1 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
5 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
7 \chapter{Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}
15 The most important problem in a Wireless Sensor Network (WSN) is to optimize the
16 use of its limited energy provision so that it can fulfill its monitoring task
17 as long as possible. Among known available approaches that can be used to
18 improve power management, lifetime coverage optimization provides activity
19 scheduling which ensures sensing coverage while minimizing the energy cost. In
20 this paper, we propose such an approach called Perimeter-based Coverage Optimization
21 protocol (PeCO). It is a hybrid of centralized and distributed methods: the
22 region of interest is first subdivided into subregions and our protocol is then
23 distributed among sensor nodes in each subregion.
24 The novelty of our approach lies essentially in the formulation of a new
25 mathematical optimization model based on the perimeter coverage level to schedule
26 sensors' activities. Extensive simulation experiments have been performed using
27 OMNeT++, the discrete event simulator, to demonstrate that PeCO can
28 offer longer lifetime coverage for WSNs in comparison with some other protocols.
34 \section{Introduction}
37 The continuous progress in Micro Electro-Mechanical Systems (MEMS) and
38 wireless communication hardware has given rise to the opportunity to use large
39 networks of tiny sensors, called Wireless Sensor Networks (WSN)~\cite{ref1,ref223}, to fulfill monitoring tasks. The features of a WSN made it suitable for a wide
40 range of application in areas such as business, environment, health, industry,
41 military, and so on~\cite{ref4}. These large number of applications have led to different design, management, and operational challenges in WSNs. The challenges become harder with considering into account the main limited capabilities of the sensor nodes such memory, processing, battery life, bandwidth, and short radio ranges. One important feature that distinguish the WSN from the other types of wireless networks is the provision of the sensing capability for the sensor nodes \cite{ref224}.
43 The sensor node consumes some energy both in performing the sensing task and in transmitting the sensed data to the sink. Therefore, it is required to activate as less number as possible of sensor nodes that can monitor the whole area of interest so as to reduce the data volume and extend the network lifetime. The sensing coverage is the most important task of the WSNs since sensing unit of the sensor node is responsible for measuring physical, chemical, or biological phenomena in the sensing field. The main challenge of any sensing coverage problem is to discover the redundant sensor node and turn off those nodes in WSN \cite{ref225}. The redundant sensor node is a node whose sensing area is covered by its active neighbors. In previous works, several methods are used to find out the redundant node such as Voronoi diagram method, sponsored sector, crossing coverage, and perimeter coverage.
46 The rest of the chapter is organized as follows. The next section is devoted to the PeCO protocol description and section~\ref{ch6:sec:03} focuses on the
47 coverage model formulation which is used to schedule the activation of sensor
48 nodes based on perimeter coverage model. Section~\ref{ch6:sec:04} presents simulations
49 results and discusses the comparison with other approaches. Finally, concluding
50 remarks are drawn in section~\ref{ch6:sec:05}.
54 \section{The PeCO Protocol Description}
57 \noindent In this section, we describe in details our Lifetime Coverage
58 Optimization protocol. First we present the assumptions we made and the models
59 we considered (in particular the perimeter coverage one), second we describe the
60 background idea of our protocol, and third we give the outline of the algorithm
61 executed by each node.
65 \subsection{Assumptions and Models}
67 The PeCO protocol uses the same assumptions and network model that presented in chapter 4, section \ref{ch4:sec:02:01}.
69 The PeCO protocol uses the same perimeter-coverage model as Huang and
70 Tseng in~\cite{ref133}. It can be expressed as follows: a sensor is
71 said to be a perimeter covered if all the points on its perimeter are covered by
72 at least one sensor other than itself. They proved that a network area is
73 $k$-covered if and only if each sensor in the network is $k$-perimeter-covered (perimeter covered by at least $k$ sensors).
75 Figure~\ref{pcm2sensors}(a) shows the coverage of sensor node~$0$. On this
76 figure, we can see that sensor~$0$ has nine neighbors and we have reported on
77 its perimeter (the perimeter of the disk covered by the sensor) for each
78 neighbor the two points resulting from intersection of the two sensing
79 areas. These points are denoted for neighbor~$i$ by $iL$ and $iR$, respectively
80 for left and right from neighbor point of view. The resulting couples of
81 intersection points subdivide the perimeter of sensor~$0$ into portions called
86 \begin{tabular}{@{}cr@{}}
87 \includegraphics[width=95mm]{Figures/ch6/pcm.jpg} & \raisebox{3.25cm}{(a)} \\
88 \includegraphics[width=95mm]{Figures/ch6/twosensors.jpg} & \raisebox{2.75cm}{(b)}
90 \caption{(a) Perimeter coverage of sensor node 0 and (b) finding the arc of
91 $u$'s perimeter covered by $v$.}
95 Figure~\ref{pcm2sensors}(b) describes the geometric information used to find the
96 locations of the left and right points of an arc on the perimeter of a sensor
97 node~$u$ covered by a sensor node~$v$. Node~$v$ is supposed to be located on the
98 west side of sensor~$u$, with the following respective coordinates in the
99 sensing area~: $(v_x,v_y)$ and $(u_x,u_y)$. From the previous coordinates we can
100 compute the euclidean distance between nodes~$u$ and $v$: $Dist(u,v)=\sqrt{\vert
101 u_x - v_x \vert^2 + \vert u_y-v_y \vert^2}$, while the angle~$\alpha$ is
102 obtained through the formula: $$\alpha = \arccos \left(\dfrac{Dist(u,v)}{2R_s}
103 \right).$$ The arc on the perimeter of~$u$ defined by the angular interval $[\pi
104 - \alpha,\pi + \alpha]$ is said to be perimeter-covered by sensor~$v$.
106 Every couple of intersection points is placed on the angular interval $[0,2\pi]$
107 in a counterclockwise manner, leading to a partitioning of the interval.
108 Figure~\ref{pcm2sensors}(a) illustrates the arcs for the nine neighbors of
109 sensor $0$ and Figure~\ref{expcm} gives the position of the corresponding arcs
110 in the interval $[0,2\pi]$. More precisely, we can see that the points are
111 ordered according to the measures of the angles defined by their respective
112 positions. The intersection points are then visited one after another, starting
113 from the first intersection point after point~zero, and the maximum level of
114 coverage is determined for each interval defined by two successive points. The
115 maximum level of coverage is equal to the number of overlapping arcs. For
117 between~$5L$ and~$6L$ the maximum level of coverage is equal to $3$
118 (the value is highlighted in yellow at the bottom of Figure~\ref{expcm}), which
119 means that at most 2~neighbors can cover the perimeter in addition to node $0$.
120 Table~\ref{my-label} summarizes for each coverage interval the maximum level of
121 coverage and the sensor nodes covering the perimeter. The example discussed
122 above is thus given by the sixth line of the table.
127 \includegraphics[width=150.5mm]{Figures/ch6/expcm2.jpg}
128 \caption{Maximum coverage levels for perimeter of sensor node $0$.}
134 \caption{Coverage intervals and contributing sensors for sensor node 0.}
136 \begin{tabular}{|c|c|c|c|c|c|c|c|c|}
138 \begin{tabular}[c]{@{}c@{}}Left \\ point \\ angle~$\alpha$ \end{tabular} & \begin{tabular}[c]{@{}c@{}}Interval \\ left \\ point\end{tabular} & \begin{tabular}[c]{@{}c@{}}Interval \\ right \\ point\end{tabular} & \begin{tabular}[c]{@{}c@{}}Maximum \\ coverage\\ level\end{tabular} & \multicolumn{5}{c|}{\begin{tabular}[c]{@{}c@{}}Set of sensors\\ involved \\ in coverage interval\end{tabular}} \\ \hline
139 0.0291 & 1L & 2L & 4 & 0 & 1 & 3 & 4 & \\ \hline
140 0.104 & 2L & 3R & 5 & 0 & 1 & 3 & 4 & 2 \\ \hline
141 0.3168 & 3R & 4R & 4 & 0 & 1 & 4 & 2 & \\ \hline
142 0.6752 & 4R & 1R & 3 & 0 & 1 & 2 & & \\ \hline
143 1.8127 & 1R & 5L & 2 & 0 & 2 & & & \\ \hline
144 1.9228 & 5L & 6L & 3 & 0 & 2 & 5 & & \\ \hline
145 2.3959 & 6L & 2R & 4 & 0 & 2 & 5 & 6 & \\ \hline
146 2.4258 & 2R & 7L & 3 & 0 & 5 & 6 & & \\ \hline
147 2.7868 & 7L & 8L & 4 & 0 & 5 & 6 & 7 & \\ \hline
148 2.8358 & 8L & 5R & 5 & 0 & 5 & 6 & 7 & 8 \\ \hline
149 2.9184 & 5R & 7R & 4 & 0 & 6 & 7 & 8 & \\ \hline
150 3.3301 & 7R & 9R & 3 & 0 & 6 & 8 & & \\ \hline
151 3.9464 & 9R & 6R & 4 & 0 & 6 & 8 & 9 & \\ \hline
152 4.767 & 6R & 3L & 3 & 0 & 8 & 9 & & \\ \hline
153 4.8425 & 3L & 8R & 4 & 0 & 3 & 8 & 9 & \\ \hline
154 4.9072 & 8R & 4L & 3 & 0 & 3 & 9 & & \\ \hline
155 5.3804 & 4L & 9R & 4 & 0 & 3 & 4 & 9 & \\ \hline
156 5.9157 & 9R & 1L & 3 & 0 & 3 & 4 & & \\ \hline
163 In the PeCO protocol, the scheduling of the sensor nodes' activities is formulated as an integer program based on coverage intervals. The formulation of the coverage optimization problem is detailed in~section~\ref{ch6:sec:03}. Note that when a sensor node has a part of its sensing range outside the WSN sensing field, as in Figure~\ref{ex4pcm}, the maximum coverage level for this arc is set to $\infty$ and the corresponding interval will not be taken into account by the optimization algorithm.
168 \includegraphics[width=95.5mm]{Figures/ch6/ex4pcm.jpg}
169 \caption{Sensing range outside the WSN's area of interest.}
177 \subsection{The Main Idea}
178 \label{ch6:sec:02:02}
180 \noindent The WSN area of interest is, in a first step, divided into regular
181 homogeneous subregions using a divide-and-conquer algorithm. In a second step
182 our protocol will be executed in a distributed way in each subregion
183 simultaneously to schedule nodes' activities for one sensing period.
185 As shown in Figure~\ref{fig2}, node activity scheduling is produced by our protocol in a periodic manner. Each period is divided into 4 stages: Information (INFO) Exchange, Leader Election, Decision (the result of an optimization problem), and Sensing. For each period, there is exactly one set cover responsible for the sensing task. Protocols based on a periodic scheme, like PeCO, are more robust against an unexpected node failure. On the one hand, if a node failure is discovered before taking the decision, the corresponding sensor
186 node will not be considered by the optimization algorithm. On the other hand, if the sensor failure happens after the decision, the sensing task of the network will be temporarily affected: only during the period of sensing until a new period starts, since a new set cover will take charge of the sensing task in the next period. The energy consumption and some other constraints can easily be taken into account since the sensors can update and then exchange their information (including their residual energy) at the beginning of each period. However, the pre-sensing phases (INFO Exchange, Leader Election, and Decision)
187 are energy consuming, even for nodes that will not join the set cover to monitor the area.
191 \includegraphics[scale=0.80]{Figures/ch6/Model.pdf}
192 \caption{PeCO protocol.}
199 \subsection{PeCO Protocol Algorithm}
200 \label{ch6:sec:02:03}
203 \noindent The pseudocode implementing the protocol on a node is given below.
204 More precisely, Algorithm~\ref{alg:PeCO} gives a brief description of the
205 protocol applied by a sensor node $s_k$ where $k$ is the node index in the WSN.
207 \begin{algorithm}[h!]
208 % \KwIn{all the parameters related to information exchange}
209 % \KwOut{$winer-node$ (: the id of the winner sensor node, which is the leader of current round)}
211 %\emph{Initialize the sensor node and determine it's position and subregion} \;
213 \If{ $RE_k \geq E_{th}$ }{
214 \emph{$s_k.status$ = COMMUNICATION}\;
215 \emph{Send $INFO()$ packet to other nodes in subregion}\;
216 \emph{Wait $INFO()$ packet from other nodes in subregion}\;
217 \emph{Update K.CurrentSize}\;
218 \emph{LeaderID = Leader election}\;
219 \If{$ s_k.ID = LeaderID $}{
220 \emph{$s_k.status$ = COMPUTATION}\;
222 \If{$ s_k.ID $ is Not previously selected as a Leader }{
223 \emph{ Execute the perimeter coverage model}\;
224 % \emph{ Determine the segment points using perimeter coverage model}\;
227 \If{$ (s_k.ID $ is the same Previous Leader) And (K.CurrentSize = K.PreviousSize)}{
229 \emph{ Use the same previous cover set for current sensing stage}\;
232 \emph{Update $a^j_{ik}$; prepare data for IP~Algorithm}\;
233 \emph{$\left\{\left(X_{1},\dots,X_{l},\dots,X_{K}\right)\right\}$ = Execute Integer Program Algorithm($K$)}\;
234 \emph{K.PreviousSize = K.CurrentSize}\;
237 \emph{$s_k.status$ = COMMUNICATION}\;
238 \emph{Send $ActiveSleep()$ to each node $l$ in subregion}\;
239 \emph{Update $RE_k $}\;
242 \emph{$s_k.status$ = LISTENING}\;
243 \emph{Wait $ActiveSleep()$ packet from the Leader}\;
244 \emph{Update $RE_k $}\;
247 \Else { Exclude $s_k$ from entering in the current sensing stage}
248 \caption{PeCO($s_k$)}
252 In this algorithm, K.CurrentSize and K.PreviousSize respectively represent the
253 current number and the previous number of living nodes in the subnetwork of the
254 subregion. Initially, the sensor node checks its remaining energy $RE_k$, which
255 must be greater than a threshold $E_{th}$ in order to participate in the current
256 period. Each sensor node determines its position and its subregion using an
257 embedded GPS or a location discovery algorithm. After that, all the sensors
258 collect position coordinates, remaining energy, sensor node ID, and the number
259 of their one-hop live neighbors during the information exchange. The sensors
260 inside a same region cooperate to elect a leader. The selection criteria for the
261 leader, in order of priority, are larger numbers of neighbors, larger remaining
262 energy, and then in case of equality, larger index. Once chosen, the leader
263 collects information to formulate and solve the integer program which allows to
264 construct the set of active sensors in the sensing stage.
268 \section{Perimeter-based Coverage Problem Formulation}
272 \noindent In this section, the coverage model is mathematically formulated. We
273 start with a description of the notations that will be used throughout the
276 First, we have the following sets:
278 \item $S$ represents the set of WSN sensor nodes;
279 \item $A \subseteq S $ is the subset of alive sensors;
280 \item $I_j$ designates the set of coverage intervals (CI) obtained for
283 $I_j$ refers to the set of coverage intervals which have been defined according
284 to the method introduced in subsection~\ref{ch6:sec:02:01}. For a coverage interval $i$,
285 let $a^j_{ik}$ denotes the indicator function of whether sensor~$k$ is involved
286 in coverage interval~$i$ of sensor~$j$, that is:
290 1 & \mbox{if sensor $k$ is involved in the } \\
291 & \mbox{coverage interval $i$ of sensor $j$}, \\
292 0 & \mbox{otherwise.}\\
297 Note that $a^k_{ik}=1$ by definition of the interval.
299 Second, we define several binary and integer variables. Hence, each binary
300 variable $X_{k}$ determines the activation of sensor $k$ in the sensing phase
301 ($X_k=1$ if the sensor $k$ is active or 0 otherwise). $M^j_i$ is an integer
302 variable which measures the undercoverage for the coverage interval $i$
303 corresponding to sensor~$j$. In the same way, the overcoverage for the same
304 coverage interval is given by the variable $V^j_i$.
306 If we decide to sustain a level of coverage equal to $l$ all along the perimeter
307 of sensor $j$, we have to ensure that at least $l$ sensors involved in each
308 coverage interval $i \in I_j$ of sensor $j$ are active. According to the
309 previous notations, the number of active sensors in the coverage interval $i$ of
310 sensor $j$ is given by $\sum_{k \in A} a^j_{ik} X_k$. To extend the network
311 lifetime, the objective is to activate a minimal number of sensors in each
312 period to ensure the desired coverage level. As the number of alive sensors
313 decreases, it becomes impossible to reach the desired level of coverage for all
314 coverage intervals. Therefore, we use variables $M^j_i$ and $V^j_i$ as a measure
315 of the deviation between the desired number of active sensors in a coverage
316 interval and the effective number. And we try to minimize these deviations,
317 first to force the activation of a minimal number of sensors to ensure the
318 desired coverage level, and if the desired level cannot be completely satisfied,
319 to reach a coverage level as close as possible to the desired one.
321 Our coverage optimization problem can then be mathematically expressed as follows:
323 \begin{equation} %\label{eq:ip2r}
326 \min \sum_{j \in S} \sum_{i \in I_j} (\alpha^j_i ~ M^j_i + \beta^j_i ~ V^j_i )&\\
327 \textrm{subject to :}&\\
328 \sum_{k \in A} ( a^j_{ik} ~ X_{k}) + M^j_i \geq l \quad \forall i \in I_j, \forall j \in S\\
330 \sum_{k \in A} ( a^j_{ik} ~ X_{k}) - V^j_i \leq l \quad \forall i \in I_j, \forall j \in S\\
332 % \Theta_{p}\in \mathbb{N}, &\forall p \in P\\
333 % U_{p} \in \{0,1\}, &\forall p \in P\\
334 X_{k} \in \{0,1\}, \forall k \in A
339 $\alpha^j_i$ and $\beta^j_i$ are nonnegative weights selected according to the
340 relative importance of satisfying the associated level of coverage. For example,
341 weights associated with coverage intervals of a specified part of a region may
342 be given by a relatively larger magnitude than weights associated with another
343 region. This kind of an integer program is inspired from the model developed for
344 brachytherapy treatment planning for optimizing dose distribution
345 \cite{0031-9155-44-1-012}. The integer program must be solved by the leader in
346 each subregion at the beginning of each sensing phase, whenever the environment
347 has changed (new leader, death of some sensors). Note that the number of
348 constraints in the model is constant (constraints of coverage expressed for all
349 sensors), whereas the number of variables $X_k$ decreases over periods, since we
350 consider only alive sensors (sensors with enough energy to be alive during one
351 sensing phase) in the model.
353 \section{Performance Evaluation and Analysis}
356 \subsection{Simulation Settings}
357 \label{ch6:sec:04:01}
359 The WSN area of interest is supposed to be divided into 16~regular subregions. %and we use the same energy consumption than in our previous work~\cite{Idrees2}.
360 Table~\ref{table3} gives the chosen parameters settings.
363 \caption{Relevant parameters for network initialization.}
366 % used for centering table
368 % centered columns (4 columns)
370 Parameter & Value \\ [0.5ex]
373 % inserts single horizontal line
374 Sensing field & $(50 \times 25)~m^2 $ \\
376 WSN size & 100, 150, 200, 250, and 300~nodes \\
378 Initial energy & in range 500-700~Joules \\
380 Sensing period & duration of 60 minutes \\
381 $E_{th}$ & 36~Joules\\
384 $\alpha^j_i$ & 0.6 \\
385 % [1ex] adds vertical space
391 % is used to refer this table in the text
395 To obtain experimental results which are relevant, simulations with five
396 different node densities going from 100 to 300~nodes were performed considering
397 each time 25~randomly generated networks. The nodes are deployed on a field of
398 interest of $(50 \times 25)~m^2 $ in such a way that they cover the field with a
399 high coverage ratio. Each node has an initial energy level, in Joules, which is
400 randomly drawn in the interval $[500-700]$. If its energy provision reaches a
401 value below the threshold $E_{th}=36$~Joules, the minimum energy needed for a
402 node to stay active during one period, it will no more participate in the
403 coverage task. This value corresponds to the energy needed by the sensing phase,
404 obtained by multiplying the energy consumed in active state (9.72 mW) with the
405 time in seconds for one period (3600 seconds), and adding the energy for the
406 pre-sensing phases. According to the interval of initial energy, a sensor may
407 be active during at most 20 periods.
410 The values of $\alpha^j_i$ and $\beta^j_i$ have been chosen to ensure a good
411 network coverage and a longer WSN lifetime. We have given a higher priority to
412 the undercoverage (by setting the $\alpha^j_i$ with a larger value than
413 $\beta^j_i$) so as to prevent the non-coverage for the interval~$i$ of the
414 sensor~$j$. On the other hand, we have assigned to
415 $\beta^j_i$ a value which is slightly lower so as to minimize the number of active sensor nodes which contribute
416 in covering the interval.
418 We applied the performance metrics, which are described in chapter 4, section \ref{ch4:sec:04:04} in order to evaluate the efficiency of our approach. We used the modeling language and the optimization solver which are mentioned in chapter 4, section \ref{ch4:sec:04:02}. In addition, we employed an energy consumption model, which is presented in chapter 4, section \ref{ch4:sec:04:03}.
421 \subsection{Simulation Results}
422 \label{ch6:sec:04:02}
424 In order to assess and analyze the performance of our protocol we have implemented PeCO protocol in OMNeT++~\cite{ref158} simulator. Besides PeCO, three other protocols, described in the next paragraph, will be evaluated for comparison purposes.
425 %The simulations were run on a laptop DELL with an Intel Core~i3~2370~M (2.4~GHz) processor (2 cores) whose MIPS (Million Instructions Per Second) rate is equal to 35330. To be consistent with the use of a sensor node based on Atmels AVR ATmega103L microcontroller (6~MHz) having a MIPS rate equal to 6, the original execution time on the laptop is multiplied by 2944.2 $\left(\frac{35330}{2} \times \frac{1}{6} \right)$. The modeling language for Mathematical Programming (AMPL)~\cite{AMPL} is employed to generate the integer program instance in a standard format, which is then read and solved by the optimization solver GLPK (GNU linear Programming Kit available in the public domain) \cite{glpk} through a Branch-and-Bound method.
426 As said previously, the PeCO is compared with three other approaches. The first one, called DESK, is a fully distributed coverage algorithm proposed by \cite{DESK}. The second one, called GAF~\cite{GAF}, consists in dividing the monitoring area into fixed squares. Then, during the decision phase, in each square, one sensor is chosen to remain active during the sensing phase. The last one, the DiLCO protocol~\cite{Idrees2}, is an improved version of a research work we presented in~\cite{ref159}. Let us notice that PeCO and DiLCO protocols are based on the same framework. In particular, the choice for the simulations of a partitioning in 16~subregions was chosen because it corresponds to the configuration producing the better results for DiLCO. The protocols are distinguished from one another by the formulation of the integer program providing the set of sensors which have to be activated in each sensing phase. DiLCO protocol tries to satisfy the coverage of a set of primary points, whereas PeCO protocol objective is to reach a desired level of coverage for each sensor perimeter. In our experimentations, we chose a level of coverage equal to one ($l=1$).
430 \subsubsection{Coverage Ratio}
431 \label{ch6:sec:04:02:01}
433 Figure~\ref{fig333} shows the average coverage ratio for 200 deployed nodes
434 obtained with the four protocols. DESK, GAF, and DiLCO provide a slightly better
435 coverage ratio with respectively 99.99\%, 99.91\%, and 99.02\%, compared to the 98.76\%
436 produced by PeCO for the first periods. This is due to the fact that at the
437 beginning the DiLCO protocol puts to sleep status more redundant sensors (which
438 slightly decreases the coverage ratio), while the three other protocols activate
439 more sensor nodes. Later, when the number of periods is beyond~70, it clearly
440 appears that PeCO provides a better coverage ratio and keeps a coverage ratio
441 greater than 50\% for longer periods (15 more compared to DiLCO, 40 more
442 compared to DESK). The energy saved by PeCO in the early periods allows later a
443 substantial increase of the coverage performance.
448 \includegraphics[scale=0.8] {Figures/ch6/R/CR.eps}
449 \caption{Coverage ratio for 200 deployed nodes.}
455 \subsubsection{Active Sensors Ratio}
456 \label{ch6:sec:04:02:02}
458 Having the less active sensor nodes in each period is essential to minimize the
459 energy consumption and thus to maximize the network lifetime. Figure~\ref{fig444}
460 shows the average active nodes ratio for 200 deployed nodes. We observe that
461 DESK and GAF have 30.36 \% and 34.96 \% active nodes for the first fourteen
462 rounds and DiLCO and PeCO protocols compete perfectly with only 17.92 \% and
463 20.16 \% active nodes during the same time interval. As the number of periods
464 increases, PeCO protocol has a lower number of active nodes in comparison with
465 the three other approaches, while keeping a greater coverage ratio as shown in
470 \includegraphics[scale=0.8]{Figures/ch6/R/ASR.eps}
471 \caption{Active sensors ratio for 200 deployed nodes.}
475 \subsubsection{The Energy Consumption}
476 \label{ch6:sec:04:02:03}
478 We studied the effect of the energy consumed by the WSN during the communication,
479 computation, listening, active, and sleep status for different network densities
480 and compared it for the four approaches. Figures~\ref{fig3EC}(a) and (b)
481 illustrate the energy consumption for different network sizes and for
482 $Lifetime95$ and $Lifetime50$. The results show that our PeCO protocol is the
483 most competitive from the energy consumption point of view. As shown in both
484 figures, PeCO consumes much less energy than the three other methods. One might
485 think that the resolution of the integer program is too costly in energy, but
486 the results show that it is very beneficial to lose a bit of time in the
487 selection of sensors to activate. Indeed the optimization program allows to
488 reduce significantly the number of active sensors and so the energy consumption
489 while keeping a good coverage level.
493 \begin{tabular}{@{}cr@{}}
494 \includegraphics[scale=0.8]{Figures/ch6/R/EC95.eps} & \raisebox{4cm}{(a)} \\
495 \includegraphics[scale=0.8]{Figures/ch6/R/EC50.eps} & \raisebox{4cm}{(b)}
497 \caption{Energy consumption per period for (a)~$Lifetime_{95}$ and (b)~$Lifetime_{50}$.}
503 \subsubsection{The Network Lifetime}
504 \label{ch6:sec:04:02:04}
506 We observe the superiority of PeCO and DiLCO protocols in comparison with the
507 two other approaches in prolonging the network lifetime. In
508 Figures~\ref{fig3LT}(a) and (b), $Lifetime95$ and $Lifetime50$ are shown for
509 different network sizes. As highlighted by these figures, the lifetime
510 increases with the size of the network, and it is clearly largest for DiLCO
511 and PeCO protocols. For instance, for a network of 300~sensors and coverage
512 ratio greater than 50\%, we can see on Figure~\ref{fig3LT}(b) that the lifetime
513 is about twice longer with PeCO compared to DESK protocol. The performance
514 difference is more obvious in Figure~\ref{fig3LT}(b) than in
515 Figure~\ref{fig3LT}(a) because the gain induced by our protocols increases with
516 time, and the lifetime with a coverage of 50\% is far longer than with
521 \begin{tabular}{@{}cr@{}}
522 \includegraphics[scale=0.8]{Figures/ch6/R/LT95.eps} & \raisebox{4cm}{(a)} \\
523 \includegraphics[scale=0.8]{Figures/ch6/R/LT50.eps} & \raisebox{4cm}{(b)}
525 \caption{Network Lifetime for (a)~$Lifetime_{95}$ and (b)~$Lifetime_{50}$.}
529 Figure~\ref{figLTALL} compares the lifetime coverage of our protocols for
530 different coverage ratios. We denote by Protocol/50, Protocol/80, Protocol/85,
531 Protocol/90, and Protocol/95 the amount of time during which the network can
532 satisfy an area coverage greater than $50\%$, $80\%$, $85\%$, $90\%$, and $95\%$
533 respectively, where the term Protocol refers to DiLCO or PeCO. Indeed there are applications
534 that do not require a 100\% coverage of the area to be monitored. PeCO might be
535 an interesting method since it achieves a good balance between a high level
536 coverage ratio and network lifetime. PeCO always outperforms DiLCO for the three
537 lower coverage ratios, moreover the improvements grow with the network
538 size. DiLCO is better for coverage ratios near 100\%, but in that case PeCO is
539 not ineffective for the smallest network sizes.
542 \centering \includegraphics[scale=0.8]{Figures/ch6/R/LTa.eps}
543 \caption{Network lifetime for different coverage ratios.}
552 In this chapter, we have studied the problem of Perimeter-based Coverage Optimization in
553 WSNs. We have designed a new protocol, called Perimeter-based Coverage Optimization, which
554 schedules nodes' activities (wake up and sleep stages) with the objective of
555 maintaining a good coverage ratio while maximizing the network lifetime. This
556 protocol is applied in a distributed way in regular subregions obtained after
557 partitioning the area of interest in a preliminary step. It works in periods and
558 is based on the resolution of an integer program to select the subset of sensors
559 operating in active status for each period. Our work is original in so far as it
560 proposes for the first time an integer program scheduling the activation of
561 sensors based on their perimeter coverage level, instead of using a set of
562 targets/points to be covered. We have carried out several simulations to evaluate the proposed protocol. The simulation results show that PeCO is more energy-efficient than other approaches, with respect to lifetime, coverage ratio, active sensors ratio, and
565 We plan to extend our framework so that the schedules are planned for multiple
567 %in order to compute all active sensor schedules in only one step for many periods;
568 We also want to improve our integer program to take into account heterogeneous
569 sensors from both energy and node characteristics point of views.
570 %the third, we are investigating new optimization model based on the sensing range so as to maximize the lifetime coverage in WSN;
571 Finally, it would be interesting to implement our protocol using a
572 sensor-testbed to evaluate it in real world applications.