Next Article in Journal
A Saliency Guided Semi-Supervised Building Change Detection Method for High Resolution Remote Sensing Images
Previous Article in Journal
Identifying Plant Part Composition of Forest Logging Residue Using Infrared Spectral Data and Linear Discriminant Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors

1
School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018, China
2
School of Science, Hangzhou Dianzi University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(9), 1372; https://doi.org/10.3390/s16091372
Submission received: 3 June 2016 / Revised: 13 August 2016 / Accepted: 19 August 2016 / Published: 27 August 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
Sensing coverage is a fundamental problem in wireless sensor networks (WSNs), which has attracted considerable attention. Conventional research on this topic focuses on the 0/1 coverage model, which is only a coarse approximation to the practical sensing model. In this paper, we study the target coverage problem, where the objective is to find the least number of sensor nodes in randomly-deployed WSNs based on the probabilistic sensing model. We analyze the joint detection probability of target with multiple sensors. Based on the theoretical analysis of the detection probability, we formulate the minimum ϵ-detection coverage problem. We prove that the minimum ϵ-detection coverage problem is NP-hard and present an approximation algorithm called the Probabilistic Sensor Coverage Algorithm (PSCA) with provable approximation ratios. To evaluate our design, we analyze the performance of PSCA theoretically and also perform extensive simulations to demonstrate the effectiveness of our proposed algorithm.

1. Introduction

With the advancement of embedded sensors and wireless networking technology, WSNs have become one of the most important research areas, which arouses tremendous interest from both the academic and industrial communities. Wireless sensor networks are widely applied in many applications, such as environmental monitoring, forest-fire prevention and air quality monitoring [1,2,3,4]. The coverage problem concerns how well a sensor network is monitored or tracked by sensors, and it is one of the fundamental issues in sensor networks. Three categories of the coverage problem exist in the literature based on the coverage subject [5,6]: target coverage (e.g., [7,8,9,10,11,12,13,14,15,16,17,18]), area coverage (e.g., [19,20,21,22,23,24,25,26,27,28]) and barrier coverage (e.g., [29,30,31,32,33,34]).
This paper focuses on the target coverage problem. Targets are often modeled as a set of discrete space points within the sensor field. These points can be used to represent physical targets or static events. Sensors are typically deployed in two schemes: (1) deterministic deployment, which is planned with fewer sensors, but is more time consuming and labor intensive; and (2) stochastic deployment with low labor cost by vehicles or aircraft [26]. Given the stochastic deployment of a sensor network, the objective of the target coverage problem is to activate a subset of sensor nodes to monitor targets, which are randomly distributed on the 2D plane. Existing solutions to sensor coverage mostly leverage the 0/1 disk model, i.e., in the area coverage problem [26], the basic 0/1 disk model is used to model sensors covering a 3D surface, and in barrier coverage [35], the same model is used to model mobile sensors forming a k-barrier.
In the 0/1 disk model, a target within the sensing radius of a node is always assumed detected with a probability of one, while outside this circle, it is assumed not detected. This idealized model is based on unrealistic assumption of perfect coverage in a circular disc. In practical applications, however, the sensing capabilities of sensors are affected by environmental factors in real deployment, especially for acoustic sensors. As shown in Figure 1a for the acoustic sensor, target t is assumed covered by sensor s based on the 0/1 disk model. However, as the received energy attenuates with distance, the acoustic sensor can hardly detect target t when it is close to the edge. In this case, the 0/1 disk model is no longer practical. The probabilistic sensing model, which can characterize the quality of sensor coverage more accurately, has been proposed with the assumption that sensing probability is a decreasing function of the sensing distance [36]. Different from the 0/1 disk model, target t in Figure 1b is detected by sensor s with a probability between zero and one. A target is considered covered when its detection probability is beyond a threshold. Therefore, the target usually needs two or more sensors for collaborative detection.
Much work has been done to address the target coverage problem; however, few of them consider the probabilistic model. In this paper, we focus on the target coverage problem with omnidirectional probabilistic sensors. We formulate the target coverage problem based on omnidirectional sensors deployed with a probabilistic model. The problem is fundamentally different from the target coverage problem based on the 0/1 disk model, since the coverage requirement ensures that the detection probability of each target is at least ϵ. We then aim to find the minimum number of probabilistic sensors to cover all targets with a detection probability greater than a threshold, i.e., at least ϵ. As a sensor network may involve tens of hundreds of nodes in a real deployment, the total energy consumption is typically large. It is crucial to only activate as few sensors as possible, especially for the sensors with high energy consumption. Therefore, our objective is to maintain the detection probability of each target as no less than ϵ with the least active sensors, i.e., achieve the minimum ϵ-detection coverage for all targets.
There exist several challenging issues in finding an effective solution to the above problem. Firstly, since sensors with a probabilistic model usually have no explicit detection boundaries, the detection probability is calculated accurately only by taking all active sensors into consideration, which has high computational complexity. Since the detection probability decreases with respect to the distance between target and sensor, the further away sensors have little sensing impact on the targets, and hence, they can be typically ignored. Therefore, it is meaningful to set a distance threshold as the detection boundary of the sensor. The detection probability is assumed as zero when the target is outside the detection boundary. However, if the detection boundary is set too large, it may end up with much unnecessary computation, which should be avoided. On the other hand, if the detection boundary is too small, a sensor’s detection range has a limited scope. In this case, we may not achieve the detection probability threshold ϵ. Due to different detection probability thresholds, it is a non-trivial task to determine the proper distance boundary. Secondly, we show that the minimum ϵ-detection coverage problem is NP-hard. Therefore, it is challenging to determine the least active sensors in polynomial time. Finally, due to the uncertainty of probability detection, the target coverage problem will become more complex and is far more challenging than the 0/1 target coverage problem. Each target requires a different number of probabilistic sensors when the probabilistic deployment model is used, while only one sensor is needed for every target when the 0/1 disk model is used. As shown in Figure 1c, because sensors s 1 , s 2 and s 3 are far away from target t 1 , we must activate all of them to detect t 1 with a probability beyond ϵ. However, for sensor s 4 , which is close to target t 2 , only sensors s 1 and s 4 need to be activated. Taking all targets into consideration simultaneously, this problem becomes more challenging.
To solve our problem, we map the minimum ϵ-detection coverage problem into a set select problem by constructing the candidate coverage set. We then propose an efficient approximation algorithm, Probabilistic Sensor Coverage Algorithm (PSCA), with a provable bound. Our main contributions are summarized as follows:
  • By theoretical analysis, we determine the detection boundary d m a x for the minimum ϵ-detection coverage problem with omni-directional probabilistic sensors.
  • By reducing a unit disk cover problem to the minimum ϵ-detection coverage problem, we prove it is NP-hard and map it into a set select problem, which can be solved by a set select algorithm.
  • We propose a bounded approximation algorithm, the PSCA, to solve the minimum ϵ-detection coverage problem and present the theoretical analysis of the algorithm approximation ratio.
The remainder of the paper is organized as follows: In Section 2, we summarize the related work, followed by the formulation of the minimum ϵ-connected coverage problem in Section 3. Section 4 provides the theoretical analysis of the problem. Section 5 presents our algorithm design and analysis. Simulation results are presented in Section 6, and finally, we conclude the paper in Section 7.

2. Related Works

Coverage is a fundamental problem in wireless sensor networks. The coverage problem can be classified into three types [5,6]: target coverage (e.g., [7,8,9,10,11,12,13,14,15,16,17,18]), area coverage (e.g., [19,20,21,22,23,24,25,26,27,28]) and barrier coverage (e.g., [29,30,31,32,33,34]).
In [37], Wan et al. conducted a comprehensive study on target coverage systematically. They investigated the minimum wireless coverage, cheapest wireless coverage and max-life wireless coverage problems. They presented a Polynomial Time Approximation Scheme (PTAS) for MWCand two randomized algorithms for CWCand MLWC, respectively. In [18], Cai et al. proposed several algorithms to address the Multiple Directional Cover Sets (MDCS) problem of organizing the directions of sensors into a group of non-disjoint cover sets for extending the network lifetime. Cardei et al. [16] studied the maximum lifetime problem of target coverage. The authors divided all sensors into disjoint sets, which can cover all targets. They proposed an efficient method to extend the sensor network life time by activating those sets successively. Since random deployment may not meet the coverage requirements of the target, Liao Zet al. [38] applied mobile sensors to the connected coverage problem. Their objective is to optimize the movement distance of all sensors, subject to the coverage and connectivity requirements. The author in [39] studied the optimal movement of mobile sensors from the perspective of game theory to track the mobile targets. The connectivity of sensor nodes with the sink is also considered in the target coverage problems. The connected coverage problem aims at activating sensor nodes to monitor a finite set of targets and maintaining the connectivity of active nodes with the sink at the same time. In [40], Li et al. made a comprehensive survey of connected coverage. The authors firstly made a brief introduction to the graph models, such as random graphs and random geometric graphs. The optimal placement of sensor nodes was discussed next, which has a fundamental impact on the connectivity and other operational requirements of WSNs. Han Ket al. studied the minimum connected coverage problem in [15]. The problem is minimizing the total energy cost of both sensing and connectivity. Considering different combinations of omni-directional and directional features in the sensor and antenna, they studied four cases. They proved that the minimum connected coverage problem is NP-hard under all of these cases and proposed approximation algorithms based on the Steiner tree algorithm.
The above research works are mainly focused on the target coverage problem based on the 0/1 disk model, which is only a coarse approximation to the practical sensing model. The probabilistic sensing model appears to be a more realistic sensing model [5]. Researchers have proposed several empirical formulas, such as the exponential attenuation probabilistic model [17,41]. Hefeeda et al. proposed an exponential attenuation probabilistic model in [42]. They assumed that the detection probability is a continuously-decreasing function of sensing distance. This model is applied in the coverage problem, and the probabilistic coverage algorithm is designed to evaluate the degree of confidence in detection probability. The probabilistic sensors are exploited to improve barrier coverage. Li et al. in [32] adopted the probabilistic sensing model proposed by Hefeeda [42] in the barrier coverage problem. They analyzed the detection probability of arbitrary intrusions and address the problem of scheduling sensors to guarantee ϵ-barrier coverage with energy efficiency. The author formulated a minimum weight ϵ-barrier problem, which aimed to schedule sensor energy usage efficiently. Based on the Voronoi graph and maximum flow, they proposed a bounded approximation algorithm to schedule the activation of sensors.
The paper [43] discussed the target coverage based on probabilistic sensors. The problem is minimizing the costs of a network deployed for target coverage. They formulated the problem as an optimization problem. A genetic algorithm is used to optimize the total costs of the network. Dimitrios et al. [44] focused on prolonging network lifetime under probabilistic target coverage. The author defined the minimum detection accuracy problem, where the objective was to prolong the network lifetime as much as possible and to achieve a minimum allowed detection probability for all of the targets in the network. A localized algorithm, LoCQAl, was designed to solve the previous problem.
In [45], both target coverage and connectivity were considered. They solved the Connected Target Coverage (CTC) problem under the probabilistic model. Assuming that each target was detected beyond the predefined threshold by at least one sensor, they reduced the CTC problem under the probabilistic model to the CTC problem under the 0/1 disk model. The directional probabilistic sensor was adopt in [46]. The author focused on the k-coverage problem, where the object was minimizing the number of active sensors. The evaluation shows that the two algorithms proposed by the author outperform the approach of [1].
In summary, [32] concentrates on the barrier coverage, while [43,44,45] belong to target coverage. The approach proposed by [32,44,45] is not applicable for us, since their work is designed for maximum lifetime, while we take account of minimum energy in this paper. The author in [43] has proposed an algorithm based on the genetic algorithm to minimize the costs of a network deployed for target coverage. The realistic case studies demonstrate very promising results.

3. Preliminary and Problem Formulation

In this study, we focus on the target detection coverage problem based on probabilistic sensors; that is, how to deploy sensors properly to meet the requirements of the target detection coverage. First, we describe the sensing model in detail and introduce the target detection deployment scenarios based on the probabilistic sensors. Then, we define the minimum ϵ-detection coverage problem based on the probabilistic sensing model. For the targets to be monitored in an area, our aim is to deploy the least probabilistic sensors that enable the detection probability of each target to be no less than ϵ.

3.1. Sensing Model

Sensors monitor the targets by receiving the energy emitted by targets. The energy received by sensors is attenuated, and the detection probability is reduced as the distances between the targets and the sensor nodes increase.
In this study, we take the omni-directional probabilistic sensors into consideration. As shown in Figure 2, an omni-directional probabilistic sensor can detect the state in all 360 of the surrounding environment. The probability of detecting targets is a continuously-decreasing function [5] of the distance between sensors and targets, p = λ ( d ) , where d is the distance between sensors and the targets and p = λ ( ) is a continuously-decreasing distance-dependent attenuation function demonstrating the sensing characteristics. Several empirical formulas have been proposed (e.g., [17,42,47]). Assuming that the energy emitted by targets is the same, Figure 3 describes the relationship between detection probability and distance in the exponential attenuation probabilistic model proposed by [42]. An important application of sensor networks is to detect some events occurring at some location. In our study, a target represents a static object that generates some event signals periodically, such as the acoustic signal. Multiple sensors will detect the occurrence of the event by receiving the signal from a target object. Due to the uncertainty of probabilistic sensors, the event signals will be captured by sensors in a certain probability. We aim to detect those events with the least probability ϵ, instead of 100%. If the object generates n events, the expectation of the captured events is n × ϵ .
Target: In our study, a targets t represent a target object that generates events randomly. The sensors deployed capture events generated by the target object by receiving the signal from the target object. To detect each event beyond ϵ means to detect the target object beyond ϵ.
For omni-directional probabilistic sensors, we define the detection probability of a target z detected by a sensor i: p i ( z ) = λ ( d i s ( i , z ) ) . The detection probability is the same in each concentric circle, while it decreases with the distance increment around the sensor location.

3.2. Network Model

We deploy N probabilistic sensors randomly in an L × L 2D plane. Let V denote the set of sensor nodes. In the same area, a set of targets D: D V = ø to be monitored by the sensor nodes in V. Each target can be monitored by multiple sensors nearby. The location of sensors and targets can be obtained by prior localization methods. There exists a sink node. All active sensors must be connected to the sink (probably though some relay nodes).
Due to the uncertainty of probabilistic sensors, the overhead of the network will be enlarged. In our study, we assume that the energy cost of a sensor contains two factors: sensing and communication. The overhead of whole networks equals the sum of the sensors’ energy. The work in [15] shows that the communication cost dominates the total energy consumption in a sensor node. Thus, the increment of overhead in coverage is not significant. To narrow down the overhead of networks, we should activate less relay sensors.

3.3. Problem Statement

The target coverage problem requires that the detection probability of each target is not less than the detection probability threshold ϵ by activating some nodes from the randomly-deployed sensor nodes. Based on the probabilistic sensing model described in the Section 3.1, we give the definition of detection probability and a formal description of the problem.
For each target z D , p i ( z ) denotes the detection probability of z monitored by sensor i.
Assuming that s z is the sensor set around z, the detection probability of a target z is P ( z ) . P ( z ) is computed by the probability formula, which integrates the detection probability of each sensor in s z , i.e.,
P ( z ) = 1 i s z ( 1 p i ( z ) )
Detection probability threshold ϵ: ϵ is a threshold set by applications, such that the detection probability of each target detected by the active sensors is at least ϵ.
Associated with the detection probability threshold ϵ, we present the definition of the minimum ϵ-detection coverage problem based on omni-directional probabilistic sensors.
Minimum ϵ-detection coverage problem: Given a set of sensors V = { 1 , 2 , , N } , and the sensors are randomly deployed in an L × L 2D Euclidean plane. The targets set is D. m targets are arbitrarily distributed in the 2D plane. We aim to activate a subset of sensors C V such that the detection probabilities for all targets are not less than the threshold ϵ. If there is more than one set that satisfies the detection requirement, then the set with the minimum number of sensors is the minimum ϵ-detection coverage set.

3.4. Connectivity

To solve the minimum ϵ-detection coverage problem, a set of sensors will be activated. Each active sensor that needs to be connected to the sink (probably though relay nodes) has a transmission radius R t . We assume that they can communicate with each other if their Euclidean distance is no more than R t . We name it the relay sensor if it has been just activated for communication.
Connected graph: We use G = ( { s } V , E ) to denote the connected graph, where s is the sink and E is the edge set. For v V , v V , if d i s ( v , v ) < R t , an undirected edge ( v , v ) will be added into E. For v V , if d i s ( v , s ) < R t , we connect them by an undirected edge ( v , s ) .
To provide connectivity, we use a two-approximation Steiner tree algorithm [48] to find a Steiner tree T s that spans the sink and all active sensors in connected graph G. The Steiner points in T s will be activated as relay sensors.

4. Problem Analysis

We present the definition of detection gain in this section. We can easily determine whether a target surpasses ϵ by computing the detection gain. We will prove that the minimum ϵ-detection coverage problem is NP-hard via a special case.

4.1. Analysis of the Detection Probability

Given a target z detected by a sensors set s z , the detection probability is P ( z ) = 1 i s z ( 1 p i ( z ) ) .
If P ( z ) is larger than ϵ, then we can get:
P ( z ) = 1 i s z ( 1 p i ( z ) ) ϵ
We linearize the formula as follows:
P ( z ) = 1 i s z ( 1 p i ( z ) ) ϵ 1 ϵ i s z ( 1 p i ( z ) ) ln ( 1 ϵ ) i s z ln ( 1 p i ( z ) ) ln ( 1 ϵ ) i s z ln ( 1 p i ( z ) )
The term Ψ = ln ( 1 ϵ ) is defined as the aggregate gain threshold.
Sensor detection gain ϕ i ( z ) : A target can get detection gain from sensor i, and the formula is ϕ i ( z ) = ln ( 1 p i ( z ) ) .
The detection gain is used to estimate a sensor’s influence on some target. When p i ( z ) is less than a given threshold, we ignore the detection probability and detection gain, i.e., p i ( z ) = ϕ i ( z ) = 0 . If the detection probability or detection gain is zero, we think the sensor could not monitor the target. Details on the given threshold are discussed in later sections.
Cumulative detection gain i s z ϕ i ( z ) : We can get a target’s cumulative detection gain by aggregating detection gains from surrounding sensors.
Obviously, if target z satisfies the detection requirement, then the cumulative detection gain of z is bigger than Ψ, i.e., i s z ϕ i ( z ) Ψ .

4.2. 0–1 Integer Programming Problem

Let us consider a field consisting of n sensors and m targets. The sensors and targets are randomly distributed. x i , i 1 , 2 , , n is the decision variables. x i is one if the sensor i is activated, and zero otherwise. Let z j , j 1 , 2 , , m represent targets.
The minimum ϵ-detection coverage problem can be formulated as follows:
m i n x 1 + x 2 + + x n s . t . i n ϕ i ( z j ) × x i Ψ , j = 1 , 2 , , m x i = 0 o r x i = 1 , i = 1 , 2 , , n
The optimization is to minimize the number of active sensors. Each sensor is in either the active state or the sleep state, and each target’s cumulative detection gain ought to be greater than the aggregate gain threshold.

4.3. NP-Hardness Proof

In this section, the minimum ϵ-detection coverage problem is proven to be NP-hard theoretically by proving the unit disk cover problem ≤p the minimum ϵ-detection coverage problem.
Theorem 1.
The minimum ϵ-detection coverage problem is NP-hard.
Proof of Theorem 1.
Unit disk cover problem: Given a set P = { e 1 , e 2 , , e m } of m points and a set A = { A 1 , A 2 , , A n } of n unit disks in the Euclidean plane, the objective is to select minimum cardinality subset A A , such that each point in P is covered by at least one disk in A . It is an NP-complete problem [49].
According to the proven NP-hardness, for any instance in the unit disk cover problem, it should be reduced into minimum ϵ-detection coverage problem in polynomial time. Reducing the procedure will be presented in detail.
As shown in Figure 4, for each unit disk A i A with radius r, we create a probabilistic sensor u i in the corresponding position. For each e i P , e i is denoted by a corresponding target v i . For the deployed sensors, we take the probabilistic model in [43] as follow:
p i ( z ) = e β d i s ( i , z ) , i f d i s ( i , z ) r s k 0 , o t h e r w i s e
To reduce the unit disk cover problem to our minimum ϵ-detection coverage problem, we set r s k = r and ϵ = e β r s k . This is the most critical part of the proof. Under these settings, the probability p i ( z ) satisfies:
p i ( z ) ϵ = e β r , i f d i s ( i , z ) r p i ( z ) = 0 , i f d i s ( i , z ) > r
This means that the minimum detection probability between a sensor and a target is ϵ. The detection probability below ϵ will be regarded as zero. According to Equation (1) and the settings ( r s k = r , ϵ = e β r s k ), to achieve the detection probability threshold ϵ, the probability of target z satisfies:
P ( z ) = 1 i s z ( 1 p i ( z ) ) ϵ = e β r s k 1 ϵ i s z ( 1 p i ( z ) )
With the settings ( r s k = r and ϵ = e β r s k ) and Equation (6), there must be at least one sensor i s z such that probability p i ( z ) ϵ to satisfy Equation (7). In other words, if and only if there is at least one sensor far from the target z within distance r, the target z will be detected beyond ϵ.
Thus, in Figure 4, a target v i will be covered with detection probability beyond ϵ, if the target is located in the disk centered in the position of some sensor u i with radius r. The detection probability of some target v j is zero, while v j is outside all disks centered in the position of sensors { u 1 , u 2 , u n } with radius r. Under these settings ( r s k = r and ϵ = e β r s k ) of the probabilistic model, the minimum ϵ-detection coverage problem is to find the least disks with radius r centered in sensors { u 1 , u 2 , u n } to cover all targets, which is exactly the same as the unit disk cover problem. Therefore, any instance of the unit disk cover problem can be reduced to the instance of the minimum ϵ-detection coverage problem in polynomial time. Thus, the minimum ϵ-detection coverage problem must also be NP-hard. ☐

4.4. Problem Transformation

As the detection gain is small when the distance between a sensor and a target is farther, we assume that the sensor could not detect the target if the detection gain is too small, and we regard the detection gain as zero.
Minimum detection probability p m i n : p m i n is a threshold set by applications. If the detection probability of a target t is detected by one sensor s to be less than p m i n , we take it as zero, otherwise λ ( d i s ( s , t ) ) .
We use the minimum detection probability p m i n to determine the detection boundaries of sensors. For a given target, it can be detected with a certain probability by a sensor if its detection probability is larger than p m i n . Therefore, we can get the effective detection radius of sensors: d m a x = λ 1 ( p m i n ) . This means that if the distance d i s ( s , t ) between the target t and the sensor s is beyond d m a x , the detection probability will be treated as zero. We compute the detection probability and the detection gains only when the distance between sensors and targets is less than d m a x .
In Figure 5, we demonstrate the ratio of the detection gain to the aggregate gain threshold. The different curves in Figure 5 represent the different detection probabilities. The detection probability threshold ϵ is the horizontal axis, and the ratio is the vertical axis. For example, when the detection probability threshold ϵ is 0.7 and the detection probability is 10%, the ratio of the detection gain to aggregate gain threshold is 8.75%. In this case, we can set the p m i n 0.1, as for the detection gain with the detection probability less than 0.1 accounts for a small part of the aggregate gain threshold. The ratio can be used to demonstrate how much impact is generated by a sensor on a target. Therefore, how do we determine the p m i n with notable impact? We just set the p m i n such that the ratio of the detection gain to the aggregate gain threshold l n ( 1 p m i n ) l n ( 1 ϵ ) is larger than a pre-defined ratio τ. Thus, the p m i n can be calculated by the following formula:
p m i n = 1 ( 1 ϵ ) τ
Independent coverage set: A target’s independent coverage set is c ( z ) V , satisfying i c ( z ) ϕ i ( z ) Ψ and c ( z ) c ( z ) , i c ( z ) ϕ i ( z ) < Ψ .
The concept of independent coverage set is to make full use of as few sensors as possible to meet the detection requirements. A target obtains the cumulative detection gains from sensors in its independent coverage set, which exactly exceeds the aggregate gain threshold, and there are no redundant sensor nodes. Assuming the detection probability threshold ϵ 0.9, { 2 , 7 } is the independent coverage set of Target 1#and { 2 , 3 , 5 } of Target 2# in Figure 6.
Candidate coverage set: Target z’s candidate coverage set is the union of its independent coverage sets, C ( z ) = { c i ( z ) } , i { 1 , 2 , , k } . c i ( z ) is the i-th independent coverage set of z, and for any c i ( z ) , c i ( z ) C ( z ) .
Based the above analysis, we can redefine the minimum ϵ-detection coverage problem as follows: In an L × L 2D plane, m targets ought to be monitored. For every target z, we select an independent coverage set from its candidate coverage set. Our object is to minimize the number of sensors of the union of the m independent coverage sets.
We present an enumeration algorithm to finding the candidate coverage set of any target in Algorithm 1.
Algorithm 1 CCS (Candidate Coverage Set Algorithm).
Input: A target z, sensor set s z around z, aggregate gain threshold Ψ
Output: Candidate coverage set C ( z ) of target z
1:
C ( z ) =
2:
c ( z ) =
3:
sort sensors in sz by gains in descending order 
4:
call DFS(0, 0, c(z))
5:
returnC(z)
void DFS(Index,totalGains)
1:
if I n d e x s z . s i z e then
2:
    return
3:
end if
4:
if t o t a l G a i n s Ψ then
5:
     C ( z ) = C ( z ) { c ( z ) }
6:
    return
7:
end if
8:
DFS ( I n d e x + 1 , t o t a l G a i n s , c ( z ) )
9:
s e n s o r = s z [ I n d e x ]
10:
g a i n s = ϕ s e n s o r ( t )
11:
c ( z ) = s e n s o r c ( z )
12:
DFS ( I n d e x + 1 , t o t a l G a i n s + g a i n s )

5. Algorithm Design

5.1. PSCA Approximation Algorithm

According to the definition of the candidate coverage set, we design an enumeration algorithm (CCS (Candidate Coverage Set Algorithm)) to find the candidate coverage set of any target. As the minimum ϵ-detection coverage is an NP-hard problem, we design an approximation algorithm (PSCA (Probabilistic Sensor Coverage Algorithm)) based on the greedy strategy. We divide the algorithm into three main phases: the computation phase, the selection phase and the connection phase. In the computation phase, we call Algorithm 1 to calculate the candidate coverage set of each target in D. In the selection phase, we select an independent coverage set from every target’s candidate coverage set in turn. Because there are m targets in D, we will select m independent coverage sets in total. The union of the m independent coverage sets is the final result. The above selection phase is described in Algorithm 2. In the connection phase, we use a Steiner tree algorithm to select some sensors as relay nodes that maintain the network connectivity.
Algorithm 2 PSCA (Probabilistic Sensor Coverage Algorithm).
Input: Candidate coverage set C i , i = 1 , 2 , , m , sensor set V = { 1 , 2 , , n }
Output: S
1:
S =
2:
U = { 1 , 2 , , m }
3:
for i f r o m 1 t o m do
4:
     F [ i ] = 0
5:
    for j f r o m 1 t o n do
6:
        if s e n s o r j e x i s t s i n C i then
7:
            F [ j ] = F [ j ] + 1
8:
        end if
9:
    end for
10:
end for
11:
for i f r o m 1 t o m do
12:
    select an independent coverage set c from a candidate coverage set C k , k U that S c is minimum, if multiply c satisfy the needs, choose the c that has the biggest weight.
13:
     U = U { k }
14:
     S = S c
15:
end for
16:
Call a Steiner tree algorithm [48] to find a Steiner tree T S that spans the sensors in { s } S . Activate the Steiner points in T S as relay sensors.
17:
return S
As an example, in Figure 6, we will demonstrate the PSCA in detail. There are two targets and seven sensors in the region. The parameters are shown in Figure 6. All targets ought to be detected by the active sensors by at least 0.9. The candidate coverage sets of all targets calculated by Algorithm 1 are presented in Table 1. As shown in Table 1, Target 1 has three independent coverage sets, and the composition of the three sets is the candidate coverage set of Target 1. Target 2 has five independent coverage sets.
Frequency of sensor i F [ i ] : We use F [ i ] to denote that the frequency of sensor i occurs in the candidate coverage sets of all targets.
Firstly, PSCA will count the frequency of every sensor. For example, the frequency of Sensor 2 is two, because it occurs in the candidate coverage sets of Target 1 and Target 2. The frequency of Sensor 7 is one, as for it occurs in the candidate coverage set of Target 1.
Weight of the independent coverage set: The weight of an independent coverage set is the sum of the frequency of every sensor in the independent coverage set; as the independent coverage set { 2 , 7 } , the weight is F [ 2 ] + F [ 7 ] = 3 .
PSCA will select an independent coverage set from the candidate coverage sets of uncovered targets in each selection. Once an independent coverage set of target z is chosen, the target z will be marked as covered by activating sensors in the independent coverage set. Additionally, the sensors in the independent coverage set will be pushed into S. PSCA will select the independent coverage set m times, for the number of targets is m. In each selection, the strategy is to choose the independent coverage set such that the union of the independent coverage set and S has the least sensors. If more than one independent coverage sets meet the above standard, we choose the one with the highest weight.
In initial stage (from Line 1 to Line 10), we set S empty, which is used to store the active sensors. The set U is initialized { 1 , 2 , , m } , which is used to store the uncovered targets. Each sensor’s frequency will be counted. Details about the initial state of PSCA are shown in Table 2. The initial state of the sensor network is shown in Figure 7. No sensors are activated, and no targets are covered.
In the selection stage (from Line 11 to 15), PSCA will select two independent coverage sets, as there are two targets in the sensor network. In Table 3a, PSCA first selects the independent coverage set { 2 , 7 } , because the number of sensors in { 2 , 7 } S is minimum. Then, the sensors in { 2 , 7 } will be activated and pushed into S. Target 1 will be marked covered, and we pop it out from U. Details about the state of the sensor network are demonstrated in Figure 8a.
Next, PSCA will select the independent coverage set of targets in U. Because the union of S and the independent coverage set { 2 , 3 , 5 } and the union of S and { 2 , 3 , 6 } have the least sensors, the weight of { 2 , 3 , 5 } and { 2 , 3 , 6 } will be calculated. The weight of { 2 , 3 , 5 } is four, and so is { 2 , 3 , 6 } . PSCA will randomly choose the one with the biggest weight. As shown in Table 3b, PSCA selects { 2 , 3 , 5 } . The sensors in { 2 , 3 , 5 } will be activated and pushed into S. Target 2 will be marked covered, and we pop it out of U. We show the state of the sensor network after this selection in Figure 8b.
Now, the U becomes ∅, which indicates that all targets will be covered by sensors in S at least ϵ. The S is the ultimate result, and our algorithm returns S.

5.2. Algorithm Theoretical Analysis

The approximation bound of our algorithm is discussed theoretically in this section.
Let the size of S calculated by PSCA be N and the size of optimum S be N o p t .
Theorem 2.
N N o p t m ln ( 1 λ ( d i s m i n ) ) 1 p m i n
Proof of Theorem 2.
PSCA initializes the S = ∅, and it will select independent coverage sets m times. We define N i as the number of sensors in S increases, and k i as the target whose candidate coverage set PSCA chooses from at the i-th step. Then, N = N 1 + N 2 + + N m . Let S i be the result of S after the i-th step. Specifically, S 0 is ∅.
Due to the independent coverage set, we choose to make the increment of S minimum; obviously, we get:
N 1 = m i n c i C k 1 | c i S 0 | = m i n c i C k 1 | c i | N 2 = m i n c i C k 2 | c i S 1 | m i n c i C k 2 | c i | N m = m i n c i C k m | c i S m 1 | m i n c i C k m | c i |
Then, we have the following formula by accumulating the above inequality.
N = N 1 + N 2 + + N m m i n c i C k 1 | c i | + m i n c i C k 2 | c i | + + m i n c i C k m | c i |
For any j = { 1 , 2 , , m } , we have:
m i n c i C k j | c i | Ψ ϕ m i n = Ψ ln ( 1 p m i n )
When the detection gains are the minimum ϕ m i n , the independent coverage set needs the most sensors. Let ϕ m i n = ln ( 1 p m i n ) denote the minimum detection gains, where p m i n is the detection probability threshold. Thus, the size is less than or equal to Ψ ϕ m i n for any independent coverage set.
With Equations (10) and (11):
N m Ψ ln ( 1 p m i n )
Since the size of S N o p t satisfies:
N o p t Ψ ϕ m a x Ψ ln ( 1 λ ( d i s m i n ) )
where ϕ m a x is the maximum detection gains and d i s m i n is the minimum distance between targets and sensors in WSNs.
Combing Equations (12) and (13), we get:
N N o p t m ln ( 1 λ ( d i s m i n ) ) ln ( 1 p m i n )
Based on the analysis of the above sections, PSCA essentially solves a minimum union problem. For a given sensor set V = { s 1 , s 2 , s n } , candidate sets C 1 , C 2 , , C m , we choose an independent coverage c i V , i = 1 , 2 , , m from every candidate sets m times. We aim to get the minimum union i = 1 m c i .
The minimum union problem and the maximum intersection problem are equivalent based on the next equation:
m i n | i = 1 m c i | = m i n | i = 1 m c i ¯ ¯ | = | V | m a x | i = 1 m c i ¯ |
For the maximum intersection problem, Clifford et al. [50] has proven that the problem cannot be approximated within an n 1 ϵ multiplicative factor, for any ϵ > 0 , unless N P = P .
Theorem 3.
The average time complexity of Algorithm 1 is O ( 2 n π d m a x 2 L 2 ) , and the time complexity of PSCA is O ( m 2 n k ) (k is the maximum number of independent coverage set in candidate coverage set).
Proof of Theorem 3.
Due to Algorithm 1 being an enumeration algorithm based on DFS, Algorithm 1 is an exponential complexity algorithm. The exponential of Algorithm 1 is related to the number of sensors in s z . As Section 4.4 mentioned, we take the probabilities into consideration only when the distance between sensors and targets is less than d m a x . As for the targets and sensors being uniformly distributed in an L × L area, the average number of sensors in s z equals n π d m a x 2 L 2 . Thus, the average time complexity of Algorithm 1 is O ( 2 n π d m a x 2 L 2 ) .
In Line 6 of PSCA, if we want to know whether sensor j exists in C i , we need to visit every independent coverage set in C i . Thus, it costs O ( k ) time. From Line 3 to Line 10, the time complexity is O ( m n k ) . In Line 12, we also need to visit every independent coverage set in the candidate coverage sets of uncovered targets. The union operation S c costs O ( | S | ) × O ( | c | ) ( | S | is the number of sensor in S, so does | c | ) time. In addition, | c | is at most l n ( 1 ϵ ) l n ( 1 p m i n ) , for the detection gain is at least l n ( 1 p m i n ) . Often, O ( | c | ) is less than a constant 20, and O ( | S | ) is obviously less than n. Therefore, PSCA costs O ( m ) × O ( k ) × O ( | S | ) × O ( | c | ) = O ( m n k ) time in Line 12. As mentioned above, we need to choose independent coverage sets m times. Therefore, PSCA costs O ( m n k ) + m × O ( m n k ) = O ( m 2 n k ) time. In addition, the space complexity of PSCA depends on the size of candidate coverage sets, which is O ( m k ) . ☐

6. Performance Evaluation

We conduct a series of simulations in order to evaluate the performance of PSCA. Sensors are randomly deployed in an L × L two-dimensional plane, with the constraint that every target’s detection probability can achieve the threshold ϵ. This study adopts the exponential attenuation probabilistic model proposed in [42].
The main objective of PSCA is to select the minimum number of sensors from the sensor set, and the selected sensors satisfy the minimum ϵ coverage requirements of each target. We conduct simulations in three different size areas and randomly deploy different numbers of sensors. Targets are randomly distributed in every area. We repeat the experiments 20 times for different detection probability threshold ϵ and different number of targets m. The communication cost of a sensor is set to two Joules. For simplicity, we assume each sensor has the same sensing cost of one Joule. For the relay sensor, the sensing cost is zero, since it is used for communication only.

6.1. PSCA’S Performance Evaluation

In this section, we conduct extensive simulations to evaluate the performance of PSCA. In Figure 9, we randomly deploy 120 omni-directional probabilistic sensors in the 100 m × 100 m area. We set the minimum detection probability p m i n = 0.2; the effective detection radius of the sensors is λ 1 ( p m i n ) 16.5 m. First, we compare the numbers of sensors with different ϵ. As shown in Figure 9, with ϵ increasing, more sensors are needed. We also compare the number of sensors with different targets. Three curves in Figure 9 respectively represent that target Numbers 10, 20 and 30 required different numbers of sensors, respectively. The average number of sensors is less, while the target number is increasing. The plots suggest that when the target number is increasing, sensors will work more cooperatively.
We also do the simulation in a sparse area. The area in Figure 10 is 200 m × 200 m. We randomly deploy 400 omni-directional sensors with p m i n = 0.2 . The d m a x is λ 1 ( p m i n ) 16.5 m. The numbers of targets are set to 10, 20 and 30, respectively. Compared to Figure 9, the sensors in Figure 10 are sparser. We also conduct a series of simulations for different ϵ. From Figure 10, we clearly see that, for the same coverage requirement and target number, the larger the area is, the more sensors are activated.

6.2. Comparison Study

In this section, we compare the performance of PSCA against the genetic algorithm (GA) for non-isotropic sensor deployment problems (SDPs) [43] and Localized Coverage Quality Algorithm (LoCQAL) [44], in terms of performance. GA for non-isotropic SDPs is a genetic algorithm-based approach to solve the probabilistic target coverage problem. Figure 11 demonstrates the simulation result of the average number of sensors activated, while Figure 12 shows the computation time.
In the simulation experiment, we use the same sensing model for PSCA and GA for non-isotropic SDPs. Forty sensors are deployed randomly following a uniform distribution in a region of 50 × 50 m2. There are 10 targets randomly distributed in the same region. We set the minimum detection probability p m i n = 0.2 . The parameters used for GA for non-isotropic SDPs are T O U R S = 100 , P O P = 50 , p c = 0.9 and p m = 0.1 . As GA for non-isotropic SDPs aims to get the minimum cost of sensors, to apply it here, we set the cost of each sensor to one. Thus, we take the following fitness function for GA for non-isotropic SDPs in the simulation:
f ( x ) = j = 1 n x i + w ( m c o v e r a g e )
The meanings of x i , w and c o v e r a g e can be found in [43].
Figure 11 presents the average number of sensors activated by PSCA and GA for non-isotropic SDPs for different ϵ. As shown in Figure 11, PSCA activates a much lesser number of sensors than GA for non-isotropic SDPs. Since PSCA is based on a greedy search policy, in each selection of the independent coverage set, it always chooses the candidate set making the least increase for the cover set. While GA for non-isotropic SDPs is sensitive to the initial population of potential solutions, PSCA outperforms GA for non-isotropic SDPs.
We also compare the computation time versus different ϵ in Figure 12. Figure 12 shows that, when ϵ is less than 0.8, our algorithm outperforms GA for non-isotropic SDPs. This is because the number of independent coverage sets in candidate coverage sets of each target is not too large. The chosen stage of the independent set will not consume too much time. However, when ϵ becomes large, the combination of the independent coverage set will increase greatly. Much more computation time will be used for the chosen stage of the independent set. Thus, PSCA outperforms in computation time with a small ϵ.
In Figure 13, we demonstrate the performance comparison of PSCA and LoCQAL in terms of active sensors. To apply LoCQAL, we assume all sensors are static and that the sensors are sufficient to detect all targets beyond ϵ without movement. All active sensors can be divided into two categories: sensing sensor (detect targets) and relay sensor (just for information transmission). As shown in Figure 13, while the targets increase, we observe that LoCQAL has more relay sensors. This is because in LoCQAL, the sensors in the connected domination set are always activated. Moreover, PSCA outperforms LoCQAL in terms of sensing sensors.
The energy cost of a sensor contains two factors: sensing and communication. We denote the communication cost of a sensor as two Joules. We assume each sensor has the same sensing cost of one Joule. For the relay sensor, the sensing cost is zero, since it is used for communication only. In Figure 14, we compare PSCA with LoCQAL in terms of the total energy cost versus different target sizes. As for many redundant relay sensors in the connected domination set, this results in a huge energy waste. However in PSCA, sensors will be activated only when they are used to detect a target or they operate as relay nodes towards the sink.

7. Conclusions

In this paper, we studied the minimum ϵ-detection coverage problem. It aims at efficiently monitoring a finite set of targets using probabilistic sensors. We adopted omni-directional probabilistic sensors with the exponential attenuation probabilistic model. Based on the theoretical analysis of the probabilistic sensing model, we proposed the minimum ϵ-detection coverage problem and prove that it is NP-hard. We transformed the minimum ϵ-detection coverage problem into a minimum cover set selection problem, which is easily solved in a randomly-deployed sensor network. Then, we proposed the PSCA algorithm to solve the minimum ϵ-detection coverage problem. In addition, we presented the theoretical analysis of the algorithm approximation ratio and proved that PSCA has a bounded approximation. Finally, we performed extensive simulations and demonstrated the effectiveness of our algorithms. This paper focused on the investigation of the omni-directional probabilistic coverage model. The evaluation of our algorithm in the real test-bed is also a meaningful work in the future.

Acknowledgments

This work is supported by National Science Foundation of China (61370087), the Zhejiang Provincial Science and Technology Project (2013E60005, 2014C01044). We thank Qili Zhou for his insightful comments and carefully text revisions.

Author Contributions

This paper was prepared through a collective effort of all of the authors. In particular: Anxing Shan has contributed: the objective function definition, constraints definition, performing the simulations, analysis of the results, preparation of diagrams and figures, preparation of the text; Xianghua Xu has contributed: the concept of the research, state-of-the-art and references, optimization algorithm concept; Zongmao Cheng has contributed: the interpretation of the simulation results, description of the optimization algorithm, formal definition of the optimization problem.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ai, J.; Abouzeid, A.A. Coverage by directional sensors in randomly deployed wireless sensor networks. J. Comb. Optim. 2006, 11, 21–41. [Google Scholar] [CrossRef]
  2. Ping, G.; Jin, W.; Xue, H.G.; Chang, S.K.; Kim, J.U. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks. J. Internet Technol. 2014, 15, 929–935. [Google Scholar]
  3. Shen, J.; Tan, H.; Wang, J.; Wang, J.; Lee, S. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks. J. Internet Technol. 2015, 16, 171–178. [Google Scholar]
  4. Liu, Y.; Xiong, N.; Zhao, Y.; Vasilakos, A.V. Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Commun. 2010, 4, 810–816. [Google Scholar] [CrossRef]
  5. Wang, B. Coverage problems in sensor networks: A survey. ACM Comput. Surv. 2011, 43, 32. [Google Scholar] [CrossRef]
  6. Costa, D.G.; Guedes, L.A. The coverage problem in video-based wireless sensor networks: A survey. Sensors 2010, 10, 8215–8247. [Google Scholar] [CrossRef] [PubMed]
  7. Shih, K.P.; Deng, D.J.; Chang, R.S.; Chen, H.C. On connected target coverage for wireless heterogeneous sensor networks with multiple sensing units. Sensors 2009, 9, 5173–5200. [Google Scholar] [CrossRef] [PubMed]
  8. Hong, Y.; Kim, D.; Li, D.; Xu, B. Maximum lifetime effective-sensing partial target-coverage in camera sensor networks. In Proceedings of the 2013 11th International Symposium on Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), Tsukuba Science City, Japan, 13–17 May 2013; pp. 619–626.
  9. Tsai, H.W.; Jhong, J.J.; Lin, M.R. The angle coverage algorithm of mobile object in wireless camera sensor networks. In Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, Aizuwakamatsu, Japan, 2–4 November 2013; pp. 422–428.
  10. Yan, T.; He, T.; Stankovic, J.A. Differentiated Surveillance for Sensor Networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 4–7 November 2003; pp. 51–62.
  11. Wang, C.; Thai, M.T.; Li, Y.; Wang, F.; Wu, W. Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks. In Proceedings of the IEEE Global Telecommunications Conference, Washington, DC, USA, 26–30 November 2007; pp. 1118–1123.
  12. Wu, M.C.; Lu, W.F. On Target Coverage Problem of Angle Rotatable Directional Sensor Networks. In Proceedings of the 2013 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Taichung, Taiwan, 3–5 July 2013; pp. 605–610.
  13. Yang, H.; Li, D.; Chen, H. Coverage Quality Based Target-Oriented Scheduling in Directional Sensor Networks. In Proceedings of the IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–5.
  14. Wang, Y.; Cao, G. Achieving Full-view Coverage in Camera Sensor Networks. ACM Trans. Sens. Netw. 2013, 10, 1781–1789. [Google Scholar] [CrossRef]
  15. Han, K.; Xiang, L.; Luo, J.; Liu, Y. Minimum-energy connected coverage in wireless sensor networks with omni-directional and directional features. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hilton Head Island, SC, USA, 11–14 June 2012; pp. 85–94.
  16. Cardei, M.; Thai, M.T.; Li, Y.; Wu, W. Energy-efficient target coverage in wireless sensor networks. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA, 13–17 March 2005; pp. 1976–1984.
  17. Zou, Y.; Chakrabarty, K. Sensor deployment and target localization in distributed sensor networks. ACM Trans. Embed. Comput. Syst. 2004, 3, 61–91. [Google Scholar] [CrossRef]
  18. Cai, Y.; Lou, W.; Li, M.; Li, X.Y. Energy efficient target-oriented scheduling in directional sensor networks. IEEE Trans. Comput. 2009, 58, 1259–1274. [Google Scholar]
  19. Zalyubovskiy, V.; Erzin, A.; Astrakov, S.; Choo, H. Energy-efficient Area Coverage by Sensors with Adjustable Ranges. Sensors 2009, 9, 2446–2460. [Google Scholar] [CrossRef] [PubMed]
  20. Fan, G.; Wang, R.; Huang, H.; Sun, L.; Sha, C. Coverage-guaranteed sensor node deployment strategies for wireless sensor networks. Sensors 2010, 10, 2064–2087. [Google Scholar] [CrossRef] [PubMed]
  21. Chen, J.; Zhang, L.; Kuo, Y. Coverage-Enhancing Algorithm Based on Overlap-Sense Ratio in Wireless Multimedia Sensor Networks. IEEE Sens. J. 2013, 13, 2077–2083. [Google Scholar] [CrossRef]
  22. Sung, T.W.; Yang, C.S. Voronoi-based coverage improvement approach for wireless directional sensor networks. J. Netw. Comput. Appl. 2014, 39, 202–213. [Google Scholar] [CrossRef]
  23. Senouci, M.R.; Mellouk, A.; Assnoune, K. Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1267–1277. [Google Scholar] [CrossRef]
  24. Yildiz, E.; Akkaya, K.; Sisikoglu, E.; Sir, M.Y. Optimal Camera Placement for Providing Angular Coverage in Wireless Video Sensor Networks. IEEE Trans. Comput. 2014, 63, 1812–1825. [Google Scholar] [CrossRef]
  25. Qiu, C.; Shen, H. A Delaunay-Based Coordinate-Free Mechanism for Full Coverage in Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2012, 25, 500–509. [Google Scholar]
  26. Kong, L.; Zhao, M.; Liu, X.Y.; Lu, J.; Liu, Y.; Wu, M.Y.; Shu, W. Surface coverage in sensor networks. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 234–243. [Google Scholar] [CrossRef]
  27. Fu, Y.G.; Zhou, J.; Deng, L. Surveillance of a 2D Plane Area with 3D Deployed Cameras. Sensors 2014, 14, 1988–2011. [Google Scholar] [CrossRef] [PubMed]
  28. Hörster, E.; Lienhart, R. On the optimal placement of multiple visual sensors. In Proceedings of the ACM International Workshop on Video Surveillance and Sensor Networks, Santa Barbara, CA, USA, 23–27 October 2006; pp. 111–120.
  29. Lee, C.; Shin, D.; Bae, S.W.; Choi, S. Best and worst-case coverage problems for arbitrary paths in wireless sensor networks. Ad Hoc Netw. 2010, 11, 1699–1714. [Google Scholar] [CrossRef]
  30. De Witt, J.; Shi, H. Maximizing lifetime for k-barrier coverage in energy harvesting wireless sensor networks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 300–304.
  31. He, S.; Gong, X.; Zhang, J.; Chen, J.; Sun, Y. Barrier Coverage in Wireless Sensor Networks: From Lined-based to Curve-based Deployment. In Proceedings of the 2013 IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 470–474.
  32. Chen, J.; Li, J.; Lai, T.H. Energy-Efficient Intrusion Detection with a Barrier of Probabilistic Sensors: Global and Local. IEEE Trans. Wirel. Commun. 2013, 12, 4742–4755. [Google Scholar] [CrossRef]
  33. Tao, D.; Tang, S.; Zhang, H.; Mao, X.; Ma, H. Strong barrier coverage in directional sensor networks. Comput. Commun. 2012, 35, 895–905. [Google Scholar] [CrossRef]
  34. Kumar, S.; Lai, T.H.; Posner, M.E.; Sinha, P. Maximizing the lifetime of a barrier of wireless sensors. IEEE Trans. Mob. Comput. 2010, 9, 1161–1172. [Google Scholar] [CrossRef]
  35. Wang, Z.; Liao, J.; Cao, Q.; Qi, H.; Wang, Z. Barrier Coverage in Hybrid Directional Sensor Networks. IEEE Trans. Mob. Comput. 2013, 13, 222–230. [Google Scholar]
  36. Kuo, S.P.; Tseng, Y.C.; Wu, F.J.; Lin, C.Y. A probabilistic signal-strength-based evaluation methodology for sensor network deployment. Int. J. Ad Hoc Ubiquitous Comput. 2005, 1, 3–12. [Google Scholar] [CrossRef]
  37. Wan, P.J.; Xu, X.; Wang, Z. Wireless coverage with disparate ranges. In Proceedings of the ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, Paris, France, 16–20 May 2011; pp. 3967–3974.
  38. Liao, Z.; Wang, J.; Zhang, S.; Cao, J.; Min, G. Minimizing movement for target coverage and network connectivity in mobile sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1971–1983. [Google Scholar] [CrossRef]
  39. Liu, B.; Dousse, O.; Nain, P.; Towsley, D. Dynamic coverage of mobile sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 301–311. [Google Scholar] [CrossRef]
  40. Li, J.; Andrew, L.L.H.; Foh, C.H.; Zukerman, M.; Chen, H.H. Connectivity, Coverage and Placement in Wireless Sensor Networks. Sensors 2014, 9, 7664–7693. [Google Scholar] [CrossRef] [PubMed]
  41. Xing, G.; Tan, R.; Liu, B.; Wang, J.; Jia, X.; Yi, C.W. Data fusion improves the coverage of wireless sensor networks. In Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009; pp. 157–168.
  42. Ahmed, N.; Kanhere, S.; Jha, S. Probabilistic coverage in wireless sensor networks. In Proceedings of the Conference on Local Computer Networks (LCN), Sydney, NSW, Australia, 17 November 2005; pp. 672–681.
  43. Carter, B.; Ragade, R. A probabilistic model for the deployment of sensors. In Proceedings of the Sensors Applications Symposium, New Orleans, LA, USA, 17–19 February 2009; pp. 7–12.
  44. Zorbas, D.; Razafindralambo, T. Prolonging network lifetime under probabilistic target coverage in wireless mobile sensor networks. Comput. Commun. 2013, 36, 1039–1053. [Google Scholar] [CrossRef]
  45. Kim, C.M.; Kim, Y.; Kang, I.S.; Lee, K.; Han, Y.H. A scheduling algorithm for connected target coverage under probabilistic coverage model. In Proceedings of the International Conference on Information Networking, Bali, Indonesia, 1–3 February 2012; pp. 86–91.
  46. Wu, Y.; Yin, J.; Li, M.; Zhu, E. Efficient algorithms for probabilistic k-coverage in directional sensor networks. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, NSW, Australia, 15–18 December 2008; pp. 587–592.
  47. Ren, S.; Li, Q.; Wang, H.; Chen, X.; Zhang, X. A study on object tracking quality under probabilistic coverage in sensor networks. ACM Sigmob. Mob. Comput. Commun. Rev. 2005, 9, 73–76. [Google Scholar] [CrossRef]
  48. Wu, Y.F.; Widmayer, P.; Wong, C.K. A faster approximation algorithm for the Steiner problem in graphs. Inf. Process. Lett. 1988, 27, 223–229. [Google Scholar] [CrossRef]
  49. Acharyya, R.; Manjanna, B.; Das, G.K. Unit Disk Cover Problem in 2D. Journal of Discrete Algorithms 2015, 7972, 193–201. [Google Scholar]
  50. Clifford, R.; Popa, A. Maximum subset intersection. Inf. Process Lett. 2011, 111, 323–325. [Google Scholar] [CrossRef]
Figure 1. The difference between the idealized 0/1 disk model and the probabilistic sensing model. (a) Idealized 0/1 disk model; (b) probabilistic sensing model; (c) the target t 1 needs three probabilistic sensors to achieve threshold ϵ, while t 2 needs two.
Figure 1. The difference between the idealized 0/1 disk model and the probabilistic sensing model. (a) Idealized 0/1 disk model; (b) probabilistic sensing model; (c) the target t 1 needs three probabilistic sensors to achieve threshold ϵ, while t 2 needs two.
Sensors 16 01372 g001
Figure 2. Omni-directional probabilistic sensor.
Figure 2. Omni-directional probabilistic sensor.
Sensors 16 01372 g002
Figure 3. Change in detection probability with distance (m).
Figure 3. Change in detection probability with distance (m).
Sensors 16 01372 g003
Figure 4. A reduction from the unit disk cover problem to the minimum ϵ-detection coverage problem. We set r s k = r and ϵ = e β r s k .
Figure 4. A reduction from the unit disk cover problem to the minimum ϵ-detection coverage problem. We set r s k = r and ϵ = e β r s k .
Sensors 16 01372 g004
Figure 5. The ratio of the detection gain to the aggregate gain with different thresholds ϵ.
Figure 5. The ratio of the detection gain to the aggregate gain with different thresholds ϵ.
Sensors 16 01372 g005
Figure 6. An example of the independent coverage set. The parameters are listed in the left table. p i ( j ) determines the probability of target j detected by the sensor i. The weight of the dotted line ϕ i ( j ) determines the detection gain of target j from sensor i. The red point in the figure represents the active sensor.
Figure 6. An example of the independent coverage set. The parameters are listed in the left table. p i ( j ) determines the probability of target j detected by the sensor i. The weight of the dotted line ϕ i ( j ) determines the detection gain of target j from sensor i. The red point in the figure represents the active sensor.
Sensors 16 01372 g006
Figure 7. The initial state of WSNs. No sensors are activated, and no targets are covered.
Figure 7. The initial state of WSNs. No sensors are activated, and no targets are covered.
Sensors 16 01372 g007
Figure 8. In the first selection, Target 1 is covered. Sensor 2 and Sensor 7 are activated. In the second selection. All targets have been covered by four sensors with the least detection probability threshold ϵ.
Figure 8. In the first selection, Target 1 is covered. Sensor 2 and Sensor 7 are activated. In the second selection. All targets have been covered by four sensors with the least detection probability threshold ϵ.
Sensors 16 01372 g008
Figure 9. Comparing the numbers of active sensors for different target sizes and detection probability threshold in a 100 m × 100 m area. We randomly deployed 120 sensors in the area and set the minimum detection probability p m i n = 0.2 . The numbers of targets are 10, 20, 30.
Figure 9. Comparing the numbers of active sensors for different target sizes and detection probability threshold in a 100 m × 100 m area. We randomly deployed 120 sensors in the area and set the minimum detection probability p m i n = 0.2 . The numbers of targets are 10, 20, 30.
Sensors 16 01372 g009
Figure 10. Comparing numbers of active sensors for different target sizes and coverage requirements in a 200 m × 200 m area. We randomly deployed 400 sensors in the area and set the minimum detection probability p m i n = 0.2 . The numbers of targets are 10, 20 and 30.
Figure 10. Comparing numbers of active sensors for different target sizes and coverage requirements in a 200 m × 200 m area. We randomly deployed 400 sensors in the area and set the minimum detection probability p m i n = 0.2 . The numbers of targets are 10, 20 and 30.
Sensors 16 01372 g010
Figure 11. Sensor size vs. ϵ. Forty sensors are uniformly deployed in a 50 m × 50 m area. The number of targets is 10, and we set p m i n = 0.2 .
Figure 11. Sensor size vs. ϵ. Forty sensors are uniformly deployed in a 50 m × 50 m area. The number of targets is 10, and we set p m i n = 0.2 .
Sensors 16 01372 g011
Figure 12. Computation time vs. ϵ. Forty sensors are uniformly deployed in a 50 m × 50 m area. The number of targets is 10, and we set p m i n = 0.2 .
Figure 12. Computation time vs. ϵ. Forty sensors are uniformly deployed in a 50 m × 50 m area. The number of targets is 10, and we set p m i n = 0.2 .
Sensors 16 01372 g012
Figure 13. Impact of target size on PSCA and LoCQAL. One hundred and fifty sensors are deployed in a region of 150 × 150 m2. We fix ϵ to 0.7 and p m i n to 0.2.
Figure 13. Impact of target size on PSCA and LoCQAL. One hundred and fifty sensors are deployed in a region of 150 × 150 m2. We fix ϵ to 0.7 and p m i n to 0.2.
Sensors 16 01372 g013
Figure 14. Energy cost comparison. For each sensor, the sensing cost is set to one Joule, and communication cost is two Joules.
Figure 14. Energy cost comparison. For each sensor, the sensing cost is set to one Joule, and communication cost is two Joules.
Sensors 16 01372 g014
Table 1. Candidate coverage sets.
Table 1. Candidate coverage sets.
TargetCandidate Coverage Set
1{{1, 2, 6}, {2, 7}, {1, 6, 7}}
2{{3, 4, 5}, {2, 3, 5}, {2, 3, 6}, {2, 4, 5, 6}, {3, 4, 6}}
Table 2. F[1] = 1, F[2] = 2, F[3] = 1, F[4] = 1, F[5] = 1, F[6] = 2, F[7] = 1.
Table 2. F[1] = 1, F[2] = 2, F[3] = 1, F[4] = 1, F[5] = 1, F[6] = 2, F[7] = 1.
TargetCandidate Coverage SetSU
1{{1, 2, 6}, {2, 7}, {1, 6, 7}}{1, 2}
2{{3, 4, 5},{2, 3, 5},{2, 3,6}, {2, 4, 5, 6}, {3, 4, 6}}
Table 3. In the first selection, PSCA selects independent coverage set {2, 7}. In the second selection, PSCA selects independent coverage set {2, 3, 5}.
(a) First selection.
(a) First selection.
TargetCandidate Coverage SetSU
1{{1, 2, 6}, {2, 7}√, {1, 6, 7}}{2, 7}{2}
2{{3, 4, 5}, {2, 3, 5}, {2, 3, 6}, {2, 4, 5, 6}, {3, 4, 6}}
(b) Second selection.
(b) Second selection.
TargetCandidate Coverage SetSU
1{{1, 2, 6}, {2, 7}√, {1, 6, 7}}{2, 3, 5, 7}
2{{3, 4, 5}, {2, 3, 5}√, {2, 3, 6}, {2, 4, 5, 6},{3, 4, 6}}

Share and Cite

MDPI and ACS Style

Shan, A.; Xu, X.; Cheng, Z. Target Coverage in Wireless Sensor Networks with Probabilistic Sensors. Sensors 2016, 16, 1372. https://doi.org/10.3390/s16091372

AMA Style

Shan A, Xu X, Cheng Z. Target Coverage in Wireless Sensor Networks with Probabilistic Sensors. Sensors. 2016; 16(9):1372. https://doi.org/10.3390/s16091372

Chicago/Turabian Style

Shan, Anxing, Xianghua Xu, and Zongmao Cheng. 2016. "Target Coverage in Wireless Sensor Networks with Probabilistic Sensors" Sensors 16, no. 9: 1372. https://doi.org/10.3390/s16091372

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop