citep{ChinhVu} and GAF~\citep{xu2001geography}, and also to our previous
99 protocol DiLCO published in~\citep{Idrees2}. DiLCO uses the same framework as
100 PeCO but is based on another optimization model for sensor scheduling.
103 The rest of the paper is organized as follows. In the next section some related
104 work in the field is reviewed. Section~\ref{sec:The PeCO Protocol Description}
105 is devoted to the PeCO protocol description and Section~\ref{cp} focuses on the
106 coverage model formulation which is used to schedule the activation of sensor
107 nodes. Section~\ref{sec:Simulation Results and Analysis} presents simulations
108 results and discusses the comparison with other approaches. Finally, concluding
109 remarks are drawn and some suggestions are given for future works in
110 Section~\ref{sec:Conclusion and Future Works}.
112 \section{Related Literature}
113 \label{sec:Literature Review}
115 In this section, some related works regarding the coverage problem is
116 summarized, and specific aspects of the PeCO protocol from the works presented
117 in the literature are presented.
119 The most discussed coverage problems in literature can be classified in three
120 categories~\citep{li2013survey} according to their respective monitoring
121 objective. Hence, area coverage \citep{Misra} means that every point inside a
122 fixed area must be monitored, while target coverage~\citep{yang2014novel} refers
123 to the objective of coverage for a finite number of discrete points called
124 targets, and barrier coverage~\citep{HeShibo,kim2013maximum} focuses on
125 preventing intruders from entering into the region of interest. In
126 \citep{Deng2012} authors transform the area coverage problem into the target
127 coverage one taking into account the intersection points among disks of sensors
128 nodes or between disk of sensor nodes and boundaries. In
129 \citep{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of
130 sensors are sufficiently covered it will be the case for the whole area. They
131 provide an algorithm in $O(nd~log~d)$ time to compute the perimeter-coverage of
132 each sensor. $d$ denotes the maximum number of sensors that are neighbors to a
133 sensor, and $n$ is the total number of sensors in the network. {\it In PeCO
134 protocol, instead of determining the level of coverage of a set of discrete
135 points, our optimization model is based on checking the perimeter-coverage of
136 each sensor to activate a minimal number of sensors.}
138 The major approach to extend network lifetime while preserving coverage is to
139 divide/organize the sensors into a suitable number of set covers (disjoint or
140 non-disjoint)\citep{wang2011coverage}, where each set completely covers a region
141 of interest, and to activate these set covers successively. The network activity
142 can be planned in advance and scheduled for the entire network lifetime or
143 organized in periods, and the set of active sensor nodes is decided at the
144 beginning of each period \citep{ling2009energy}. Active node selection is
145 determined based on the problem requirements (e.g. area monitoring,
146 connectivity, or power efficiency). For instance, \citet{jaggi2006} address the
147 problem of maximizing the lifetime by dividing sensors into the maximum number
148 of disjoint subsets such that each subset can ensure both coverage and
149 connectivity. A greedy algorithm is applied once to solve this problem and the
150 computed sets are activated in succession to achieve the desired network
151 lifetime. \citet{chin2007}, \citet{yan2008design}, \citet{pc10}, propose
152 algorithms working in a periodic fashion where a cover set is computed at the
153 beginning of each period. {\it Motivated by these works, PeCO protocol works in
154 periods, where each period contains a preliminary phase for information
155 exchange and decisions, followed by a sensing phase where one cover set is in
156 charge of the sensing task.}
158 Various centralized and distributed approaches, or even a mixing of these two
159 concepts, have been proposed to extend the network lifetime
160 \citep{zhou2009variable}. In distributed
161 algorithms~\citep{Tian02,yangnovel,ChinhVu,qu2013distributed} each sensor
162 decides of its own activity scheduling after an information exchange with its
163 neighbors. The main interest of such an approach is to avoid long range
164 communications and thus to reduce the energy dedicated to the communications.
165 Unfortunately, since each node has only information on its immediate neighbors
166 (usually the one-hop ones) it may make a bad decision leading to a global
167 suboptimal solution. Conversely, centralized
168 algorithms~\citep{cardei2005improving,zorbas2010solving,pujari2011high} always
169 provide nearly or close to optimal solution since the algorithm has a global
170 view of the whole network. The disadvantage of a centralized method is obviously
171 its high cost in communications needed to transmit to a single node, the base
172 station which will globally schedule nodes' activities, data from all the other
173 sensor nodes in the area. The price in communications can be huge since long
174 range communications will be needed. In fact the larger the WNS is, the higher
175 the communication and thus the energy cost are. {\it In order to be suitable
176 for large-scale networks, in the PeCO protocol, the area of interest is
177 divided into several smaller subregions, and in each one, a node called the
178 leader is in charge of selecting the active sensors for the current period.
179 Thus our protocol is scalable and is a globally distributed method, whereas it
180 is centralized in each subregion.}
182 Various coverage scheduling algorithms have been developed these past few years.
183 Many of them, dealing with the maximization of the number of cover sets, are
184 heuristics. These heuristics involve the construction of a cover set by
185 including in priority the sensor nodes which cover critical targets, that is to
186 say targets that are covered by the smallest number of sensors
187 \citep{berman04,zorbas2010solving}. Other approaches are based on mathematical
189 formulations~\citep{cardei2005energy,5714480,pujari2011high,Yang2014} and
190 dedicated techniques (solving with a branch-and-bound algorithm available in
191 optimization solver). The problem is formulated as an optimization problem
192 (maximization of the lifetime or number of cover sets) under target coverage and
193 energy constraints. Column generation techniques, well-known and widely
194 practiced techniques for solving linear programs with too many variables, have
196 used~\citep{castano2013column,doi:10.1080/0305215X.2012.687732,deschinkel2012column}.
197 {\it In the PeCO protocol, each leader, in charge of a subregion, solves an
198 integer program which has a twofold objective: minimize the overcoverage and
199 the undercoverage of the perimeter of each sensor.}
201 The authors in \citep{Idrees2} propose a Distributed Lifetime Coverage
202 Optimization (DiLCO) protocol, which maintains the coverage and improves the
203 lifetime in WSNs. It is an improved version of a research work presented
204 in~\citep{idrees2014coverage}. First, the area of interest is partitioned into
205 subregions using a divide-and-conquer method. DiLCO protocol is then distributed
206 on the sensor nodes in each subregion in a second step. Hence this protocol
207 combines two techniques: a leader election in each subregion, followed by an
208 optimization-based node activity scheduling performed by each elected
209 leader. The proposed DiLCO protocol is a periodic protocol where each period is
210 decomposed into 4 phases: information exchange, leader election, decision, and
211 sensing. The simulations show that DiLCO is able to increase the WSN lifetime
212 and provides improved coverage performance. {\it In the PeCO protocol, a new
213 mathematical optimization model is proposed. Instead of trying to cover a set
214 of specified points/targets as in DiLCO protocol, we formulate an integer
215 program based on perimeter coverage of each sensor. The model involves integer
216 variables to capture the deviations between the actual level of coverage and
217 the required level. The idea is that an optimal scheduling will be obtained by
218 minimizing a weighted sum of these deviations.}
220 \section{ The P{\scshape e}CO Protocol Description}
221 \label{sec:The PeCO Protocol Description}
223 %In this section, the Perimeter-based Coverage
224 %Optimization protocol is decribed in details. First we present the assumptions we made and the models
225 %we considered (in particular the perimeter coverage one), second we describe the
226 %background idea of our protocol, and third we give the outline of the algorithm
227 %executed by each node.
230 \subsection{Assumptions and Models}
233 A WSN consisting of $J$ stationary sensor nodes randomly and uniformly
234 distributed in a bounded sensor field is considered. The wireless sensors are
235 deployed in high density to ensure initially a high coverage ratio of the area
236 of interest. We assume that all the sensor nodes are homogeneous in terms of
237 communication, sensing, and processing capabilities and heterogeneous from the
238 energy provision point of view. The location information is available to a
239 sensor node either through hardware such as embedded GPS or location discovery
240 algorithms. We consider a Boolean disk coverage model, which is the most widely
241 used sensor coverage model in the literature, and all sensor nodes have a
242 constant sensing range $R_s$. Thus, all the space points within a disk centered
243 at a sensor with a radius equal to the sensing range are said to be covered by
244 this sensor. We also assume that the communication range $R_c$ satisfies $R_c
245 \geq 2 \cdot R_s$. In fact, \citet{Zhang05} proved that if the transmission
246 range fulfills the previous hypothesis, the complete coverage of a convex area
247 implies connectivity among active nodes.
249 The PeCO protocol uses the same perimeter-coverage model as
250 \citet{huang2005coverage}. It can be expressed as follows: a sensor is said to
251 be perimeter covered if all the points on its perimeter are covered by at least
252 one sensor other than itself. Authors \citet{huang2005coverage} proved that a
253 network area is $k$-covered (every point in the area is covered by at least
254 $k$~sensors) if and only if each sensor in the network is $k$-perimeter-covered
255 (perimeter covered by at least $k$ sensors).
257 Figure~\ref{figure1}(a) shows the coverage of sensor node~$0$. On this figure,
258 sensor~$0$ has nine neighbors and we have reported on its perimeter (the
259 perimeter of the disk covered by the sensor) for each neighbor the two points
260 resulting from the intersection of the two sensing areas. These points are
261 denoted for neighbor~$i$ by $iL$ and $iR$, respectively for left and right from
262 a neighboring point of view. The resulting couples of intersection points
263 subdivide the perimeter of sensor~$0$ into portions called arcs.
267 \begin{tabular}{@{}cr@{}}
268 \includegraphics[width=75mm]{figure1a.eps} & \raisebox{3.25cm}{(a)} \\
269 \includegraphics[width=75mm]{figure1b.eps} & \raisebox{2.75cm}{(b)}
271 \caption{(a) Perimeter coverage of sensor node 0 and (b) finding the arc of
272 $u$'s perimeter covered by $v$.}
276 Figure~\ref{figure1}(b) describes the geometric information used to find the
277 locations of the left and right points of an arc on the perimeter of a sensor
278 node~$u$ covered by a sensor node~$v$. Node~$v$ is supposed to be located on the
279 west side of sensor~$u$, with the following respective coordinates in the
280 sensing area~: $(v_x,v_y)$ and $(u_x,u_y)$. From the previous coordinates the
281 euclidean distance between nodes~$u$ and $v$ is computed as follows:
283 Dist(u,v)=\sqrt{\vert u_x - v_x \vert^2 + \vert u_y-v_y \vert^2},
285 while the angle~$\alpha$ is obtained through the formula:
287 \alpha = \arccos \left(\frac{Dist(u,v)}{2R_s} \right).
289 The arc on the perimeter of~$u$ defined by the angular interval $[\pi -
290 \alpha,\pi + \alpha]$ is then said to be perimeter-covered by sensor~$v$.
292 Every couple of intersection points is placed on the angular interval $[0,2\pi)$
293 in a counterclockwise manner, leading to a partitioning of the interval.
294 Figure~\ref{figure1}(a) illustrates the arcs for the nine neighbors of
295 sensor $0$ and Table~\ref{my-label} gives the position of the corresponding arcs
296 in the interval $[0,2\pi)$. More precisely, the points are
297 ordered according to the measures of the angles defined by their respective
298 positions. The intersection points are then visited one after another, starting
299 from the first intersection point after point~zero, and the maximum level of
300 coverage is determined for each interval defined by two successive points. The
301 maximum level of coverage is equal to the number of overlapping arcs. For
302 example, between~$5L$ and~$6L$ the maximum level of coverage is equal to $3$
303 (the value is highlighted in yellow at the bottom of Figure~\ref{figure2}), which
304 means that at most 2~neighbors can cover the perimeter in addition to node $0$.
305 Table~\ref{my-label} summarizes for each coverage interval the maximum level of
306 coverage and the sensor nodes covering the perimeter. The example discussed
307 above is thus given by the sixth line of the table.
311 \includegraphics[width=127.5mm]{figure2.eps}
312 \caption{Maximum coverage levels for perimeter of sensor node $0$.}
317 \tbl{Coverage intervals and contributing sensors for node 0 \label{my-label}}
318 {\begin{tabular}{|c|c|c|c|c|c|c|c|c|}
320 \begin{tabular}[c]{@{}c@{}}Left \\ point \\ angle~$\alpha$ \end{tabular} & \begin{tabular}[c]{@{}c@{}}Interval \\ left \\ point\end{tabular} & \begin{tabular}[c]{@{}c@{}}Interval \\ right \\ point\end{tabular} & \begin{tabular}[c]{@{}c@{}}Maximum \\ coverage\\ level\end{tabular} & \multicolumn{5}{c|}{\begin{tabular}[c]{@{}c@{}}Set of sensors\\ involved \\ in coverage interval\end{tabular}} \\ \hline
321 0.0291 & 1L & 2L & 4 & 0 & 1 & 3 & 4 & \\ \hline
322 0.104 & 2L & 3R & 5 & 0 & 1 & 3 & 4 & 2 \\ \hline
323 0.3168 & 3R & 4R & 4 & 0 & 1 & 4 & 2 & \\ \hline
324 0.6752 & 4R & 1R & 3 & 0 & 1 & 2 & & \\ \hline
325 1.8127 & 1R & 5L & 2 & 0 & 2 & & & \\ \hline
326 1.9228 & 5L & 6L & 3 & 0 & 2 & 5 & & \\ \hline
327 2.3959 & 6L & 2R & 4 & 0 & 2 & 5 & 6 & \\ \hline
328 2.4258 & 2R & 7L & 3 & 0 & 5 & 6 & & \\ \hline
329 2.7868 & 7L & 8L & 4 & 0 & 5 & 6 & 7 & \\ \hline
330 2.8358 & 8L & 5R & 5 & 0 & 5 & 6 & 7 & 8 \\ \hline
331 2.9184 & 5R & 7R & 4 & 0 & 6 & 7 & 8 & \\ \hline
332 3.3301 & 7R & 9R & 3 & 0 & 6 & 8 & & \\ \hline
333 3.9464 & 9R & 6R & 4 & 0 & 6 & 8 & 9 & \\ \hline
334 4.767 & 6R & 3L & 3 & 0 & 8 & 9 & & \\ \hline
335 4.8425 & 3L & 8R & 4 & 0 & 3 & 8 & 9 & \\ \hline
336 4.9072 & 8R & 4L & 3 & 0 & 3 & 9 & & \\ \hline
337 5.3804 & 4L & 9R & 4 & 0 & 3 & 4 & 9 & \\ \hline
338 5.9157 & 9R & 1L & 3 & 0 & 3 & 4 & & \\ \hline
344 In the PeCO protocol, the scheduling of the sensor nodes' activities is
345 formulated with an mixed-integer program based on coverage
346 intervals~\citep{doi:10.1155/2010/926075}. The formulation of the coverage
347 optimization problem is detailed in~Section~\ref{cp}. Note that when a sensor
348 node has a part of its sensing range outside the WSN sensing field, as in
349 Figure~\ref{figure3}, the maximum coverage level for this arc is set to $\infty$
350 and the corresponding interval will not be taken into account by the
351 optimization algorithm.
356 \includegraphics[width=62.5mm]{figure3.eps}
357 \caption{Sensing range outside the WSN's area of interest.}
363 \subsection{Main Idea}
365 The WSN area of interest is, in a first step, divided into regular homogeneous
366 subregions using a divide-and-conquer algorithm. In a second step our protocol
367 will be executed in a distributed way in each subregion simultaneously to
368 schedule nodes' activities for one sensing period. Node Sensors are assumed to
369 be deployed almost uniformly over the region. The regular subdivision is made
370 such that the number of hops between any pairs of sensors inside a subregion is
371 less than or equal to 3.
373 As shown in Figure~\ref{figure4}, node activity scheduling is produced by the
374 proposed protocol in a periodic manner. Each period is divided into 4 stages:
375 Information (INFO) Exchange, Leader Election, Decision (the result of an
376 optimization problem), and Sensing. For each period there is exactly one set
377 cover responsible for the sensing task. Protocols based on a periodic scheme,
378 like PeCO, are more robust against an unexpected node failure. On the one hand,
379 if a node failure is discovered before taking the decision, the corresponding
380 sensor node will not be considered by the optimization algorithm. On the other
381 hand, if the sensor failure happens after the decision, the sensing task of the
382 network will be temporarily affected: only during the period of sensing until a
383 new period starts, since a new set cover will take charge of the sensing task in
384 the next period. The energy consumption and some other constraints can easily be
385 taken into account since the sensors can update and then exchange their
386 information (including their residual energy) at the beginning of each period.
387 However, the pre-sensing phases (INFO Exchange, Leader Election, and Decision)
388 are energy consuming, even for nodes that will not join the set cover to monitor
389 the area. Sensing period duration is adapted according to the QoS requirements
394 \includegraphics[width=85mm]{figure4.eps}
395 \caption{PeCO protocol.}
399 We define two types of packets to be used by PeCO protocol:
401 \item INFO packet: sent by each sensor node to all the nodes inside a same
402 subregion for information exchange.
403 \item ActiveSleep packet: sent by the leader to all the nodes in its subregion
404 to transmit to them their respective status (stay Active or go Sleep) during
408 Five statuses are possible for a sensor node in the network:
410 \item LISTENING: waits for a decision (to be active or not);
411 \item COMPUTATION: executes the optimization algorithm as leader to
412 determine the activities scheduling;
413 \item ACTIVE: node is sensing;
414 \item SLEEP: node is turned off;
415 \item COMMUNICATION: transmits or receives packets.
418 \subsection{PeCO Protocol Algorithm}
420 The pseudocode implementing the protocol on a node is given below. More
421 precisely, Algorithm~\ref{alg:PeCO} gives a brief description of the protocol
422 applied by a sensor node $s_k$ where $k$ is the node index in the WSN.
426 % \KwIn{all the parameters related to information exchange}
427 % \KwOut{$winer-node$ (: the id of the winner sensor node, which is the leader of current round)}
429 %\emph{Initialize the sensor node and determine it's position and subregion} \;
430 \caption{PeCO pseudocode}
431 \eIf{$RE_k \geq E_{th}$}{
432 $s_k.status$ = COMMUNICATION\;
433 Send $INFO()$ packet to other nodes in subregion\;
434 Wait $INFO()$ packet from other nodes in subregion\;
435 Update K.CurrentSize\;
436 LeaderID = Leader election\;
437 \eIf{$s_k.ID = LeaderID$}{
438 $s_k.status$ = COMPUTATION\;
439 \If{$ s_k.ID $ is Not previously selected as a Leader}{
440 Execute the perimeter coverage model\;
442 \eIf{($s_k.ID $ is the same Previous Leader) {\bf and} \\
443 \indent (K.CurrentSize = K.PreviousSize)}{
444 Use the same previous cover set for current sensing stage\;
446 Update $a^j_{ik}$; prepare data for IP~Algorithm\;
447 $\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$)\;
448 K.PreviousSize = K.CurrentSize\;
450 $s_k.status$ = COMMUNICATION\;
451 Send $ActiveSleep()$ to each node $l$ in subregion\;
454 $s_k.status$ = LISTENING\;
455 Wait $ActiveSleep()$ packet from the Leader\;
459 Exclude $s_k$ from entering in the current sensing stage\;
464 %\noindent{\bf If} $RE_k \geq E_{th}$ {\bf then}\\
465 %\hspace*{0.6cm} \emph{$s_k.status$ = COMMUNICATION;}\\
466 %\hspace*{0.6cm} \emph{Send $INFO()$ packet to other nodes in subregion;}\\
467 %\hspace*{0.6cm} \emph{Wait $INFO()$ packet from other nodes in subregion;}\\
468 %\hspace*{0.6cm} \emph{Update K.CurrentSize;}\\
469 %\hspace*{0.6cm} \emph{LeaderID = Leader election;}\\
470 %\hspace*{0.6cm} {\bf If} $ s_k.ID = LeaderID $ {\bf then}\\
471 %\hspace*{1.2cm} \emph{$s_k.status$ = COMPUTATION;}\\
472 %\hspace*{1.2cm}{\bf If} \emph{$ s_k.ID $ is Not previously selected as a Leader} {\bf then}\\
473 %\hspace*{1.8cm} \emph{ Execute the perimeter coverage model;}\\
474 %\hspace*{1.2cm} {\bf end}\\
475 %\hspace*{1.2cm}{\bf If} \emph{($s_k.ID $ is the same Previous Leader)~And~(K.CurrentSize = K.PreviousSize)}\\
476 %\hspace*{1.8cm} \emph{ Use the same previous cover set for current sensing stage;}\\
477 %\hspace*{1.2cm} {\bf end}\\
478 %\hspace*{1.2cm} {\bf else}\\
479 %\hspace*{1.8cm}\emph{Update $a^j_{ik}$; prepare data for IP~Algorithm;}\\
480 %\hspace*{1.8cm} \emph{$\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$);}\\
481 %\hspace*{1.8cm} \emph{K.PreviousSize = K.CurrentSize;}\\
482 %\hspace*{1.2cm} {\bf end}\\
483 %\hspace*{1.2cm}\emph{$s_k.status$ = COMMUNICATION;}\\
484 %\hspace*{1.2cm}\emph{Send $ActiveSleep()$ to each node $l$ in subregion;}\\
485 %\hspace*{1.2cm}\emph{Update $RE_k $;}\\
486 %\hspace*{0.6cm} {\bf end}\\
487 %\hspace*{0.6cm} {\bf else}\\
488 %\hspace*{1.2cm}\emph{$s_k.status$ = LISTENING;}\\
489 %\hspace*{1.2cm}\emph{Wait $ActiveSleep()$ packet from the Leader;}\\
490 %\hspace*{1.2cm}\emph{Update $RE_k $;}\\
491 %\hspace*{0.6cm} {\bf end}\\
494 %\hspace*{0.6cm} \emph{Exclude $s_k$ from entering in the current sensing stage;}\\
499 In this algorithm, K.CurrentSize and K.PreviousSize respectively represent the
500 current number and the previous number of living nodes in the subnetwork of the
501 subregion. Initially, the sensor node checks its remaining energy $RE_k$, which
502 must be greater than a threshold $E_{th}$ in order to participate in the current
503 period. Each sensor node determines its position and its subregion using an
504 embedded GPS or a location discovery algorithm. After that, all the sensors
505 collect position coordinates, remaining energy, sensor node ID, and the number
506 of their one-hop live neighbors during the information exchange. The sensors
507 inside a same region cooperate to elect a leader. The selection criteria for
508 the leader, in order of priority, are: larger numbers of neighbors, larger
509 remaining energy, and then in case of equality, larger index. Once chosen, the
510 leader collects information to formulate and solve the integer program which
511 allows to construct the set of active sensors in the sensing stage.
515 \section{Perimeter-based Coverage Problem Formulation}
518 In this section, the perimeter-based coverage problem is mathematically formulated. It has been proved to be a NP-hard problem by\citep{doi:10.1155/2010/926075}. Authors study the coverage of the perimeter of a large object requiring to be monitored. For the proposed formulation in this paper, the large object to be monitored is the sensor itself (or more precisely its sensing area).
520 The following notations are used throughout the
522 First, the following sets:
524 \item $S$ represents the set of WSN sensor nodes;
525 \item $A \subseteq S $ is the subset of alive sensors;
526 \item $I_j$ designates the set of coverage intervals (CI) obtained for
529 $I_j$ refers to the set of coverage intervals which have been defined according
530 to the method introduced in subsection~\ref{CI}. For a coverage interval $i$,
531 let $a^j_{ik}$ denotes the indicator function of whether sensor~$k$ is involved
532 in coverage interval~$i$ of sensor~$j$, that is:
536 1 & \mbox{if sensor $k$ is involved in the } \\
537 & \mbox{coverage interval $i$ of sensor $j$}, \\
538 0 & \mbox{otherwise.}\\
541 Note that $a^k_{ik}=1$ by definition of the interval.
543 Second, several variables are defined. Hence, each binary
544 variable $X_{k}$ determines the activation of sensor $k$ in the sensing phase
545 ($X_k=1$ if the sensor $k$ is active or 0 otherwise). $M^j_i$ is a
546 variable which measures the undercoverage for the coverage interval $i$
547 corresponding to sensor~$j$. In the same way, the overcoverage for the same
548 coverage interval is given by the variable $V^j_i$.
550 To sustain a level of coverage equal to $l$ all along the perimeter
551 of sensor $j$, at least $l$ sensors involved in each
552 coverage interval $i \in I_j$ of sensor $j$ have to be active. According to the
553 previous notations, the number of active sensors in the coverage interval $i$ of
554 sensor $j$ is given by $\sum_{k \in A} a^j_{ik} X_k$. To extend the network
555 lifetime, the objective is to activate a minimal number of sensors in each
556 period to ensure the desired coverage level. As the number of alive sensors
557 decreases, it becomes impossible to reach the desired level of coverage for all
558 coverage intervals. Therefore variables $M^j_i$ and $V^j_i$ are introduced as a measure
559 of the deviation between the desired number of active sensors in a coverage
560 interval and the effective number. And we try to minimize these deviations,
561 first to force the activation of a minimal number of sensors to ensure the
562 desired coverage level, and if the desired level cannot be completely satisfied,
563 to reach a coverage level as close as possible to the desired one.
568 The coverage optimization problem can then be mathematically expressed as follows:
573 \min \sum_{j \in S} \sum_{i \in I_j} (\alpha^j_i ~ M^j_i + \beta^j_i ~ V^j_i )&\\
574 \textrm{subject to :}&\\
575 \sum_{k \in A} ( a^j_{ik} ~ X_{k}) + M^j_i \geq l \quad \forall i \in I_j, \forall j \in S\\
576 \sum_{k \in A} ( a^j_{ik} ~ X_{k}) - V^j_i \leq l \quad \forall i \in I_j, \forall j \in S\\
577 X_{k} \in \{0,1\}, \forall k \in A \\
578 M^j_i, V^j_i \in \mathbb{R}^{+}
583 If a given level of coverage $l$ is required for one sensor, the sensor is said to be undercovered (respectively overcovered) if the level of coverage of one of its CI is less (respectively greater) than $l$. If the sensor $j$ is undercovered, there exists at least one of its CI (say $i$) for which the number of active sensors (denoted by $l^{i}$) covering this part of the perimeter is less than $l$ and in this case : $M_{i}^{j}=l-l^{i}$, $V_{i}^{j}=0$. In the contrary, if the sensor $j$ is overcovered, there exists at least one of its CI (say $i$) for which the number of active sensors (denoted by $l^{i}$) covering this part of the perimeter is greater than $l$ and in this case : $M_{i}^{j}=0$, $V_{i}^{j}=l^{i}-l$.
585 $\alpha^j_i$ and $\beta^j_i$ are nonnegative weights selected according to the
586 relative importance of satisfying the associated level of coverage. For example,
587 weights associated with coverage intervals of a specified part of a region may
588 be given by a relatively larger magnitude than weights associated with another
589 region. This kind of mixed-integer program is inspired from the model developed for
590 brachytherapy treatment planning for optimizing dose distribution
591 \citep{0031-9155-44-1-012}. The choice of variables $\alpha$ and $\beta$ should be made according to the needs of the application. $\alpha$ should be enough large to prevent undercoverage and so to reach the highest possible coverage ratio. $\beta$ should be enough large to prevent overcoverage and so to activate a minimum number of sensors.
592 The mixed-integer program must be solved by the leader in
593 each subregion at the beginning of each sensing phase, whenever the environment
594 has changed (new leader, death of some sensors). Note that the number of
595 constraints in the model is constant (constraints of coverage expressed for all
596 sensors), whereas the number of variables $X_k$ decreases over periods, since
597 only alive sensors (sensors with enough energy to be alive during one
598 sensing phase) are considered in the model.
600 \section{Performance Evaluation and Analysis}
601 \label{sec:Simulation Results and Analysis}
604 \subsection{Simulation Settings}
607 The WSN area of interest is supposed to be divided into 16~regular subregions
608 and we use the same energy consumption model as in our previous work~\citep{Idrees2}.
609 Table~\ref{table3} gives the chosen parameters settings.
612 \tbl{Relevant parameters for network initialization \label{table3}}{
619 Parameter & Value \\ [0.5ex]
622 % inserts single horizontal line
623 Sensing field & $(50 \times 25)~m^2 $ \\
625 WSN size & 100, 150, 200, 250, and 300~nodes \\
627 Initial energy & in range 500-700~Joules \\
629 Sensing period & duration of 60 minutes \\
630 $E_{th}$ & 36~Joules\\
633 $\alpha^j_i$ & 0.6 \\
641 To obtain experimental results which are relevant, simulations with five
642 different node densities going from 100 to 300~nodes were performed considering
643 each time 25~randomly generated networks. The nodes are deployed on a field of
644 interest of $(50 \times 25)~m^2 $ in such a way that they cover the field with a
645 high coverage ratio. Each node has an initial energy level, in Joules, which is
646 randomly drawn in the interval $[500-700]$. If its energy provision reaches a
647 value below the threshold $E_{th}=36$~Joules, the minimum energy needed for a
648 node to stay active during one period, it will no longer participate in the
649 coverage task. This value corresponds to the energy needed by the sensing phase,
650 obtained by multiplying the energy consumed in the active state (9.72 mW) with the
651 time in seconds for one period (3600 seconds), and adding the energy for the
652 pre-sensing phases. According to the interval of initial energy, a sensor may
653 be active during at most 20 periods.
655 The values of $\alpha^j_i$ and $\beta^j_i$ have been chosen to ensure a good
656 network coverage and a longer WSN lifetime. Higher priority is given to
657 the undercoverage (by setting the $\alpha^j_i$ with a larger value than
658 $\beta^j_i$) so as to prevent the non-coverage for the interval~$i$ of the
659 sensor~$j$. On the other hand,
660 $\beta^j_i$ is assigned to a value which is slightly lower so as to minimize the number of active sensor nodes which contribute
661 in covering the interval.
663 The following performance metrics are used to evaluate the efficiency of the
668 \item {\bf Network Lifetime}: the lifetime is defined as the time elapsed until
669 the coverage ratio falls below a fixed threshold. $Lifetime_{95}$ and
670 $Lifetime_{50}$ denote, respectively, the amount of time during which is
671 guaranteed a level of coverage greater than $95\%$ and $50\%$. The WSN can
672 fulfill the expected monitoring task until all its nodes have depleted their
673 energy or if the network is no more connected. This last condition is crucial
674 because without network connectivity a sensor may not be able to send to a
675 base station an event it has sensed.
676 \item {\bf Coverage Ratio (CR)} : it measures how well the WSN is able to
677 observe the area of interest. In our case, the sensor field is discretized as
678 a regular grid, which yields the following equation:
683 \mbox{CR}(\%) = \frac{\mbox{$n$}}{\mbox{$N$}} \times 100
687 where $n$ is the number of covered grid points by active sensors of every
688 subregions during the current sensing phase and $N$ is total number of grid
689 points in the sensing field. In simulations a layout of
690 $N~=~51~\times~26~=~1326$~grid points is considered.
691 \item {\bf Active Sensors Ratio (ASR)}: a major objective of our protocol is to
692 activate as few nodes as possible, in order to minimize the communication
693 overhead and maximize the WSN lifetime. The active sensors ratio is defined as
698 \mbox{ASR}(\%) = \frac{\sum\limits_{r=1}^R \mbox{$|A_r^p|$}}{\mbox{$|J|$}} \times 100
701 where $|A_r^p|$ is the number of active sensors in the subregion $r$ in the
702 current sensing period~$p$, $|J|$ is the number of sensors in the network, and
703 $R$ is the number of subregions.
704 \item {\bf Energy Consumption (EC)}: energy consumption can be seen as the total
705 energy consumed by the sensors during $Lifetime_{95}$ or $Lifetime_{50}$,
706 divided by the number of periods. The value of EC is computed according to
711 \mbox{EC} = \frac{\sum\limits_{p=1}^{P} \left( E^{\mbox{com}}_p+E^{\mbox{list}}_p+E^{\mbox{comp}}_p
712 + E^{a}_p+E^{s}_p \right)}{P},
715 where $P$ corresponds to the number of periods. The total energy consumed by
716 the sensors comes through taking into consideration four main energy
717 factors. The first one, denoted $E^{\scriptsize \mbox{com}}_p$, represents the
718 energy consumption spent by all the nodes for wireless communications during
719 period $p$. $E^{\scriptsize \mbox{list}}_p$, the next factor, corresponds to
720 the energy consumed by the sensors in LISTENING status before receiving the
721 decision to go active or sleep in period $p$. $E^{\scriptsize \mbox{comp}}_p$
722 refers to the energy needed by all the leader nodes to solve the integer
723 program during a period. Finally, $E^a_{p}$ and $E^s_{p}$ indicate the energy
724 consumed by the WSN during the sensing phase (active and sleeping nodes).
728 \subsection{Simulation Results}
730 In order to assess and analyze the performance of our protocol we have
731 implemented PeCO protocol in OMNeT++~\citep{varga} simulator. Besides PeCO, two
732 other protocols, described in the next paragraph, will be evaluated for
733 comparison purposes. The simulations were run on a DELL laptop with an Intel
734 Core~i3~2370~M (1.8~GHz) processor (2 cores) whose MIPS (Million Instructions
735 Per Second) rate is equal to 35330. To be consistent with the use of a sensor
736 node based on Atmels AVR ATmega103L microcontroller (6~MHz) having a MIPS rate
737 equal to 6, the original execution time on the laptop is multiplied by 2944.2
738 $\left(\frac{35330}{2} \times \frac{1}{6} \right)$. The modeling language for
739 Mathematical Programming (AMPL)~\citep{AMPL} is employed to generate the integer
740 program instance in a standard format, which is then read and solved by the
741 optimization solver GLPK (GNU linear Programming Kit available in the public
742 domain) \citep{glpk} through a Branch-and-Bound method.
744 As said previously, the PeCO is compared to three other approaches. The first
745 one, called DESK, is a fully distributed coverage algorithm proposed by
746 \citep{ChinhVu}. The second one, called GAF~\citep{xu2001geography}, consists in
747 dividing the monitoring area into fixed squares. Then, during the decision
748 phase, in each square, one sensor is chosen to remain active during the sensing
749 phase. The last one, the DiLCO protocol~\citep{Idrees2}, is an improved version
750 of a research work we presented in~\citep{idrees2014coverage}. Let us notice that
751 PeCO and DiLCO protocols are based on the same framework. In particular, the
752 choice for the simulations of a partitioning in 16~subregions was made because
753 it corresponds to the configuration producing the best results for DiLCO. The
754 protocols are distinguished from one another by the formulation of the integer
755 program providing the set of sensors which have to be activated in each sensing
756 phase. DiLCO protocol tries to satisfy the coverage of a set of primary points,
757 whereas the PeCO protocol objective is to reach a desired level of coverage for each
758 sensor perimeter. In our experimentations, we chose a level of coverage equal to
761 \subsubsection{\bf Coverage Ratio}
763 Figure~\ref{figure5} shows the average coverage ratio for 200 deployed nodes
764 obtained with the four protocols. DESK, GAF, and DiLCO provide a slightly better
765 coverage ratio with respectively 99.99\%, 99.91\%, and 99.02\%, compared to the 98.76\%
766 produced by PeCO for the first periods. This is due to the fact that at the
767 beginning the DiLCO protocol puts to sleep status more redundant sensors (which
768 slightly decreases the coverage ratio), while the three other protocols activate
769 more sensor nodes. Later, when the number of periods is beyond~70, it clearly
770 appears that PeCO provides a better coverage ratio and keeps a coverage ratio
771 greater than 50\% for longer periods (15 more compared to DiLCO, 40 more
772 compared to DESK). The energy saved by PeCO in the early periods allows later a
773 substantial increase of the coverage performance.
778 \includegraphics[scale=0.5] {figure5.eps}
779 \caption{Coverage ratio for 200 deployed nodes.}
786 \subsubsection{\bf Active Sensors Ratio}
788 Having the less active sensor nodes in each period is essential to minimize the
789 energy consumption and thus to maximize the network lifetime. Figure~\ref{figure6}
790 shows the average active nodes ratio for 200 deployed nodes. We observe that
791 DESK and GAF have 30.36 \% and 34.96 \% active nodes for the first fourteen
792 rounds and DiLCO and PeCO protocols compete perfectly with only 17.92~\% and
793 20.16~\% active nodes during the same time interval. As the number of periods
794 increases, PeCO protocol has a lower number of active nodes in comparison with
795 the three other approaches, while keeping a greater coverage ratio as shown in
796 Figure \ref{figure5}.
800 \includegraphics[scale=0.5]{figure6.eps}
801 \caption{Active sensors ratio for 200 deployed nodes.}
805 \subsubsection{\bf Energy Consumption}
807 We studied the effect of the energy consumed by the WSN during the communication,
808 computation, listening, active, and sleep status for different network densities
809 and compared it for the four approaches. Figures~\ref{figure7}(a) and (b)
810 illustrate the energy consumption for different network sizes and for
811 $Lifetime95$ and $Lifetime50$. The results show that our PeCO protocol is the
812 most competitive from the energy consumption point of view. As shown in both
813 figures, PeCO consumes much less energy than the three other methods. One might
814 think that the resolution of the integer program is too costly in energy, but
815 the results show that it is very beneficial to lose a bit of time in the
816 selection of sensors to activate. Indeed the optimization program allows to
817 reduce significantly the number of active sensors and so the energy consumption
818 while keeping a good coverage level.
