Next Article in Journal
An X-Band Radar System for Bathymetry and Wave Field Analysis in a Harbour Area
Previous Article in Journal
Design of Surface Modifications for Nanoscale Sensor Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimal Base Station Placement for Wireless Sensor Networks with Successive Interference Cancellation

1
School of Computer and Information, Hefei University of Technology, Hefei 230009, China
2
Intelligent Automation Inc., 15400 Calhoun Drive, Rockville, MD 20855, USA
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(1), 1676-1690; https://doi.org/10.3390/s150101676
Submission received: 29 September 2014 / Accepted: 8 January 2015 / Published: 14 January 2015
(This article belongs to the Section Sensor Networks)

Abstract

: We consider the base station placement problem for wireless sensor networks with successive interference cancellation (SIC) to improve throughput. We build a mathematical model for SIC. Although this model cannot be solved directly, it enables us to identify a necessary condition for SIC on distances from sensor nodes to the base station. Based on this relationship, we propose to divide the feasible region of the base station into small pieces and choose a point within each piece for base station placement. The point with the largest throughput is identified as the solution. The complexity of this algorithm is polynomial. Simulation results show that this algorithm can achieve about 25% improvement compared with the case that the base station is placed at the center of the network coverage area when using SIC.

1. Introduction

Due to limited resources, it is a challenge to increase throughput in a wireless sensor network (WSN) [1]. Traditional interference avoidance mechanisms, e.g., TDMA, CDMA, CSMA, do not allow concurrent transmissions and, thus, cannot maximize throughput. Recently, interference management [2,3] was proposed to enable concurrent transmissions. Several techniques [4,5] were designed to realize such interference management. Among them, successive interference cancellation (SIC) [6] is easy to implement while also being able to achieve good performance. Zhang and Haenggi proposed a unified framework to study the performance of SIC [7]. Their analytical results showed that SIC can achieve potential gain in wireless networks, especially in heterogeneous cellular networks. Blomer and Jindal showed that although the benefit of SIC may be small for a small network with two links [8], the benefit is much larger for a complex network with many links [9]. Since SIC changes physical layer behaviors, new schemes and protocols should be designed for the upper layers, so that SIC can be used effectively [10]. For example, Lv et al. focused on link scheduling in ad hoc networks with SIC and developed a greedy scheduling algorithm, which can improve the throughput gain by 30% to 60% in simulations [11]. They later designed another algorithm [12] based on the simultaneity graph model and achieved a throughput gain from 40% to 120%. Jiang et al. proposed an optimal cross-layer algorithm that can be used in a multi-hop network with SIC and showed that their algorithm can increase throughput by 47% compared with the interference avoidance model [13]. Shi et al. proposed a greedy cross-layer algorithm for both scheduling and routing with polynomial complexity [14], and thus, it can be used for a multi-hop network with many nodes.

In addition to new upper layer schemes, base station location also has a significant impact on throughput, since data from sensor nodes will eventually transmit to the base station. The base station placement problems have also been studied by many researchers. Akkaya et al. studied positioning of base stations in WSNs [15]. They gave a survey of different base-station positioning works, categorized the literature into different approaches and then introduced dynamic schemes to repositioning base stations during the network operation. Arkin et al. proposed a heuristic for data transmission and base station placement to optimize network lifetime [16]. They built the model with a set of sensors and one base station, then studied the situation with at most two hops in the network and then extended it to multiple hops. Shi et al. designed a (1−ε)-optimal approximation algorithm [17] to improve the network lifetime for a multi-hop sensor network, where ε can be set as a very small number. They then considered that the base station can move in the network for collecting data and proposed another (1 − ε)-optimal approximation algorithm [18] for the base station moving path and data routing. To investigate a joint femtocell base station placement and power control problem, Liu et al. built a mixed-integer linear program (MILP) model for the femtocell network in commercial building environments [19]. They then proposed an optimization algorithm based on this model and showed that their algorithm had low complexity in simulation. Other researchers focused their interests on the base station problems in cellular networks and mainly on how to design energy-saving algorithms for base stations [2022].

However, almost all existing works focused on either SIC or base station placement only, although we may further improve throughput by considering joint SIC and base station placement for a WSN. Zhou and Yu considered the influence of SIC on the base station in cellular networks [23] and proposed a scheme that performs Wyner–Ziv compress-and-forward relaying on a per base station basis. However, their work was on the uplink multi-cell joint processing technique, without consideration of choosing suitable positions for base stations. Altman et al. considered base station placement with SIC [24]. However, their work was mainly on the determination of base stations for mobile users in a cellular network. They only considered the model of hierarchical equilibria for SIC in two-frequency systems and do not consider the scheduling and routing method of the whole network after the determination of the base stations.

In this paper, we will design a base station placement algorithm for WSNs with SIC. We first formulate the problem and point out that the problem has prohibitive complexity, which makes it difficult to solve directly. Thus, we consider the relationship for distances between nodes and the base station under SIC. Based on this relationship, we propose an algorithm, which we called the likelihood maximum inscribed disk (LMID) algorithm, to find a good position for base station. The analysis for complexity shows that the LMID algorithm is polynomial-time, and simulation results show that the LMID algorithm can achieve about 25% improvement compared with our previous work [25] on SIC only.

The rest of the paper is organized as follows. In Section 2, we propose the mathematical model for the problem and find the relationship for distances between nodes and the base station under SIC. Section 3 presents the main idea and the details of the LMID algorithm. We also analyze its polynomial-time complexity in this section. In Section 4, we present simulation results to show the efficiency of our algorithm. Section 5 concludes this paper.

2. The Problem Model

We consider a WSN with n sensor nodes and one base station B in a two-dimensional area. Denote N as the set of sensor nodes. Sensor nodes are already deployed. Denote (xi, yi) as the location of each sensor node siN, which is fixed and known. Denote (xb, yb) as the location of the base station B, which can be optimized to improve sensor network performance. All nodes use the same power P and the same bandwidth W to transmit their data to B directly. Assume that each sensor node si has a minimum rate requirement ri. We want to maximize a common scaling factor K, such that si can transmit data to B with rate Kri.

Denote d i = ( x i x B ) 2 + ( y i y B ) 2 as the distance between node si and B, gi as the channel gain from node si to B and λ as the path loss index. We have:

g i = d i λ

We will use the SIC technique [6] to improve throughput. By using SIC, multiple nodes may transmit at the same time to B, and their data will be decoded sequentially, based on their signal strength (from the strongest signal to the weakest signal). When we try to decode data from node si, the stronger signals than si's must have already been decoded and removed via interference cancellation. Note that even with SIC, base station B may not be able to receive from all sensor nodes at the same time. Thus, we need to schedule sensor nodes in multiple (say m) time slots. The length of each time slot is t1, t2,…, tm, and the total length of time slots is T, i.e., T = i = 1 m t i. We now consider an SIC set k, where 1 ≤ km, and define variable:

θ i k = { 1 : if node s i trasmits data to B in time slot t k ; 0 : otherwise .

Node si's signal-to-noise ratio (SINR) under SIC (say σi) can be written as:

σ i k = g i θ i k P N 0 + g j g i g j θ j k P
where N0 is the noise power. Note that there is interference from a node sj only if gjgi, since all stronger signals are decoded and removed under SIC. This SINR should be larger than a threshold (say β), such that it can be decoded with a peak data rate W log 2 ( 1 + σ i k ).

We can normalize all tk by T and then have k = 1 m t k = 1. For each node, its average data rate over all time slots should be no more than k = 1 m t k W log 2 ( 1 + σ i k ). Then, we have the following problem.

s.t. { g i = [ ( x i x B ) 2 + ( y i y B ) 2 ] λ ( s i N ) σ i k = g i θ i k P N 0 + g j g i g j θ j k P ( s i N , 1 k m ) σ i k β ( s i N , 1 k m ) K r i k = 1 m t k W log 2 ( 1 + σ i k ) ( s i N ) k = 1 m t k = 1 ( x B , y B ) A , g i , σ i k , t k , K 0 , θ i k { 0 , 1 } ( s i N , 1 k m ) max K
where A is an area of possible base station locations and will be determined in Section 3. xB, yB, gi, σ i k, tk, θ i k and K are all variables. This formulated problem is a mixed integer, non-convex program, which cannot be solved efficiently

In Equation (3), variables gi are calculated by a non-convex function. As a result, the optimization problem is non-convex. If we can determine the base station B's position, then all of the gi values will become constants.

Furthermore, we can determine whether some nodes can transmit together or not by Equation (2). We have the following result on concurrent transmitting nodes [25].

Theorem 1

If multiple nodes can transmit at the same time and we sort them by their distances to B, then for two nodes si and sj adjacent in the sorted list with dj > di, we have d j d i > β 1 λ.

Based on Theorem 1, we can draw concentric disks around the base station. Nodes in the same concentric ring cannot transmit simultaneously. For example, consider a WSN with four nodes, as shown in Figure 1. In Figure 1a, the position of B is not a good position, because all nodes are in the same concentric ring, so these nodes cannot transmit together. While in Figure 1b, three of them can transmit together. Therefore, the position of B in Figure 1b is better than that in Figure 1a. Based on this example, we will design an algorithm in the next section.

3. The Base Station Placement Algorithm

Our algorithm includes two steps. First, we will determine the feasible region where we can place the base station, such that all sensor nodes can transmit data to the base station. Second, we will find a suitable position within the feasible region for the base station with the objective of maximizing the common scaling factor K. In this section, we will describe these two steps and analyze their complexities.

3.1. Find the Feasible Region for Base Station Placement

In a two-dimensional area, the base station cannot be placed arbitrarily, because there is a transmission range for all nodes. We have:

g i P N 0 = d i λ P N 0 σ i β
where d i λ P N 0 = σ i if there is no interference. For this ideal case, the transmission range RT can be calculated by R T λ P N 0 = σ i = β, i.e., R T = ( P N 0 β ) 1 / λ. Apparently, if the base station is out of the transmission range of a node, then this node's data cannot be transmitted to B. Thus, the base station B should be placed in a disk centered at this node with radius RT. Then, the feasible region of B is the intersection of all of these disks. One example is shown in Figure 2 for three nodes, where the shaded region is the feasible region for B. The boundary of this region is a set of arcs.

Instead of identifying the exact feasible region (or the set of arcs for this region), we can approximate it by a polygon, where each arc is approximated by a segment (see the triangle in Figure 2 as an example). The vertices of this polygon can be determined by the algorithm in Figure 3. This algorithm is based on the following two facts.

(1)

To find the feasible region, we only need to find the convex closure of all nodes in N and consider the nodes on the border of the convex closure.

(2)

The intersection points of two circles are vertices of the polygon if and only if they are within all disks.

To prove the first fact, we denote p as a feasible location for B, S as the set of nodes on the border of the convex closure of N, si as a node in the network and siS. The distance from si to p is di. Then, we can make a line from p to si, and the line will intersect at a point ŝi with S, where di < diRT . Thus, we do not need to consider the nodes that are not on the border of the convex closure. The convex closure can be determined by efficient algorithms, such as the algorithm named “Graham scan” [26].

There are two special situations for the second fact. First, any two circles have no intersection points. That means there is no feasible position for B. Second, any two circles have only one intersection point. Then, if the point is within all other disks, this point is the only feasible position for B. Otherwise, there is no feasible position for B.

Figure 4 is a simple example for the algorithm in Figure 3. There are seven nodes in the network. Among them, the four black nodes are the vertices of the convex closure, while the three white nodes are inside the convex closure. Therefore, we only need to consider four black nodes to determine a feasible region. We obtain the four red nodes as the vertices of the feasible region.

3.2. The Main Idea for Finding a Good Position of B

We now determine a good position within the identified feasible region for B. As shown in Figure 1, a good position should enable more nodes to transmit together. We design a likelihood maximum inscribed disk (LMID) algorithm to determine B's location. The main idea and the basic steps of the LMID algorithm are as follows.

I.

The set of locations that have the same distance to two nodes is the perpendicular bisector of the line segment between these two nodes. We should not put the base station in (or close to) this perpendicular bisector. Otherwise, these two nodes cannot transmit at the same time. All such perpendicular bisectors divide the feasible region into many small pieces.

II.

Find a point in each piece, such that it has the largest distances to all edges of this piece.

III.

Put the base station at each point found in Step II and calculate all K values. Find the maximum value among these values and use the corresponding point as the solution for B's position.

We first prove that each small piece obtained in Step I is a convex polygon. Note that the feasible region is a convex polygon (since it is a convex closure of some points). We can add perpendicular bisectors one by one to divide this feasible region. We have the following lemma.

Lemma 1

After we use a perpendicular bisector to divide a convex polygon into two pieces, these two pieces are both convex polygons.

Proof

As a convex polygon, all inner angles are less than 180 degree. There are three different situations when a line (perpendicular bisector) divides a convex polygon into two pieces, as shown in Figure 5: (I) the line intersects with two edges of the convex polygon; (II) the line intersects with one edge and one angle of the convex polygon; (III) the line intersects with two angles of the convex polygon. No matter the situation, all new angles of the two new pieces are less than 180 degree. Thus, the two pieces are both convex polygons.

To find the point in Step II, we have the following algorithm.

A.

The bisectors of two adjacent interior angles intersect at one point. Calculate the distance d from this point to the common edge of the two angles.

B.

We have one distance for each edge in Step A. Find the minimum distance dmin among these distances. Delete this edge by coalescing its two endpoints into one point located at the common point of bisection. Then, shrink the polygon by moving all of the remaining edges into the polygon's interior by dmin. Since the edge corresponding to dmin is reduced to a point, the number of edges of the new polygon is reduced by at least one. Figure 6 is an example of a six-edge polygon shrinking into a five-edge polygon.

C.

If the new polygon has more than three edges, go to Step A. If the new polygon has three edges, it is a triangle. We find the center point of the maximum inscribed disk for the triangle as the base station location. If the new polygon reduces as a line segment, we choose any point on this segment as the base station location. If the new polygon reduces as a point, this point is chosen as the base station location.

If n = 3, the center point of the maximum inscribed circle for the triangle has the largest distances to all edges, and thus, it is a good position. For an n-edge polygon, n > 3, we also want to identify its maximum inscribed disk. We have the following theorem.

Theorem 2

Suppose that we reduce an m-edge convex polygon to an k-edge convex polygon, k < m, by Steps A and B, and we know the maximum inside disk of the k-edge polygon. Then, the center point of this disk is also the center point of a maximum inside disk for the m-edge polygon.

Proof

The proof is based on contradiction. Suppose that the maximum inside disk for the k-edge polygon has the center point Ok and radius rk. Denote the shrink distance for the m-edge polygon as dm. Then, we have an inside disk for the m-edge polygon with center Ok and radius rk + dm. Suppose that the center point of the maximum inside disk for the k-edge polygon is not the center point of a maximum inside disk for the m-edge polygon. That is, the maximum inside disk for the m-edge polygon has radius rm larger than rk + dm. Now, reduce the radius of this maximum inside disk for the m-edge polygon by dm; we have an inside disk for the k-edge polygon with radius rmdm > rk. This is a contradiction.

Step II provides many potential good points for the base station. In Step III, we will calculate the k value for each point based on the algorithm developed in [25] and then find the best point.

3.3. Complexity

We will first analyze the complexity for finding the feasible region (see the pseudocode in Figure 3). First, we need to find the convex closure of nodes in set N in Step 1, which can be done by many algorithms. In particular, the complexity of the “Graham scan” algorithm is O(n2 log n2) = O(n2 log n). The worst case is S = N. Under this worst case, the number of iterations (from Step 5 to Step 17) is O(n2). Within an iteration, the complexity to calculate the intersection points of two circles (Step 5) is O(1). If there is one intersection point, we need to check the distance from this point to each sensor (Step 9). The complexity is O(n). If there are two intersection points, we need to check the distance from these points to each sensor (Steps 14 and 16). The complexity is again O(n). Then, the total complexity of one iteration is O(n), and the complexity of all iterations is O(n)O(n2) = O(n3). Finally, we need to find the convex closure of the nodes in set P. If we use the “Graham scan” algorithm, the complexity is O(p2 log p2) = O(p2 log p) = O(n4 log n), where p is the number of nodes in set P and is no more than 2O(n2) = O(n2). The overall complexity is O(n2 log n) + O(n2)O(n3) + O(n4 log n) = O(n5).

Next, we will show the complexity for finding the suitable positions by LMID.

For the first step, the number of the perpendicular bisectors is no more than O(n2), where n is the number of nodes in the network. Using these perpendicular bisectors to divide the feasible region, the number of the pieces is no more than:

O ( n 2 ) ( O ( n 2 ) + 1 ) 2 + 1 = O ( n 4 )

The second step is further divided into three substeps. For Step (A), the number of different distances is O(n). For Step (B), dmin can be determined in O(n). Then, the complexity of shrink is also O(n). Since at least one edge is removed by one iteration of Steps (A) and (B), we will repeat Steps (A) and (B) O(n) times. The complexity of Step (C) is O(1). Then, the overall complexity of the second step is (O(n) + O(n))O(n) + O(1) = O(n2).

Combining the first and the second steps, the complexity of finding all possible positions is O(n4) × O(n2) = O(n6). Therefore, the whole complexity of our algorithm is O(n5) + O(n6) = O(n6), which is polynomial. This result is a worst-case upper bound.

4. Simulation Results

In this section, we show simulation results on the performance of our algorithm. We also compare results with our previous work in [25], where the location of the base station is fixed at the center of the network coverage area. We first present one set of results on a network with 20 nodes, then give all sets of results on networks with 10 to 50 nodes.

We randomly generate network instances with nodes deployed in a square region of 250 × 250 m. Transmission power is P = 1 W; the path loss index is λ = 4; noise power is N0 = 10−10 W; and the SINR threshold is β = 3. The transmission range of each node rt can be calculated as R T = ( P N 0 β ) 1 / λ 240 m. The channel bandwidth is W = 22 MHz. The required minimum data rate ri is randomly generated between 100 kbps and 1 Mbps.

4.1. Results for a Network with 20 Nodes

We first present results for a network with 20 nodes, shown in Figure 7. The coordinates and the required minimum data rate ri are randomly generated and shown in Table 1.

Using the algorithm in Figure 3 to find the feasible region for base station placement, the vertex coordinates of the feasible region are (223.3,207.4), (197.4,236.3), (252.1,83.7), (14.4,179.6), (133.0,25.0), (89.6,258.2) (19.1,193.9) and (217.7,6.8), as shown in Figure 8. Then, using the LMID algorithm, we divide the feasible region into 262 pieces, as shown in Figure 9. The center points of these pieces are shown in Figure 10. We then calculate the K value for the case that the base station is placed at each of these center points. We find that the maximum value of K is 23.151 when the coordinate of B is (171.9,127.8). We compare the performance with and without base station placement, where the second case can be solved by the algorithm in [25] and the base station is fixed at the center of the region (i.e., (125,125)). When the base station is placed at the center of the region, the K value is 16.592 with SIC and 4.119 without SIC. They are both less than that with base station placement.

Figure 11 shows the link scheduling for the 20-node network with the three schemes. Figure 11a is for the scheduling without SIC when the base station is in the center of the network. Figure 11b is for the scheduling with SIC when the base station is in the center of the network, and Figure 11c is for the scheduling with SIC when using the LMID algorithm. We show the time slot numbers on each link. From this, we can see in Figure 11a that each node is assigned a different time slot for transmission, so the total number of time slots is 20; while in Figure 11b,c, some nodes can transmit at the same time slot, and the total numbers of the time slots are both 17. We record the length of each time slot in Table 2.

4.2. Results for All Network Instances

To show the performance of our algorithm, we change the number of nodes N from 10 to 50 and generate 20 different network instances randomly for each N. Then, we use the LMID algorithm to find a good position of B for each network instance and calculate the achieved K value. We calculate the average values for each N in Table 3, where the second column is for the scheme when the base station is fixed and there is no SIC, the third column is for the scheme when the base station is fixed and with SIC and the fourth column is for the scheme when using the LMID algorithm. We can see that the LMID algorithm has much better performance (the value of K) than the fixed base station without SIC. Even if we compare LMID with the fixed base station with SIC, LMID can still achieve about a 25% improvement.

5. Conclusions

In our previous work, we applied the SIC technique for interference management and proposed algorithms of link scheduling and data routing schemes for different models with fixed base stations [14,25]. In this paper, we considered base station placement in wireless sensor networks. Since the mathematical model using SIC was non-convex and could not be solved directly, we proposed an algorithm, which we call the likelihood maximum inscribed disk (LMID) algorithm, to solve it. The LMID algorithm is based on the relationship of distances from sensor nodes to the base station under the SIC environment, and we show that it can find a good base station position in polynomial time. Simulation results show that the LMID algorithm can increase throughput by about 25% compared with the case that the base station is located at the center of the region.

Acknowledgments

This paper is supported by the National Natural Science Foundation of China (No. 61370088), the International Science and Technology Cooperation Program of China (No. 2014DFB10060) and the International S&T Cooperation Program of Anhui Province of China (1303063009).

Author Contributions

Jianjun Zhang raised the problem and conceived the rough idea; Lei Shi improved the rough idea and designed the algorithm; Lei Shi and Yi Shi designed the experiments; Xu Ding performed the experiments; Zhenchun Wei analyzed the data; Yi Shi and Lei Shi wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Uthra, R.A.; Raja, S.V.K. QoS routing in wireless sensor networks—A survey. ACM Comput. Surveys 2012, 45. [Google Scholar] [CrossRef]
  2. Andrews, J.G. Interference cancellation for cellular systems: A contemporary overview. IEEE Wirel. Commun. Mag. 2005, 12, 19–29. [Google Scholar]
  3. Nam, W.; Bai, D.; Lee, J.; Kang, I. Advanced interference management for 5G cellular networks. IEEE Commun. Mag. 2014, 52, 52–60. [Google Scholar]
  4. Feng, H.; Liu, K.J.R. A multiuser TRDMA uplink system with 2D parallel interference cancellation. IEEE Trans. Commun. 2014, 62, 1011–1022. [Google Scholar]
  5. Mukherjee, M.; Kumar, P. Overloaded wh-spread CI/MC-CDMA with iterative interference cancellation. IEEE Commun. Lett. 2011, 15, 1391–1393. [Google Scholar]
  6. Miridakis, N.I.; Vergados, D.D. A survey on the successive interference cancellation performance for single-antenna and multiple-antenna OFDM systems. IEEE Commun. Surveys Tutor. 2013, 15, 312–335. [Google Scholar]
  7. Zhang, X.; Haenggi, M. The performance of successive interference cancellation in random wireless networks. IEEE Trans. Inf. Theory 2014, 60, 6368–6388. [Google Scholar]
  8. Blomer, J.; Jindal, N. Transmission capacity of wireless ad hoc networks: Successive interference cancellation vs. joint detection. Proceedings of the IEEE ICC, Dresden, Germany, 14–18 June 2009.
  9. Sen, S.; Santhapuri, N.; Choudhury, R.R.; Nelakuditi, S. Successive interference cancellation: A back-of-the-envelope perspective. Proceedings of the Ninth ACM Workshop on Hot Topics in Networks (HotNets-I), Monterey, CA, USA, 20–21 October 2010.
  10. Frenger, P.; Orten, P.; Ottosson, T. Code-spread CDMA with interference cancellation. IEEE J. Sel. Areas Commun. 1999, 17, 2090–2095. [Google Scholar]
  11. Lv, S.; Wang, X.; Zhou, X. Scheduling under SINR model in ad hoc networks with successive interference cancellation. Proceedings of the IEEE GLOBECOM, Miami, FL, USA, 6–10 December 2010.
  12. Lv, S.; Zhuang, W.; Wang, X.; Zhou, X. Scheduling in wireless ad hoc networks with successive interference cancellation. Proceedings of the IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1282–1290.
  13. Jiang, C.; Shi, Y.; Hou, Y.T.; Lou, W.; Kompella, S.; Midkiff, S.F. Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance. Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 424–432.
  14. Shi, L.; Shi, Y.; Ye, Y.X.; Wei, Z.C.; Han, J.H. An efficient interference management framework for multi-hop wireless networks. Proceedings of the IEEE WCNC, Shanghai, China, 7–10 April 2013; pp. 1129–1134.
  15. Akkaya, K.; Younis, M.; Youssef, W. Positioning of base stations in wireless sensor networks. IEEE Commun. Mag. 2007, 45, 96–102. [Google Scholar]
  16. Arkin, E.M.; Efrat, A.; Mitchell, J.S.B.; Polishchuk, V.; Ramasubramanian, S.; Sankararaman, S. Data transmission and base-station placement for optimizing network lifetime. Ad Hoc Netw. 2014, 12, 201–218. [Google Scholar]
  17. Shi, Y.; Hou, Y.T. Optimal base station placement in wireless sensor networks. ACM Trans. Sens. Netw. 2009, 5. [Google Scholar] [CrossRef]
  18. Shi, Y.; Hou, Y.T. Some fundamental results on base station movement problem for wireless sensor networks. IEEE/ACM Trans. Netw. 2012, 20, 1054–1067. [Google Scholar]
  19. Liu, J.; Chen, Q.; Sherali, H.D. Algorithm design for femtocell base station placement in commercial building environments. Proceedings of the IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2951–2955.
  20. Peng, C.Y.; Lee, S.B.; Lu, S.W.; Luo, H.Y. GreenBSN: Enabling energy-proportional cellular base station networks. IEEE Trans. Mob. Comput. 2014, 13, 2537–2551. [Google Scholar]
  21. Zhang, X.; Yu, R.; Zhang, Y.; Gao, Y.; Im, M.; Cuthbert, L.G.; Wang, W.B. Energy-efficient multimedia transmissions through base station cooperation over heterogeneous cellular networks exploiting user behavior. IEEE Wirel. Commun. 2014, 21, 54–61. [Google Scholar]
  22. Marsan, M.A.; Chiaraviglio, L.; Ciullo, D.; Meo, M. On the effectiveness of single and multiple base station sleep modes in cellular networks. Comput. Netw. 2013, 57, 3276–3290. [Google Scholar]
  23. Zhou, L.; Yu, W. Uplink multi-cell processing with limited backhaul via per-base-station successive interference cancellation. IEEE J. Sel. Areas Commun. 2013, 31, 1981–1993. [Google Scholar]
  24. Altman, E.; Kumar, A.; Singh, C.; Sundaresan, R. Spatial SINR games of base station placement and mobile association. IEEE/ACM Trans. Netw. 2012, 20, 1856–1869. [Google Scholar]
  25. Shi, L.; Han, J.H.; Shi, Y.; Wei, Z.C. Cross-layer optimization for wireless sensor network with multi-packet reception. Proceedings of the International ICST Conference on Communications and Networking in China (CHINACOM), Beijing, China, 25–27 August 2010; pp. 1–5.
  26. Graham, R.L. An efficient algorithm for determining the convex hull of a finite planar set. Inf. Process. Lett. 1972, 1, 132–133. [Google Scholar]
Figure 1. Suitable and unsuitable positions for the base station.
Figure 1. Suitable and unsuitable positions for the base station.
Sensors 15 01676f1 1024
Figure 2. An example for the feasible region.
Figure 2. An example for the feasible region.
Sensors 15 01676f2 1024
Figure 3. The pseudocode for finding the feasible region for B.
Figure 3. The pseudocode for finding the feasible region for B.
Sensors 15 01676f3 1024
Figure 4. An example for finding a feasible region of B.
Figure 4. An example for finding a feasible region of B.
Sensors 15 01676f4 1024
Figure 5. Three situations when dividing the region.
Figure 5. Three situations when dividing the region.
Sensors 15 01676f5 1024
Figure 6. A example of shrinking.
Figure 6. A example of shrinking.
Sensors 15 01676f6 1024
Figure 7. A 20-node network.
Figure 7. A 20-node network.
Sensors 15 01676f7 1024
Figure 8. Feasible region for the 20-node network.
Figure 8. Feasible region for the 20-node network.
Sensors 15 01676f8 1024
Figure 9. Dividing the feasible region into pieces for the 20-node network.
Figure 9. Dividing the feasible region into pieces for the 20-node network.
Sensors 15 01676f9 1024
Figure 10. Center points of all pieces for the 20-node network.
Figure 10. Center points of all pieces for the 20-node network.
Sensors 15 01676f10 1024
Figure 11. Link scheduling for the 20-node network with the three schemes.
Figure 11. Link scheduling for the 20-node network with the three schemes.
Sensors 15 01676f11 1024
Table 1. Coordinates (m) and ri values (kbps) of all nodes in the 20-node network.
Table 1. Coordinates (m) and ri values (kbps) of all nodes in the 20-node network.
iCoordinatesriiCoordinatesri
1(207,172)666.36911(12,93)845.894
2(164,50)386.03212(248,236)729.633
3(159,139)350.26013(36,110)322.546
4(32,62)221.29114(213,52)405.357
5(171,51)229.94415(97,18)775.751
6(181,228)532.30016(245,112)444.750
7(224,163)703.34117(221,66)517.417
8(64,189)746.22118(167,210)639.194
9(166,142)389.07219(19,142)845.549
10(59,141)128.53520(225,247)607.315
Table 2. The length of each time slot for the three schemes.
Table 2. The length of each time slot for the three schemes.
iLength for (a)Length for (b)Length for (c)iLength for (a)Length for (b)Length for (c)
10.0810.0310.056110.0230.0100.060
20.0200.0720.068120.1730.0500.044
30.0250.0690.151130.0100.0150.012
40.0050.0840.0002140.0310.0960.049
50.0120.1020.034150.0220.0350.096
60.0790.0960.042160.0540.0300.059
70.0920.0280.087170.0440.0780.024
80.0490.0650.070180.077
90.0300.0520.126190.034
100.0060.0860.024200.134
Table 3. Optimization results for base station placement.
Table 3. Optimization results for base station placement.
nCenter B without SICCenter B with SICPlacement with SICImprovement Comparing with Center B with SIC
1013.247.059.226.0%
157.930.437.924.5%
205.422.428.427.0%
254.919.825.026.2%
303.716.021.031.3%
353.013.116.727.4%
402.912.415.322.8%
452.611.514.123.2%
502.310.112.725.0%

Share and Cite

MDPI and ACS Style

Shi, L.; Zhang, J.; Shi, Y.; Ding, X.; Wei, Z. Optimal Base Station Placement for Wireless Sensor Networks with Successive Interference Cancellation. Sensors 2015, 15, 1676-1690. https://doi.org/10.3390/s150101676

AMA Style

Shi L, Zhang J, Shi Y, Ding X, Wei Z. Optimal Base Station Placement for Wireless Sensor Networks with Successive Interference Cancellation. Sensors. 2015; 15(1):1676-1690. https://doi.org/10.3390/s150101676

Chicago/Turabian Style

Shi, Lei, Jianjun Zhang, Yi Shi, Xu Ding, and Zhenchun Wei. 2015. "Optimal Base Station Placement for Wireless Sensor Networks with Successive Interference Cancellation" Sensors 15, no. 1: 1676-1690. https://doi.org/10.3390/s150101676

Article Metrics

Back to TopTop