Next Article in Journal
Automated Low-Cost Smartphone-Based Lateral Flow Saliva Test Reader for Drugs-of-Abuse Detection
Previous Article in Journal
A Real-Time Monitoring System of Industry Carbon Monoxide Based on Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Automated Negotiation for Resource Assignment in Wireless Surveillance Sensor Networks

1
Departamento de Automática, Universidad de Alcalá, Edificio Politécnico, 28805 Alcalá de Henares (Madrid), Spain
2
Departamento de Física y Matemáticas, Universidad de Alcalá, Edificio Politécnico, 28805 Alcalá de Henares (Madrid), Spain
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(11), 29547-29568; https://doi.org/10.3390/s151129547
Submission received: 23 September 2015 / Revised: 6 November 2015 / Accepted: 18 November 2015 / Published: 24 November 2015
(This article belongs to the Section Sensor Networks)

Abstract

:
Due to the low cost of CMOS IP-based cameras, wireless surveillance sensor networks have emerged as a new application of sensor networks able to monitor public or private areas or even country borders. Since these networks are bandwidth intensive and the radioelectric spectrum is limited, especially in unlicensed bands, it is mandatory to assign frequency channels in a smart manner. In this work, we propose the application of automated negotiation techniques for frequency assignment. Results show that these techniques are very suitable for the problem, being able to obtain the best solutions among the techniques with which we have compared them.

1. Introduction

Wireless multimedia sensor networks are a special type of wireless sensor networks that are able to manage multimedia content. According to [1], the development of these networks fosters the evolution of new applications, such as electronic surveillance, traffic monitoring and guidance, healthcare, assistance for elderly people and environmental monitoring. The research community has studied a wide range of aspects of these type of networks, as summarized in the surveys [1,2,3,4].
Security in residential and public areas is a matter of great importance for many people. For that reason, some Internet providers are offering surveillance systems as a value-added service. As many other fields in technology, surveillance systems have recently undergone a revolution, shifting from CCTVs to IP-based cameras, as the latter offer clear advantages to their users. Not only their cost is more competitive, but IP-based cameras are also able to naturally connect to the widely-deployed Internet. Thus, IP-based cameras will constitute the key component in surveillance systems that are connected to the Internet, setting up a wireless surveillance sensor network (WSSN).
The main requirements of a WSSN combine the requirements from wireless sensor networks and real-time applications, the high bandwidth demand and low power consumption standing out. The network must provide for surveillance purposes a high bandwidth, as video quality must be high enough to distinguish even patterns that may indicate intrusion or attack attempts. The low power consumption constraint comes from the essence of wireless sensor networks, as sensors must be as autonomous as possible.
WSSNs make use of radio resources in unlicensed frequency bands, which currently are highly populated with a wide range of devices using heterogeneous technologies. Moreover, the requirements in terms of bandwidth are also increasing. All of these motives as a whole make it harder for wireless communication networks to meet user demands regarding quality of service. For all of these reasons, we can claim that there is an actual need for a more efficient management of the radio spectrum. Many solutions have been proposed for the problem of radio spectrum scarcity from different points of view. Some works focus on improving spectral efficiency [5] and error detection and correction algorithms [6] or on the design of new antennas for taking better advantage from multipath propagation for a more efficient signal reception (MIMO) [7]. Some other works propose, for a certain wireless technology, device coordination mechanisms for those devices that share the same frequency band, so that interferences are minimized and throughput is increased. For data services, the effect of interferences on the throughput perceived by the user is of paramount significance, as throughput ranges from zero until its maximum value depending on the S I N R (signal-to-interference plus noise ratio; determines the relation between the power of the desired signal (the video we want to receive) and all of the undesired signals that are received (other video flows and noise)) value [8].
This last problem is commonly known as the frequency assignment problem (FAP) [9]. Frequency assignment has been approached in a centralized manner from the point of view of optimization [10] and from an engineering point of view with distributed heuristics, LCCS (least congested channel search) [11] being one of the most commonly-used techniques.
Therefore, to deploy the required bandwidth to IP-based cameras in a WSSN environment, frequency assignment arises as a paramount problem. In this work, we address the frequency (channel) assignment problem in WSSNs from the perspective of automated negotiation techniques. Automated negotiation has proven to be valuable to support the decision-making process in scenarios where it is necessary to find an agreement quickly and with conflicting interests involved [12]. Potential applications of automated negotiation range from e-commerce [13] to task distribution problem solving, resource sharing or cooperative design [14,15,16,17]. One of the most important advantages of automated negotiation is that it takes into account the conflict of interests from the beginning. This enables finding more stable solutions (agreements), which make participating agents less prone to deviating from the socially-optimal solution to favor their privately-optimal solution.
Particularly, this work is, to the best of our knowledge, the first one that deals with the frequency assignment problem by using non-linear negotiation techniques, which have been extensively studied by the authors [18,19]. This work contributes to achieving this objective in the following ways:
  • We present the problem of frequency assignment in WSSNs.
  • We model the problem of frequency assignment in WSSNs by means of the mathematical problem of graph coloring.
  • We present a utility model for frequency assignment that takes into account the influence of interferences in terms of the signal-to-noise ratio in a receiver at a given time.
  • We solve the frequency assignment problem in WSSNs with different negotiation techniques and, also, for comparison purposes, with other techniques: a random assignment, an optimization technique, and a heuristic technique based on LCCS.
The paper is structured as follows. In Section 2, we model the problem as a graph, and we also model the propagation, interferences and utility of the solutions. In Section 3, we describe in detail the automated negotiation techniques proposed to solve the frequency assignment problem. Finally, in Section 4, we describe the scenarios under study and show the results, while in Section 5 we conclude and discuss the paper.