822 \begin{tabular}{@{}cr@{}}
823 \includegraphics[scale=0.475]{figure7a.eps} & \raisebox{2.75cm}{(a)} \\
824 \includegraphics[scale=0.475]{figure7b.eps} & \raisebox{2.75cm}{(b)}
826 \caption{Energy consumption per period for (a)~$Lifetime_{95}$ and (b)~$Lifetime_{50}$.}
832 \subsubsection{\bf Network Lifetime}
834 We observe the superiority of PeCO and DiLCO protocols in comparison with the
835 two other approaches in prolonging the network lifetime. In
836 Figures~\ref{figure8}(a) and (b), $Lifetime95$ and $Lifetime50$ are shown for
837 different network sizes. As highlighted by these figures, the lifetime
838 increases with the size of the network, and it is clearly largest for DiLCO
839 and PeCO protocols. For instance, for a network of 300~sensors and coverage
840 ratio greater than 50\%, we can see on Figure~\ref{figure8}(b) that the lifetime
841 is about twice longer with PeCO compared to DESK protocol. The performance
842 difference is more obvious in Figure~\ref{figure8}(b) than in
843 Figure~\ref{figure8}(a) because the gain induced by our protocols increases with
844 time, and the lifetime with a coverage over 50\% is far longer than with
849 \begin{tabular}{@{}cr@{}}
850 \includegraphics[scale=0.475]{figure8a.eps} & \raisebox{2.75cm}{(a)} \\
851 \includegraphics[scale=0.475]{figure8b.eps} & \raisebox{2.75cm}{(b)}
853 \caption{Network Lifetime for (a)~$Lifetime_{95}$ \\
854 and (b)~$Lifetime_{50}$.}
860 Figure~\ref{figure9} compares the lifetime coverage of our protocols for
861 different coverage ratios. We denote by Protocol/50, Protocol/80, Protocol/85,
862 Protocol/90, and Protocol/95 the amount of time during which the network can
863 satisfy an area coverage greater than $50\%$, $80\%$, $85\%$, $90\%$, and $95\%$
864 respectively, where the term Protocol refers to DiLCO or PeCO. Indeed there are applications
865 that do not require a 100\% coverage of the area to be monitored. PeCO might be
866 an interesting method since it achieves a good balance between a high level
867 coverage ratio and network lifetime. PeCO always outperforms DiLCO for the three
868 lower coverage ratios, moreover the improvements grow with the network
869 size. DiLCO is better for coverage ratios near 100\%, but in that case PeCO is
870 not ineffective for the smallest network sizes.
873 \centering \includegraphics[scale=0.5]{figure9.eps}
874 \caption{Network lifetime for different coverage ratios.}
879 \subsubsection{\bf Impact of $\alpha$ and $\beta$ on PeCO's performance}
880 Table~\ref{my-labelx} shows network lifetime results for the different values of $\alpha$ and $\beta$, and for a network size equal to 200 sensor nodes. The choice of $\beta \gg \alpha$ prevents the overcoverage, and so limit the activation of a large number of sensors, but as $\alpha$ is low, some areas may be poorly covered. This explains the results obtained for {\it Lifetime50} with $\beta \gg \alpha$: a large number of periods with low coverage ratio. With $\alpha \gg \beta$, we priviligie the coverage even if some areas may be overcovered, so high coverage ratio is reached, but a large number of sensors are activated to achieve this goal. Therefore network lifetime is reduced. The choice $\alpha=0.6$ and $\beta=0.4$ seems to achieve the best compromise between lifetime and coverage ratio.
881 %As can be seen in Table~\ref{my-labelx}, it is obvious and clear that when $\alpha$ decreased and $\beta$ increased by any step, the network lifetime for $Lifetime_{50}$ increased and the $Lifetime_{95}$ decreased. Therefore, selecting the values of $\alpha$ and $\beta$ depend on the application type used in the sensor nework. In PeCO protocol, $\alpha$ and $\beta$ are chosen based on the largest value of network lifetime for $Lifetime_{95}$.
885 \caption{The impact of $\alpha$ and $\beta$ on PeCO's performance}
887 \begin{tabular}{|c|c|c|c|}
889 $\alpha$ & $\beta$ & $Lifetime_{50}$ & $Lifetime_{95}$ \\ \hline
890 0.0 & 1.0 & 151 & 0 \\ \hline
891 0.1 & 0.9 & 145 & 0 \\ \hline
892 0.2 & 0.8 & 140 & 0 \\ \hline
893 0.3 & 0.7 & 134 & 0 \\ \hline
894 0.4 & 0.6 & 125 & 0 \\ \hline
895 0.5 & 0.5 & 118 & 30 \\ \hline
896 {\bf 0.6} & {\bf 0.4} & {\bf 94} & {\bf 57} \\ \hline
897 0.7 & 0.3 & 97 & 49 \\ \hline
898 0.8 & 0.2 & 90 & 52 \\ \hline
899 0.9 & 0.1 & 77 & 50 \\ \hline
900 1.0 & 0.0 & 60 & 44 \\ \hline
905 \section{Conclusion and Future Works}
906 \label{sec:Conclusion and Future Works}
908 In this paper we have studied the problem of Perimeter-based Coverage Optimization in WSNs. We have designed a new protocol, called Perimeter-based Coverage Optimization, which schedules nodes' activities (wake up and sleep stages) with the objective of maintaining a good coverage ratio while maximizing the network lifetime. This protocol is applied in a distributed way in regular subregions obtained after partitioning the area of interest in a preliminary step. It works in periods and
909 is based on the resolution of an integer program to select the subset of sensors operating in active status for each period. Our work is original in so far as it proposes for the first time an integer program scheduling the activation of sensors based on their perimeter coverage level, instead of using a set of targets/points to be covered.
912 We have carried out several simulations to evaluate the proposed protocol. The simulation results show that PeCO is more energy-efficient than other approaches, with respect to lifetime, coverage ratio, active sensors ratio, and energy consumption.
914 We plan to extend our framework so that the schedules are planned for multiple sensing periods. We also want to improve our integer program to take into account heterogeneous sensors from both energy and node characteristics point of views. Finally, it would be interesting to implement our protocol using a sensor-testbed to evaluate it in real world applications.
916 \bibliographystyle{gENO}
917 \bibliography{biblio} %articleeo