X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/LiCO.git/blobdiff_plain/7c4dba69375b22b115d2905fcabe455b3e5997a4..aea572d8e1576cadb78ac1ae321832b1494788e1:/LiCO_Journal.tex?ds=inline diff --git a/LiCO_Journal.tex b/LiCO_Journal.tex index 780d151..6842df2 100755 --- a/LiCO_Journal.tex +++ b/LiCO_Journal.tex @@ -61,7 +61,7 @@ \begin{abstract} - One fundamental issue in Wireless Sensor Networks (WSNs) is the lifetime coverage optimization, which reflects how well a WSN is covered by a wireless sensors so that the network lifetime can be maximized. In this paper, a Lifetime Coverage Optimization Protocol (LiCO) in WSNs is proposed. The surveillance region is divided into subregions and LiCO protocol is distributed among sensor nodes in each subregion. LiC0 protocols works into periods, each period is divided into four stages: Information exchange, Leader Election, Optimization Decision, and Sensing. Schedules node activities (wakeup and sleep of sensors) is performed in each subregion by a leader whose selection is the result of cooperation between nodes within the same subregion. The novelty of the approach lies essentially in the formulation of a new mathematical optimization model based on perimeter coverage level to schedule sensors activities. Extensive simulation experiments have been performed using OMNeT++, the discrete event simulator, to demonstrate that LiCO is capable to extend the lifetime coverage of WSN as longer time as possible in comparison with some other protocols. + One fundamental issue in Wireless Sensor Networks (WSNs) is the lifetime coverage optimization, which reflects how well a WSN is covered so that the network lifetime can be maximized. In this paper, a Lifetime Coverage Optimization Protocol (LiCO) in WSNs is proposed. The surveillance region is divided into subregions and LiCO protocol is distributed among sensor nodes in each subregion. LiC0 protocols works into periods, each period is divided into four stages: Information exchange, Leader Election, Optimization Decision, and Sensing. Schedules node activities (wakeup and sleep of sensors) is performed in each subregion by a leader whose selection is the result of cooperation between nodes within the same subregion. The novelty of the approach lies essentially in the formulation of a new mathematical optimization model based on perimeter coverage level to schedule sensors activities. Extensive simulation experiments have been performed using OMNeT++, the discrete event simulator, to demonstrate that LiCO is capable to extend the lifetime coverage of WSN as longer time as possible in comparison with some other protocols. \end{abstract} @@ -80,7 +80,7 @@ Wireless Sensor Networks, Area Coverage, Network lifetime, Optimization, Schedul \section{\uppercase{Introduction}} \label{sec:introduction} -\noindent The great development in Micro Electro-Mechanical Systems (MEMS) and wireless communication hardware are being led to emerge networks of tiny distributed sensors called WSN~\cite{akyildiz2002wireless,puccinelli2005wireless}. WSN comprises of small, low-powered sensors working together for perform a typical mission by communicating with one another through multihop wireless connections. They can send the sensed measurements based on local decisions to the user by means of sink nodes. WSN has been used in many applications such as Military, Habitat, Environment, Health, industrial, and Business~\cite{yick2008wireless}.Typically, a sensor node contains three main parts~\cite{anastasi2009energy}: a sensing subsystem, for sense, measure, and gather the measurements from the real environment; processing subsystem, for measurements processing and storage; a communication subsystem, for data transmission and receiving. Moreover, the energy needed by the sensor node is supplied by a power supply, to accomplish the scheduled task. This power supply is composed of a battery with a limited lifetime. And it maybe be unsuitable or impossible to replace or recharge the batteries in most applications. It is then necessary to deploy the WSN with high density so as to increase the reliability and to exploit redundancy by using energy-efficient activity scheduling approaches. So, the main question is: how to extend the lifetime coverage of WSN as long time as possible while ensuring a high level of coverage? Many energy-efficient mechanisms have been suggested to retain energy and extend the lifetime of the WSNs~\cite{rault2014energy}. +\noindent The great development in Micro Electro-Mechanical Systems (MEMS) and wireless communication hardware are being led to emerge networks of tiny distributed sensors called WSN~\cite{akyildiz2002wireless,puccinelli2005wireless}. WSN comprises of small, low-powered sensors working together for perform a typical mission by communicating with one another through multihop wireless connections. They can send the sensed measurements based on local decisions to the user by means of sink nodes. WSN has been used in many applications such as Military, Habitat, Environment, Health, industrial, and Business~\cite{yick2008wireless}.Typically, a sensor node contains three main parts~\cite{anastasi2009energy}: a sensing subsystem, for sense, measure, and gather the measurements from the real environment; processing subsystem, for measurements processing and storage; a communication subsystem, for data transmission and receiving. Moreover, the energy needed by the sensor node is supplied by a power supply, to accomplish the scheduled task. This power supply is composed of a battery with a limited lifetime. And it maybe be unsuitable or impossible to replace or recharge the batteries in most applications. It is then necessary to deploy the WSN with high density so as to increase the reliability and to exploit redundancy by using energy-efficient activity scheduling approaches. So, the main question is: how to extend the lifetime coverage of WSN as long time as possible while ensuring a high level of coverage? Many energy-efficient mechanisms have been suggested to retain energy and extend the lifetime of the WSNs~\cite{rault2014energy}. \\ %The sensor system ought to have a lifetime long enough to satisfy the application necessities. The lifetime coverage maximization is one of the fundamental requirements of any area coverage protocol in WSN implementation~\cite{nayak2010wireless}. In order to increase the reliability and prevent the possession of coverage holes (some parts are not covered in the area of interest) in the WSN, it is necessary to deploy the WSN with high density so as to increase the reliability and to exploit redundancy by using energy-efficient activity scheduling approaches. @@ -89,9 +89,9 @@ Wireless Sensor Networks, Area Coverage, Network lifetime, Optimization, Schedul %\uppercase{\textbf{Our contributions.}} This paper makes the following contributions.\\ \begin{enumerate} -\item We devise a framework to schedules nodes to be activated alternatively, such that the network lifetime may be prolonged ans certain coverage reuirement can still be met. +\item We devise a framework to schedules nodes to be activated alternatively, such that the network lifetime may be prolonged ans certain coverage requirement can still be met. This framework is based on the division of the area of interest into several smaller subregions; on the division of timeline into periods of equal length. -One leader elected for each subregion in an independent, distributed, and simultaneous way by the cooperation among the sensor nodes within each subregion, and this similar to cluster architecture +One leader is elected for each subregion in an independent, distributed, and simultaneous way by the cooperation among the sensor nodes within each subregion, and this similar to cluster architecture \item We propose a new mathematical optimization model. Instead of trying to cover a set of specified points/targets as in most of the methods proposed in the literature, we formulate an integer program based on perimeter coverage of each sensor. The model involves integer variables to capture the deviations between the actual level of coverage and the required level. And a weighted sum of these deviations is minimized. @@ -125,7 +125,7 @@ and barrier coverage \cite{Kumar:2005}\cite{kim2013maximum} to prevent intruders from entering into the region of interest. In \cite{Deng2012} authors transform the area coverage problem to the target coverage problem taking into account the intersection points among disks of sensors nodes or between disk of sensor nodes -and boundaries. In \cite{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of sensors are sufficiently covered, the whole area is sufficiently covered and they provide an algorithm in $O(n d \quad log d)$ time to compute the perimeter-coverage of each sensor ($d$ the maixmum number of sensors that are neighboring to a sensor, $n$ the total number of sensors in teh network). {\it In LiCO protocol, rather than determining the level of coverage of a set of discrete points, our optimization model is based on checking the perimeter-coverage of each sensor to activate a minimal number of sensors.} +and boundaries. In \cite{Huang:2003:CPW:941350.941367} authors prove that if the perimeters of sensors are sufficiently covered, the whole area is sufficiently covered and they provide an algorithm in $O(n d log d)$ time to compute the perimeter-coverage of each sensor ($d$ the maximum number of sensors that are neighboring to a sensor, $n$ the total number of sensors in the network). {\it In LiCO protocol, rather than determining the level of coverage of a set of discrete points, our optimization model is based on checking the perimeter-coverage of each sensor to activate a minimal number of sensors.} The major approach to extend network lifetime while preserving coverage is to divide/organize the sensors into a suitable number of set covers (disjoint or @@ -232,9 +232,9 @@ the double objective consisting in minimizing the overcoverage and the \subsection{ Assumptions and Models} \noindent A WSN consisting of $J$ stationary sensor nodes randomly and uniformly distributed in a bounded sensor field is considered. The wireless sensors are deployed in high density to ensure initially a high coverage ratio of the interested area. We assume that all the sensor nodes are homogeneous in terms of communication, sensing, and processing capabilities and heterogeneous in term of energy supply. The location information is available to the sensor node either through hardware such as embedded GPS or through location discovery algorithms. We assume that each sensor node can directly transmit its measurements to a mobile sink node. For example, a sink can be an unmanned aerial vehicle (UAV) flying regularly over the sensor field to collect measurements from sensor nodes. A mobile sink node collects the measurements and transmits them to the base station. We consider a boolean disk coverage model which is the most widely used sensor coverage model in the literature. Each sensor has a constant sensing range $R_s$. All space points within a disk centered at the sensor with the radius of the sensing range is said to be covered by this sensor. We also assume that the communication range $R_c \geq 2R_s$. In fact, Zhang and Zhou~\cite{Zhang05} proved that if the transmission range fulfills the previous hypothesis, a complete coverage of a convex area implies connectivity among the working nodes in the active mode. -\indent LiCO protocol uses the perimeter-coverage model which states in ~\cite{huang2005coverage} as following: The sensor is said to be perimeter covered if all the points on its perimeter are covered by at least one sensor other than itself. Huang and Tseng in \cite{huang2005coverage} proves that a network area is $k-covered$ if and only if each sensor in the network is $k-perimeter-covered$. +\indent LiCO protocol uses the perimeter-coverage model which states in ~\cite{huang2005coverage} as following: The sensor is said to be perimeter covered if all the points on its perimeter are covered by at least one sensor other than itself. Huang and Tseng in \cite{huang2005coverage} proves that a network area is $k$-covered if and only if each sensor in the network is $k$-perimeter-covered. %According to this model, we named the intersections among the sensor nodes in the sensing field as intersection points. Instead of working with the coverage area, we consider for each sensor a set of intersection points which are determined by using perimeter-coverage model. -Figure~\ref{pcmfig} illuminates the perimeter coverage of the sensor node $0$. On this figure, sensor $0$ has $9$ neighbors. We report for each sensor $i$ having an intersection with sensor $0$, the two intersection points, $i\quad L$ for left point and $i\quad R$ for right point. These intersections points subdivide the perimeter of the sensor $0$ (the perimeter of the disk covered by the sensor) into portions called segments. +Figure~\ref{pcmfig} illuminates the perimeter coverage of the sensor node $0$. On this figure, sensor $0$ has $9$ neighbors. We report for each sensor $i$ having an intersection with sensor $0$, the two intersection points, $iL$ for left point and $iR$ for right point. These intersections points subdivide the perimeter of the sensor $0$ (the perimeter of the disk covered by the sensor) into portions called segments. \begin{figure}[ht!] \centering @@ -243,9 +243,9 @@ Figure~\ref{pcmfig} illuminates the perimeter coverage of the sensor node $0$. O \label{pcmfig} \end{figure} -Figure~\ref{twosensors} demonstrates the way of locating the left and right points of a segment for a sensor node $u$ covered by a sensor node $v$. This figure supposed that the neighbor sensor node $v$ is located on the west of a sensor $u$. It is assumed that the two sensor nodes $v$ and $u$ are located in the positions $(v_x,v_y)$ and $(u_x,u_y)$, respectively. The distance between $v$ and $u$ is computed by $Dist(u,v) = \sqrt{\vert u_x - v_x \vert^2 + \vert u_y - v_y \vert^2}$ . The angle $\alpha$ is computed through the formula $\alpha = arccos \left(\dfrac{Dist(u,v)}{2R_s} \right) $. So, the arch of sensor $u$ falling in the angle $[\pi - \alpha,\pi + \alpha]$, is said to be perimeter-covered by sensor node $v$. +Figure~\ref{twosensors} demonstrates the way of locating the left and right points of a segment for a sensor node $u$ covered by a sensor node $v$. This figure assumes that the neighbor sensor node $v$ is located on the west of a sensor $u$. It is assumed that the two sensor nodes $v$ and $u$ are located in the positions $(v_x,v_y)$ and $(u_x,u_y)$, respectively. The distance between $v$ and $u$ is computed by $Dist(u,v) = \sqrt{\vert u_x - v_x \vert^2 + \vert u_y - v_y \vert^2}$. The angle $\alpha$ is computed through the formula $\alpha = arccos \left(\dfrac{Dist(u,v)}{2R_s} \right)$. So, the arch of sensor $u$ falling in the angle $[\pi - \alpha,\pi + \alpha]$, is said to be perimeter-covered by sensor node $v$. -The left and right points of each segment are placed on the line segment $[0,2\pi]$. Figure~\ref{pcmfig} illustrates the segments for the 9 neighbors of sensor $0$. The points reported on the line segment separates it in intervals. For each interval, we sump up the number of parts of segments, and we deduce a level of coverage for each interval. For instance, the interval delimited by the points $5L$ and $6L$ contains three parts of segments. That means that this part of the perimeter of the sensor $0$ may be covered by three sensors, sensor $0$ itself and sensors $2$ and $5$. The level of coverage of this interval may reach $3$ if all previously mentioned sensors are active. Let say that sensors $0$, $2$ and $5$ are involved in the coverage of this interval. The table in figure~\ref{expcm} summarizes the level of coverage for each interval and the sensors involved in. +The left and right points of each segment are placed on the line segment $[0,2\pi]$. Figure~\ref{pcmfig} illustrates the segments for the 9 neighbors of sensor $0$. The points reported on the line segment $[0,2\pi]$ separates it in intervals. For each interval, we sum up the number of parts of segments, and we deduce a level of coverage for each interval. For instance, the interval delimited by the points $5L$ and $6L$ contains three parts of segments. That means that this part of the perimeter of the sensor $0$ may be covered by three sensors, sensor $0$ itself and sensors $2$ and $5$. The level of coverage of this interval may reach $3$ if all previously mentioned sensors are active. Let say that sensors $0$, $2$ and $5$ are involved in the coverage of this interval. The table in figure~\ref{expcm} summarizes the level of coverage for each interval and the sensors involved in. % to determine the level of the perimeter coverage for each left and right point of a segment. \begin{figure}[ht!] \centering @@ -281,13 +281,13 @@ In the case of sensor node, which has a part of its sensing range outside the bo \caption{Part of sensing range outside the the border of WSN sensing field.} \label{ex4pcm} \end{figure} -Figure~\ref{ex5pcm} gives an example to compute the perimeter coverage levels for the left and right points of the segments for a sensor node $0$, which has a part of its sensing range exceeding the border of the sensing field of WSN, and it has a six neighbors. In figure~\ref{ex5pcm}, the sensor node $0$ has two segments outside the border of the network sensing field, so the left and right points of the two segments called $-1L$, $-1R$, $-2L$, and $-2R$. -\begin{figure}[ht!] -\centering -\includegraphics[width=75mm]{ex5pcm.jpg} -\caption{Coverage intervals and contributing sensors for sensor node 0 having a part of its sensing range outside the border.} -\label{ex5pcm} -\end{figure} +%Figure~\ref{ex5pcm} gives an example to compute the perimeter coverage levels for the left and right points of the segments for a sensor node $0$, which has a part of its sensing range exceeding the border of the sensing field of WSN, and it has a six neighbors. In figure~\ref{ex5pcm}, the sensor node $0$ has two segments outside the border of the network sensing field, so the left and right points of the two segments called $-1L$, $-1R$, $-2L$, and $-2R$. +%\begin{figure}[ht!] +%\centering +%\includegraphics[width=75mm]{ex5pcm.jpg} +%\caption{Coverage intervals and contributing sensors for sensor node 0 having a part of its sensing range outside the border.} +%\label{ex5pcm} +%\end{figure} \subsection{The Main Idea} @@ -374,8 +374,8 @@ The pseudo-code for LiCO Protocol is illustrated as follows: \end{algorithm} -\noindent Algorithm 1 gives a brief description of the protocol applied by each sensor node (denoted by $s_k$ for a sensor node indexed by $k$). In this algorithm, the K.CurrentSize and K.PreviousSize refer to the current size and the previous size of sensor nodes in the subregion respectively. -Initially, the sensor node checks its remaining energy in order to participate in the current period. Each sensor node determines its position and its subregion based Embedded GPS or Location Discovery Algorithm. After that, all the sensors collect position coordinates, remaining energy $RE_k$, sensor node id, and the number of its one-hop live neighbors during the information exchange. The sensors inside a same region cooperates to elect a leader. The selection criteria for the leader in order of priority are: larger number of neighbors, larger remaining energy, and then in case of equality, larger index. Thereafter the leader collects information to formulate and solve the integer program which allows to construct the set of active sensors in the sensing stage. +\noindent Algorithm 1 gives a brief description of the protocol applied by each sensor node (denoted by $s_k$ for a sensor node indexed by $k$). In this algorithm, the K.CurrentSize and K.PreviousSize refer to the current size and the previous size of sensor nodes still alive in the subregion respectively. +Initially, the sensor node checks its remaining energy $RE_k$, which must be greater than a threshold $E_{th}$ in order to participate in the current period. Each sensor node determines its position and its subregion based Embedded GPS or Location Discovery Algorithm. After that, all the sensors collect position coordinates, remaining energy, sensor node id, and the number of its one-hop live neighbors during the information exchange. The sensors inside a same region cooperate to elect a leader. The selection criteria for the leader in order of priority are: larger number of neighbors, larger remaining energy, and then in case of equality, larger index. Thereafter the leader collects information to formulate and solve the integer program which allows to construct the set of active sensors in the sensing stage. %After the cooperation among the sensor nodes in the same subregion, the leader will be elected in distributed way, where each sensor node and based on it's information decide who is the leader. The selection criteria for the leader in order of priority are: larger number of neighbors, larger remaining energy, and then in case of equality, larger index. Thereafter, if the sensor node is leader, it will execute the perimeter-coverage model for each sensor in the subregion in order to determine the segment points which would be used in the next stage by the optimization algorithm of the LiCO protocol. Every sensor node is selected as a leader, it is executed the perimeter coverage model only one time during it's life in the network. @@ -392,7 +392,7 @@ For convenience, the notations are described first. \noindent $A :$ the set of alive sensors within $S$.\\ %\noindent $I :$ the set of segment points.\\ \noindent $I_j :$ the set of coverage intervals (CI) for sensor $j$.\\ - +\noindent $I_j$ refers to the set of intervals which have been defined for each sensor $j$ in section~\ref{sec:The LiCO Protocol Description}. \noindent For a coverage interval $i$, let $a^j_{ik}$ denote the indicator function of whether the sensor $k$ is involved in the coverage interval $i$ of sensor $j$, that is: \begin{equation} @@ -405,9 +405,10 @@ a^j_{ik} = \left \{ %\label{eq12} \notag \end{equation} +Note that $a^k_{ik}=1$ by definition of the interval.\\ %, where the objective is to find the maximum number of non-disjoint sets of sensor nodes such that each set cover can assure the coverage for the whole region so as to extend the network lifetime in WSN. Our model uses the PCL~\cite{huang2005coverage} in order to optimize the lifetime coverage in each subregion. %We defined some parameters, which are related to our optimization model. In our model, we consider binary variables $X_{k}$, which determine the activation of sensor $k$ in the sensing round $k$. . -We consider binary variables $X_{k}$ ($X_k=1$ if the sensor $k$ is active or 0 otherwise), which determine the activation of sensor $k$ in the sensing phase. We define the integer variable $M^j_i$ which measures the undercoverage for the coverage interval $i$ for sensor $j$. In the same way, we define the integer variable $V^j_i$, which measures the overcoverage for the coverage interval $i$ for sensor $j$. If we decide to sustain a level of coverage equal to $l$ all along the perimeter of the sensor $j$, we have to ensure that at least $l$ sensors involved in each coverage interval $i$ ($i \in I_j$) of sensor $j$ are active. According to the previous notations, the number of active sensors in the coverage interval $i$ of sensor $j$ is given by $\sum_{k \in K} a^j_{ik} X_k$. To extend the network lifetime, the objective is to active a minimal number of sensors in each period to ensure the desired coverage level. As the number of alive sensors decreases, it becomes impossible to satisfy the level of coverage for all covergae intervals. We uses variables $M^j_i$ and $V^j_i$ as a measure of the deviation between the desired number of active sensors in a coverage interval and the effective number of active sensors. And we try to minimize these deviations, first to force the activation of a minimal number of sensors to ensure the desired coverage level, and if the desired level can not be completely satisfied, to reach a coverage level as close as possible that the desired one. +\noindent We consider binary variables $X_{k}$ ($X_k=1$ if the sensor $k$ is active or 0 otherwise), which determine the activation of sensor $k$ in the sensing phase. We define the integer variable $M^j_i$ which measures the undercoverage for the coverage interval $i$ for sensor $j$. In the same way, we define the integer variable $V^j_i$, which measures the overcoverage for the coverage interval $i$ for sensor $j$. If we decide to sustain a level of coverage equal to $l$ all along the perimeter of the sensor $j$, we have to ensure that at least $l$ sensors involved in each coverage interval $i$ ($i \in I_j$) of sensor $j$ are active. According to the previous notations, the number of active sensors in the coverage interval $i$ of sensor $j$ is given by $\sum_{k \in K} a^j_{ik} X_k$. To extend the network lifetime, the objective is to active a minimal number of sensors in each period to ensure the desired coverage level. As the number of alive sensors decreases, it becomes impossible to satisfy the level of coverage for all covergae intervals. We uses variables $M^j_i$ and $V^j_i$ as a measure of the deviation between the desired number of active sensors in a coverage interval and the effective number of active sensors. And we try to minimize these deviations, first to force the activation of a minimal number of sensors to ensure the desired coverage level, and if the desired level can not be completely satisfied, to reach a coverage level as close as possible that the desired one. @@ -469,7 +470,7 @@ with another region. This kind of integer program is inspired from the model dev \subsection{Simulation Settings} %\label{sub1} -In this section, we focused on the performance of LiCO protocol, which is distributed in each sensor node in the sixteen subregions of WSN. We used the same energy consumption model which are used in~\cite{Idrees2}. Table~\ref{table3} gives the chosen parameters setting. +In this section, we focus on the performance of LiCO protocol, which is distributed in each sensor node in the sixteen subregions of WSN. We use the same energy consumption model which is used in~\cite{Idrees2}. Table~\ref{table3} gives the chosen parameters setting. \begin{table}[ht] \caption{Relevant parameters for network initializing.} @@ -586,7 +587,7 @@ In this section, we present the simulation results of LiCO protocol and the othe We compared LiCO protocol to three other approaches: the first, called DESK and proposed by ~\cite{ChinhVu} is a fully distributed coverage algorithm; the second, called GAF ~\cite{xu2001geography}, consists in dividing the region into fixed squares. During the decision phase, in each square, one sensor is -chosen to remain active during the sensing phase; the third, DiLCO protocol~\cite{Idrees2} is an improved version on the work presented in ~\cite{idrees2014coverage}. DNote that the LiCO protocol is based on the same framework as that of DiLCO. For thes two protocols, the division of the region of interest in 16 subregions was chosen since it produces the best results. The difference between the two protocols relies on the use of the integer programming to provide the set of sensors that have to be actived in each sensing phase. Whereas DilCO protocol tries to satisfy the coverage of a set of primary points, LiCO protocol tries to reach a desired level of coverage $l$ for each sensor's perimeter. In the experimentations, we chose a level of coverage equal to 1 ($l=1$). +chosen to remain active during the sensing phase; the third, DiLCO protocol~\cite{Idrees2} is an improved version on the work presented in ~\cite{idrees2014coverage}. Note that the LiCO protocol is based on the same framework as that of DiLCO. For these two protocols, the division of the region of interest in 16 subregions was chosen since it produces the best results. The difference between the two protocols relies on the use of the integer programming to provide the set of sensors that have to be actived in each sensing phase. Whereas DilCO protocol tries to satisfy the coverage of a set of primary points, LiCO protocol tries to reach a desired level of coverage $l$ for each sensor's perimeter. In the experimentations, we chose a level of coverage equal to 1 ($l=1$). \subsubsection{\textbf{Coverage Ratio}} Figure~\ref{fig333} shows the average coverage ratio for 200 deployed nodes obtained with the four methods. @@ -599,7 +600,7 @@ Figure~\ref{fig333} shows the average coverage ratio for 200 deployed nodes obta \label{fig333} \end{figure} -DESK, GAF, and DiLCO provides a little better coverage ratio with 99.99\%, 99.91\%, and 99.02\% against 98.76\% produced by LiCO for the lowest number of periods. This is due to the fact that DiLCO protocol put in sleep mode redundant sensors using optimization (which lightly decreases the coverage ratio) while there are more active nodes in the case of others methods. But when the number of periods exceeds 70 periods, it clearly appears that LiCO provides a better coverage ratio and keeps a coverage ratio greater than 50\% for longer periods (15 more compared to DiLCO, 40 more compared to DESK). +DESK, GAF, and DiLCO provides a little better coverage ratio with 99.99\%, 99.91\%, and 99.02\% against 98.76\% produced by LiCO for the first periods. This is due to the fact that DiLCO protocol put in sleep mode redundant sensors using optimization (which lightly decreases the coverage ratio) while there are more active nodes in the case of others methods. But when the number of periods exceeds 70 periods, it clearly appears that LiCO provides a better coverage ratio and keeps a coverage ratio greater than 50\% for longer periods (15 more compared to DiLCO, 40 more compared to DESK). %When the number of periods increases, coverage ratio produced by DESK and GAF protocols decreases. This is due to dead nodes. However, DiLCO protocol maintains almost a good coverage from the round 31 to the round 63 and it is close to LiCO protocol. The coverage ratio of LiCO protocol is better than other approaches from the period 64. @@ -619,7 +620,7 @@ Having active nodes as few as possible in each period is essential in order to m We observe that DESK and GAF have 30.36 \% and 34.96 \% active nodes for the first fourteen rounds and DiLCO and LiCO protocols compete perfectly with only 17.92 \% and 20.16 \% active nodes during the same time interval. As the number of periods increases, LiCO protocol has a lower number of active nodes in comparison with the three other approaches, while keeping of greater coverage ratio as shown in figure \ref{fig333}. \subsubsection{\textbf{The Energy Consumption}} -We study the effect of the energy consumed by the WSN during the communication, computation, listening, active, and sleep modes for different network densities and compare it for the four approaches. Figures~\ref{fig3EC95} and ~\ref{fig3EC50} illustrate the energy consumption for different network sizes and for $Lifetime95$ and $Lifetime50$. +We study the effect of the energy consumed by the WSN during the communication, computation, listening, active, and sleep modes for different network densities and compare it for the four approaches. Figures~\ref{fig3EC95} and \ref{fig3EC50} illustrate the energy consumption for different network sizes and for $Lifetime95$ and $Lifetime50$. \begin{figure}[h!] \centering @@ -635,7 +636,7 @@ We study the effect of the energy consumed by the WSN during the communication, \label{fig3EC50} \end{figure} -The results show that our LiCO protocol is the most competitive from the energy consumption point of view. As shown in figures~\ref{fig3EC95} and ~\ref{fig3EC50}, LiCO consumes much less energy than the three other methods. One might think that the resolution of the integer program is too costly in energy, but the results show that it is very beneficial to lose a bit of time in the selection of sensors to activate. Indeed this optimization program allows to reduce significantly the number of active sensors and so the energy consumption while keeping a good coverage level. +The results show that our LiCO protocol is the most competitive from the energy consumption point of view. As shown in figures~\ref{fig3EC95} and \ref{fig3EC50}, LiCO consumes much less energy than the three other methods. One might think that the resolution of the integer program is too costly in energy, but the results show that it is very beneficial to lose a bit of time in the selection of sensors to activate. Indeed this optimization program allows to reduce significantly the number of active sensors and so the energy consumption while keeping a good coverage level. %The optimization algorithm, which used by LiCO protocol, was improved the lifetime coverage efficiently based on the perimeter coverage model. %The other approaches have a high energy consumption due to activating a larger number of sensors. In fact, a distributed method on the subregions greatly reduces the number of communications and the time of listening so thanks to the partitioning of the initial network into several independent subnetworks.