2. Problem Modeling

2.1. WSSN Architecture

The architecture chosen for the WSSN is a single-tier clustered-based architecture [1] where IP-based cameras (sensors) are wirelessly connected to a central clusterhead, which is also in charge of processing the multimedia data (audio, video and possibly other scalar sensor data) received from the cameras. To cope with the high bandwidth requirements of multimedia transmission and the described architecture, we have resorted to IEEE 802.11n (Wi-Fi) technology working in the 2.4-GHz band. In this architecture, the clusterhead will be a device connected to (or integrated in) the Wi-Fi access point. As this architecture uses existing Wi-Fi networks, we have considered that, in addition to the cameras, there are other wireless devices in the Wi-Fi network, which are connected to the Internet through their associated access point.
Figure 1 shows a graphical view of the architecture. Although there are other technologies for sensor networks, like ZigBee or IEEE 802.15.4, these technologies have a clear shortcoming that impedes their use in WSSNs, as their transmission data rate is limited to 250 kbps, which makes real-time video transmission almost impossible [20] if we want to meet the quality standards needed for surveillance. Wi-Fi, on the contrary, provides the necessary bandwidth to transmit high-quality video in sensor networks [21,22,23].
Obviously, the main drawback of using Wi-Fi technology instead of ZigBee is that it is a less energy-efficient solution. For example, in [22], the authors propose a video sensor using Wi-Fi and estimate that Wi-Fi networking accounts for about a third of the total energy consumed by cameras. However, there are already studies that deal with this issue. In [24,25], the power consumption of video sensors using Wi-Fi is analyzed, while in [20], a dual radio proposal is discussed, where sensors use ZigBee when they transmit small amounts of data and Wi-Fi when they must transmit large amounts of data to the home router in order to reach a remote node connected to the Internet. In [26], the authors describe an energy-harvesting technique to use Wi-Fi for sensor networks.
Figure 1. Wireless surveillance sensor network (WSSN) architecture.
Figure 1. Wireless surveillance sensor network (WSSN) architecture.
Sensors 15 29547 g001

2.2. Abstract Modeling Based on Graph Coloring

Graphs are one of the most commonly-used tools for modeling the frequency assignment problems, because of the relation of this problem to the graph coloring problem, which has been widely studied by the mathematical community [27].
In graph coloring, an abstract graph is considered, defined by a set of vertices along with some edges connecting them, and the objective is to assign one color to each vertex, in such a manner that the minimum possible number of colors should be used, while avoiding monochromatic edges.
In the commonly-used model, graph nodes represent elements that should be assigned a frequency, while edges represent element pairs that should not be assigned the same frequency. This way, colors act as frequencies, and hetero-chromatic edges guarantee element pairs with different frequencies.
Although widely used, Tragos et al. [28] conclude that the model is not accurate enough, because it does not reflect all of the information. For instance, the authors suggest that the information regarding adjacent channel interferences should be incorporated into the graph. In this work, we do so and use a graph showing greater fidelity to the problem modeled.
We can distinguish three types of vertices and two types of edges as graph elements. Regarding vertices, we consider access points (AP), sensors or cameras (C) and other wireless devices (D). Regarding edges, on the one hand, every wireless device (C or D) will be associated with its closest AP, trying to reflect that it will use the channel assigned to its closest AP. On the other hand, we will also link some node pairs when the distance between them is below the corresponding interference radius R (to reflect interferences): AP-AP pairs will be linked provided that the distance condition is met, AP-C (AP-D) pairs only when the camera (device) is not associated with that AP and C-C (D-D) pairs only if both cameras (devices) are associated with different APs, as the communications among the elements connected to the same AP are coordinated.
Furthermore, to model the interference power between two elements, we weigh each edge based on three factors. First, we consider a weight for each color pair i j , which can be understood as the interference between color i and color j. It is worth noting that the usual coloring problem only takes into account the particular case of interferences between vertices of the same color, while our extension of the problem allows considering also interferences between adjacent colors or colors in a certain distance range.
Second, we weigh the previous weights, by introducing the distance between edges’ endpoints. This way, the weight assigned to a colored edge i j will be different depending on how far apart its endpoints are. This represents another extension to the usual coloring problem, because now vertices have also certain positions, and this means that our graph is no longer abstract, but geometrical.
Third, we include the effect of the amount of data into the weights, including a factor that accounts for the fact that a higher bandwidth data flow will occupy the wireless channel a higher fraction of the time.

2.3. Effect of Propagation on Coverage

In order to evaluate a certain coloring for the proposed scenario, the effect of both the propagation and the interferences over wireless signals must be incorporated. Regarding the propagation model, in [29], it is defined that radio signal power losses, expressed in dB and considering that antennas are close to the ground (between 1 m and 2.5 m), can be obtained according to the following equation:
P l o s s = 40 log 10 d + 20 log 10 f - 20 log 10 ( h t h r )
where d is the distance, in meters, f is the signal frequency, in GHz, and h t ( h r ) is the transmission (reception) antenna height, also in meters. Equation (1) can be simplified for its use in the 2.4-GHz frequency band, and the resulting expression is as follows:
P l o s s = 7 . 6 + 40 log 10 d - 20 log 10 ( h t h r )
A particularly interesting case of this propagation model is when a signal with a power equal to the receiver sensitivity is received, that is:
P t + G t + G r - L - P l o s s = S
where P t stands for the transmission power (in dBm), G t ( G r ) stands for the transmission (reception) antenna gain (in dB), L stands for losses due to walls, windows and other obstacles in the propagation (in dB), P l o s s stands for propagation losses (in dB) and S represents the receiver sensitivity (in dBm). Using Equation (2), we can determine the distance, such that signals can be perceived by the receiver. Such a distance (expressed in meters) can be obtained as:
R = 10 P t + G t + G r - L - S - 7 . 6 + 20 l o g 10 ( h t h r ) 40
The interest in computing R is that it allows one to compute the maximum distance between a pair of nodes for them to be connected in the interference graph.

2.4. Effect of Interferences

In order to be able to measure the quality of the received signal, we must take into account the interfering signals. By interfering signals, we mean those undesired signals received by different network elements that make it harder to receive the expected signal properly. In the context of this work, it is necessary to quantify the power of interfering signals both in wireless terminals (C and D) and APs. We have to take into consideration several issues for this. First, we have assumed that there are only interferences coming from other Wi-Fi devices, but not from any other wireless technologies that may be also using the 2.4-GHz frequency band. It would not be difficult to extend our interference model, but we have decided not to do so, because these interferences are unconnected to the problem that we are presenting here. Second, provided that distance also affects interference signals, those interferences coming from sources far enough from the reception point so that they fall below the receiver’s sensitivity have been dismissed, according to the interference graph presented in Section 2.2. Third, it is commonly accepted that data traffic in access networks is very asymmetric, i.e., the downstream clearly dominates the upstream [30]. Indeed, this asymmetry has shaped the ADSL (Asymmetric Digital Subscriber Line) and cable design. For that reason, we have assumed that uplink traffic of wireless devices (D) is negligible in comparison with the traffic transmitted by APs, so they are not included in the graph. However, note that this assumption has only been made for wireless devices (D) different from cameras, as IP-based cameras’ (C) data traffic will be mainly upstream.
The quality of the received signal depends on all of the received interferences. Aside from distance (which affects signal losses; Equation (2)), interferences are also influenced by other factors: the activity index (Ψ) and the co-channel index (δ). The purpose of the activity index is to account for the fact that different volumes of data traffic will suppose different effects on interferences. In other words, higher bandwidth flows will generate more harmful interference signals, as they will occupy the spectrum for a higher ratio of time. Note that the interferences generated by APs are mainly due to traffic sent to the other wireless devices. Finally, the co-channel index (δ) is defined as the existing overlap between the IEEE 802.11 2.4-GHz frequency band. To model this effect, we have used the values obtained for this index in [31], where the authors provide a matrix where each value ( i , j ) represents the interference, as seen in channel i, motivated by the transmission on channel j. As a summary, if a node operating in channel i is interfered by a node operating in channel j, that interference power can be expressed as:
I = P t + G t + G r - L - P l o s s + δ ( i , j ) + Ψ
where every value is expressed in dB. Once there is a model for interfering signals, the signal-to-noise ratio for terminal i ( S I N R i ) can be computed as the ratio between the received signal and the sum of the received interferences, i.e.,
S I N R i = P j = 1 M I j
being P the power of the desired video signal and M the number of interference signals ( I j ) that are received.
Note that each AP will have a S I N R value for every terminal that is associated with it. In that case, we will assume that its S I N R will be the minimum of all of them, which is in fact the worst case.

2.5. Utility of the Solutions

To quantify the goodness of the different network colorings, we have used the concept of utility, which is closely related to the perceived throughput and S I N R . According to [8], in a wireless network, the throughput equals a maximum value when the S I N R is over a certain value S I N R m a x and monotonically decreases with the reduction of S I N R until an insufficient value of S I N R , called S I N R m i n , is reached, when the throughput falls to zero. We can consider the utility seen by node i ( U i ) as a normalized throughput, so it can be defined as a value ranging from zero to one, with zero corresponding to the situations when there is a very low-quality reception and the devices cannot keep connected (throughput equals zero) and one corresponding to the case when the signal quality is excellent (throughput equals its maximum value). Figure 2 shows the relation between utility and S I N R , expressed in dB.
Figure 2. Relation between utility and S I N R .
Figure 2. Relation between utility and S I N R .
Sensors 15 29547 g002
Threshold values for S I N R , which in turn define maximum and minimum utility values, have been defined from the values presented in [32]: S I N R m i n = 10 dB and S I N R m a x = 40 dB.
Finally, the utility value for a specific network coloring is computed as the sum of the utility values for all nodes in the network, that is:
U = i U i
In a wireless sensor network, it is important to consider sensor energy consumption issues, as they will have a clear impact on sensor lifetime. However, a surveillance camera will consume the same energy independent of the frequency channel on which it is operating. For that reason, the different S I N R values that the different strategies provide come from different values in the interferences (denominator in the S I N R equation), not by different values in the signal (numerator in the S I N R equation).

3. Automated Negotiation Techniques for Channel Selection

In this work, we propose to tackle the frequency assignment problem in WSSNs using automated negotiation techniques. Automated negotiation is a quite wide [33] field, but most authors agree that a negotiation problem can be characterized by a negotiation domain (who negotiates and what to negotiate about), an interaction protocol (which rules govern the negotiation process) and a set of decision mechanisms or strategies that guide the negotiating agents through every phase of the interaction protocol [34]. In the following, we define our particular negotiation problem along these three dimensions.

3.1. Negotiation Domain

For the scope of this work, we assume a multi-attribute negotiation domain, where a deal or solution to the problem is defined as the set of attributes (issues), and each one of them can be in a certain range. In our case, for a channel assignment problem with n A P access points, a solution or deal S can be expressed as S = { s i | i 1 , . . . , n A P } , where s i { 1 , , 11 } represents the assignation of a Wi-Fi channel to the i-th access point. Although there are 13 channels in the 2.4-GHz frequency band, they are not used everywhere in the world. For instance, only the first 11 channels are used in North America. In this work, we will use only those 11 channels, as the co-channel interference computation, referred in the previous section, has been done after the work in [31], where only 11 channels are used.
In this work, we assume that there are a number p of network providers offering surveillance services; thus, APs can belong to any of the providers P i . Each provider only has control over the frequency assignment for its own access points. According to this situation, P = { p i } | i = 1 , . . . , p will be the set of agents that will negotiate the frequency assignment.
Finally, each one of these agents will compute its utility for a certain deal or solution according to the model described in the previous section, but taking into account only the interference affecting its own access points. Our hypothesis is that the problem settings (high cardinality of the solution space and attribute interdependence) will make the utility functions highly complex, with multiple local minima and maxima. Figure 3 shows an example of such a complex utility function for two issues. Unfortunately, the dimensionality and cardinality of the utility spaces derived from the setting of this problem will prevent us from providing a graphical representation of the actual utility functions (or even sampling them). Nevertheless, in Section 4.3, we will present some results that support this assumption.
Figure 3. Utility function with multiple local maxima.
Figure 3. Utility function with multiple local maxima.
Sensors 15 29547 g003

3.2. Interaction Protocol

There are many interaction protocols for negotiations, from the classical alternating offers model [35] to auction-based protocols [36]. Accepting the hypothesis that the negotiation scenarios coming from the channel assignment problem in WSSNs will be highly nonlinear and according to the discussion in [37], we have chosen a simple text mediation protocol [38]. In its simplest version, the negotiation protocol will be as follows:
  • It starts with a randomly-generated candidate contract ( S 0 c ). In our case, this means assigning a random channel to each access point.
  • In each iteration t, the mediator proposes a contract S t c to the rest of agents.
  • Each agent either accepts or rejects the contract proposed by the mediator.
  • The mediator generates a new contract S t + 1 c from the previous contracts and from the votes received from the agents, and the process moves to Step 2.
This process goes on until either a maximum number of iterations is reached or another stop condition is met. The protocol, as defined, is rather generic and must be completed with the definition of the decision mechanism or strategies to be used by the negotiating agents and the mediator.

3.3. Decision Mechanisms

For the mediator, we have implemented a single-text mediation mechanism [38] for the generation of new contracts, which works as shown in Algorithm 1:
  • If at time t all agents have accepted the presented contract S t c , this contract will be used as the base contract S b to generate the next contract S t + 1 c (1). Otherwise, the last mutually-accepted contract will be used.
  • To generate the next candidate contract S t + 1 c , the mediator takes the base contract S b and mutates one of its issues randomly (2). In our case of study, this would correspond to choosing a random access point and selecting a new random channel for it.
  • After a fixed number of iterations, the mediator advertises the final contract, which will be the last mutually-accepted contract (3).
For the agents, we have considered two different mechanisms to vote about the candidate contracts S c :
  • Hill-climber (HC): In this case, the agent behaves as a greedy utility maximizer (see Algorithm 2). The agent will only accept a contract when it has at least the same utility for her or him as the previous mutually-accepted contract (2). If there is no previous mutually-accepted contract (1), the agent will accept the presented one (this effectively makes the first contract generated by the mediator be the first mutually-accepted contract).
  • Annealer (simulated annealing (SA)): In this case, we use a widespread nonlinear optimization technique called simulated annealing [38,39]. When a contract yields a utility loss against the previous mutually-accepted contract, there will be a probability for the agent to accept it nonetheless. As shown in Algorithm 3, this probability P a depends on the utility loss associated with the new contract Δ u and also depends on a parameter known as annealing temperature τ, so that P a = e - Δ u τ (2). Annealing temperature begins at an initial value and linearly decreases to zero throughout the successive iterations of the protocol (1).
Algorithm 1: Single-text mediation algorithm.
Sensors 15 29547 i001
Algorithm 2: Hill-climber voting algorithm.
Sensors 15 29547 i002
Algorithm 3: Annealer voting algorithm.
Sensors 15 29547 i003
The choice of these two mechanisms is not arbitrary. Simulated annealing techniques have yielded very satisfactory results in negotiation for nonlinear utility spaces [40] and are the basis for several of our previous works [18,19]. Furthermore, as discussed in [38], the comparison between hill-climbers and annealers allows one to assess whether the scenario under consideration is a highly complex one, since in such scenarios, greedy optimizers tend to get stuck in local optima, while the simulated annealing optimizer tends to escape from them.
For a complexity analysis, we are using heuristics that are stopped when reaching a certain number of iterations (see Section 4.3). For the complexity of each iteration, we first have to compute the utility of the corresponding coloring (see Section 2.5), which requires checking the neighbors for every node and, hence, lies in O ( n 2 ) for n the number of nodes in the network. After that, the negotiation steps detailed in this section arise, with a constant complexity in every iteration. Therefore, the complexity of our results is in O ( n 2 ) .

4. Experimental Evaluation

4.1. Considered Scenarios

In this paper, we make the common assumption that sensor nodes (IP-based cameras) are static elements. As in our problem there is not any element that evolves with time, we deal with the problem of evaluating the performance of a particular frequency assignment strategy by means of the computation described in Section 2. Please, note that the frequency strategy evolves with time, but it is computed in an offline manner.
We have taken into consideration three types of WSSN scenarios. In the first case, we have considered 50 APs and 350 (50 × 7) cameras; in the second one, 50 APs and 500 (50 × 10) cameras; and in the third one, 100 APs and 500 (100 × 5) cameras. The position where APs and wireless terminals are located in a plane is random, considering that a wireless terminal is associated with its closest AP. If a sensor (camera) is not in the coverage area of any AP (given by the sensitivity of its receptor, as explained in Section 2.3), we have removed that sensor from the problem. Additionally, if an AP has no associated sensors, it is also removed from the problem. Obviously, as the density of nodes increases, the number of unconnected nodes decreases. For each type of scenario and due to their randomness, we have generated three specific scenarios, so we have studied nine scenarios. Moreover, given the non-deterministic nature of the different algorithms under study, we have run each algorithm ten times in each scenario. Table 1 summarizes the scenarios under study, where we show the number of nodes (APs and sensors) initially deployed and the number of nodes that remain after removing the unconnected nodes (ν). Moreover, for the sake of quantifying the density of each scenario, we also show the mean number of interference signals that each node in the network receives ( I ¯ ).
Table 1. Summary of scenarios.
Table 1. Summary of scenarios.
Scenario# APs# Sensorsν I ¯
15035023722.53
25035024121.53
35035024021.81
45050043934.72
55050041439.26
65050042734.30
710050049047.62
810050048751.57
910050052748.63

4.2. Analyzed Techniques

In addition to the negotiation techniques under study, presented in Section 3.3, we have included a comparison with three reference techniques:
  • Random reference: As a first baseline, in this technique, each AP chooses a channel randomly to use with their clients.
  • Sequential channel search (SCS): This is a more realistic baseline and inspired by LCCS [11]. In this algorithm, APs are activated in sequence, and each of them chooses the channel where it finds the lowest interferences from other active APs and their clients. If there are several least congested channels, it chooses one of them randomly.
  • Augmented Lagrangian harmony search optimization (ALHSO): In addition to our negotiators based on simulated annealing, we wanted to have, as a reference, a nonlinear optimizer using complete information. We have chosen harmony search, which is an evolutionary optimization algorithm inspired by musical composition [41]. More concretely, we have used a public implementation that uses augmented Lagrange multipliers to deal with restrictions [42].

4.3. Results

The choice of the configuration parameters for the studied scenarios has been driven by considering typical or reasonable parameters from a realistic point of view, as summarized in Table 2. With these values, the coverage area is R = 40 . 3 m.
Firstly, we study the performance of the SA algorithm with different values for its configuration parameters: initial temperature (T) and the number of iterations. In general, a higher initial temperature increases the chances for escaping from local maxima, although an excessive temperature can drive the optimizer to escape from the global maximum. For that reason, setting the initial temperature is usually a delicate matter and depends on the concrete application. For the case of the number of iterations, and as a general rule, a higher number of iterations provides more opportunities to improve the solution, but it also increases the time that the algorithm is operating with high temperatures and, so, the risk of escaping from the global maximum (in addition to the increased computation cost, of course). In Figure 4, Figure 5 and Figure 6, we show the variation of the utility and the confidence intervals at 95% of the final negotiation outcome for different values of temperature and the number of iterations for Scenarios 3, 6 and 9 (we omit the rest of the scenarios, as the results obtained are very similar). In those figures, we notice that, for the number of iterations, the best choice is to choose the highest number as possible to obtain higher utilities. This effect occurs in all of the studied scenarios (not only the ones depicted in the figures), with the exception of one of them (Scenario 6 in Figure 5 with T = 8 ), where the utility function decreases from 220 . 56 to 218 . 34 for 2000 and 3000 iterations, respectively. Regarding the initial temperature T, the best choice is T = 1 . From this point on, the SA algorithm will be executed with T = 1 and 3000 iterations.
Table 2. Summary of the parameters (C, camera).
Table 2. Summary of the parameters (C, camera).
ParameterValue
P t 30 mW
G t 0 dB
G r 0 dB
L40 dB
S - 90 dBm
h t 1 . 5 m
h r 1 . 5 m
Ψ (APs)0.5
Ψ (C)0.2
Figure 4. Simulated annealing (SA) evaluation in Scenario 3.
Figure 4. Simulated annealing (SA) evaluation in Scenario 3.
Sensors 15 29547 g004
Figure 5. SA evaluation in Scenario 6.
Figure 5. SA evaluation in Scenario 6.
Sensors 15 29547 g005
Figure 6. SA evaluation in Scenario 9.
Figure 6. SA evaluation in Scenario 9.
Sensors 15 29547 g006
Once the SA algorithm has been tuned, the next experiments are focused on determining the impact of having a different number of agents or network providers (p) in the negotiation. In Figure 7, we have evaluated all of the scenarios under study with p [ 2 , 5 , 10 ] . From the figure, we can conclude that, as expected, increasing the number of providers p yields a progressive diminution of the global utility, since trade-off solutions involving access points in different providers will be more likely to be rejected. However, this reduction is moderate enough. From this point on, all of the results belong to the case p = 2 . The reason for this choice is two-fold. First, we think it is reasonable to consider a small number of providers offering surveillance services. Second, there are more works in complex bilateral negotiations than for the multilateral case (three or more agents).
Next, we compare the SA algorithm with the rest of the proposals: random channel assignment, SCS, HC and ALHSO. In Table 3, Table 4 and Table 5, we show the average (avg), standard deviation (SD) and confidence intervals at 95% (CI) of the utility function for 10 executions of the algorithm in each of the proposed scenarios. Furthermore, we highlight in bold the best solution. As can be observed, regarding the mean utility, the SA algorithm is the best solution for all of the scenarios, except for Scenario 8, where ALHSO shows the best performance. The second best performance is obtained by ALHSO, followed, by far, by SCS. As could be expected, the worst performance is obtained by the random channel assignment, which obtains very low utility values. In the case of HC (which can be seen as an SA optimizer with T = 0 ), we can note that it is able to obtain good results for the simplest scenarios (Table 3), but its performance decreases in more complex scenarios (Table 3, Table 4 and Table 5), due to its tendency of getting stuck in local maxima.
Figure 7. SA evaluation with different numbers of network providers (p).
Figure 7. SA evaluation with different numbers of network providers (p).
Sensors 15 29547 g007
Table 3. Utility in scenarios with 50 APs and 350 sensors. SCS, sequential channel search; ALHSO, augmented Lagrangian harmony search optimization; HC, hill-climber.
Table 3. Utility in scenarios with 50 APs and 350 sensors. SCS, sequential channel search; ALHSO, augmented Lagrangian harmony search optimization; HC, hill-climber.
Scenario 1Scenario 2Scenario 3
avgSDCIavgSDCIavgSDCI
Random59.369.616.8773.7410.687.6465.8113.769.84
SCS106.744.303.08121.207.185.14122.784.463.19
ALHSO121.644.172.98141.093.562.55132.923.952.83
HC123.303.502.50140.374.933.53138.025.313.80
SA130.892.651.90149.161.651.18149.132.271.62
Table 4. Utility in scenarios with 50 APs and 500 sensors.
Table 4. Utility in scenarios with 50 APs and 500 sensors.
Scenario 4Scenario 5Scenario 6
avgSDCIavgSDCIavgSDCI
Random92.966.594.7178.0516.9512.13105.0813.709.80
SCS165.609.006.44151.7410.247.33181.279.146.54
ALHSO203.625.764.12184.017.465.34221.965.373.84
HC196.829.947.11179.1111.067.91211.7611.057.90
SA215.372.751.97199.522.982.13234.591.461.04
Table 5. Utility in scenarios with 100 APs and 500 sensors.
Table 5. Utility in scenarios with 100 APs and 500 sensors.
Scenario 7Scenario 8Scenario 9
avgSDCIavgSDCIavgSDCI
Random90.139.146.5495.7315.8711.3588.7911.648.33
SCS164.949.346.68168.2813.099.36172.7011.538.25
ALHSO216.366.404.58223.025.033.60217.534.863.48
HC196.338.075.77199.518.746.25199.657.735.53
SA220.295.173.70217.605.243.75220.944.923.52
Regarding the standard deviation of the solutions, the algorithm that shows the lowest deviation is SA in almost every studied case (except in the most complex Scenarios 8 and 9, where SA is very similar to ALHSO), followed by ALHSO, SCS and random. As a conclusion, we can state that outperforming an optimization algorithm like ALHSO with negotiation techniques like SA shows that the use of negotiation techniques is advisable for the problem under study. Since the SA algorithm requires, as seen previously, the configuration of two parameters (initial temperature and the number of iterations), we finally include a comparison of all of the algorithms in a relative manner, with the purpose of analyzing the behavior of SA if it is not configured properly.
Figure 8. Results relatives to the maximum.
Figure 8. Results relatives to the maximum.
Sensors 15 29547 g008
Figure 8 shows the mean value of the utility functions for the different scenarios and relative to their maximum value (in bold). To make the interpretation easier, in the table devoted to the results of the SA algorithm, we have highlighted in green those results that outperform or equal ALHSO (they also outperform SCS and random, as they are less restrictive). Moreover, we have highlighted in yellow the results where SA outperforms SCS. As a conclusion, for temperatures close to T = 1 and 1000 or more iterations, SA outperforms ALHSO. Moreover, we notice that, for almost all cases (except for very high temperatures and very few iterations), SA outperforms SCS. In the figure, we also show the results for HC (equivalent to SA with T = 0 ) with 3000 iterations, and we observe that it has a worse performance than SA for the same number of iterations.
As a conclusion, we can recommend the use of negotiation techniques based on SA, as it is able to obtain better results than SCS in almost all cases, and it is not difficult to find configuration parameters that make SA even better than a nonlinear optimizer like ALHSO.

5. Discussion and Conclusions

Frequency assignment in Wi-Fi-based WSSNs is a topic that has not yet attracted the necessary attention from the research community. This scarcity of related works is probably due to the complexity of the problem, which is NP-hard [43]. More specifically, we have modeled the problem by using graphs, so the channel assignment is equivalent to coloring the edges of a graph. We have included the effect of having partially-overlapped channels (as is the case in IEEE 802.11n) by using a co-channel interference matrix. In fact, in [43], the authors present a summary of techniques useful for assigning frequencies in Wi-Fi, where it can be concluded that there are not too many proposals. Regarding other research works related to our proposal, it is important to cite [44,45,46], this last work being the one that is probably more related to our proposal, as it is inspired by the graph coloring problem and uses a measurement to quantify the performance of the solutions, which is similar to the utility that we use in negotiation. However, none of these works [44,45,46] is focused on WSSNs and the use of negotiation techniques. A proposal that deals with the coordination of Wi-Fi access points to assign frequencies without the use of graphs can be found in [47].
From a practical point of view, and to the best of our knowledge, probably the only technique that is actually used is the one called LCCS [11]. This technique is quite simple: if an access point detects too many interferences in the channel it is using, it moves to the least congested channel that can be found at that moment. In this paper, we show that there is still much more room for improvement, so it is possible to reach solutions that clearly improve the spectrum usage of WSSN. More concretely, we have used a bilateral negotiation protocol with a mediator, where negotiating agents (two access providers, each of them controlling a fraction of the access points in the scenario) negotiate with a strategy based on either HC or SA. We show that automated negotiation techniques are able to obtain those improvements for both the mean and standard deviation of the utility. Moreover, we have compared those results with those obtained by the optimization technique called ALHSO, achieving fairly similar results. However, negotiation techniques are simpler and less time consuming than ALHSO. As a general conclusion, we can state that negotiation techniques are very useful to solve the problem of frequency assignment in WSSN.
Finally, although our experiments have yielded satisfactory results, the work presented here is not exempt from limitations. The use of negotiation techniques such as the ones described here imposes a communication and computational overhead over the negotiating elements. Taking this into account in our approach, only the APs (which in this setting are assumed not to be battery powered) participate in the negotiation. Moreover, in this work, we have assumed the bandwidth cost of negotiation messages as negligible when compared to the high volume of data exchanged in video surveillance networks. For settings with lower application bandwidth consumption, mechanisms that minimize the number of exchanged messages (e.g., one-shot combinatorial auctions) may be more adequate.
This works opens a variety of avenues for further research. As discussed in the previous sections, a range of bilateral and multilateral negotiation protocols and agent decision mechanisms can be studied. We are interested in determining which features of different WSSN scenarios may help us determine the more suitable negotiation approach to be used in a specific situation, in a similar way as we did in [48]. Furthermore, we are working in more complex mediation approaches, which may improve the efficiency of the negotiations while enforcing different social welfare notions in the outcomes. Finally, we are interested in fully-distributed negotiations, where the need for mediation can be substituted by a form of distributed social choice.

Acknowledgments

This work has been supported by Spanish government project grants TIGRE5-CM Comunidad de Madrid (S2013/ICE-2919), MICINN MTM2011-22792, MINECO MTM2014-54207 and MINECO TIN2014-61627-EXP.

Author Contributions

All authors relevantly contributed to the manuscript. The formulation of the problem was initiated as the result of numerous meetings involving all of the authors. Later, each of them provided their expertise to the problem, leading the tasks related to them. David Orden led the graph formulation of the problem, Jose Manuel Gimenez-Guzman the network engineering aspect of the problem and Enrique de la Hoz and Ivan Marsa-Maestre the automated negotiation techniques. All authors have reviewed, read and approved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Melodia, T.; Chowdhury, K.R. A survey on wireless multimedia sensor networks. Comput. Netw. 2007, 51, 921–960. [Google Scholar] [CrossRef]
  2. Misra, S.; Reisslein, M.; Xue, G. A survey of multimedia streaming in wireless sensor networks. IEEE Commun. Surv. Tutor. 2008, 10, 18–39. [Google Scholar] [CrossRef]
  3. Abazeed, M.; Faisal, N.; Zubair, S.; Ali, A. Routing Protocols for Wireless Multimedia Sensor Network: A Survey. J. Sens. 2013, 2013, 1–11. [Google Scholar] [CrossRef]
  4. Almalkawi, I.T.; Guerrero Zapata, M.; Al-Karaki, J.N.; Morillo-Pozo, J. Wireless multimedia sensor networks: Current trends and future directions. Sensors 2010, 10, 6662–6717. [Google Scholar] [CrossRef] [PubMed]
  5. Au, E.; Cheong, M.; Ngo, C.; Cordeiro, C.; Zhuang, W. The future of Wi-Fi (Guest Editorial). IEEE Commun. Mag. 2014, 52, 20–21. [Google Scholar] [CrossRef]
  6. Dalal, P.; Sarkar, M.; Dasgupta, K.; Kothar, N. Link Layer Correction Techniques and Impact on TCP’s Performance in IEEE 802.11 Wireless Network. Commun. Netw. 2014, 6, 49–60. [Google Scholar] [CrossRef]
  7. Liao, R.; Bellalta, B.; Oliver, M.; Niu, Z. MU-MIMO MAC Protocols for Wireless Local Area Networks: A Survey. IEEE Commun. Surv. Tutor. 2014. [Google Scholar] [CrossRef]
  8. Bazzi, A. On uncoordinated multi user multi RAT combining. In Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA, 5–8 September 2011; pp. 1–6.
  9. Aardal, K.; van Hoesel, S.; Koster, A.; Mannino, C.; Sassano, A. Models and solution techniques for frequency assignment problems. Ann. Oper. Res. 2007, 153, 79–129. [Google Scholar] [CrossRef]
  10. Luna, F.; Alba, E.; Nebro, A.J.; Pedraza, S. Evolutionary algorithms for real-world instances of the automatic frequency planning problem in GSM networks. Lect. Notes Comput. Sci. 2007, 4446, 108–120. [Google Scholar]
  11. Achanta, M. Method and Apparatus for Least Congested Channel Scan for Wireless Access Points. U.S. Patent Application 10/959,446, 5 October 2006. [Google Scholar]
  12. Ren, F.; Zhang, M.; Sim, K.M. Adaptive conceding strategies for automated trading agents in dynamic, open markets. Decis. Support Syst. 2009, 46, 704–716. [Google Scholar] [CrossRef]
  13. Myerson, R.B.; Satterthwaite, M.A. Efficient mechanisms for bilateral trading. J. Econ. Theory 1983, 29, 265–281. [Google Scholar] [CrossRef]
  14. Ito, T.; Klein, M.; Hattori, H. A multi-issue negotiation protocol among agents with nonlinear utility functions. Multiagent Grid Syst. 2008, 4, 67–83. [Google Scholar]
  15. Sim, K.M.; Shi, B. Concurrent negotiation and coordination for grid resource coallocation. IEEE Trans. Syst. Man Cybern. Part B 2010, 40, 753–766. [Google Scholar] [CrossRef]
  16. Smith, R.G. The contract net protocol: High-level communication and control in a distributed problem solver. IEEE Trans. Comput. 1980, C-29, 1104–1113. [Google Scholar] [CrossRef]
  17. Wu, M.; de Weerdt, M.; la Poutré, H. Efficient methods for multi-agent multi-issue negotiation: Allocating resources. Lect. Notes Comput. Sci. 2009, 5925, 97–112. [Google Scholar]
  18. Marsa-Maestre, I.; Lopez-Carmona, M.A.; Velasco, J.R.; de la Hoz, E. Avoiding the prisoner’s dilemma in auction-based negotiations for highly rugged utility spaces. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS), Toronto, ON, Canada, 10–14 May 2010; pp. 425–432.
  19. Marsa-Maestre, I.; Lopez-Carmona, M.A.; Velasco, J.R.; Ito, T.; Klein, M.; Fujita, K. Balancing utility and deal probability for auction-based negotiations in highly nonlinear utility spaces. In Proceedings of the 21st International Jont Conference on Artifical Intelligence (IJCAI), Pasadena, CA, USA, 11–17 July 2009; pp. 214–219.
  20. Seema, A.; Reisslein, M. Towards efficient wireless video sensor networks: A survey of existing node architectures and proposal for a Flexi-WVSNP design. IEEE Commun. Surv. Tutor. 2011, 13, 462–486. [Google Scholar] [CrossRef]
  21. Kandhalu, A.; Rowe, A.; Rajkumar, R. DSPcam: A camera sensor system for surveillance networks. In Proceedings of the 3rd ACM/IEEE International Conference on Distributed Smart Cameras (ICDSC), Como, Italy, 30 August–2 September 2009; pp. 1–7.
  22. Feng, W.C.; Kaiser, E.; Feng, W.C.; le Baillif, M. Panoptes: Scalable low-power video sensor networking technologies. ACM Trans. Multimedia Comput. Commun. Appl. 2005, 1, 151–167. [Google Scholar] [CrossRef]
  23. Pudlewski, S.; Prasanna, A.; Melodia, T. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks. IEEE Trans. Mobile Comput. 2012, 11, 1060–1072. [Google Scholar] [CrossRef]
  24. Chien, S.Y.; Cheng, T.Y.; Ou, S.H.; Chiu, C.C.; Lee, C.H.; Somayazulu, V.S.; Chen, Y.K. Power Consumption Analysis for Distributed Video Sensors in Machine-to-Machine Networks. IEEE J. Emerg. Sel. Top. Circuits Syst. 2013, 3, 55–64. [Google Scholar] [CrossRef]
  25. Margi, C.B.; Petkov, V.; Obraczka, K.; Manduchi, R. Characterizing energy consumption in a visual sensor network testbed. In Proceedings of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TRIDENTCOM), Barcelona, Spain, 1–3 March 2006.
  26. Fafoutis, X.; Sørensen, T.; Madsen, J. Energy Harvesting-Wireless Sensor Networks for Indoors Applications Using IEEE 802.11. Proc. Comput. Sci. 2014, 32, 991–996. [Google Scholar] [CrossRef] [Green Version]
  27. Tuza, Z. Graph coloring. In Handbook of Graph Theory; Gross, J.L., Yellen, J., Eds.; CRC Press: Boca Raton, FL, USA, 2004; Volume 25, pp. 408–438. [Google Scholar]
  28. Tragos, E.Z.; Zeadally, S.; Fragkiadakis, A.G.; Siris, V.A. Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2013, 15, 1108–1135. [Google Scholar] [CrossRef]
  29. Green, D.B.; Obaidat, A.S. An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices. In Proceedings of the IEEE International Conference on Communications (ICC), New York, NY, USA, 28 April–2 May 2002; pp. 3424–3428.
  30. Maier, G.; Feldmann, A.; Paxson, V.; Allman, M. On dominant characteristics of residential broadband internet traffic. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC), Chicago, IL, USA, 4–6 November 2009; pp. 90–102.
  31. Ng, S.W.K.; Szymanski, T.H. Interference measurements in an 802.11n wireless mesh network testbed. In Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), Montreal, QC, Canada, 29 April–2 May 2012; pp. 1–6.
  32. Geier, J. How to: Define Minimum SNR Values for Signal Coverage. Available online: http://www.wireless-nets.com/resources/tutorials/define_SNR_values.html (accessed on 28 July 2015).
  33. Fatima, S.; Kraus, S.; Wooldridge, M. Principles of Automated Negotiation; Cambridge University Press: Cambridge, UK, 2014. [Google Scholar]
  34. Fatima, S.; Wooldridge, M.; Jennings, N.R. Optimal negotiation strategies for agents with incomplete information. Lect. Notes Comput. Sci. Vol. 2002, 2333, 377–392. [Google Scholar]
  35. Rubinstein, A. Perfect equilibrium in a bargaining model. Econometrica 1982, 50, 97–109. [Google Scholar] [CrossRef]
  36. Hattori, H.; Klein, M.; Ito, T. Using iterative narrowing to enable multi-party negotiations with multiple interdependent issues. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), Honolulu, HI, USA, 14–18 May 2007; p. 247.
  37. Marsa-Maestre, I. Contribución a la NegociacióN AutomáTica en Espacios de Utilidad Complejos. Ph.D. Thesis, Universidad de Alcalá, Alcalá de Henares, Spain, 2009. [Google Scholar]
  38. Klein, M.; Faratin, P.; Sayama, H.; Bar-Yam, Y. Negotiating complex contracts. Group Decis. Negot. 2003, 12, 111–125. [Google Scholar] [CrossRef]
  39. Kirkpatrick, S.; Gelatt, C.D.; Vecchi, M.P. Optimization by simulated annealing. Science 1983, 220, 671–680. [Google Scholar] [CrossRef] [PubMed]
  40. Lang, F.; Fink, A. Learning from the metaheuristics: Protocols for automated negotiations. Group Decis. Negot. 2015, 24, 299–332. [Google Scholar] [CrossRef]
  41. Geem, Z.W.; Kim, J.H.; Loganathan, G.V. A New Heuristic Optimization Algorithm: Harmony Search. Simulation 2001, 76, 60–68. [Google Scholar] [CrossRef]
  42. Perez, R.E.; Jansen, P.W.; Martins, J.R.R.A. A Python-Based Object-Oriented Framework for Nonlinear Constrained Optimization. Available online: http://www.pyopt.org/reference/optimizers.alhso.html (accessed on 28 July 2015).
  43. Chieochan, S.; Hossain, E.; Diamond, J. Channel assignment schemes for infrastructure-based 802.11 WLANs: A survey. IEEE Commun. Surv. Tutor. 2010, 12, 124–136. [Google Scholar] [CrossRef]
  44. McDiarmid, C. Frequency-distance constraints with large distances. Discrete Math. 2000, 223, 227–251. [Google Scholar] [CrossRef]
  45. Narayanan, L.; Shende, S.M. Static frequency assignment in cellular networks. Algorithmica 2001, 29, 396–409. [Google Scholar] [CrossRef]
  46. Mishra, A.; Banerjee, S.; Arbaugh, W. Weighted Coloring Based Channel Assignment for WLANs. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2005, 9, 19–31. [Google Scholar] [CrossRef]
  47. Abusubaih, M.; Gross, J.; Wiethoelter, S.; Wolisz, A. On access point selection in IEEE 802.11 wireless local area networks. In Proceedings of the 31st IEEE Conference on Local Computer Networks, Tampa, FL, USA, 14–16 November 2006; pp. 879–886.
  48. Marsa-Maestre, I.; Klein, M.; Jonker, C.M.; Aydoğan, R. From problems to protocols: Towards a negotiation handbook. Decis. Support Syst. 2014, 60, 39–54. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

De la Hoz, E.; Gimenez-Guzman, J.M.; Marsa-Maestre, I.; Orden, D. Automated Negotiation for Resource Assignment in Wireless Surveillance Sensor Networks. Sensors 2015, 15, 29547-29568. https://doi.org/10.3390/s151129547

AMA Style

De la Hoz E, Gimenez-Guzman JM, Marsa-Maestre I, Orden D. Automated Negotiation for Resource Assignment in Wireless Surveillance Sensor Networks. Sensors. 2015; 15(11):29547-29568. https://doi.org/10.3390/s151129547

Chicago/Turabian Style

De la Hoz, Enrique, Jose Manuel Gimenez-Guzman, Ivan Marsa-Maestre, and David Orden. 2015. "Automated Negotiation for Resource Assignment in Wireless Surveillance Sensor Networks" Sensors 15, no. 11: 29547-29568. https://doi.org/10.3390/s151129547

Article Metrics

Back to TopTop