X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/ThesisAli.git/blobdiff_plain/6bf881a8ca453aa337be79c6945f1b97daf44039..025698f711cfa8d174abdf309b09da921696771e:/Thesis.toc?ds=inline diff --git a/Thesis.toc b/Thesis.toc index 2e06f6f..2b8d1d4 100644 --- a/Thesis.toc +++ b/Thesis.toc @@ -1,107 +1,108 @@ \select@language {english} -\contentsline {chapter}{Table of Contents}{4}{chapter*.1} -\contentsline {chapter}{List of Figures}{6}{chapter*.2} -\contentsline {chapter}{List of Tables}{7}{chapter*.3} -\contentsline {chapter}{List of Algorithms}{9}{chapter*.4} -\contentsline {chapter}{List of Acronyms}{9}{chapter*.4} -\contentsline {chapter}{abbreviations}{11}{chapter*.5} -\contentsline {chapter}{Abstract}{13}{chapter*.6} -\contentsline {chapter}{Introduction }{15}{chapter*.7} -\contentsline {section}{1. General Introduction }{15}{section*.8} -\contentsline {section}{2. Motivation of the Dissertation }{16}{section*.9} -\contentsline {section}{3. The Objective of this Dissertation}{16}{section*.10} -\contentsline {section}{4. Main Contributions of this Dissertation}{16}{section*.11} -\contentsline {section}{5. Dissertation Outline}{18}{section*.12} -\contentsline {part}{I\hspace {1em}Scientific Background}{19}{part.1} -\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{21}{chapter.1} -\contentsline {section}{\numberline {1.1}Introduction}{21}{section.1.1} -\contentsline {section}{\numberline {1.2}Architecture}{22}{section.1.2} -\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{24}{section.1.3} -\contentsline {section}{\numberline {1.4}Applications}{26}{section.1.4} -\contentsline {section}{\numberline {1.5}The Main Challenges}{29}{section.1.5} -\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms of a working WSN}{31}{section.1.6} -\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{31}{subsection.1.6.1} -\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy}{31}{subsubsection.1.6.1.1} -\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing}{31}{subsubsection.1.6.1.2} -\contentsline {subsection}{\numberline {1.6.2}Cluster Architecture}{32}{subsection.1.6.2} -\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{32}{subsection.1.6.3} -\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes}{32}{subsubsection.1.6.3.1} -\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes}{35}{subsubsection.1.6.3.2} -\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes}{35}{subsection.1.6.4} -\contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{36}{subsubsection.1.6.4.1} -\contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{36}{subsubsection.1.6.4.2} -\contentsline {subsection}{\numberline {1.6.5}Battery Repletion}{36}{subsection.1.6.5} -\contentsline {subsection}{\numberline {1.6.6}Radio Optimization}{36}{subsection.1.6.6} -\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility}{37}{subsection.1.6.7} -\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement}{37}{subsubsection.1.6.7.1} -\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility}{37}{subsubsection.1.6.7.2} -\contentsline {section}{\numberline {1.7}Network Lifetime}{37}{section.1.7} -\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{38}{section.1.8} -\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{40}{section.1.9} -\contentsline {section}{\numberline {1.10}Energy Consumption Model}{41}{section.1.10} -\contentsline {section}{\numberline {1.11}Conclusion}{42}{section.1.11} -\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{43}{chapter.2} -\contentsline {section}{\numberline {2.1}Introduction}{43}{section.2.1} -\contentsline {section}{\numberline {2.2}Centralized Algorithms}{45}{section.2.2} -\contentsline {section}{\numberline {2.3}Distributed Algorithms}{48}{section.2.3} -\contentsline {subsection}{\numberline {2.3.1}GAF}{50}{subsection.2.3.1} -\contentsline {subsection}{\numberline {2.3.2}DESK}{52}{subsection.2.3.2} -\contentsline {section}{\numberline {2.4}Conclusion}{54}{section.2.4} -\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{57}{chapter.3} -\contentsline {section}{\numberline {3.1}Introduction}{57}{section.3.1} -\contentsline {section}{\numberline {3.2}Evaluation Tools}{57}{section.3.2} -\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{58}{subsection.3.2.1} -\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{59}{subsection.3.2.2} -\contentsline {section}{\numberline {3.3}Optimization Solvers}{64}{section.3.3} -\contentsline {section}{\numberline {3.4}Conclusion}{67}{section.3.4} -\contentsline {part}{II\hspace {1em}Contributions}{69}{part.2} -\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{71}{chapter.4} -\contentsline {section}{\numberline {4.1}Introduction}{71}{section.4.1} -\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{72}{section.4.2} -\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{72}{subsection.4.2.1} -\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{73}{subsection.4.2.2} -\contentsline {subsection}{\numberline {4.2.3}Main Idea}{74}{subsection.4.2.3} -\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{75}{subsubsection.4.2.3.1} -\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{75}{subsubsection.4.2.3.2} -\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{75}{subsubsection.4.2.3.3} -\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{75}{subsubsection.4.2.3.4} -\contentsline {section}{\numberline {4.3}Primary Points based Coverage Problem Formulation}{76}{section.4.3} -\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{78}{section.4.4} -\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{78}{subsection.4.4.1} -\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{78}{subsection.4.4.2} -\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{78}{subsection.4.4.3} -\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{79}{subsection.4.4.4} -\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Subregions}{80}{subsection.4.4.5} -\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Primary Point Models}{86}{subsection.4.4.6} -\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{91}{subsection.4.4.7} -\contentsline {section}{\numberline {4.5}Conclusion}{97}{section.4.5} -\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol in Wireless Sensor Networks}{99}{chapter.5} -\contentsline {section}{\numberline {5.1}Introduction}{99}{section.5.1} -\contentsline {section}{\numberline {5.2}MuDiLCO Protocol Description}{100}{section.5.2} -\contentsline {subsection}{\numberline {5.2.1}Background Idea and Algorithm}{100}{subsection.5.2.1} -\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{101}{section.5.3} -\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{103}{section.5.4} -\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{103}{subsection.5.4.1} -\contentsline {subsection}{\numberline {5.4.2}Metrics}{104}{subsection.5.4.2} -\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{105}{subsection.5.4.3} -\contentsline {section}{\numberline {5.5}Conclusion}{110}{section.5.5} -\contentsline {chapter}{\numberline {6}Perimeter-based Coverage Optimization to Improve Lifetime in Wireless Sensor Networks}{113}{chapter.6} -\contentsline {section}{\numberline {6.1}Introduction}{113}{section.6.1} -\contentsline {section}{\numberline {6.2}The PeCO Protocol Description}{114}{section.6.2} -\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{114}{subsection.6.2.1} -\contentsline {subsection}{\numberline {6.2.2}The Main Idea}{117}{subsection.6.2.2} -\contentsline {subsection}{\numberline {6.2.3}PeCO Protocol Algorithm}{117}{subsection.6.2.3} -\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{118}{section.6.3} -\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{120}{section.6.4} -\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{120}{subsection.6.4.1} -\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{121}{subsection.6.4.2} -\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{122}{subsubsection.6.4.2.1} -\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{122}{subsubsection.6.4.2.2} -\contentsline {subsubsection}{\numberline {6.4.2.3}The Energy Consumption}{123}{subsubsection.6.4.2.3} -\contentsline {subsubsection}{\numberline {6.4.2.4}The Network Lifetime}{123}{subsubsection.6.4.2.4} -\contentsline {section}{\numberline {6.5}Conclusion}{126}{section.6.5} -\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{127}{part.3} -\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{129}{chapter.7} -\contentsline {section}{\numberline {7.1}Conclusion}{129}{section.7.1} -\contentsline {section}{\numberline {7.2}Perspectives}{130}{section.7.2} -\contentsline {part}{Bibliographie}{146}{chapter*.13} +\contentsline {chapter}{Abstract}{1}{chapter*.1} +\contentsline {chapter}{R\IeC {\'e}sum\IeC {\'e}}{3}{chapter*.2} +\contentsline {chapter}{Table of Contents}{8}{chapter*.3} +\contentsline {chapter}{List of Figures}{10}{chapter*.4} +\contentsline {chapter}{List of Tables}{11}{chapter*.5} +\contentsline {chapter}{List of Algorithms}{13}{chapter*.6} +\contentsline {chapter}{List of Abbreviations}{15}{chapter*.7} +\contentsline {chapter}{Dedication}{19}{chapter*.8} +\contentsline {chapter}{Acknowledgements}{21}{chapter*.9} +\contentsline {chapter}{Introduction }{23}{chapter*.10} +\contentsline {section}{1. General Introduction }{23}{section*.11} +\contentsline {section}{2. Motivation of the Dissertation }{24}{section*.12} +\contentsline {section}{3. Main Contributions of this Dissertation}{24}{section*.13} +\contentsline {section}{4. Dissertation Outline}{25}{section*.14} +\contentsline {part}{I\hspace {1em}Scientific Background}{27}{part.1} +\contentsline {chapter}{\numberline {1}Wireless Sensor Networks}{29}{chapter.1} +\contentsline {section}{\numberline {1.1}Introduction}{29}{section.1.1} +\contentsline {section}{\numberline {1.2}Architecture}{30}{section.1.2} +\contentsline {section}{\numberline {1.3}Types of Wireless Sensor Networks}{32}{section.1.3} +\contentsline {section}{\numberline {1.4}Applications}{34}{section.1.4} +\contentsline {section}{\numberline {1.5}The Main Challenges}{37}{section.1.5} +\contentsline {section}{\numberline {1.6}Energy-Efficient Mechanisms of a working WSN}{39}{section.1.6} +\contentsline {subsection}{\numberline {1.6.1}Energy-Efficient Routing}{39}{subsection.1.6.1} +\contentsline {subsubsection}{\numberline {1.6.1.1}Routing Metric based on Residual Energy}{39}{subsubsection.1.6.1.1} +\contentsline {subsubsection}{\numberline {1.6.1.2}Multipath Routing}{39}{subsubsection.1.6.1.2} +\contentsline {subsection}{\numberline {1.6.2}Cluster Architecture}{40}{subsection.1.6.2} +\contentsline {subsection}{\numberline {1.6.3}Scheduling Schemes}{40}{subsection.1.6.3} +\contentsline {subsubsection}{\numberline {1.6.3.1}Wake up Scheduling Schemes}{40}{subsubsection.1.6.3.1} +\contentsline {subsubsection}{\numberline {1.6.3.2}Topology Control Schemes}{43}{subsubsection.1.6.3.2} +\contentsline {subsection}{\numberline {1.6.4}Data-Driven Schemes}{43}{subsection.1.6.4} +\contentsline {subsubsection}{\numberline {1.6.4.1}Data Reduction Schemes}{44}{subsubsection.1.6.4.1} +\contentsline {subsubsection}{\numberline {1.6.4.2}Energy Efficient Data Acquisition Schemes}{44}{subsubsection.1.6.4.2} +\contentsline {subsection}{\numberline {1.6.5}Battery Repletion}{44}{subsection.1.6.5} +\contentsline {subsection}{\numberline {1.6.6}Radio Optimization}{44}{subsection.1.6.6} +\contentsline {subsection}{\numberline {1.6.7}Relay nodes and Sink Mobility}{45}{subsection.1.6.7} +\contentsline {subsubsection}{\numberline {1.6.7.1}Relay node placement}{45}{subsubsection.1.6.7.1} +\contentsline {subsubsection}{\numberline {1.6.7.2}Sink Mobility}{45}{subsubsection.1.6.7.2} +\contentsline {section}{\numberline {1.7}Network Lifetime}{45}{section.1.7} +\contentsline {section}{\numberline {1.8}Coverage in Wireless Sensor Networks }{46}{section.1.8} +\contentsline {section}{\numberline {1.9}Design Issues for Coverage Problems}{48}{section.1.9} +\contentsline {section}{\numberline {1.10}Energy Consumption Model}{49}{section.1.10} +\contentsline {section}{\numberline {1.11}Conclusion}{50}{section.1.11} +\contentsline {chapter}{\numberline {2}Related Works on Coverage Problems}{51}{chapter.2} +\contentsline {section}{\numberline {2.1}Introduction}{51}{section.2.1} +\contentsline {section}{\numberline {2.2}Centralized Algorithms}{53}{section.2.2} +\contentsline {section}{\numberline {2.3}Distributed Algorithms}{55}{section.2.3} +\contentsline {subsection}{\numberline {2.3.1}Geographical Adaptive Fidelity (GAF)}{57}{subsection.2.3.1} +\contentsline {subsection}{\numberline {2.3.2}Distributed Energy-efficient Scheduling for K-coverage (DESK)}{59}{subsection.2.3.2} +\contentsline {section}{\numberline {2.4}Conclusion}{63}{section.2.4} +\contentsline {chapter}{\numberline {3}Evaluation Tools and Optimization Solvers}{65}{chapter.3} +\contentsline {section}{\numberline {3.1}Introduction}{65}{section.3.1} +\contentsline {section}{\numberline {3.2}Evaluation Tools}{65}{section.3.2} +\contentsline {subsection}{\numberline {3.2.1}Testbed Tools}{66}{subsection.3.2.1} +\contentsline {subsection}{\numberline {3.2.2}Simulation Tools}{68}{subsection.3.2.2} +\contentsline {section}{\numberline {3.3}Optimization Solvers}{70}{section.3.3} +\contentsline {section}{\numberline {3.4}Conclusion}{74}{section.3.4} +\contentsline {part}{II\hspace {1em}Contributions}{75}{part.2} +\contentsline {chapter}{\numberline {4}Distributed Lifetime Coverage Optimization Protocol}{77}{chapter.4} +\contentsline {section}{\numberline {4.1}Introduction}{77}{section.4.1} +\contentsline {section}{\numberline {4.2}Description of the DiLCO Protocol}{78}{section.4.2} +\contentsline {subsection}{\numberline {4.2.1}Assumptions and Network Model}{78}{subsection.4.2.1} +\contentsline {subsection}{\numberline {4.2.2}Primary Point Coverage Model}{79}{subsection.4.2.2} +\contentsline {subsection}{\numberline {4.2.3}Main Idea}{79}{subsection.4.2.3} +\contentsline {subsubsection}{\numberline {4.2.3.1}Information Exchange Phase}{81}{subsubsection.4.2.3.1} +\contentsline {subsubsection}{\numberline {4.2.3.2}Leader Election Phase}{81}{subsubsection.4.2.3.2} +\contentsline {subsubsection}{\numberline {4.2.3.3}Decision phase}{82}{subsubsection.4.2.3.3} +\contentsline {subsubsection}{\numberline {4.2.3.4}Sensing phase}{82}{subsubsection.4.2.3.4} +\contentsline {section}{\numberline {4.3}Coverage Problem Formulation}{83}{section.4.3} +\contentsline {section}{\numberline {4.4}Simulation Results and Analysis}{85}{section.4.4} +\contentsline {subsection}{\numberline {4.4.1}Simulation Framework}{85}{subsection.4.4.1} +\contentsline {subsection}{\numberline {4.4.2}Modeling Language and Optimization Solver}{85}{subsection.4.4.2} +\contentsline {subsection}{\numberline {4.4.3}Energy Consumption Model}{85}{subsection.4.4.3} +\contentsline {subsection}{\numberline {4.4.4}Performance Metrics}{86}{subsection.4.4.4} +\contentsline {subsection}{\numberline {4.4.5}Performance Analysis for Different Number of Subregions}{87}{subsection.4.4.5} +\contentsline {subsection}{\numberline {4.4.6}Performance Analysis for Different Number of Primary Points}{92}{subsection.4.4.6} +\contentsline {subsection}{\numberline {4.4.7}Performance Comparison with other Approaches}{96}{subsection.4.4.7} +\contentsline {section}{\numberline {4.5}Conclusion}{105}{section.4.5} +\contentsline {chapter}{\numberline {5}Multiround Distributed Lifetime Coverage Optimization Protocol}{107}{chapter.5} +\contentsline {section}{\numberline {5.1}Introduction}{107}{section.5.1} +\contentsline {section}{\numberline {5.2}Description of the MuDiLCO Protocol }{107}{section.5.2} +\contentsline {section}{\numberline {5.3}Primary Points based Multiround Coverage Problem Formulation}{109}{section.5.3} +\contentsline {section}{\numberline {5.4}Experimental Study and Analysis}{111}{section.5.4} +\contentsline {subsection}{\numberline {5.4.1}Simulation Setup}{111}{subsection.5.4.1} +\contentsline {subsection}{\numberline {5.4.2}Metrics}{111}{subsection.5.4.2} +\contentsline {subsection}{\numberline {5.4.3}Results Analysis and Comparison }{112}{subsection.5.4.3} +\contentsline {section}{\numberline {5.5}Conclusion}{118}{section.5.5} +\contentsline {chapter}{\numberline {6} Perimeter-based Coverage Optimization to Improve Lifetime in WSNs}{119}{chapter.6} +\contentsline {section}{\numberline {6.1}Introduction}{119}{section.6.1} +\contentsline {section}{\numberline {6.2}Description of the PeCO Protocol}{119}{section.6.2} +\contentsline {subsection}{\numberline {6.2.1}Assumptions and Models}{119}{subsection.6.2.1} +\contentsline {subsection}{\numberline {6.2.2}PeCO Protocol Algorithm}{122}{subsection.6.2.2} +\contentsline {section}{\numberline {6.3}Perimeter-based Coverage Problem Formulation}{125}{section.6.3} +\contentsline {section}{\numberline {6.4}Performance Evaluation and Analysis}{126}{section.6.4} +\contentsline {subsection}{\numberline {6.4.1}Simulation Settings}{126}{subsection.6.4.1} +\contentsline {subsection}{\numberline {6.4.2}Simulation Results}{127}{subsection.6.4.2} +\contentsline {subsubsection}{\numberline {6.4.2.1}Coverage Ratio}{127}{subsubsection.6.4.2.1} +\contentsline {subsubsection}{\numberline {6.4.2.2}Active Sensors Ratio}{127}{subsubsection.6.4.2.2} +\contentsline {subsubsection}{\numberline {6.4.2.3}Energy Consumption}{128}{subsubsection.6.4.2.3} +\contentsline {subsubsection}{\numberline {6.4.2.4}Network Lifetime}{128}{subsubsection.6.4.2.4} +\contentsline {subsubsection}{\numberline {6.4.2.5}Impact of $\alpha $ and $\beta $ on PeCO's performance}{129}{subsubsection.6.4.2.5} +\contentsline {section}{\numberline {6.5}Conclusion}{133}{section.6.5} +\contentsline {part}{III\hspace {1em}Conclusion and Perspectives}{135}{part.3} +\contentsline {chapter}{\numberline {7}Conclusion and Perspectives}{137}{chapter.7} +\contentsline {section}{\numberline {7.1}Conclusion}{137}{section.7.1} +\contentsline {section}{\numberline {7.2}Perspectives}{138}{section.7.2} +\contentsline {part}{Publications}{141}{chapter*.15} +\contentsline {part}{Bibliographie}{156}{chapter*.19}