Next Article in Journal
A Tagless Indoor Localization System Based on Capacitive Sensing Technology
Previous Article in Journal
Study of Intrinsic Dissipation Due to Thermoelastic Coupling in Gyroscope Resonators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks

Computer Science and Engineering Department, University of Bridgeport, 126 Park Ave, Bridgeport, CT 06604, USA
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(9), 1438; https://doi.org/10.3390/s16091438
Submission received: 10 June 2016 / Revised: 26 August 2016 / Accepted: 31 August 2016 / Published: 7 September 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
Successful transmission of online multimedia streams in wireless multimedia sensor networks (WMSNs) is a big challenge due to their limited bandwidth and power resources. The existing WSN protocols are not completely appropriate for multimedia communication. The effectiveness of WMSNs varies, and it depends on the correct location of its sensor nodes in the field. Thus, maximizing the multimedia coverage is the most important issue in the delivery of multimedia contents. The nodes in WMSNs are either static or mobile. Thus, the node connections change continuously due to the mobility in wireless multimedia communication that causes an additional energy consumption, and synchronization loss between neighboring nodes. In this paper, we introduce an Optimized Hidden Node Detection (OHND) paradigm. The OHND consists of three phases: hidden node detection, message exchange, and location detection. These three phases aim to maximize the multimedia node coverage, and improve energy efficiency, hidden node detection capacity, and packet delivery ratio. OHND helps multimedia sensor nodes to compute the directional coverage. Furthermore, an OHND is used to maintain a continuous node– continuous neighbor discovery process in order to handle the mobility of the nodes. We implement our proposed algorithms by using a network simulator (NS2). The simulation results demonstrate that nodes are capable of maintaining direct coverage and detecting hidden nodes in order to maximize coverage and multimedia node mobility. To evaluate the performance of our proposed algorithms, we compared our results with other known approaches.

1. Introduction

WMSNs are capable of capturing audio-video information by using low-cost cameras embedded with sensor nodes. The multimedia sensors provide substantial information related to a particular area of interest [1,2,3,4,5,6]. However, multimedia applications experience problems due to online media transmission challenges [7]. Several sources of energy waste include idle listening, overhearing, packet loss due to collisions, and packet overhead in the multimedia sense. One of the major sources of energy waste are the packet collisions that happen when two nodes try to transmit the packets simultaneously. As a result, this causes a partial or complete packet loss at the recipient node. The lost packets need to be discarded or retransmitted, which could be the source of the excess energy consumption waste and Quality of Service (QoS) degradation. To enable the on-demand multimedia services, we need to focus on multimedia-supported algorithms in WMSNs to determine the hidden node problems and compute the directional coverage. The existing IEEE 802.15.4 standard is based on the blind back off carrier sense multiple approach with collision avoidance (CSMA/CA), where the nodes check the channel before sending the data frame. If, the channel is free, then the node initiates the transmission process; otherwise, it reattempts after a certain time. However, this approach is only suitable when the nodes hear each other, and that could be a rare case in WMSNs [6]. In most cases, the network coverage is much larger than the single node’s coverage area. In general, a well-defined coverage area does not support WMSNs because the propagation characteristics are uncertain and dynamic. In this situation, the node is unable to determine the receiver side. The results could be the probability of hidden node collisions. The restrictions of the multimedia sensing proficiencies relate to the location coverage and hidden node problem. Once a better location coverage and hidden node solution for multimedia sensors are discovered, the results will help to improve the capabilities of WMSNs applications. Additionally, WMSNs restrictions are caused by tall buildings, mountains, and trees. Hence, directional coverage of multimedia sensors could be completed once they are deployed in an area of interest. However, proper directional location for multimedia sensors requires correct field information prior to deployment of sensors. It is also likely that multimedia sensors might change their location due to mobility over time. This problem can be resolved by dynamic updates of the locations through location information exchanges [8]. However, multimedia applications have limitations that will affect the successful media transmission in the sensor networks. Node connectivity is subject to change because of wireless commotions [9,10]. When a sensor is responsive to its immediate neighbors, it must uninterruptedly upload information about its surroundings.
The connectivity is a severe problem subject to the mobility change when the network has been set up. The sensors nodes try to identify new neighbors to address mobility problems, but a hidden node problem is a hurdle. Initial neighbor node discovery is typically performed when the sensor node has no proof about the configuration of its immediate neighbors. In this situation, the sensor node is unable to communicate with either the base station or the sink station. Thus, immediate neighboring nodes should be detected as soon as possible to set a path to the base station and contribute to the operation of the network [11,12]. Hence, in this state, more wide-ranging energy use is justified.
In order to handle the hidden node and coverage problem, our approach contributes the Obstacle-driven Negative Effect Strategy (ONES) method that handles the negative effect of the obstacles. The proposed method is designed for those scenarios where the number of the relays are less than those of relays required for building steady links. In addition, it is particularly suitable for those multimedia sensor networks that suffer due to several disconnected subdivisions of the network that are experiencing the issue of obstacles among the subdivisions. The method is validated by applying several assumptions and definitions. This helps reduce energy consumption and maintaining the QoS.
Furthermore, our paradigm contributes the Optimized Hidden Node Paradigm that involves the hidden node detection, message exchange phase, and location detection. Our paradigm is different from existing hidden node approaches, as we focus on the multiple discoveries of nodes rather than a single discovery of node. The approach is particularly designed for a distributed network as most of the existing approaches follow the central-based network in the node discovery process, which is also expensive for location-updating. We focus on improving the QoS and extending the network life. Thus, a network is divided into different subdivisions and is controlled by a coordinator node, as the subdivision process helps multimedia sensor nodes cover the entire area efficiently. The network life extension is justified with the proper selection of a controlling node using metrics such as residual energy, data forwarding capacity of the node, distance of the node from the base station, and memory allocation. These metrics are assigned the specific weightage that provides enough chance for each node to be a coordinator and balance the network. Handling the problem of overlapped subdivisions in the network particularly when a new joining node attempts to be a part of either subdivision is a critical issue that has also been handled by a priority-based synchronization.
The random wake-up procedure is applied to reduce the option of repeating collision amongst the nodes in the same subdivision. The beauty of our random wake-up process that it provides an opportunity for each node to coordinate with its neighborhood nodes to avoid the collision and initiate a faster discovery process for the new joining hidden node. In addition, each node applies an active discovery process to detect its coordinator node, whereas in the existing approaches, the coordinator (head node) is responsible for detecting its nodes in its subdivision, which puts an extra burden on the coordinator node. However, our approach handles this issue by assigning responsibility to each node to detect its coordinator node in each subdivision. Unlike existing approaches, our paper also contributes the novel location detection procedure that helps detect the maximum view, node boundary and viewpoint of multimedia sensor node; existing approaches either apply a node boundary or node view to detect the location. The remainder of the paper is organized as follows: Section 2 presents the salient features of the most related work. Section 3 presents an obstacle-driven negative effect strategy method. Section 4 presents optimized occlusion-free viewpoint and an energy efficient hidden node detection algorithms. Section 5 discusses the simulation setup and experimental results. Finally, the conclusions of the entire approach are given in Section 6.

2. Related Work

In this section, related WMSN approaches are discussed. Previous works discuss maximizing the coverage area and detecting the hidden nodes in the fields of wireless sensor networking, ad-hoc networks, and robotics. However, little research has been done in wireless multimedia sensor networking. Some addresses an omnidirectional coverage problem in wireless sensor networks [13,14], but it is not suitable for a bidirectional and an occlusion-free viewpoint. Numerous applications require bi-directional coverage, but existing coverage models are only suitable for traditional wireless sensor networks (WSNs), and do not support WMSNs. An initial study regarding the coverage of multimedia sensors is described in [15]. In this work, the authors proposed a routing protocol with the field of view camera placed on the floor. The video sensors are used by oceanographers to monitor the shallows. Furthermore, triangular view segments are used for calculating the coverage of wireless multimedia sensor networks in [16].
The neighbor discovery node process is proposed in [17] to regulate the new nodes from the base station. This approach only focuses on finding hidden nodes and not on energy consumption. The base station starts the node discovery process by broadcasting a HELLO message, and the node initiates the registration process after receiving the HELLO message. The node can switch channels to find the best HELLO message, which helps to locate the hidden nodes. In order to reduce the neighbor node discovery time, [18] introduced the HELLO message-based approach to identify the hidden nodes, but energy efficiency was not considered. In [19], an energy efficient node discovery algorithm was introduced based on temporal patterns of coincidences in order to reach other nodes. However, all these approaches address the wireless sensor network issues rather than multimedia wireless sensor network issues. In [11], the authors proposed the use of Voronoi diagrams and Delaunay triangulation to detect the best and worst coverage area in WMSNs. Another approach based on deploying an additional sensor node is introduced in [20] to maximize the coverage area. In this proposed approach, a two stage process was used for detection of phase coverage boundaries and obstacles by applying the formula 2 × R (where R: sensing radius of sensors).
In [8], virtual centripetal force-based coverage-enhancing algorithm was proposed for WMSNs. In this work, the grid theory, centripetal force model with essential mass and overlapping idea of the sensors are discussed. This algorithm shuts off any idle multimedia sensory to maximize the network coverage. Furthermore, the network is extended by redistributing sensors and by applying centripetal force based on the circular motion. The authors of [21] introduced a secure neighbor discovery process and attempted to protect the wireless sensor networks from different types of threats. The approach comprises a scalable key-distribution protocol that protects the neighbor nodes in the presence of malicious nodes. This aims to improve the secure neighbor discovery to guard the attacks of hidden nodes. The static network is deployed for securing the one-hop neighbor discovery process. However, the work does not address energy efficiency. The Line of Sight Method (LOSM) [22] is introduced for the wireless personal area network based on visible light communication technology. It handles the issue of the hidden nodes in IEEE 802.15.7 and in particular focuses on QoS parameters such as end-to-end delay, message loss, and goodput. The idle-pattern-based approach is introduced and in which the idle patterns are sent by the network coordinator to perpetuate the communication with other network sensor nodes. However, the work did not focus on energy efficiency and multimedia contents. The Efficient Beam Scanning Algorithm for Hidden Node (EBSAHN) [23] is proposed for the wireless sensor networks. This approach is based on an efficient Intra cluster grouping scheme (IC-GS) that helps add a new node into the wireless sensor network. Furthermore, it avoids the hidden node collision avoidance. The Hidden Node Problem (HNP) [24] is introduced in the wireless sensor network. This approach aims to generate the hidden node relationship for all nodes and allot the hidden nodes into different clusters. In this approach, time for super-frame is divided into sub-period, and size of the sub-period depends on the number of the hidden nodes into the cluster. The approach is primary based on improving the QoS. The Clustering-Based Mechanism for Detecting the Hidden Nodes (CMDHN) [25] is proposed for resolving the hidden node problem in the wireless sensor networks in order to improve the network performance. Furthermore, delay, throughput, and energy consumption are major parameters focuses. All existing approaches attempted to determine the hidden nodes and coverage problems but did not properly focus on energy efficiency, scalability, QoS, multimedia-content support delivery, and accuracy in multimedia sensor nodes. The characteristics and limitations of existing approaches are highlighted in Table 1.

3. Obstacle-Driven Negative Effect Strategy Method

Here, we consider the wireless sensor network that is divided into several subdivisions and suffered because of disconnected subdivisions; it also experiences the issue of the obstacles among the subdivisions. In the network, each subdivision is controlled by the coordinator node. The coordinator node has a communication range R c that is the maximum Euclidean distance reached by the node’s radio. Our network is based on the following assumptions.
Assumption 1: 
All the relay nodes are mobile sensor and responsible for on-demand delivery as depicted in Figure 1.
Assumption 2: 
There is at least one edge that interconnects the obstacles. Each obstacle is not overlapped with subdivisions.
Assumption 3: 
Let σ be the count of subdivision S d i . The number of available mobile relay nodes responsible for dealing with on-demand multimedia service M r n should satisfy the following condition:
M r n > σ    & &    M r n < T r n
where T r n : Total relay nodes.
Definition 1: 
Given an undirected graph G U with subdivisions (segments) S D and edges E can be written as G U = ( S D , E ) . Thus, the set of subdivisions are S D = { S d 1 , S d 2 , S d 3 , . . . , S d n } and edges.
E = { ( S d i , S d j ) S d i , S d j     S D } . Let obstacle-driven negative effect strategy ‘Ψ’ be Ψ = (SD, E Ψ ), where E Ψ denotes the set of edges of (ONES). Let E d = ( E E Ψ ) , ( S d i , S d j )     E Ψ and Ƹ ( S d p , S d q )     E d   ˅   r ( S d i , S d j ) < r ( S d p , S d q ) , where r ( S d p , S d q ) : Euclidean distance of subdivision S d i   a n d   S d j , E d : deleted edges.
Definition 2: 
The number of relay sensor nodes between subdivisions S d i   a n d   S d j can be denoted by Ƹ ( S d p , S d q )     E Ψ ,   M r n ( S d i , S d j ) . Thus, M r n ( S d i , S d j ) can be obtained by:
M r n ( S d i , S d j ) = r ( S d p , S d q ) R c 1
Definition 3: 
Let T r n represents the total number of the relay needed to generate the steady network topology. Thus, T r n can be obtained by:
T r n = ( S d i , S d j ) E Ψ N M r n ( S d i , S d j )
Hence, obstacle-driven negative effect strategy can be simplified as S D = { S d 1 , S d 2 , S d 3 , . . . , S d n } that is the set of subdivisions and set of obstacles are O = { O 1 , O 2 , O 3 , . . . , O n } . where O j cannot be overlapped with subdivision S d i . Thus, T r n denotes the total relay nodes to create the steady network topology. Let M r n = { R a 1 , R a 2 , R a 3 , . . . , R a n } be the available relays for on-demand multimedia contents, where M r n satisfies following condition:
M r n > E d     M r n < T r n

4. Optimized Hidden Node Detection Paradigm

An optimized hidden node detection paradigm is introduced for distributed wireless multimedia sensor networks because the sensor nodes are deployed in a disseminated manner within a realistic environment. On the other hand, centralized location deployment is not appropriate for WMSNs because these networks encompass a large number of multimedia nodes. Furthermore, updating the location is expensive within a centralized approach when compared to a distributed approach. Our approach consists of three phases:
  • Hidden Node Detection
  • Message Exchange Phase
  • Location Detection

4.1. Hidden Node Detection

Detecting a hidden node in WMSNs is the critical problem that affects the network performance. Hence, the efficient neighbor discovery process helps in hidden node detection. In this phase, we focus on a continuous neighbor discovery process to determine the hidden nodes. Each sensor node uses a coordination-driven approach, and we chose the 1-hop multiple neighborhood discovery process rather than the particular node-discovery in the network that helps detect all hidden nodes at the1-hop neighborhood. As a result, the network consumes a minimum amount of energy and has a collision-free process. In this approach, the nodes share the schedule as discussed in [26]. The network is divided into different subdivisions, and each subdivision is controlled by a coordination node. However, our approach selects the coordination node based on the residual energy, data forwarding capacity of the node, distance of the node from the base station, and memory allocation. Each node continues to play a role as the coordinator until it possesses the higher weightage as compared with other nodes of the subdivision. The higher weightage is calculated by assigning different values as residual energy is assigned 33% weightage, the nearest distance of the node from the base station gets 25%, the data forwarding capability gets 15%, and the memory allocation resource gets 27% weightage. We tried to use different combinations of the weightage for each metrics, but we obtained the optimal results with our chosen weightage numbers. Thus, each coordination node is responsible for detecting the new hidden node when joining the network. Each new joining node is required to send a synchronization message to the coordination node, each subdivision has only one coordination node, which means there is less possibility of collision to handle synchronization message. In case a new joining node sends the coordination requests to two different subdivisions, if a node is located close to the subdivisions that are overlapped, the coordinator node that receives the first synchronization message that entertains the node. On other hand, the coordination node that receives a later synchronization message that responds to the new joining node, but that node has already become part of the other subdivision. As a result, the possibility exists for energy waste of the coordination node. However, the wasted energy of the coordination node is negligible. The coordination node replies to the new node and sends a message to all the nodes in the same subdivision to store records about the new joining node. After getting a message from the coordination node, all the nodes send a message to the new node. When it receives these messages, the new node sends a message to the coordination node about the nodes who replied to the previous message. The goal is to confirm the new node request and inform all the nodes in the same subdivision about the new member and the new node has the information about the other neighboring nodes. The synchronization message is dispersed over the entire links of the network to link with the coordination node. This is the way that the coordination node determines a new joining node is detected. When the coordination node has information about a new joining node that broadcasts within its subdivision nodes, the coordinating node will send out a message to all the nodes in the same subdivision. The synchronization process of a new joining node with the coordination node process is depicted in Figure 2.
The hidden node detection process applies a random wake-up procedure to reduce the option of repeating collisions amongst the nodes in the same subdivision. In this phase, each node coordinates with its neighborhood nodes during the wake-up period to avoid collisions and make a faster discovery process of any new joining hidden node. The wake up time period is very small, and the time of forwarding the HELLO message is even smaller. In this case, there is a possibility that two nodes can be active at same time and initiate the neighbor node discovery process. Therefore, we use a scheduling method to control the wake up process of two nodes at the same time. During the scheduling, the nodes are required to be synchronized with each other and report to the coordination node. During the scheduling, each receiving node chooses time slots and obtains the data during those time slots. The time slot process is performed without contradicting the schedule of the other node. This is the reason that the neighbor nodes are subdivided into different subdivisions, where each node chooses its slot assigned to that subdivision. Each sensor node decides randomly when to initiate the transmission of a HELLO message. If its message does not strike with another HELLO message, the node is referred to as a discovered node. We can also determine residual energy and the load of each node after the node discovery process occurs.
Let us assume that each sensor node communicates at the distance of the single-hop node to detect the hidden nodes. Each sensor node sends the HELLO message ‘Hm’ at the distance ‘d’ within the subdivision ‘Sd’ and is located at the N × N area of WMSN. The residual energy of the two types of multimedia sensor nodes, the coordinator node ‘C’ and the non-coordinator node ‘Cn’, can be determined as follows.
The coordinator node performs four types of jobs that include the synchronization with newly joined nodes, broadcasting the information of newly joined nodes inside the subdivision, scheduling the transmission of subdivision, and data collection from non-coordinator nodes of the subdivision. The synchronization process between the newly joined node and the coordinator is explained in Algorithm 1.
Algorithm 1: Priority-based synchronization process between coordinator and newly joined nodes
  • Initialization: ( C n 1 : coordinator node-1; C n 2 : coordinator node-2; N j : newly joined-node; B m : beacon message for joining the subdivision; S n : node synchronization process; N s d i : subdivision of the network; ℓ: listening)
  • Input: ( B m )
  • Output: ( S n )
  • Set N j attempts for N s d // New node intends to join the subdivision of the network
  • N j B m // New node sends beacon message for joining the network
  • B m C n 1 && C n 2 // Beacon message sent by new node, but it is heard/listened by two coordinator nodes when two subdivisions are overlapped.
  • I f   C n 1     B m     N j then // If coordinator node-1 gets beacon message from new node for joining the subdivision.
  • C n 1   ɀ   N j     N s d // coordinator node-1 allows ‘ ɀ the new node to be part of subdivision
  • C n 2 Ґ N j // coordinator node-2 discards ‘Ґ’ the request initiated by new node
  • Else if C n 2   ɀ   N j     N s d // If coordinator node-2 gets beacon message from new node for joining the subdivision
  • C n 2   ɀ   N j     N s d // coordinator node-2 allows ‘ ɀ the new node to be part of subdivision
  • C n 1   Ґ N j // coordinator node-2 discards ‘Ґ’ the request initiated by new node
  • End if
  • End else
Here, we determine the energy consumed for four types of jobs. Thus, the residual energy of ‘C’ and ‘Cn’ can be calculated as follows:
C e s = [ d 2 { ( M s × ( E r ) ) + ( M s × ( E a ) ) } × S n ]
Equation (3) shows the consumed energy by coordinator node for synchronization:
E b = E r + E a
Equation (4) shows the consumed energy for broadcasting the message (disclosing the information of newly joined nodes to the subdivision nodes):
E s = S n = 1 k ( E r + E a ) × d 2
Equation (5) shows the consumed energy by coordinator node for scheduling with subdivision nodes:
E d c = [ d 2 { ( M s × ( E r ) ) + ( M s × ( E a ) ) } × S n ] 2
Equation (6) shows the consumed energy by coordinator node for collecting and forwarding the data.
We can determine the residual energy of the coordinator node and non-coordinator nodes based on the energy consumption for four tasks given by Equations (7) and (8), respectively:
C r e = C i e ( C e s + E b + E s + E d c )
N C r e = C i e ( C e s + E b + E d c )
Determining the node’s load is significant for hidden node discovery. The load factor N l requires the buffer capacity that is calculated d by using the Equation (9).
N l = [ N h e l l o N b m ]
Table 2 shows the details of the notations used and their respective explanations.
When the nodes that are available at the distance of a one hop neighborhood node of coordinator node receive the messages they start calculating distance from the coordinator node to detect the hidden nodes depicted in Figure 3. Let us assume that coordinator node ‘C’ has three neighbor nodes: N n 1 , N n 2 and N n 3 with distance that calculates d 1 , d 2 and d 3 with known ranges r 1 , r 2 , r 3 and r 4 and r n a hidden node N h .
Hence, the straight distance is at the possible values s 1 and s 2 from the coordinator node. The neighbor discovery method used in [27] is applied if there exist more than three multimedia sensor nodes. Thus, multimedia sensor nodes of more than three are connected either by N n 1 and N n 2 or N n 3 . We replace N n 1 , N n 2 , N n 3 and N n n with a new joined node or an existing hidden node that yields a pair of distance approximations. We can include more neighbor nodes to make a more accurate selection.

4.2. Message Exchange Phase

In this phase, the multimedia sensor nodes exist at a 1-hop neighborhood node that initiates the message exchange process to gather the information about the neighboring nodes. All sensor nodes use unicast addressing methodology that refers to the neighbor handshake indication (NHI) process. The NHI contains the identity of the nodes and the current location of the multimedia sensor node. Let us assume that the mobile multimedia sensor node comprises an identical standpoint and a list of overlapped neighbor nodes that are accessible in the same sensing position that yields the NHI. This aims to guarantee that each multimedia sensor node should detect their neighbor’s hidden nodes and their location:
T n = i = 0 N ( N n i   )
In Equation (10), the total neighbor nodes T n are calculated to determine the exact number of all 1-hop neighbor nodes. Each neighbor node N n sends on NHI message that can be obtained by:
N n = j = 1 1 ( N i d ) + C l
In Equation (11), multimedia sensor node unicasts the neighbor handshake indication process that contains node identity N i d and the current location C l :
N n   R m = i = 1 1 ( N i d ) + C l × N n     β T n ( β ) · N n
In Equation (12), each neighbor node returns the message R m with a node overlapping report β including the current location of each neighbor node.

4.3. Location Detection

The location detection of the sensor node is of paramount significance for continuous communication. Thus, there are several events that can be implicitly adjusted and responded to only if the correct location of the event is detected. The location detection plays a key role for understanding the multimedia- application- contents. There are three advantages of detecting the location of the multimedia sensor node. First, location detection is required to determine the event of the interest. For example, the location of a fire, location of an intruder, or the location of the opponent’s tank in the arena are critical for deploying the relief troops and rescue squads. Second, location detection enables several application services, such as helping doctors to gain the information of medical gears and personnel in smart hospitals. Third, the location detection helps in several system functionalities, such as network coverage checking, geographical routing, and location-based information querying. This phase helps to detect a sensor’s maximum view. The location detection involves the node boundary and viewpoint. In the node boundary, we detect the area in which the node is capable of broadcasting the message. The viewpoint covers the degree of the node from 0 to 360 in which the node can be located at any degree. First, the node attempts to determine the location of the neighbor node within the boundary by broadcasting the message. If a node fails to locate the node within the boundary, then it initiates the neighbor distance search process by checking the distance of the node viewpoint of the neighbor node. Last, if the previous process fails, then an obstacle-distance process is used [4]. If the first two processes and later process fail, then the sensor node uses an optimized occlusion free viewpoint to determine the largest viewpoint [28]. Let us assume that sensor node N s is located in the node boundary area and has three obstacles inside the viewpoint that are relatively close to N s . As such, these three obstacles restrict the sensor node from detecting the location of another node. Thus, we can obtain the location error rate by applying Equation (13):
θ e = ( l e 1 l a 1 ) 2 + ( l e 2 l a 2 ) 2 × Ψ 2 T s n
The average location detection time is an important factor that helps determine the detection capacity of the multimedia sensor nodes. As such, this feature has an impact on the performance and extensibility of the network. Thus, Equation (14) provides an average location detection time for each multimedia sensor node as follows:
θ t = i = 0 l ( t e x T s n ) i
In Figure 4, we show a complete node boundary process with the obstacles. The intersection of the curves on the given node boundary are displayed by including points A and B for the first obstacle, C and D for the second obstacle, and E and C for the third. Hence, the multimedia sensor node can determine whether there exists the obstacles Ψ that can be expressed as:
Ψ   < A B = 0   ,   Ψ   < D C = 0   &   Ψ   < E C = 0
then " Ψ " is visible to the viewpoint that refers to an AB clockwise curve; CD, and EC are available on the blocked curve of the viewpoint within the multimedia sensor node. This procedure not only finds the visible viewpoint, but it also helps detect the non-overlapped viewpoints. Similarly, the overlapped areas are detected by applying the node boundaries.
Table 3 shows the details of the notations used and their respective explanations.

5. Simulation Setup and Experimental Results

To validate the effectiveness of our proposed optimized hidden node detection paradigm for wireless multimedia sensor networks, we performed the simulation by using network simulator-NS2. The network is constructed to cover 1200 × 1200 square meters. The 270 multimedia enabled nodes are randomly distributed with homogenous capabilities. The initial energy of each node is set at 7 joules. The simulation aims to identify the coverage and network efficiency in the presence of hidden nodes. Furthermore, the performance of OHND is compared with other known mechanisms handling the issue of hidden nodes: Line Of Sight Method (LOSM) [22], Efficient Beam Scanning Algorithm for Hidden Node (EBSAHN) [23], Hidden Node Problem (HNP) [24], and Clustering-Based Mechanism for Detecting the Hidden Nodes (CMDHN) [25].
We designed three scenarios that include both hidden nodes and without hidden nodes. In the first scenario, each multimedia sensor node hears 20 out of 30 of the other multimedia sensor nodes. This gives a 66.666% probability of detecting the hidden nodes without wasting additional energy. In the second scenario, 10 out of 30 multimedia sensor nodes can hear other nodes that give a 33.33% probability to detect the hidden nodes. In the third scenario, all end nodes that contribute in the network can listen to each other. The distance between each multimedia sensor node is set at 40 meters. These three scenarios demonstrate expected, worst, and ideal scenarios, respectively. All nodes are completely constructed using the angle θ = 70 ° and the 30 meter sensing range that is set for each multimedia sensor node. The communication capability of each sensor node is set at 50 meters. We set 10–18 obstacles in the first scenario. In the second scenario, 18–27 obstacles were set. The third scenario had no obstacle. In scenarios 1 and 2, the viewpoint of the multimedia sensor nodes was affected. The remaining simulation parameters are given in Table 4.
Based on simulation, we obtained these results:
  • Multimedia Throughput Efficiency
  • Successful Packet Delivery Ratio
  • Network Accuracy
  • Energy Consumption with Hidden Nodes

5.1. Multimedia Throughput Efficiency

To confirm the multimedia throughput-efficiency of our proposed optimized hidden node detection, we created three scenarios: the worst case, the expected case, and the ideal case. In the worst case scenario, we used 18–27 maximum obstacles depicted in Figure 5a. In the expected case, we used 10–18 obstacles as depicted in Figure 5b, and there were no obstacles in the ideal case depicted in Figure 5c. Furthermore, we compared the performance of OHND with LOSM, EBSAHN, HNP, and CMDHN. The communication time is set at 18 min in the three scenarios for all competing approaches. We observed in Figure 5a–c that when the number of obstacles increases, the throughput efficiency decreases. However, throughput efficiency of our proposed OHND is better than other competing approaches. Our results demonstrated that the approach of the OHND significantly improved the throughput efficiency of the multimedia sensor network. The reason for improvement in throughput efficiency, in our case, is the use of the obstacle-driven negative effect strategy method that handles the negative effect of the obstacles. Our approach is particularly suitable for multimedia sensor networks that suffer due to several disconnected subdivisions of the network that are experiencing obstacles among the subdivisions. Furthermore, the multiple discovery of nodes rather than single discovery of node substantially improved the performance.

5.2. Successful Packet Delivery Ratio

One of the drawbacks of the hidden node in WMSNs is to drop the packets due to collisions. As a result, the quality of service is highly affected. Successful packet delivery ratio can be shown in Equation (15):
P s = P d × 100 P g
where P s : Ratio of successful packets, P g : Number of generated packets, and P d : delivered packets.
Figure 6 demonstrates the results of our proposed OHND and its comparison with LOSM, EBSAHN, HNP, and CMDHN approaches. The performance is measured by using a various number of events. When the number of events increase, the, successful packet delivery ratio starts reducing. However, our approach is more stable when compared with other competing approaches. Our approach has 93.4% of success rate after detecting 18 events, but other approaches have 82.24%–89.2% after monitoring the same number of events. In other approaches, the lost packets cannot be transmitted. In the presence of the hidden nodes, packets are lost. As a result, there is a possibility of collision that reduces the packet delivery ratio.

5.3. Network Accuarasy

Network accuracy is highly affected due to the presence of hidden nodes. Thus, end- to- end delay including processing, propagation delay, and time synchronization between the two end-to-end-points are extended. As a result, the network does not perform as expected and throughput performance is greatly degraded. In Figure 7, we determined the network accuracy of our proposed OHND and compared them with other competing approaches. When the number of hidden nodes increases, the network accuracy of our proposed approach is marginally reduced. On the other hand, the network accuracy of competing approaches is highly affected. In our case, our approach shows 96.1% network accuracy after detecting the 18 hidden nodes. HNP shows a lower network accuracy with an increased number of the hidden nodes. Furthermore, other approaches also showing lower network accuracy. The result demonstrates that our approach has an edge over other competing approaches.
The reason for better network accuracy in our case is the use of a random wake-up procedure that reduces the option of repeating collision amongst the nodes in the same subdivision. The beauty of our random wake-up process is to provide a chance for each node of coordination with its neighborhood nodes in avoiding a collision and initiating a faster discovery process for a new joining hidden node.

5.4. Energy Consumption with Hidden Node

The performance of the OHND approach was evaluated by using 500 rounds with a constant frame size of 512 data frames (including payload and data frame format). We performed several runs to determine the energy consumption of our proposed approach. Figure 8 demonstrates the energy consumption of our proposed approach and compares it with other competing approaches in the presence of hidden nodes using a maximum of 500 rounds. Based on the results, we observed that when the number of hidden nodes increase, the energy consumption rate also increases. However, our proposed OHND consumes less energy when compared to other competing approaches. HNP consumes less energy between 4–9 nodes, but when the number of hidden nodes increase, it performs poorly. OHND consumes an overall of 4.5 Joules with 18 hidden nodes using 500 rounds. However, other approaches consumed from 4.7–5.8 Joules for 500 rounds with a similar number of hidden nodes. The results demonstrate that our approach could also extend the network lifetime by saving more energy when compared to other approaches.

6. Conclusions

The hidden node problem creates a real threat to any type of multimedia wireless sensor network application. This paper introduces an optimized hidden node detection paradigm to improve the quality of service of the wireless multimedia sensor networks. Our paradigm consists of three phases: hidden node detection, message exchange phase, and location detection. These three phases resolve the hidden node problem and improve the network performance and QoS provision. The message exchange phase is responsible for detecting overlapped and non-overlapped areas of multimedia sensor nodes. The location detection phase determines the correct location of each multimedia node which helps improve the coverage efficiency of multimedia sensor nodes. Furthermore, the hidden node detection phase identifies the load and residual energy of the nodes when performing the discovery process. To determine the strength of our proposed OHND, we used NS2 and also compared the performance with other competing approaches: LOSM, EBSAHN, HNP, and CMDHN. The results demonstrate that our OHND improved multimedia coverage, energy consumption, and the packet delivery ratio when compared to other approaches. Furthermore, OHND has a hidden node detection capacity that is 0.8%–4.1% higher than the other the approaches. The simulation results confirm that our proposed paradigm is capable of determining hidden nodes for WMSNs application. In future research, we will implement our proposed OHND in a hardware-based environment.

Acknowledgments

The authors acknowledge the University of Bridgeport for providing the necessary resources to carry this research conducted in the Mobile and Wireless Communications laboratory under the supervision of Prof. Khaled Elleithy.

Author Contributions

The work has been primarily conducted by Adwan Alanazi under the supervision of Khaled Elleithy. Extensive discussions about the algorithms and techniques presented in this paper were carried between the two authors over the past year.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alanazi, A.; Elleithy, K. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis. Sensors 2015, 15, 22209–22233. [Google Scholar] [CrossRef] [PubMed]
  2. Levendovszky, J.; Thai, H. Quality-of-service routing protocol for wireless sensor networks. J. Inf. Technol. Softw. Eng. 2015, 2014. [Google Scholar] [CrossRef]
  3. Abazeed, M.; Faisal, N.; Zubair, S.; Ali, A. Routing protocols for wireless multimedia sensor network: A survey. J. Sens. 2013, 2013. [Google Scholar] [CrossRef]
  4. Tezcan, N.; Wang, W. Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints. Comput. Netw. 2008, 52, 2558–2567. [Google Scholar] [CrossRef]
  5. Bhandary, V.; Malik, A.; Kumar, S. Routing in Wireless Multimedia Sensor Networks: A Survey of Existing Protocols and Open Research Issues. J. Eng. 2016, 2016, 27. [Google Scholar] [CrossRef]
  6. Razaque, A.; Elleithy, K. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks. Sensors 2014, 14, 5074. [Google Scholar] [CrossRef] [PubMed]
  7. Cobo, L.; Quintero, A. Ant-based routing for wireless multimedia sensor networks using multiple QoS metrics. Comput. Netw. 2010, 54, 2991–3010. [Google Scholar] [CrossRef]
  8. Madan, R.; Lall, S. An energy-optimal algorithm for neighbor discovery in wireless sensor networks. Mob. Netw. Appl. 2006, 11, 317–326. [Google Scholar] [CrossRef]
  9. Serhan, Z.; Diab, W.B. Energy-efficient QoS Routing in Wireless Multimedia Sensor Networks. In Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA ‘15), Gwangju, South Korea, 24–27 March 2015; pp. 223–230.
  10. Malarvizhi, K.; Brindha, M.; Kumar, M. Evaluation of energy efficient routing in wireless multimedia sensor networks. In Proceedings of the 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Tamilnadu, India, 26–27 February 2015.
  11. Dyo, V.; Mascolo, C. Efficient node discovery in mobile wireless sensor networks. In Proceedings of the International Conference on Distributed Computing in Sensor Systems, Santorini Island, Greece, 11 June 2008.
  12. Jurdak, R.; Baldi, P.; Lopes, C.V. Adaptive low power listening for wireless sensor networks. IEEE Trans. Mob. Comput. 2007, 6, 988–1004. [Google Scholar] [CrossRef]
  13. Yang, Q.; He, S.; Li, J.; Chen, J.; Sun, Y. Energy-efficient probabilistic area coverage in wireless sensor networks. IEEE Trans. Veh. Technol. 2015, 64, 367–377. [Google Scholar] [CrossRef]
  14. Chaturvedi, P.; Daniel, A. An energy efficient node scheduling protocol for target coverage in wireless sensor networks. In Proceedings of the 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), Gwalior, India, 4–6 April 2015; pp. 138–142.
  15. Soro, S.; Heinzelman, W.B. On the coverage problem in video-based wireless sensor networks. In Proceedings of the 2nd International Conference on Broadband Networks, 2005. BroadNets 2005, Boston, MA, USA, 7 October 2005; pp. 932–939.
  16. Adriaens, J.; Megerian, S.; Potkonjak, M. Optimal worst-case coverage of directional field-of-view sensor networks. In Proceedings of the 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006, SECON’06, Reston, VA, USA, 25–28 September 2006; pp. 336–345.
  17. Megerian, S.; Koushanfar, F.; Potkonjak, M.; Srivastava, M.B. Worst and best-case coverage in sensor networks. IEEE Trans. Mobile Comput. 2005, 4, 84–92. [Google Scholar] [CrossRef]
  18. Wu, C.-H.; Lee, K.-C.; Chung, Y.-C. A Delaunay triangulation based method for wireless sensor network deployment. Comput. Commun. 2007, 30, 2744–2752. [Google Scholar] [CrossRef]
  19. Zhao, J.; Zeng, J.-C. A virtual centripetal force-based coverage-enhancing algorithm for wireless multimedia sensor networks. IEEE Sens. J. 2010, 10, 1328–1334. [Google Scholar]
  20. Keshavarzian, A.; Uysal-Biyikoglu, E.; Herrmann, F.; Manjeshwar, A. Energy-efficient link assessment in wireless sensor networks. In Proceedings of the INFOCOM 2004. Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies 2004, Hongkong, China, 7–11 March 2004; IEEE: New York, NY, USA; pp. 1751–1761.
  21. Bagchi, S.; Hariharan, S.; Shroff, N. Secure Neighbor Discovery in Wireless Sensor Networks; Purdue Technical Report, TR ECE 07-19; Purdue University: West Lafayette, IN, USA, 2007. [Google Scholar]
  22. Ley-Bosch, C.; Alonso-González, I.; Sánchez-Rodríguez, D.; Ramírez-Casañas, C. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15. 7 Uplink Performance. Sensors 2016, 16, 216. [Google Scholar] [CrossRef] [PubMed]
  23. Sujatha, M.; Bhuvaneswaran, R.S. An Efficient Beam Scanning Algorithm for Hidden Node Collision Avoidance in Wireless Sensor Networks. In Advanced Computer and Communication Engineering Technology; Sulaiman, H., Othman, M.A., Othman, M.F., Rahim, Y., Pee, N., Eds.; Springer: Melaka, Malysia, 2015; pp. 627–639. [Google Scholar]
  24. Tseng, W.; Fan, Y.-C.; Sheu, S.-T.; Ou, S.-Y. An effective grouping scheme for avoiding hidden node problem in IEEE 802.15. 4-based wireless sensor networks. ACM SIGAPP Appl. Comput. Rev. 2014, 14, 30–40. [Google Scholar] [CrossRef]
  25. Rohini, R.; Gnanamurthy, R. Performance analysis to improve quality of service using cluster based hidden node detection algorithm in wireless sensor networks. Intell. Autom. Soft Comput. 2016, 1–7. [Google Scholar] [CrossRef]
  26. Koubâa, A.; Severino, R.; Alves, M.; Tovar, E. H-NAMe: A hidden-node avoidance mechanism for wireless sensor networks. IFAC Proc. Vol. 2009, 42, 10–19. [Google Scholar] [CrossRef]
  27. Sachan, M.; Imam, S.; Beg, M. Energy-efficient communication methods in wireless sensor networks: A critical review. Int. J. Comput. Appl. 2012, 39, 35–48. [Google Scholar]
  28. Tanimoto, M.; Tehrani, M.P.; Fujii, T.; Yendo, T. Free-viewpoint TV. IEEE Signal Process. Mag. 2011, 28, 67–76. [Google Scholar]
Figure 1. Showing the On-Demand Delivery process and obstacles.
Figure 1. Showing the On-Demand Delivery process and obstacles.
Sensors 16 01438 g001
Figure 2. Coordination node synchronization process.
Figure 2. Coordination node synchronization process.
Sensors 16 01438 g002
Figure 3. Hidden node discovery process.
Figure 3. Hidden node discovery process.
Sensors 16 01438 g003
Figure 4. Obstacles within the node boundary and viewpoint; the yellow area represents the viewpoints of first sensor, the blue represents the viewpoints of the second sensor, the red represents the viewpoints of the third sensor and the dark blue represents the overlapped viewpoints area of the sensors.
Figure 4. Obstacles within the node boundary and viewpoint; the yellow area represents the viewpoints of first sensor, the blue represents the viewpoints of the second sensor, the red represents the viewpoints of the third sensor and the dark blue represents the overlapped viewpoints area of the sensors.
Sensors 16 01438 g004
Figure 5. (a) multimedia converge in existence of 27 obstacles; (b) multimedia converge in existence of 18 obstacles; (c) multimedia coverage efficiency without the existence of obstacles.
Figure 5. (a) multimedia converge in existence of 27 obstacles; (b) multimedia converge in existence of 18 obstacles; (c) multimedia coverage efficiency without the existence of obstacles.
Sensors 16 01438 g005aSensors 16 01438 g005b
Figure 6. Successful packet delivery vs. number of monitoring events.
Figure 6. Successful packet delivery vs. number of monitoring events.
Sensors 16 01438 g006
Figure 7. The network accuracy in presence of hidden nodes of OHND and other competing approaches.
Figure 7. The network accuracy in presence of hidden nodes of OHND and other competing approaches.
Sensors 16 01438 g007
Figure 8. Energy consumption vs. number of hidden nodes.
Figure 8. Energy consumption vs. number of hidden nodes.
Sensors 16 01438 g008
Table 1. The characteristics and limitations of the existing approaches.
Table 1. The characteristics and limitations of the existing approaches.
Existing ProtocolsBio-Directional CoverageOmni-Directional CoverageSingle-Directional CoverageEnergy-EfficientHidden Node DetectionScalabilityMultimedia Content-Support DeliveryQoS
Energy-efficient Probabilistic Area Coverage (EPAC) [12] X X
Energy-efficient Node Scheduling Protocol for Target Coverage (ENSPTC) [13] X X
Coverage Problem in Video-Based (CPV) [14] X X
Optimal Worst-Case Coverage of Directional Field-of-View (OWCDF) [15] X X
Worst and Best-Case Coverage (WBC) [16]X X X
Delaunay Triangulation-Based Method (DTM) [17] X X
Virtual Centripetal Force-based Coverage-Enhancing Algorithm (VCFEA) [18] X
Energy-Efficient Link Assessment (ELA) [19] XX
Secure Neighbor Discovery (SND) [20] X
Line of Sight Method (LOSM) [22] X X
Efficient Beam Scanning Algorithm for Hidden Node (EBSAHN) [23]X XX
Hidden Node Problem (HNP) [24] X X X
Clustering-Based Mechanism for Detecting the Hidden Nodes (CMDHN) [25]X X X
Table 2. Notations used and their description.
Table 2. Notations used and their description.
NotationDescription
C e s Consumed energy of coordinator node for synchronization
M s Number of synchronized messages by each newly joining node
E r Energy consumed by radio of multimedia sensor
E a Energy consumed for amplifying
S n Number of synchronizing nodes
dDistance between coordinator and newly joined node
E b Energy consumed for broadcasting
E s Energy consumed by coordinator node for scheduling
CCoordinator node
CnNon-coordinator nodes
C i e Coordinator’s initial energy
C r e Residual energy of coordinator
E d c Energy consumed by coordinator node for data collection
SdSubdivision
N l Node load
N h e l l o Number of hello message by node
N b m Maximum buffer size of node
N h Hidden node
Table 3. Notations and their description.
Table 3. Notations and their description.
NotationsDescription
θ e Average location error
l e 1 First estimated location
l e 2 Second estimated location
l a 1 First actual location
l a 2 Second actual location
T s n Total number of multimedia sensor nodes
ΨObstacles
θ t Average location detection time
l Total locations of all multimedia sensor nodes
Boundary range
Table 4. Simulation parameters and its corresponding values.
Table 4. Simulation parameters and its corresponding values.
ParametersValue
Size of network1200 × 1200 square meters
Number of multimedia sensor nodes270
Queue-capacity50 packets
free-space propagation47 meters
Maximum number of retransmissions allowed03
Initial energy of node7 Joules
MAC protocol BN- MAC [6]
Size of packets512 bytes
Data rate450 kb/second
Sensing range of node30 meters
Communication range50 meters
Transmitter power12.2 mW
Receiver power13.4 mW
Buffer threshold1024 Bytes
Sensing range30 meters
Number of obstacles10–18 for Expected and 18–27 for worst scenario
Simulation time18 min
Average simulation run10
Frame rate40 frame/second
Reliability[0.78, 0.92]
Average reporting rate4 packet/second
Base station location(0,700)

Share and Cite

MDPI and ACS Style

Alanazi, A.; Elleithy, K. An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks. Sensors 2016, 16, 1438. https://doi.org/10.3390/s16091438

AMA Style

Alanazi A, Elleithy K. An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks. Sensors. 2016; 16(9):1438. https://doi.org/10.3390/s16091438

Chicago/Turabian Style

Alanazi, Adwan, and Khaled Elleithy. 2016. "An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks" Sensors 16, no. 9: 1438. https://doi.org/10.3390/s16091438

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop