Next Article in Journal
Performance Enhancement of Land Vehicle Positioning Using Multiple GPS Receivers in an Urban Area
Next Article in Special Issue
Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks
Previous Article in Journal
Full On-Device Stay Points Detection in Smartphones for Location-Based Mobile Applications
Previous Article in Special Issue
A Hybrid Spectral Clustering and Deep Neural Network Ensemble Algorithm for Intrusion Detection in Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks

1
School of Electronics, Suzhou Vocational University, Suzhou 215104, China
2
Department of Computer Science, University of Texas at Dallas, Richardson, TX 75080, USA
3
School of Computer Science, Soochow University, Suzhou 215006, China
4
College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(10), 1702; https://doi.org/10.3390/s16101702
Submission received: 27 August 2016 / Revised: 6 October 2016 / Accepted: 9 October 2016 / Published: 14 October 2016
(This article belongs to the Special Issue Topology Control in Emerging Sensor Networks)

Abstract

:
In high-density sensor networks, scheduling some sensor nodes to be in the sleep mode while other sensor nodes remain active for monitoring or forwarding packets is an effective control scheme to conserve energy. In this paper, a Coverage-Preserving Control Scheduling Scheme (CPCSS) based on a cloud model and redundancy degree in sensor networks is proposed. Firstly, the normal cloud model is adopted for calculating the similarity degree between the sensor nodes in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories. Secondly, the redundancy degree of a node is calculated according to its sensing area being covered by the neighboring sensors. Finally, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network at the same time. The simulation results show that the proposed CPCSS can balance the energy consumption and optimize the coverage performance of the sensor network.

1. Introduction

In Emerging Sensor Networks (ESNs), sensor nodes are equipped with several abilities, including information acquisition, wireless communication, data processing and self-organization. Those nodes can work together to complete a large-scale and complex monitoring task [1,2]. Due to the limited energy, reducing energy consumption as much as possible while meeting the requirements for continuous and effective monitoring is a major issue. The high-density random deployment of nodes in ESNs can ensure high network connectivity and coverage [3], but the problem of this manner is that a large number of redundant nodes could come into being, which will enhance communication interference and reduce the network energy efficiency [4]. At present, the main approach to solve the above problems is to use node sleep scheduling methods [5], whereby the nodes that need to work are selected from among the active nodes, and the other nodes are set to be dormant. Accordingly, the active nodes and non-active nodes work alternately through some reasonable scheme, so that the network lifetime can be prolonged.
Topology reconfiguration technology can not only improve the network coverage performance and connectivity, but also may be used to balance the network energy consumption and thus improve the life cycle of the entire system. Among them, one effective method is to reduce the number of active nodes using a node sleep scheduling scheme. Only when the active node fails, some redundant nodes will be awakened. In the early stage, a certain number of nodes are selected randomly according to the nodes’ sensing distances, and the other nodes can be turned to a dormant state. In order to reduce the uncertainty effects of random scheduling, several works have been implemented to operate a node set rotation method. In this way, all nodes are divided into multiple sets, and each set is rotated independently to undertake monitoring tasks. Once the number of nodes in each set is the least and the number of node sets is maximized, this will extend the time interval of nodes in an active state. The main idea is that the redundant nodes should shut down to save energy after a quantitative selection process, and at the same time the initial coverage of the network is guaranteed.
With a controlled scheduling scheme, some nodes take turns to be in a dormant state with low power, which can conserve the node’s energy and improve the network lifespan. The current control scheduling methods can be classified as follows: random scheduling [6] and sleep scheduling [7].
Random scheduling methods. The nodes can autonomously sense and collect the information of the target area on the basis of a variety of factors, for example, location information, the number of neighbor nodes, node residual energy, etc. [8]. Then, according to the built-in algorithm, the sensor node can decide freely whether it should remain in working condition or close its function module into a state of dormancy. In addition, in clustered ESNs, the cluster head can control the working status of its member nodes by means of the hierarchical structure [9]. Generally speaking, in the stochastic scheduling method, all nodes can determine the appropriate status alone from their own actions, no matter what the other nodes do, which can effectively reduce the communication overhead between nodes.
Sleep scheduling schemes. By making a global and comprehensive judgment of the nodes based on the degree of coverage redundancy in the network, the redundant nodes may be closed according to certain rules so as to achieve a balanced energy consumption and prolong the network lifetime [10]. This type of scheduling approach demands that the nodes cooperate with each other to complete the tasks, and massive factors should be taken into account comprehensively to determine which nodes are redundant, for example, the coverage ratio, nodes’ location information, the number of neighbor nodes, the distance between nodes, etc. [11,12]. In this way, the sharing of state information between nodes will increase communication overhead, but the advantage is that the distribution of active nodes in the target area is more balanced. This can effectively avoid the problem of “routing holes” in some areas of the network which occurs more frequently with stochastic scheduling methods.
By judging whether the node is redundant, the node sleep scheduling scheme can adjust the sleep-wake schedule of eligible nodes and reduce the sensors’ energy consumption [13]. However, it will generate another problem, that is, whether the coverage and connectivity of the network can be guaranteed. ESNs are data-centric networks, and the leading performance indicator of the quality of the network is whether can obtain all the information in the monitored area [14], which is the most essential requirement for the design of ESNs. For example, in event monitoring applications, the primary concern is whether the deployed network can detect all the events occurring within the entire region [15,16]. Besides, the coverage problem is used to describe the non-destructive requirements of the information about the monitoring region. Therefore, an appropriate sleep scheduling method should not be implemented at the cost of affecting the performance of the system. Generally, the sensor nodes with high power may have more possibility to remain in an active state for monitoring and packet forwarding, and some nodes with low power will be put into the sleep state, under the condition of not affecting the network connectivity and providing sufficient coverage of the target area. On the one hand, by reducing the density of active nodes in the network, it can reduce the redundancy of the sensing data and the wireless communication conflicts and interference [17]. Hence, the energy cost of the whole system will decrease. On the other hand, when some nodes fail due to energy depletion, the adjacent sleep nodes can work instead of the failed nodes to maintain the normal operation of the network [18]. Therefore, the node sleep scheduling method must take into account of the following two basic factors: (1) ensure the approximately full coverage of the target area; (2) ensure that all the working nodes of the communication network are still connected.
Furthermore, the goal of topology control is to form an optimized network topology which can extend the life cycle of the network on the condition of ensuring the network coverage and connectivity. In addition, it can improve the performance in aspects of time delay, communication interference, load balance, reliability, scalability, etc. The quality of a network topology is difficult to measure directly by the final goal of topology control. Therefore, it is the first choice for the network design and planning to achieve a good topology in the design of topology control mechanism. In general, the relationship between the various factors of the topology design objectives is complex, so this should be considered and coordinated comprehensively in practice according to the specific application of the network.
In particular, due to the fact ESNs are usually applied in harsh environments or a state of emergency, such as military battlefields and disaster relief, there exist some problems about topology control in aspects of dynamic, adaptive, reliability and survivability as follows:
The model is too idealistic, and there are many uncertain factors in practical application, which cannot meet the dynamic network topology requirements;
Lack of effective measurement of the dynamic and self-adaptation network topology;
Lack of an effective fault tolerance mechanism or method for high reliability and strong survivability in terms of topology control.
The rest of this paper is organized as follows: a brief overview of related works is presented in Section 2. Section 3 discusses the system optimization model, and the coverage-preserving control scheduling scheme is proposed in Section 4. The simulation results and performance analysis is presented in Section 5. Finally, Section 6 concludes the paper and discusses some future research directions.

2. Related Works

The main challenge in the design of ESNs is to meet the functional requirements of the network, such as reducing time delays and improving the data integrity. Meanwhile, it should deal with the problems of calculation overhead, energy consumption and communication interference under the constrained resource conditions. At present, ESNs usually use various methods to try to optimize each layer in the communication protocol, including: data fusion [19], hierarchical topology [20], minimizing the idle listening time [21], adaptive node wake up schemes [22], lightweight data authentication and encryption [23], and so on. Among them, the deterministic way by deploying sensor nodes is a common optimization strategy, which can ensure the coverage and connectivity of the area to be monitored by planning the nodes’ density and deploying their position accurately [24]. However, there are a lot of applications where the sensor network nodes are randomly deployed or the distribution of nodes is not uniform.
In order to achieve a uniform node density, high network coverage and stable connectivity, it is often necessary to adjust or control the nodes’ state. In addition to the performance of coverage and connectivity, the nodes’ location and network topology will affect Quality of Service (QoS) properties, for example, energy consumption, time delay and throughput and so on. Obviously, the communication quality and the throughput of the link will weaken significantly as the distance between the nodes increase excessively, besides, it will increase the energy consumption for packets forwarding.
In [25], an optimized broadcast BPS protocol for sensor networks was proposed, which adopts a geometric-based approach to reduce the retransmissions adaptively by maximizing the hop length. In BPS, nodes did not need any neighborhood information and the approximate optimal connected coverage set is solved by a broadcast and time delay scheme. In [26], an Adaptive Coordination Protocol (ACP) was suggested to determine the deployment of backbone nodes over heterogeneous wireless networks. The main idea was to construct the network structure based on the cellular model, and used the node’s position in the hexagon model as the “strategic point”, then to determine the actual location of the sensor nodes.
Tian et al. [27] proved that k-degree coverage preservation of the target area can be achieved while the communication range is twice the sensing range, and then proposed a method to determine whether the node’s sensing coverage area had been covered by other working nodes. By acquiring the location information of the neighbor nodes in the sensing range, the node can calculate the contribution of circle angle from its adjacent nodes. If the circle angle coverage from its neighbor nodes ran up to 2π, the node can be determined to be a redundant node and switched to a dormant state.
In order to determine whether the node was redundant more accurately, Huang et al. [28] proposed a coverage degree that can be obtained by means of the ratio of the circumference in the nodes’ edges being covered. In [29], a novel energy consumption model was devised and a heuristic distributed greedy algorithm was proposed to solve the problem of multiple target coverage. The proposed algorithm aimed at maximizing the number of targets by establishing a mathematical model and adjusted the sensing radius of the nodes adaptively to save network energy consumption. With the intention of maintain the connectivity of the network, a Communication Weighted Greedy Cover (CWGC) algorithm [30] was introduced to avoid potential coverage holes.
Aiming at resolving the coverage problem for randomly deployed mobile sensor networks, Meng et al. [31] presented two strategies named coverage-priority and connectivity-priority for node deployment based on a ring model of energy consumption. Fu et al. proposed a novel perception model for three-dimensional space and a coverage-enhancing algorithm for a plane monitoring area [32]. The optimal pitch angle of the node was obtained by the computational geometry method, and then the optimal angle of deflection was calculated by the particle swarm optimization algorithm.
In [33], the minimum cost to achieve full coverage for discrete points on the plane area was implemented under a deterministic deployment, which constructs a mathematical model of an integer linear programming problem. In [34], a distributed C2 algorithm was proposed based on mobilized sensors and a clustering structure. The monitoring region was divided into several hexagonal grids by using the nodes’ communication distance, and the connectivity of the network was guaranteed by adjusting the position of the nodes in the neighboring clusters. Considering that the network cost was minimized while the resulting lifetime was at least equal to a given value, Liu et al. [35] placed the minimum number of sensors that can be deployed to cover the given target objects during a limited time interval. Next, they proved that the problem of covering the target objects completely is NP-hard.
Deng et al. proposed a distance-based on linear sleep scheduling algorithm [36], which was suitable for clustering ESNs with dense sensor nodes. The main idea of the proposed algorithm was to make the cluster member nodes far from the cluster heads have higher probability to enter the dormant state, so as to ensure the quality of network services and reduce the energy consumption of the whole network. Besides, each node can dynamically adjust the transmission power to change its own emission radius, and it can improve the energy efficiency of network nodes, especially for the member nodes close to the boundaries of the cluster. The problem was that the proposed algorithm only applied to static clusters, that is, once the cluster head was selected the structure of the cluster will not be changed.
Wang et al. [37] proposed an integrated coverage and connectivity configuration for energy conservation in sensor networks, which can ensure that the network achieve K-coverage and K-connectivity while maximizing the number of dormant nodes. The proposed scheme was applied to the convex region, and fully considered the impact of the nodes dispersed around the boundary of the network. In [38], a heuristic algorithm was proposed to select exclusive sets of sensor nodes to cover the monitoring area completely. In addition, the exclusive sets can be updated after a round robin to balance the energy consumption of all nodes. Next, the target coverage problem was regarded as a Maximal Set Cover (MSC) problem and proved the NP-completeness of the problem. Cardei et al. proposed two heuristics based on linear programming and greedy approach to find the maximum number of set covers [39].
Xu et al. [40] introduced a coverage-preserved and connected distributed Voronoi coverage algorithm to detect coverage redundancy sensors and implemented an energy efficient self-scheduling strategy to improve the astringency of distributed scheduling. In [41], an energy-efficient protocol was proposed for deterministic and probabilistic coverage in sensor networks, where the nodes determined their final state autonomously according to a δ-circle and random intervals.
In [42], an optimal deterministic algorithm was proposed based on the target weight by applying the target overlap and greedy algorithm. By using a perceived probability model and the greedy algorithm, the minimum value of indicator function was determined, and the overlap degree of the targets and the optimal deployment location of sensor nodes can be obtained. In [43], an adaptive adjustment of a sensing radius algorithm was proposed to achieve an effective coverage control, in which the nodes chose the optimal coverage adaptively and nodes’ energy consumption could be reduced. Zhao et al. proposed a detect-repair scheme to solve the problem of coverage holes for area coverage in wireless sensor network with a Voronoi algorithm [44]. By using geometry theories and vector algebra to measure the sensing range of nodes, the hole areas can be calculated accurately so as to deploy the least number of nodes to maintain the network connectivity.

3. System Optimization Model

3.1. One-Dimension Normal Cloud Model

Most of the existing algorithms cannot meet all the requirements such as connectivity, coverage, fewer active nodes and lower computation cost. In this paper, a coverage-preserving control scheduling scheme based on a cloud model and partition of the target area in emerging sensor networks is proposed. By employing the normal cloud model, the degree of similarity between the sensor nodes can be measured in terms of their historical data, and then all nodes in each grid of the target area can be classified into several categories.
For the nodes in the adjacent area, measuring the similarity between them is a very difficult task due to their cognitive behavior and instability. In the similarity analysis of the information monitored by the sensor nodes, most of the algorithms concentrate on the comparison of the data according to some statistical model. However, they do not systematically consider two uncertainties: randomness and fuzziness. Liu et al. [45] introduced the concept of membership cloud and membership cloud generators, which provided a new way of combining fuzziness and randomness. It mainly reflects the fuzziness and randomness of the concept of human knowledge, and provides a new method for the study of artificial intelligence. Also, a cloud model can represent the relationship between randomness and fuzziness, and involve the transformation from qualitative notion to its quantitative instances. Due to the characteristics of randomness and fuzziness, it has been widely used and has achieved good results in various aspects of data mining, knowledge discovery, signal handling and decision analysis.
The normal cloud model can demonstrate the uncertainty between the qualitative model and quantitative model by using linguistic values, which primarily describe the two kinds of uncertainty in the objective world: fuzziness and randomness. Since many phenomena in the real world are subject to or similar to a normal distribution, the normal cloud model is a significant and universal model which possesses good mathematical properties and general applicability. In the similarity analysis of the information monitored by the sensor nodes, most of the algorithms concentrate on the comparison of the data according to statistical model. Then, the prediction of the uncertainty of the model is seldom taken into account. Actually, in the data collection process, a general regularity exists in that real environmental data tends to vary near the trend and close to the normal distribution. This coincides with the classical statistical theory. In this section, we will present the similarity evaluation method based on a normal cloud model to analyze the historical data collected by the monitoring nodes for sensor classification.
Definition 1:
Assume U is the universe of discourse, and T is a qualitative concept in U. If x (x ∈ X) is a random instantiation of concept T, which meets μT(x) ∈ [0.1] and has a stable trend. Thus, the distribution of x in the universe T can be defined as a one-dimensional normal cloud.
The cloud is composed of a plurality of cloud drops, which can be produced repeatedly and are integrated to reflect the overall characteristics of qualitative concept. As is can be seen from Figure 1, the digital features of cloud can be repressed as: expectation parameter Ex, entropy parameter En, and hyper entropy parameter He. The explanation of the above parameters in normal cloud is as follows:
Ex is the mathematical expectation of the cloud, which is the most typical sample to represent a qualitative concept.
En represents the uncertainty metric of a qualitative notion, which demonstrates the level of random dispersion of cloud drops in views of the qualitative concept. It is relevant for both the randomness and the fuzziness of the concept. Mathematically, En contributes to represent the average scope of the universe. Besides, with another parameter He, they can represent the extent of random dispersion of cloud drops.
He is the uncertainty degree of entropy En, which reflects the randomness and fuzziness of entropy and is often used for measuring the uncertainty of entropy and determined by randomness and fuzziness of entropy.
The overall features of the qualitative concepts can be denoted as cloud feature vector C(Ex,En,He).
The normal cloud is a kind of uncertain transformation model from a qualitative concept to a quantitative representation. Correspondingly, the positive normal cloud generator establishes the mapping relation between the qualitative concept and the quantitative data. From Figure 1, we can see that the normal cloud has obvious geometric features, which can be used to discuss the properties of the normal cloud. The overall characteristics of the cloud can be depicted by regression curves and principal curves, which is from the expectation along the vertical direction and the orthogonal direction, respectively. Since obtaining the analytical formula is complicated it can only be obtained by a linear approximation method.
The target area is divided into a number of square grids, and then the historical data monitored by nodes in each grid can be collected to construct the cloud model. In order to measure the similarity between the nodes dispersed in adjacent fields, the similarity degree of the expected curve is introduced. Assuming the sensor network is located in the square area with the length M of the sides, the region is divided into m × m grids where the nodes are analyzed individually. Suppose P = {p1,p2,…,pn} is the data set collected at n time intervals and T is a qualitative concept of P, and there exists a random value of ημT(pi), η ∈ [0,1]. In other words, η is the distribution of data interval of pi to membership grade T.
To analyze the random cloud drop x, normal random number En’ with expected value En and variance of He2 is generated by the digital features of the cloud. The probability density function fEn’(x) can be expressed as:
f E n ( x ) = 1 2 π H e exp { ( x E n ) 2 2 H e 2 }
Normal cloud X is subject to normal distribution with the expected value Ex and variance of En2, then the probability density of X can be given:
f X ( x ) = 1 2 π | E n | exp { ( x E n ) 2 2 H e 2 }
Next, we can get:
f X ( x ) = + 1 2 π H e | y | exp { ( x E x ) 2 2 y 2 ( y E n ) 2 2 H e 2 } d y
Consequently, the function is a density function of normal distribution N(Ex2,En2), He = 0.
Next, the degree of certainty Yi can be regarded as a sample of random variable Y i = e ( x i E x ) 2 2 ( E n i ) 2 , and the probability density of Yi can be given as:
f Y i ( y ) = d ( g Y i ( y ) ) d y = 1 π ln   y
where g Y i = P { Y y } = P { e ( x i E x ) 2 2 ( E n i ) 2 y } .
If xi corresponds to the N dimension domain space, (xi,yi) is a point of N + 1 dimension domain space and the set of all points that form cloud (X,Y). While xi is one-dimensional, the normal cloud (X,Y) can be a two-dimensional random variable with the joint probability density:
f X , Y ( x , y ) = f Y ( y ) f X ( x | Y = y ) = { 1 2 π H e × 1 ln   y × exp { ( x E x π ln   y E n ) 2 4 H e 2 ln   y } , ( E x x < + , 0 < y 1 ) 1 2 π H e × 1 ln   y × exp { ( x E x + π ln   y E n ) 2 4 H e 2 ln   y } , ( < x < E x , 0 < y 1 )
Since En’ ~ N(Ex,He2), it can be given that X should be a standard normal random variable with mathematical expectation E X = E x + π l n y E n . a standard deviation σ = π l n y H e . Therefore, the expected curve of the normal cloud can be obtained as:
h ( x ) = exp { ( x E x ) 2 π E n 2 }
The degree of dispersion of cloud drops is proportional to He, and is inversely proportional to y. In other words, He is directly proportional to the dispersion of cloud drop, and conversely to the value of y. As can be seen from Figure 2, the significant geometric characteristics of the normal cloud can be well reflected by the expected curve method. Besides, all cloud drops fluctuate randomly around the expected curve of normal cloud.
According to Equation (6) and the expression of the desired curve, the expected curves of the two cloud models are:
{ h 1 ( x ) = exp { ( x E x ) 2 π E n 1 2 } h 2 ( x ) = exp { ( x E x ) 2 π E n 2 2 }
Typically, under the premise that the two expected curves are definitive, the area of the overlapping region can be calculated by an integral method. As shown in Figure 3, if the horizontal coordinate of the intersection point of the two desired curve is x0, then:
Δ s = x 0 h 2 ( x ) d x + x 0 + h 1 ( x ) d x
where h1(x) and h2(x) are the expectation curve equation for the normal cloud models C1 and C2, respectively. This function is a non-integral function, so it can only be approximated by a numerical approximation method. However, the approximate solution method is quite time consuming, which is not feasible to the similarity comparison between plenty of cloud models.
From the expected curve, it is intrinsic that the expression may be approximated by a probability density function of the normal distribution. Then, the expression can be transformed as follows:
h ( x ) = 2 π E n × f ( x )
where f(x) is a probability density function of normal distribution. Next, the relative properties of the normal distribution are used to solve the overlapping area of the two expected curves. Thus, we have:
Δ s = 2 π x 0 E n 2 f ( x ) d x + 2 π x 0 + E n 1 f ( x ) d x
Suppose θ 1 = ( x 0 E x 1 ) E n 1 and θ 2 = ( x 0 E x 2 ) E n 2 , then Equation (10) can be expressed as:
Δ s = 2 π E n 2 θ 2 ϕ ( x ) d x + 2 π E n 1 θ 1 ϕ ( x ) d x
Compared to the conventional model, the cloud model involves the transformation of a qualitative notion and its quantitative instances, and can systematically consider the randomness and fuzziness of eutrophication assessment. The normal cloud model is the most rudimentary model for its adoption of normal distribution and membership function, which should be satisfied by the node characteristics of wireless sensor networks.

3.2. Similarity Criterion and Node’s Classification

In this section, we will discuss how to obtain the redundancy degree of a node with respect to its sensing area being covered by neighboring sensors. Then, a centralized approximation algorithm based on the partition of the target area is designed to obtain the approximate minimum set of nodes, which can retain the sufficient coverage of the target region and ensure the connectivity of the network.
Many methods have been put forward to prolong the lifetime of networks. The most common techniques include: data fusion coding [46], balancing network energy consumption by routing protocol [47], eliminating the redundant data [48], etc. In practical applications, especially in environmental monitoring, a large number of sensor nodes is usually deployed randomly in the target area for ensuring that the monitoring region has sufficient coverage. However, the problem of node redundancy may be impractical to take into account and a lot of redundant nodes will be generated. The approach of searching for these redundant nodes and making them sleep intermittently may reduce the redundant data in network and channel congestion. Further, an appropriate scheduling mechanism can balance the energy consumption of the sensor nodes, and improve the energy efficiency.
The fuzzy clustering technique adopts a fuzzy matrix to classify objects, and it is particularly effective when the boundaries between clusters of data are ambiguous. Different classification results can be obtained for different levels of confidence, and this forms a dynamic clustering chart. For all nodes within a single grid, the normal cloud model is established according to the historical data. By using the correlation property of the normal distribution, the overlapping area of any two nodes can be solved. Firstly, the matrix SS = (sij)n×n can be constructed as:
S S = [ s 11 s 12 s 1 n s 21 s 22 s 2 n s n 1 s n 2 s n n ]
Moreover, in order to make the original data mathematically tractable for fuzzy clustering, the original data matrix is needed to be standardized and transformed into fuzzy matrix via proper data transformation. The normalization formula is given by:
r i j = { 1 , ( i = j ) exp { k = 1 n | s i k s j k | } , ( i j )
Therefore, the fuzzy similar matrix can be obtained:
R = [ 1 r 12 r 1 n r 21 1 r 2 n r n 1 r n 2 1 ]
According to the characteristics of the fuzzy similar matrix, there must be a minimum number of natural k (kn) which the condition of transitive closure satisfies t(R) = Rk and Rl = Rk for all natural numbers l greater than k.
Hence, the transitive closure of R can be calculated by the square method. Then, it is needed to find the λ-truncation matrix of the fuzzy similar matrix, and then the classification of U can be given at the level λ. In the fuzzy clustering analysis, different classification can be obtained for different λ ∈ [0,1]. Here, taking into account the characteristics of similarity of the data collected by adjacent sensor nodes of ESNs, F-statistics is employed to determine the optimal values.
According to the original matrix SS, let s ¯ = { s ¯ 1 , , s ¯ i , , s ¯ n } denote the center vector of the population sample, s ¯ i = j = 1 n s j i / n . Suppose that n sensor nodes in the grid are classified into different categories according to the value of λ, the number of categories is t and nj denotes the number of nodes in the j-th category, j = 1 t n j = n . The sample of category j is denoted by s 1 ( j ) , s 2 ( j ) , , s n j ( j ) , then the center clustering vector of the j-th category is s ¯ ( j ) = ( s ¯ 1 ( j ) , s ¯ 2 ( j ) , , s ¯ n ( j ) ) , s ¯ u ( j ) = v = 1 n j s u v ( j ) n j , u = 1 , 2 , , m .
Hence, the F-statistic can be obtained:
F = j = 1 t n j s ¯ ( j ) s ¯ 2 / ( t 1 ) j = 1 t u = 1 n j s ¯ u ( j ) s ¯ ( j ) 2 / ( n t )
After clustering, the nodes in a single grid are divided into several categories, and the nodes with similar average observation results are classified into a same class. Intuitively, the less nodes determined as redundant nodes and then put into sleep mode, the greater the amount of information retained. For the selection of redundant nodes, we will comprehensively take into account multiple factors, such as the category of the node, residual energy, redundancy degree. In the next section, a highly distributed and scalable mechanism is proposed to increase network lifetime as well as maintain sufficient sensing coverage and the complete connectivity of the network.

3.3. Redundancy Degree of Nodes

In most ESN applications, the coverage rate is a key to demonstrate the capacity of monitoring the environment [49], and it also serves as a QoS standard for evaluating the effectiveness of data collection. Actually, small sensing holes do not affect the performance of the entire network. Therefore, partial coverage redundancy is used to measure the redundancy of nodes, which is more suitable for ESNs [50].
To judge whether the node may enter into the dormant state, it is necessary to determine the redundancy degree of the node. In some algorithms, we must know the geographic information of the node and the relative position of its neighbor nodes to calculate the degree of redundancy. Unlike these deterministic methods, the mathematical model was based on the theory of probability [51], and the expected value of a node’s redundancy can be calculated in accordance with the number of valid neighbors and the degree of its neighbors’ coverage.
We consider a wireless sensor network of n arbitrarily distributed sensor nodes, whose location information is unknown. All nodes will no longer move after deployment. In addition, the node’s perception model adopts the Boolean model based on circular region, where the coverage area of each node can be confined to a circle about its position with a sensing range r. The sensing range of all nodes can be adjusted adaptively, and the sensor-to-sensor distance is obtained by using the signal strength indicator or time of arrival methods. Let Ri and Ci be the sensing range and communication range of node Ni, respectively, and the relationship between them is defined as Ci = λR, 1 ≤ λ ≤ 2.
Definition 2:
The sufficient condition for the communication between the nodes is that the distance is less than or equal to the minimum communication radius, i.e., d(i,j) ≤ min{Ci,Cj}.
Definition 3:
Only when the distance between the nodes Ni and Nj satisfy d(i,j)Ri + Rj, those nodes are neighbors and can communicate with each other directly.
Definition 4:
If each point in a region of a node is covered by at least one of its neighbors, then this area can be regarded as the area of redundant coverage. The redundancy of a node is defined as the ratio of the redundant coverage area by its neighbors to the sensing area of the node.
Corollary 1:
For any node i, there exists the neighbor set with the sensing range Ri. Assuming an arbitrary point x in the sensing area, if the probability of being covered by a neighbor node is denoted by Pr(x), there must be Pr(x) of sensing area covered by neighbor nodes of i.
Proof: 
Assuming there are K perception points {x1,x2,…,xK} in the sensor field of radius Ri for node Ni, the perception points’ distributions are uniformed and the events that the points being covered by neighbor nodes is independent. Considering the probability that a sensing point is covered by its neighbor node is described by Pr(x), then, the possibility that there are k out of K nodes being covered by neighbor nodes based on the probabilistic model is given by:
P { X = k } = C K k P r ( x ) k ( 1 P r ( x ) ) K k
From Equation (16), it should be pointed out that the event is subject to binomial distribution, namely X ~ B(Pr(x)K). By solving for the mathematical expression of X, we have:
E [ X ] = k = 0 K n C K k P r ( x ) k ( 1 P r ( x ) ) K k = K P r ( x )
So, in the sensing range of Ri, there are about KPr(x) perception points covered by neighbor nodes. When K tends to infinity, the sensing area with the radius π R i 2 can be seen as an infinite number of sensing points. Therefore, the probability of the perception points being covered by the neighbor nodes can be regarded as the ratio of the total covered area, i.e.,
lim K K P r ( x ) K = P r ( x )
Let Sx = {X1,X2,…,Xi,…} be the set of perceptual points in the sensing field of node Ni and x be the distance from the point to the node. In terms of the Corollary 1, if the sensing set can be covered by its neighbor nodes, the node Ni can be covered by its neighbor nodes completely. Assuming that Y is a random variable used to represent the Euclidean distance between the node and a perceptual point x within its range, the probability density function of x can be calculated as:
f Y ( x ) = 2 x / λ i 2 R i 2
As shown in Figure 4, the sensing area ρ(Ni,Ri) is the range of the node’s perception. For the point X within the range of node Ni, the probability that the point is covered by the neighbor node Nj is denoted Pri,j(x). If Xρ(Ni,Ri) and the point is covered by another neighbor’s node Nj, we can determine that the distance from point X to node Nj is less than the sensing range of Nj , meanwhile, these two nodes are able to communicate with each other. Thus, Pri,j(x) is equal to the ratio of the shaded part within the sensing range Rj to the communication range of node Nj.
The probability Pri,j(x) of perception point X within the sensing range of Ni being covered by the neighbor node Nj can be expressed as follows:
P r i , j ( x ) = ρ ( X , R j ) ρ ( N i , C i ) ρ ( N j , C j ) ρ ( N i , C i ) ρ ( N j , C j ) × f Y ( x , N i ) f Y ( x , N j ) = ρ ( X , R j ) ρ ( i , min { C i , C j } ) ρ ( N i , min { C i , C j } ) × λ j 2 R j 2 λ i 2 R i 2
According to the previous definition, the sensing range of a sensor node is less than the communication range. Then, we can discuss the problem in two scenarios as shown in Figure 5a,b, respectively.
If 0 < x < min{Ci,Cj} − Rj, the maximum distance between point X and Nj is about min{Ci,Cj}. But if min{Ci,Cj} − RjxRj, the distance between them can be obtained as [min{Ci,Cj} − Rj,Ri]. Therefore, Pri,j(x) can be expressed as:
P r i , j ( x ) = { ρ ( X , R j ) ρ ( i , min { C i , C j } ) × λ j 2 R j 2 λ i 2 R i 2 , 0 < x < min { C i , C j } R j ρ ( X , R j ) ρ ( s i , min { C i , C j } ) ρ ( i , min { C i , C j } ) × λ j 2 R j 2 λ i 2 R i 2 , min { C i , C j } R j x R j
Suppose the point X can be covered at least one node with the same category of Nj, then the probability is:
P ˜ r i , j ( x ) = 1 ( 1 Pr i , j ( x ) ) n j ( i )
where nj(i) is the number of sensor nodes with the same category of Nj.
Let ψ(X) be the random event that point X within the scope of Ni being covered by at least one sensor node of a different category. Then, for total t categories of node sets, the probability of point X being covered by a neighbor node with other categories in the range of Ni can be given as:
P ˜ r i ( ψ ( X ) ) = 1 1 k t ( 1 Pr i , k ( x ) ) n k ( i )
Thus, when Ni is covered by at least one neighbor node, its redundancy degree can be calculated by:
ρ ( i , R i ) P ˜ r i ( ψ ( X ) ) ) d ρ
According to the definition of node redundancy, the expected value of the redundancy of the node Ni is the ratio of the area covered by other nodes to its sensing area. Therefore, the expected value of the redundancy is:
E [ ϕ i ] = 1 ρ ( N i , R i ) ρ ( i , R i ) P ˜ r i ( ψ ( X ) ) ) d ρ = 2 π π R i 2 0 R i P ˜ r i ( ψ ( X ) ) ) x d x
Therefore, the node’s redundancy degree can be obtained as:
E [ ϕ i ] = 2 R i 2 0 R i ( 1 1 k t ( 1 P r i , k ( x ) ) n k ( i ) ) x d x = 1 2 R i 2 0 R i ( 1 k t ( 1 P r i , k ( x ) ) n k ( i ) ) x d x

4. Coverage-Preserving Control Scheduling Scheme

4.1. Determination of Redundant Nodes

How to prolong the network lifetime as long as possible under the condition of limited sensor node energy is the main challenge in designing ESNs. The reduction of the number of working sensors is an important and effective means to achieve the above purpose. That is, without impacting the performance of the system, some nodes are scheduled into sleep status to retain their residual energy, and others remain in an active state. In this way, we can reduce the node density of the network, lower the redundancy of monitored information, and cut down interference levels. Thus, the energy consumption of the whole system can be improved. In addition, when a node fails due to energy depletion, its neighboring nodes in sleep status can be activated to replace the failed node, and thus continue to maintain the network coverage. Therefore, density control can effectively prolong the lifetime of wireless sensor networks. Aiming to maintain the original performance of the network, density control must meet the following two conditions: (1) ensure coverage quality of the target area; (2) ensure the connectivity of the network.
Definition 5:
Given a set of sensor nodes IS, Gs = (Vs,Es) is an undirected graph composed of all nodes in the set, in which Vs = S, ∀Ni,Nj ∈ S and dis(i,j) ∈ Es. If and only if dis(i,j) ≤ min{Ci,Cj}, it can be denoted that the transmission graph Gs is constructed by all nodes from set S. Moreover, a transmission path Path = {N1,N2,N3,…} derived from Gs consists of a series of nodes, in which every pair of adjacent nodes are communication neighbors. If there exists at least a communication path between any two nodes in the transmission graph Gs, it is said that the graph is connected.
Definition 6:
Given a sensor node set RS and target area R, If every point within the R is covered by at least one of the nodes within the set S, the S is denoted as the cover set of R. Next, meanwhile if the transmission graph derived from the set S is connected, the set S can be denoted as a connected cover set of R.
Considering that a sensor network deployed in the target area R, the problem of the minimum connected cover set is to find out the minimum subset S* (S* ⊆ S), which R N i S * ρ ( N i , R i ) and the transmission graph derived from S* is connected completely. In [52], the minimum connected cover set problem was proved to be a NP-hard problem.
Since that the number of redundant nodes that can be hibernated at the same time determines the size of the final set, we can construct the minimal connected cover set according to multiple criteria, including node redundancy degree, the residual energy, node category, etc. In this paper, a greedy algorithm is used to find the redundant nodes set which can be scheduled to sleep simultaneously. Firstly, a node with the maximum redundancy degree in each grid should be selected and put into the temporary node set. Secondly, the temporary redundant nodes will be closed and at least one node of each type of its neighbors must be in a working state after being selected to the largest independent set. In order to make the final coverage set as small as possible, the above process iterates until no redundant nodes can be closed. At the end of the algorithm, all the redundant nodes are selected and form the maximum independent set. The rest of the nodes will remain in working state in the next round and form the coverage of the target area. Algorithm 1 is described as follows:
Algorithm 1: Determination of redundant nodes
Input: initialize the sensor node set S = {N1,N2,…,Ni,…} and target area R;
Require: redundant node set RS, maximum independent set MIS, temporary redundant node set TS, temporary active node set AS.
Output: minimum connected cover set (MCS) of R.
1. RS = AS = ;
2. TS = S;
3. for each node NiIS do
4. calculate the node redundancy degree;
5. broadcast the HELLO message to its neighbors, and receive the reply;
6. update the neighbor nodes list;
7. obtain the categories of the neighbor nodes;
8. end for;
9. if ( R N i M C S ρ ( N i , R i ) then
10. return MCS = ;
11. end if;
12. while (TS ≠ )
13. MIS = ;
14. obtain the maximum redundancy degree { m a x N i T S { E [ ϕ i ] } };
15. for each node Ni do
16. if E r e s ( N i ) > N j T S E r e s ( N j ) | T S | then
17. AS = AS ∪ {Ni};
18. calculate the maximum independent MIS;
19. RS = SAS;
20. end if;
21. end for;
22. for each node NjRS do
23. estimate the total cover area;
24. end for;
25. end while;
26. return MCS = SAS;

4.2. Control Scheduling Scheme

After the selection of redundant nodes, we need to design a reasonable scheme for scheduling as many nodes as possible to enter the dormant state without creating blind spots. Meanwhile, in order to maximize the network lifetime, the sensor nodes should take turns to enter the dormant state. The scheme has the advantages of less active nodes and uniform distribution, which satisfies the requirements of low sensor node utilization rate and a high coverage ratio.
First, the network is initialized, and each node broadcasts its position information and energy information to its neighbor nodes. The subsequent network lifetime is divided into a number of equal time intervals (Round), and each round includes two phases: scheduling phase and steady phase. Furthermore, the scheduling phase consists of two substages: neighbor discovery and autonomous judgment. In the neighbor discovery phase, the nodes exchange information with neighbor nodes to obtain their location and residual energy, and then establish the neighbor node table. On the basis of the above, the node can decide whether to satisfy the redundant condition. If it does not meet the conditions, the node remains active in the stable stage during the current round and is responsible for target sensing, monitoring and data transmission. Otherwise, the node enters the dormant state until the next scheduling phase. Intuitively, the stable phase is much longer than the schedule phrase, so as to reduce the overhead of the scheduling scheme.
During the neighbor discovery phase, the node firstly broadcasts a HELLO message to its neighbors, which contains the node ID, location information and residual energy. To avoid channel conflict and packet loss while the packets are transmitted simultaneously between several nodes, each node waits for a period of time before broadcasting HELLO messages.
In the node autonomous judgment stage, concurrent dormancy where a number of nodes that are dependent on the cover to enter the state of dormancy at the same time may cause blind spots. In order to avoid the above situation, the scheduling scheme based on priority is introduced. After the neighbor discovery phase, the maximum value of the residual energy of each node denoted by Emax is obtained. In terms of the residual energy and Emax, each node calculates the back off delay:
T b a c k o f f ( i ) = ω × E r e s ( i ) / E max + ( 1 ω ) × r a n d ( 0 , 1 ) × T s
where w is regulation parameter and rand(0,1) represents a random number within the interval [0,1]. Here, the purpose of the introduction of random number is to avoid the same delay being set by the nodes with the same residual energy.
After a period of time delay, each node begins to judge whether or not to sleep. The dormant node broadcasts SLEEP signaling to its neighbor node. Then, the neighbor node will remove dormant nodes from its neighbor nodes table after receiving the corresponding SLEEP signals, and determine the redundant degree again based on the updated neighbor node set. It is obvious that the nodes with lower residual energy will have more opportunities of being scheduled to a sleep state, which can play a role of balancing the energy consumption of the network. After being determined as active or dormant state in next round, the node will remain in the state for a period of time. After Tw time periods, dormant nodes are awakened and all nodes go into the next round. The specific steps are as follows:
Step 1:
Initialization, all valid nodes are set to Ready state.
Step 2:
By using the method of Section 4.1, the redundant measurement is adopted to determine whether the redundant node.
Step 3:
If the current node is a redundant node, it sends a pre-SLEEP message to its neighbor nodes and enter the pre hibernation state. Furthermore, it will start a delay timer Tbackoff to listen for more messages. If receiving the pre-SLEEP message from the adjacent nodes in interval Tbackoff, return to Step 2. Otherwise, if not receiving the wake-up message in the same interval, the node continues to enter the sleep state.
Step 4:
After a period of time, the node i of the Ready state broadcasts its position information and residual energy to its active neighbors. Then, it will collect neighbor nodes’ information and establish its neighbor node table. According to the residual energy of nodes, the time delay is calculated.
Step 5:
After a period of Tbackoff(i), the steady state node begins to estimate the distance between its neighbor nodes, finds the nearest active neighbor nodes and adds it to the neighbor node table.
Step 6:
Data collection and forwarding.
Step 7:
Until the time Tw arrives, all dormant nodes will be woken up. Return to Step 2 and prepare for scheduling the next round.

4.3. Fault-Tolerant Backbone

The main objective of topology management in wireless sensor network management is to ensure the network’s connectivity and optimize the path for data transmission. Moreover, once failed nodes appears in the network, the practical topology control can adjust the communication links dynamically as far as possible to ensure the normal operation of the network. The topology management can be achieved through the deployment of nodes. For the unattended network with random deployment of nodes, topology management protocols or algorithms should be designed to improve the network performance.
After constructing the maximal connected set of active nodes in each grid, the high coverage and connectivity between nodes can be guaranteed. Next, the virtual backbone should be constructed to forward the data collected in each grid to the sink with respect of ensuring the connectivity of the global network. Thus, it can effectively reduce the energy consumption and prolong the network lifetime. The most conventional technique applied of constructing virtual backbone network is to obtain a Connected Dominating Set (CDS). Most of the data transmission or forwarding occurs between the dominating nodes in multi-hop mode. If there are multiple paths between any source node and the destination, a node can change its choice of next hop once a path failure occurs. In this way, it is necessary to construct a virtual backbone network with fault tolerance. Actually, the centralized algorithms often require global information of the sensor nodes, thus it is hard to be achieved in most cases. In contrast, the distributed algorithms can be extended to the whole network only by local information. In this section, the two-connected dominating set algorithm is proposed to implement the architecture of distributed backbone network, which can ensure the node information collected in different regions is transmitted to the sink node through multi-hop mode.
Definition 7:
Given a graph G = (V,E), and suppose a subset of vertexes D ⊆ V. If each vertex in V − D is dominated by at least k directed vertex in D, D is denoted as a distance k-dominating set of graph G. The vertex in D is described as dominator node, and the vertex in V − D is a dominated node correspondingly.
Definition 8:
Given a graph G = (V,E), and suppose a dominating set of vertex C and C ⊆ V. If there exist at least two different paths between each pair of nodes in C, and meanwhile C is a distance k-dominating set of graph G, then C can be denoted as a two-connected k-dominating set of graph.
The main steps for constructing two-connected k-dominating sets for a fault-tolerant backbone is as follows: (1) for network graph G, the k-dominating set D is defined, which can be obtained by a distributed manner based on localized management; (2) The minimum spanning tree of the k-dominating set D is constructed, and the nodes in the path is added to the set D; (3) the nodes of VD can be labeled as backbone nodes, which satisfy two-connectivity for all dominated nodes.
During the neighbor discovery phase, each node needs to broadcast HELLO messages to its neighbors for exchanging information. Each node creates a local neighbor list, which includes all one-hop neighboring nodes with respect to their distance. After the exchange of information, each node can obtain the comprehensive information, such as, neighbors ID, estimated distance, color status, etc. Next, the graph coloring algorithm is put to use to color all nodes, which can determine the node’s state being dominating or dominated. Here, black represents the dominating node; gray represents the dominated node and all nodes initiate as white nodes.
Each node contains two parameters of SUM and dom. For node u, the u.dom is set to k initially. In every round, a node will be selected to the dominating set. If u is the direct neighbor of any dominated node, u.dom should be updated by subtracting the number of neighbor node in dominating set. Otherwise, u.dom can keep constant. Once the node is k-dominated or is selected as the dominated node, u.dom will be set to zero. u.SUM is the sum of the dom of all the neighbors around the node u. Algorithm 2 is described as follows:
Algorithm 2: Constructing two-connected k-dominating sets for fault-tolerant backbone
Input: Graph G = (V,E), integer k
Output: A two-connected k-dominating set C
1. for each node νV(G) do
2. color ν as white;
3. ν.dom = k, I = , W = V(G);
4. broadcast HELLO message and find all neighbor nodes;
5. restore the neighbor information (ID, State_color) to the local neighborLIST;
6. update pathLIST;
7. end for;
8. for each node νV(G) do
9. for each node uneighborLIST(ν) do
10. if u.color = white and u.SUM > MAX_ID then
11. ν.dom−−;
12. MAX_ID = id(u);
13. color u as black, and set I = I∪{u}, W = W − {u};
14. end if;
15. end for;
16. end for;
17. while W ≠ do
18. C = IW;
19. for each cC do
20. suppose c is k-dominated node from set I;
21. if dist(c,MAX_ID) < rc && |neighborLIST(c)| ≥ k then
22. pop out the vertex c from I, and set D = {c};
23. else
24. C = C − {c};
25. end if;
26. end for;
27. end while;
28. for νI and ν is not a cut-vertex do
29. for uCW do
30. Pu,v = shortPATH(G:u,ν) and P = PPu,v
31. put the backbone node on the shortest path to the CDS D;
32. end for;
33. end for;
34. return D;

5. Simulation and Results Analysis

To verify the validity of the proposed scheme, we will compare the performance of CPCSS, Energy Aware Evolutionary Routing (EAER) [53], and Energy Efficient Heterogeneous Clustered (EEHC) [54]. We set up the model and experimental environment, and each examination was run 10 times to obtain the average results so as to eliminate the error caused by randomness. In order to implement senses’ classification, we adopted the data sets from the Intel Berkeley Research Lab [55], where actual sensor nodes are deployed in the lab, during the data sensing process. The data collected by sensor nodes includes the humidity, temperature, light, and voltage values and so on. We randomly choose part of the nodes’ temperature, humidity, and light data, and attach to all the sensors in the experiment, and generate the predicted data sequence for our tests.
There are 200 sensor nodes deployed randomly in a 100 × 100 2D plane, and the node’s sensing range can make adaptive regulation in the range of 9 m to 12 m. Figure 6a,b indicates the active node distribution and active node coverage after the initial deployment of the network, in which the solid points are represented as active nodes in the network. From the nodes’ deployment, it can be observed that most parts of the area are covered by more than one sensor node. Moreover, lots of redundant nodes will lead to produce overload data and mass collision in wireless channel. Intuitively, if those sensor nodes are off-duty when they have no sensing or relaying work to do, the whole system will can achieve a better performance in aspects of energy consumption.
With the operation of the network, the node scheduling scheme determines redundant nodes gradually. Figure 7a,b shows the distribution and coverage of active nodes after sleep scheduling. The sign “o” in Figure 7 represents the dormant node, and the number of dormant nodes arrives 157, which is about 78.5% of the total number. It can be seen that a large number of redundant nodes are scheduling into sleep state, and active nodes can still ensure the full coverage of the monitoring area, which can greatly save network energy overhead.
With the gradual depletion of the energy of some nodes, Figure 8 shows the situation while some active nodes failed in the network, where “x” indicates the failed node. During the current round, there are five active nodes being labeled failed state due to energy depletion, and the network can no longer be able to achieve full coverage of the region.
Figure 9 shows that the relevant dormant nodes will be awaken to repair coverage holes. It can be seen that there are four dormant nodes being awakened, and the network retains high target area coverage, it can be observed that the CPCSS can effectively control the working status of nodes according to the network variation, so as to achieve the goal of saving energy consumption. In addition, the adjacent nodes in sleep state can be waken up timely to maintain high coverage of the system as soon as the appearance of some nodes failed due to energy depletion.
Figure 10 shows the coverage of the algorithm over rounds. For EEHC, if not carrying out any scheduling scheme, that is to say, all nodes are active and it can get high network coverage at the beginning of system running. However, with the increase of the number of rounds, the coverage will demonstrate a sharp drop.
The coverage rate of the EAER algorithm also decreases gradually over rounds, and the coverage rate of the CPCSS algorithm is much slower than others. At 518 rounds of the network, the EAER coverage is close to zero, and at this time the coverage ratio in CPCSS is still 61.2%. Until 591 rounds, the coverage rate of the CPCSS algorithm will drop to zero rather slowly. It is mainly beneficial of that each node can dynamically adjust its own state according to the residual energy and the coverage of the neighbor nodes in CPCSS. In EAER, the periodic asynchronous mode is repeated in the state estimation, which has a great effect on the energy consumption and reduces the energy efficiency.
The performances of the proposed algorithm with 100 and 200 nodes uniformly deployed on a network field are shown in Figure 11. In the simulation scenario, the sensing range of the node is within the limits of 8 m to 12 m while the corresponding communication range of each node is about 16–24 m, and the other parameters are consistent with the simulation parameters in the previous experiments. As expected, sleep scheduling algorithms provide a remarkable gain and maintain a high coverage rate long-term with the network running. No matter how the network density changes, the high coverage of the target area can be guaranteed during the most of the lifetime of network.
Figure 12 shows that the number of active nodes varies with the increase of the initial deployment node. As it can be seen, the number of active nodes increases with a different extent in case of different density of nodes deployed from 100 to 500. Theoretically, the number of active nodes required for sensing the target area should be approximately constant.
The main reason for this phenomenon is the boundary effect of the target region, in which the nodes at the edge of the area usually have less chance to be hibernated nodes owing to hard to be replaced. When the number of initial nodes is 100, active nodes in EAER and CPCSS are 38 and 33 respectively, the latter can reduce about 13.16% of active node’s deployment in the network. While the total number of nodes is 300, EAER need to deploy 52 active nodes, is much higher than 44 in CPCSS. In EEHC, all nodes are active which will result in energy depletion in advance.
Figure 13 shows that the average number of active nodes in the network varies with the sensing range. With the increase of the node sensing range, the number of active nodes of the algorithms is gradually reduced in the premise of ensuring the network coverage. This is because the greater the sensing range of the node, less active nodes is required to achieve the same coverage effect; namely, fewer nodes can retain the network coverage. Simulation results indicate that the number of active nodes in CPCSS is less than EAER in different sensing range model, and the advantage is more obvious especially the sensing range is small.
To investigate the sensor’s performance in terms of energy consumption, we compare the energy consumption of the nodes in CPCSS, EAER, and EEHC. Figure 14 shows the variation of total energy consumption of the network over the number of rounds. Since the initial energy of each node is 2 J, there are 200 nodes being deployed in the network and the total energy is 400 J. As can be seen from the results, the energy consumption of CPCSS is much slower than the EEHC and EAER.
Figure 15 shows the number of alive nodes over rounds. It can be seen that in contrast to the EAER and EEHC protocols, the number of alive nodes in CPCSS decreases more smoothly. This is because the reduction of working sensors in CPCSS can conserve energy and prolong their operation lifetimes.
Subsequently, we examine the performance of energy efficiency of the whole network. Figure 16 depicts the comparison of energy consumption per packet in different protocols. From the simulation results, we can find that the energy consumption per packet of all methods monotonously increases with the traffic load. Also, it can be observed that CPCSS does not always show the better performance than the other protocols. As the traffic load is relatively low, CPCSS consumes more energy for each packet due to excessive overhead for node classification and redundancy calculation. Along with the traffic load of network increases, this type of impact turns out to be negligible in contrast of communication overhead and CPCSS can demonstrate high energy efficiency.

6. Conclusions

This paper addresses the problem of energy efficiency enhancement and coverage quality assurance in high-density ESNs, and a coverage-preserving control scheduling scheme based on cloud model in emerging sensor networks is proposed. Our solution exploits the correlations of the data monitored by the adjacent sensor nodes to classify the nodes into different categories, and then generates the redundant nodes set for sleep scheduling. Experimental results demonstrate that an effective sleep-wake cycle scheduling algorithm can improve the efficiency of the whole system and optimize the connectivity and coverage performance. In the future, we will study the use of sparse over-complete representation for data similarity in ESNs, and the work will address enhancing the performance of the proposed technique in settings with sparse deployments or mobile sensor nodes.

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant No. 61070169 and 61603420, the National Natural Science Foundation of Hubei province under Grant No. 2014CFB413, the Special Fund for Basic Scientific Research of Central Colleges, South-Central University for Nationalities under Grant No. CZY14007. We wish to thank the anonymous reviewers who helped to improve the quality of the paper. The authors gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author Contributions

Binbin Shi and Yihuai Wang conceived and designed the experiments; Binbin Shi performed the experiments; Wei Wei analyzed the data; Yihuai Wang contributed reagents/materials/analysis tools; Wanneng Shu offered advice and modified the paper; Binbin Shi wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Rout, R.R.; Ghosh, S.K. Enhancement of lifetime using duty cycle and network coding in wireless sensor networks. IEEE Trans. Wirel. Commun. 2013, 12, 656–667. [Google Scholar] [CrossRef]
  2. Lin, K.; Chenb, M.; Zeadally, S.; Rodrigues, J.J.P.C. Balancing energy consumption with mobile agents in wireless sensor networks. Future Gener. Comput. Syst. 2012, 28, 446–456. [Google Scholar] [CrossRef]
  3. Halder, S.; Ghosal, A.; DasBit, S.A. pre-determined node deployment strategy to prolong network lifetime in wireless sensor network. Comput. Commun. 2011, 34, 294–306. [Google Scholar] [CrossRef]
  4. Bartolini, N.; Calamoneri, T.; Massini, A.; Silvestri, S. On adaptive density deployment tomitigate the sink-hole problem in mobile sensor networks. Mob. Netw. Appl. 2011, 16, 134–145. [Google Scholar] [CrossRef]
  5. Jhumka, A. Crash-tolerant collision-free data aggregation scheduling for wireless sensor networks. In Proceedings of the Symposium on Reliable Distributed Systems, New Delhi, India, 31 October–3 November 2010; pp. 44–53.
  6. Satyajayant, M.; Don, H.S. Constrained relay node placement in wireless sensor networks to meet connectivity and survivability requirements. In Proceedings of the 27th IEEE Communications Society Conference on Computer Communications, Phoenix, AZ, USA, 13–18 April 2008; Volume 52, pp. 879–887.
  7. Halit, S.; Hui, L. Integrated topology control and routing in wireless sensor networks for prolonged network lifetime. Ad Hoc Netw. 2011, 9, 35–51. [Google Scholar]
  8. Dabirmoghaddasm, A.; Ghaderi, M.; Williamson, C. Energy efficient clustering in wireless sensor networks with spatially correlated data. Proc. Infocom 2010, 2010, 1–12. [Google Scholar]
  9. Tseng, C.C.; Chen, H.H.; Chen, K.C.; Lo, S.C.; Liu, M.Y. Quality of service-guaranteed cluster-based multihop wireless ad hoc sensor networks. IET Commun. 2011, 12, 1698–1710. [Google Scholar] [CrossRef]
  10. Sengupta, S.; Das, S.; Nasir, M.; Vasilakos, A.V.; Pedrycz, W. An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks. IEEE Trans. Syst. Man Cybern. Part C 2012, 42, 1093–1102. [Google Scholar] [CrossRef]
  11. Nguyen, D.T.; Choi, W.; Ha, M.T.; Ghoo, H. Design and analysis of a multi-candidate selection scheme for greedy routing in wireless sensor networks. J. Netw. Comput. Appl. 2011, 34, 1805–1817. [Google Scholar] [CrossRef]
  12. Sacaleanu, D.I.; Ofrim, D.M.; Stoian, R.; Lazarescu, V. Increasing lifetime in grid wireless sensor networks through routing algorithm and data aggregation techniques. Int. J. Commun. 2011, 5, 157–164. [Google Scholar]
  13. Shabdanov, S.; Rosenberg, C.; Mitran, P. Joint routing, scheduling, and network coding for wireless multihop networks. In Proceedings of the 2011 International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), Paris, France, 9–13 May 2011; pp. 33–40.
  14. Martins, F.V.C.; Carrano, E.G.; Wanner, E.F.; Takahashi, R.H.C.; Mateus, G.R. A hybrid multiobjective evolutionary approach for improving the performance of wireless sensor networks. IEEE Sens. J. 2011, 11, 545–554. [Google Scholar] [CrossRef]
  15. Malhotra, B.; Nikolaidis, I.; Nascimento, M.A. Aggregation converge cast scheduling in wireless sensor networks. Wirel. Netw. 2011, 17, 319–335. [Google Scholar] [CrossRef]
  16. Ferng, H.-W.; Hadiputro, M.S.; Kurniawan, A. Design of novel node distribution strategies in corona-based wireless sensor networks. IEEE Trans. Mob. Comput. 2011, 10, 1297–1311. [Google Scholar] [CrossRef]
  17. Gupta, S.K.; Kuila, P.; Jana, P.K. GAR: An energy efficient GA-based routing for wireless sensor networks. Lect. Notes Comput. Sci. 2013, 77, 267–277. [Google Scholar]
  18. Khalil, E.A.; Attea, B.A. Energy-aware evolutionary routing protocol for dynamic clustering of wireless sensor networks. Swarm Evolut. Comput. 2011, 1, 195–203. [Google Scholar] [CrossRef]
  19. Kinoshita, K.; Okazaki, T.; Tode, H.; Murakami, K. A data gathering scheme for environmental energy-based wireless sensor networks. In Proceedings of the 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 10–12 January 2008; pp. 719–723.
  20. Ding, P.; Holliday, J.; Celik, A. Distributed energy-efficient hierarchical clustering for wireless sensor networks. Distrib. Comput. Sens. Syst. 2005, 35, 322–339. [Google Scholar]
  21. Li, J.; Mohapatra, P. Analytical modeling and mitigation techniques for the energy hole problem in sensor networks. Pervasive Mob. Comput. 2007, 3, 233–254. [Google Scholar] [CrossRef]
  22. Iyengar, R.; Kar, K.; Banerjee, S. Low coordination wakeup algorithms for multiple connected-covered topologies in sensornets. Int. J. Sens. Netw. 2009, 5, 33–47. [Google Scholar] [CrossRef]
  23. Denko, M.K.; Sun, T.; Woungang, I. Trust management in ubiquitous computing: A Bayesian approach. Comput. Commun. 2011, 34, 398–406. [Google Scholar] [CrossRef]
  24. Aziz, A.A.; Sekercioglu, Y.A.; Fitzpatrick, P.; Ivanovich, M. A survey on distributed topology control techniques for extending the lifetime of battery powered wireless sensor networks. IEEE Commun. Surv. Tutor. 2012, 15, 1–24. [Google Scholar] [CrossRef]
  25. Durresi, A.; Paruchuri, V.K.; Lyengar, S.S. Optimized Broadcast Protocol for Sensor Networks. IEEE Trans. Comput. 2005, 54, 112–119. [Google Scholar] [CrossRef]
  26. Paruchuri, V.; Durresi, A. Adaptive Coordination Protocol for Heterogeneous Wireless Networks. In Proceedings of the IEEE International Conference On Communica Ztions, Paris, France, 24–28 June 2007; pp. 4805–4810.
  27. Tian, D.; Georganas, N.D. Connectivity Maintenance and Coverage Preservation in Wireless Sensor Networks. Ad Hoc Netw. 2005, 3, 744–761. [Google Scholar] [CrossRef]
  28. Huang, C.-F.; Tseng, Y.C. A Survey of Solutions to the Coverage Problems in Wireless Sensor Networks. J. Internet Technol. 2004, 12, 2356–2359. [Google Scholar]
  29. Naderan, M.; Dehghan, M.; Pedram, H. Sensing task assignment via sensor selection for maximum target coverage in WSNs. J. Netw. Comput. Appl. 2013, 36, 262–273. [Google Scholar] [CrossRef]
  30. Zao, Q.; Gurusamy, M. Lifetime maximization for connected target coverage in wireless sensor networks. IEEE/ACM Trans. Netw. 2008, 16, 1378–1391. [Google Scholar]
  31. Meng, Z.; Wang, S.; Wang, Q.; Zhao, F. Research on the Node Deployment of Large-scale Wireless Sensor Networks. J. Chin. Comput. Syst. 2010, 1, 13–16. [Google Scholar]
  32. Xiao, F.; Wang, R.C.; Sun, L.J.; Weng, J.Y. Coverage Enhancing Algorithm for Wireless Multi-Media Sensor Networks Based on Three-Dimensional Perception. Acta Electron. Sin. 2012, 40, 167–168. [Google Scholar]
  33. Osais, Y.E.; St-Hilaire, M.; Fei, R.Y. Directional sensor placement with optimal sensing range, field of view and orientation. Mob. Netw. Appl. 2010, 15, 216–225. [Google Scholar] [CrossRef]
  34. Mateska, A.; Gavrilovska, L. WSN coverage & connectivity improvement utilizing sensors mobility. In Proceedings of the 11th European Wireless Conference 2011—Sustainable Wireless Technologies, Vienna, Austria, 27–29 April 2011; pp. 1–8.
  35. Liu, H.; Chu, X.; Leung, Y.-W.; Du, R. Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 1783–1796. [Google Scholar] [CrossRef]
  36. Deng, J.; Han, Y.S; Heinzelman, W.B.; Varshney, P.K. Scheduling sleeping nodes in high density cluster-based sensor networks. Mob. Netw. Appl. 2005, 10, 825–835. [Google Scholar] [CrossRef]
  37. Xing, G.; Wang, X.; Zhang, Y.; Lu, C.; Pless, R.; Gill, C. Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Trans. Sens. Netw. 2005, 1, 36–72. [Google Scholar] [CrossRef]
  38. Cardei, M.; Du, D.-Z. Improving wireless sensor network lifetime through power aware organization. Wirel. Netw. 2005, 11, 333–340. [Google Scholar] [CrossRef]
  39. Cardei, M.; Thai, M.T.; Li, Y.; Wu, W. Energy-efficient target coverage in wireless sensor networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Washington, DC, USA, 13–17 March 2005; pp. 32–40.
  40. Xu, P.F.; Chen, Z.G.; Deng, X.H. Distributed Voronoi coverage algorithm in wireless sensor networks. J. Commun. 2010, 31, 16–25. [Google Scholar]
  41. Hefeeda, M.; Ahmadi, H. Energy-efficient protocol for deterministic and probabilistic coverage in sensor networks. IEEE Trans. Parallel Distrib. Syst. 2010, 21, 579–593. [Google Scholar] [CrossRef]
  42. Zhao, M.; Yang, H.Y.; Li, L.W. Target coverage control algorithm based on weight. Control Decis. 2014, 29, 1845–1850. [Google Scholar]
  43. Han, Z.J.; Wu, Z.B.; Wang, R.C.; Sun, L.J.; Xiao, F. Novel coverage control algorithm for wireless sensor network. J. Commun. 2011, 32, 174–184. [Google Scholar]
  44. Zhao, C.J.; Wu, H.R.; Liu, Q.; Zhu, L. Optimization strategy on coverage control in wireless sensor network based on Voronoi. J. Commun. 2013, 34, 115–122. [Google Scholar]
  45. Liu, C.-Y.; Li, D.-Y.; Du, Y.; Han, X. Some Statistical Analysis of the Normal Cloud Model. Inf. Control 2005, 34, 236–239. [Google Scholar]
  46. Ye, Z.; Abouzeid, A.; Ai, J. Optimal stochastic policies for distributed data aggregation in wireless sensor networks. IEEE/ACM Trans. Netw. 2009, 17, 1494–1507. [Google Scholar]
  47. Okazaki, A.M.; Frohlich, AA. AD-ZRP: Ant-based routing algorithm for dynamic wireless sensor networks. In Proceedings of the 18th International Conference on Telecommunications (ICT), Ayia Napa, Cyprus, 8–11 May 2011; pp. 15–20.
  48. Megerian, S.; Koushanfar, F.; Potkonjak, M.; Srivastava, M.B. Worst and best-case coverage in sensor networks. IEEE Trans. Mob. Comput. 2004, 4, 84–92. [Google Scholar] [CrossRef]
  49. Anita, X.; Bhagyaveni, M.A.; Manickam, J.M.L. Fuzzy-based trust prediction model for routing in WSNs. Sci. World J. 2014, 2, 1–11. [Google Scholar] [CrossRef] [PubMed]
  50. Liu, M.; Cao, J.; Zheng, Y.; Chen, L.; Xie, L. Analysis for Multi-Coverage Problem in Wireless Sensor Networks. J. Softw. 2007, 18, 127–136. [Google Scholar] [CrossRef]
  51. Younis, O.; Krunz, M.; Ramasubramanian, S. Location-unaware coverage in wireless sensor networks. Ad Hoc Netw. 2008, 6, 1078–1097. [Google Scholar] [CrossRef]
  52. Madden, S. Intel Berkeley Research Lab Data. Available online: http://db.csail.mit.edu/labdata/labdata.html (accessed on 28 February 2004).
  53. Khalil, E.A.; Ozdemir, S. Energy aware evolutionary routing protocol with probabilistic sensing model and wake-up scheduling. In Proceedings of the 2013 IEEE Globe-com Workshops (GCWkshps), Atlanta, GA, USA, 9–13 December 2013; pp. 873–878.
  54. Kumar, D.; Aseri, T.C.; Patel, R.B. EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Comput. Commun. 2009, 32, 662–667. [Google Scholar] [CrossRef]
  55. Gupta, H.; Zhou, Z.; Das, S.R.; Gu, Q. Connected sensor cover: Self-Organization of sensor networks for efficient query execution. IEEE/ACM Trans. Netw. 2006, 14, 55–67. [Google Scholar] [CrossRef]
Figure 1. A typical normal cloud model.
Figure 1. A typical normal cloud model.
Sensors 16 01702 g001
Figure 2. The expected curves of the normal cloud mode.
Figure 2. The expected curves of the normal cloud mode.
Sensors 16 01702 g002
Figure 3. The similarity of two normal cloud models.
Figure 3. The similarity of two normal cloud models.
Sensors 16 01702 g003
Figure 4. The point within the sensing range of Ni being covered by its neighbor.
Figure 4. The point within the sensing range of Ni being covered by its neighbor.
Sensors 16 01702 g004
Figure 5. The maximum distance between point X and the neighbor node. (a) x < min{Ci,Cj}; (b) min{Ci,Cj} − RjxRj.
Figure 5. The maximum distance between point X and the neighbor node. (a) x < min{Ci,Cj}; (b) min{Ci,Cj} − RjxRj.
Sensors 16 01702 g005
Figure 6. The initial deployment of nodes. (a) Nodes’ deployment; (b) Coverage area.
Figure 6. The initial deployment of nodes. (a) Nodes’ deployment; (b) Coverage area.
Sensors 16 01702 g006
Figure 7. The distribution and coverage of active nodes after sleep scheduling. (a) Dormant nodes’ deployment; (b) Coverage area.
Figure 7. The distribution and coverage of active nodes after sleep scheduling. (a) Dormant nodes’ deployment; (b) Coverage area.
Sensors 16 01702 g007
Figure 8. The distribution and coverage while some active nodes failed. (a) Some nodes being depleted; (b) Coverage hole.
Figure 8. The distribution and coverage while some active nodes failed. (a) Some nodes being depleted; (b) Coverage hole.
Sensors 16 01702 g008
Figure 9. The distribution and coverage after some hibernated node being awaken. (a) Some hibernated node being awaken; (b) Coverage area.
Figure 9. The distribution and coverage after some hibernated node being awaken. (a) Some hibernated node being awaken; (b) Coverage area.
Sensors 16 01702 g009
Figure 10. Comparison of the coverage ratio over rounds.
Figure 10. Comparison of the coverage ratio over rounds.
Sensors 16 01702 g010
Figure 11. Comparison of the coverage ratio over rounds.
Figure 11. Comparison of the coverage ratio over rounds.
Sensors 16 01702 g011
Figure 12. The average number of active nodes versus number of sensor nodes.
Figure 12. The average number of active nodes versus number of sensor nodes.
Sensors 16 01702 g012
Figure 13. The average number of active nodes versus sensing range.
Figure 13. The average number of active nodes versus sensing range.
Sensors 16 01702 g013
Figure 14. The total energy consumed over rounds.
Figure 14. The total energy consumed over rounds.
Sensors 16 01702 g014
Figure 15. The alive nodes over rounds.
Figure 15. The alive nodes over rounds.
Sensors 16 01702 g015
Figure 16. Energy consumption per packet in different traffic load.
Figure 16. Energy consumption per packet in different traffic load.
Sensors 16 01702 g016

Share and Cite

MDPI and ACS Style

Shi, B.; Wei, W.; Wang, Y.; Shu, W. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks. Sensors 2016, 16, 1702. https://doi.org/10.3390/s16101702

AMA Style

Shi B, Wei W, Wang Y, Shu W. A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks. Sensors. 2016; 16(10):1702. https://doi.org/10.3390/s16101702

Chicago/Turabian Style

Shi, Binbin, Wei Wei, Yihuai Wang, and Wanneng Shu. 2016. "A Novel Energy Efficient Topology Control Scheme Based on a Coverage-Preserving and Sleep Scheduling Model for Sensor Networks" Sensors 16, no. 10: 1702. https://doi.org/10.3390/s16101702

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop