Next Article in Journal
A Novel Software Architecture for the Provision of Context-Aware Semantic Transport Information
Previous Article in Journal
Amorphous Silicon p-i-n Structure Acting as Light and Temperature Sensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Random and Directed Walk-Based Top- Queries in Wireless Sensor Networks

School of Electronic and Information Engineering, Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(6), 12273-12298; https://doi.org/10.3390/s150612273
Submission received: 10 March 2015 / Accepted: 13 May 2015 / Published: 26 May 2015
(This article belongs to the Section Sensor Networks)

Abstract

:
In wireless sensor networks, filter-based top-k query approaches are the state-of-the-art solutions and have been extensively researched in the literature, however, they are very sensitive to the network parameters, including the size of the network, dynamics of the sensors’ readings and declines in the overall range of all the readings. In this work, a random walk-based top-k query approach called RWTQ and a directed walk-based top-k query approach called DWTQ are proposed. At the beginning of a top-k query, one or several tokens are sent to the specific node(s) in the network by the base station. Then, each token walks in the network independently to record and process the readings in a random or directed way. A strategy of choosing the “right” way in DWTQ is carefully designed for the token(s) to arrive at the high-value regions as soon as possible. When designing the walking strategy for DWTQ, the spatial correlations of the readings are also considered. Theoretical analysis and simulation results indicate that RWTQ and DWTQ both are very robust against these parameters discussed previously. In addition, DWTQ outperforms TAG, FILA and EXTOK in transmission cost, energy consumption and network lifetime.

1. Introduction

Wireless sensor networks (WSNs) composed of a large number of wireless connected devices have been widely researched and applied in many fields. Oftentimes, there is a powerful base station (BS) acting as a bridge between the WSN and the external users. On the contrary, the other nodes have very limited resources to collect, process, transmit and receive the data about the surrounding physical environment making energy conservation is a major issue. Top- k queries, i.e., querying the top- k readings with the corresponding nodes of a WSN, is a very common demand for the users and has been widely studied in the literature [1,2,3,4,5,6]. The top- k query approaches can be roughly divided into two categories, i.e., aggregation-based and filter-based query approaches. There are some parameters of the networks and the readings such as large size, severe damages to the network topology, and dynamics of the nodes’ readings that can affect the performance of the query approaches. Aggregation-based query approaches perform well in defending against these parameters. In fact, for most of aggregation-based query approaches, the transmission cost is stable for a specific query. In most cases, the filter-based top- k query approaches outperforms aggregation-based top- k query methods in transmission cost, energy consumption and network lifetime. However, the updating of the filters is very sensitive to the parameters discussed previously, especially the size of the network and the dynamics of the readings, which will be discussed in detail in Section 5.1 based on a simple model.
Another very important parameter that influences the performance of the filter-based top- k query approaches is the decline of the whole range of readings. Theoretical analysis in Section 5.1 illustrates that the declining speed of the whole readings range has a significant bad impact on the performance of filter-based top- k query approaches. The filters easily become heavy burdens rather than something that reduces the transmission cost when all the readings decline. In real life, the decline of the readings is a very common phenomenon.
Consider a WSN deployed in an interest region which is used to monitor the temperature and the user wants to know the top- k readings in the network. From morning to afternoon, the trends of all the temperatures are increasing though some exceptional cases could happen because of measurement error or failure of the nodes. In this period, the filter-based top- k query approaches outperform the approaches based on aggregation techniques. However, the whole range of temperatures decreases from afternoon to dawn. In this condition, the filters would change to be the heavy burden of the network.
Power supply is strictly limited in WSNs and therefore residual energy of the nodes is an essential network management parameter. Therefore, the users may monitor the top- k nodes with the highest residual energy. Obviously, the residual energy for a node always decreases during the whole lifetime which can lead to the failure of the filter-based approaches.
Another shortcoming of filter-based top- k query approaches is that though the filter-based approaches carefully consider the temporal correlations of the readings, the spatial correlations between them are ignored, but spatial correlations in fact are very common and have been confirmed by analysis of real data set in various papers [7,8,9].
Consider a WSN which is designed to monitor gas concentrations in factories. When there is a gas leakage incident, the gas will diffuse from the source to the surrounding environment. Under normal conditions, the readings of the nodes near the gas source will be beyond the safety threshold, however the remote nodes will not detect the incident. Then it is likely that the nodes that detect the gas coordinate with their neighbors rather than the remote ones to verify the incident.
The distribution of the transmission cost is an important indicator of the load-balance of a WSN. Therefore, the users may be interested in finding the nodes with top- k traffic. When a node’s transmission cost is very high, we would draw a conclusion that the transmission costs of the node’s neighbors are also very likely to be high. This is reasonable because, in most cases, a node just communicates with its neighbors rather than nodes in a remote region. As a result, the neighbors of the node have a high probability of having a high transmission cost.
In fact, the strong relations between nodes with their neighbors are the basis of many in-network data processing techniques, such as data compression, data prediction and data fusion in WSNs. In addition, the relations can also be used in top- k queries. In this work, we present an in-depth analysis on filter-based top- k query approaches and propose two novel top- k query methods named RWTQ and DWTQ to overcome the shortcomings of filter-based top- k query approaches. In RWTQ, each node uses its Relative-Neighbors’ list only to make the token(s) walking decisions. We employ the Relative-Neighbors of a node rather than the all the neighbors to reduce the redundant paths.
On the contrary, DWTQ uses not only the position of the node but also the a priori information stored in the token to make the token(s) walking decisions. DWTQ is an extension of RWTQ and comprises of four modes, i.e., Random-Walk (RW) Mode, Directed-Walk (DW) Mode, Extreme-Point (EP) Mode and Leave (L) mode. A token can switch mode between these four modes. The contributions of this paper are summarized as follows:
(1)
We find and point out the limitations of filter-based top- k query approaches in certain situations based on theoretical analysis presented in Section 5.1. We employ a simple network model which is composed of N nodes and make locate the base station at the center. The relations between the performance and the parameters of filter-based top- k query approaches are analyzed in detail. Analysis results are shown with figures.
(2)
A novel paradigm called RWTQ is proposed. The whole framework of RWTQ is displayed, which is also the basis of DWTQ. In RWTQ, we introduce the Relative Neighborhood Graph (RNG) to defend against the Density-Trap phenomenon. A distributed construction method for RNG is also discussed.
(3)
We extend the RWTQ to DWTQ considering the spatial correlations between the readings of the nodes. DWTQ comprises four modes, i.e., Random-Walk (RW) Mode, Directed-Walk (DW) Mode, Extreme-Point (EP) Mode and Leave (L) mode. We provide a detailed discussion of each type of mode and the switches between the modes.
(4)
We evaluate the performance of RWTQ and DWTQ through a series of simulations. The results show that DWTQ outperforms RWTQ, TAG, FILA and EXTOK in transmission cost, energy consumption and network lifetime.
The rest of this paper is organized as follows: Section 2 reviews the related work on top- k query approaches. Section 3 gives the background of top- k queries and our random walk-based approach, RWTQ, in detail. We then extend the RWTQ to the directed walk-based top- k query approach, DWTQ, and design a detailed strategy of walking directions in Section 4. Both theoretical analysis and simulation are employed to evaluate the performances of RWTQ, DWTQ and some other approaches in Section 5. Finally, the conclusions of the paper are presented in Section 6.

2. Related Work

As discussed previously, the top- k query problem in WSNs has been widely studied and most of the previous approaches are divided into two categories, i.e., aggregation-based and filter-based top- k query approaches, and we present them, respectively, in the following paragraphs.
Several data aggregation functions exist in the literature, including sum, count, average, min, max and so on, and the top- k query problem is just one special case of them. As a result, most data aggregation researchers focus on constructing the routing architecture and reducing the transmission cost. TAG [3] is a well-known aggregation algorithm which can be used to solve the top- k query problem. Any routing algorithm can be used by TAG for communications between the base station and all the nodes in a network. A series of aggregation functions (e.g., MAX, MIN, they are also capable of querying the top- k readings. In [10], a clustered aggregation approach (CAG) is presented which outperforms TAG in transmission cost. The disadvantage of CAG is that the hot-spot nodes are more easily exhausted, which shortens the lifetime of networks significantly. There are many other protocols that can be used to aggregate the data such as LEACH [11], directed diffusion [12] and GPSR [13].
Range caching [4], proposed by Olston et al., is the rudiment of filter-based top- k queries. In range caching, the data cache stores an interval approximation which is a value range for each data source. When the data value of a source changes, it would be transmitted to the data cache only when the value is beyond the interval approximation. Therefore, the transmission cost is reduced when the precision (width of the interval approximation) is set appropriately. A parameterized algorithm for adjusting the precision of approximations is designed to get the best performance as data value, precision or workload vary. Then, in [5], Babcock and Olston extended the approach in [4] and applied it to the top- k monitoring problem in data streams. Initially, the coordinator node computes and maintains a top- k set and installs arithmetic constrains at each monitor node. For each monitor node, if the updated value is located in the arithmetic constraints, no information needs to be transmitted to the coordinator node, which can reduce the communication cost. When some constraint is violated, a process called resolution takes place which can determine whether it is necessary to impose new constraints on the monitor nodes. To our knowledge, Olston et al. first proposed in [6] the use of adaptive filters to continuously query over distributed data streams with low communication overhead. They designed a low-overhead algorithm for setting the widths of the filters adaptively which always guarantees precision constrains of the users will be met. FILA [1] is another classic query algorithm which uses range-based filters to reduce the transmission cost and save energy. In addition, it is developed specifically for WSNs. Each sensor node installs a filter locally and, for the top- k members, the filter is unique in the whole network; all the other nodes share a same filter. The sensor-initiated updates are divided into three types: Internal update, Join update and Leave update. For each type of updates, a corresponding mechanism is used to reinstall the filters. When the updated readings of the sensor nodes do not surpass the filter, it has no need to transfer the readings to the base station (BS). More recently, a new filter-based top- k query approach called EXTOK [2] was developed. Different from FILA, all the nodes in EXTOK shares the same filter which is a number rather than a range and the top- k nodes always upload the readings to the BS. On the contrary, the other nodes upload the readings only when the value of their readings is larger than the filter. Different from the above two categories of traditional top- k query approaches, in this work we propose a novel method based on the walking of the token in the network to collect the top- k readings. To our knowledge, this is a new perspective on the top- k query problem.

3. Top-k Query Based on Random Walk

In Section 3.1, we first state the problem of top- k queries in WSNs and then present some assumptions to make our approaches work well. RWTQ is discussed in Section 3.2.

3.1. Problem Definition and Assumptions

Considering a monitoring region in which a large number of homogeneous nodes are deployed randomly, we assume that all the nodes are static and are capable of collecting information, processing, transmitting and receiving data. In addition, each node is assumed to know its own geographic position either from a GPS device or by some other means. Every node measures the local physical phenomenon (e.g., temperature, humidity, residual energy and concentration of toxic gases) with a constant sampling rate. In each sampling period, the top- k readings and the corresponding nodes in the whole network are required by the external users. A more formal definition of the top- k query problem is given as follows:
Given a network which comprises a set of nodes N o d e s = ( n 1 ,   n 2 , , n N ) , all the nodes generate local readings R = ( R n 2 , R n 2 , , R n N ) synchronously with a constant frequency. In each period, the users want to get a list L containing k pieces of records shown as follows:
L = < ( n 1 ' , R n 1 ' ) , ( n 2 ' , R n 2 ' ) , , ( n k ' , R n k ' ) >
where R i ' is the reading of n i ' :
0 < i < j k ,     R n i ' R n j '
and:
n l N o d e s   and   n l n i '   ( i = 1 , 2 , , k ) ,   R n l ' R n k '
For ease of description, in this work, we see the set of homogeneous nodes with identical circular communication range r as a graph G . The vertex of the graph G comprises all the nodes in the network. If the distance d ( s i ,   s j ) between two nodes n i and n j is smaller than r , the two nodes can communicate with each other and an edge exists between n i and n j in G . It is easy to find that G is an unweighted and undirected graph. We can get a distributed G by each node communicating with its neighbors and a full list L of a node’s neighbors can be obtained by each node. For this, it is essential to distinguish individual neighbors. Any locally unique identifier can be used for this propose, e.g., unique IDs in the network, 802.11 MAC addresses [14] or Bluetooth cluster addresses [15]. In this work, we assume that all the nodes are static and the topology is stable. Therefore, the neighbors list L can be updated by the nodes with a long time interval.

3.2. RWTQ

At the beginning of the network construction, each node sends information about its location to the BS. To avoid sending some of the tokens to the neighboring nodes, the BS selects n representative nodes in the network based on an algorithm named S e l R e p , where n is the number of tokens preset by the users, specified by the users. The pseudo-code of S e l R e p is shown as follows:
Algorithm 1: S e l R e p
Input: locations of all the nodes L o c a t i o n s and parameter n
Output: n representations
1) while the number of clusters >   n
2)    combine the nearest two clusters
3) end while
4) for each cluster
5)   select a representation of the cluster
6) end for
Having obtained n representations, BS sends a token to each of them by any routing algorithm and then the tokens walk in the network randomly to collect the top- k readings. In this work, we employ GPSR [13] to exchange data between BS and the nodes, because GPSR has strong correlations with our approaches (as an example, they both employ the Relative Neighborhood Graph which will be introduced in the following section). Each token has a unique ID and a pedometer which is initiated by the representations.
A node that receives a token first checks the pedometer and if the pedometer is smaller than a threshold T , adds one to the pedometer count. Then, the node needs to search the readings cache for a matching reading. Note that, the readings in the token are sorted in descending order and the node compares the local reading with the readings in the token in order. When finding a smaller reading in the token, the node inserts the local reading before the smaller reading. Then, the node needs to check the number of the readings in the token, if the number beyond k , deletes the last reading in the token; else, does nothing. Having updated the token, the node chooses one neighbor from the neighbor list L (excluding the neighbor that sends the token) with equal probability and sends the token to the neighbor. The pseudo-code of the Updating-Token algorithm is as follows:
Algorithm 2: Updating-Token
Input: A token and its readings sorted in descending order
Output: An updated token
1) for i=1 to the number of the readings in the token
2)   scan the readings in order
3)   if (the local reading > the i-th reading in the token)
4)    insert the local reading before the i-th reading
5)    break
6)   end if
7) end for
8) if the number of readings in the token beyond k
9)  delete the last reading in the token
10) end if
On the contrary, when a node finds that the pedometer is beyond a threshold T , it realizes that the token should be sent to the BS by GPSR and then selects the next hop with the rules in [13]. Using the full list of neighbors to decide the next hop comes with one attendant drawback named Density-Trap (D-T): it is most likely that in a high-density region (H-R) the token will walks around and around, and it is hard to walk out. A simple example of such situation is shown in Figure 1. Here, the six black dots comprise an H-R and they can communicate with each other directly, i.e., each pair of them are neighbors. In addition, there are five stars and each star connects with the H-R by a “narrow bridge”, i.e., each star can only communicate with one black dot. Considering that a token randomly walks in the H-R, in each step, the probability that the token is sent to the stars is smaller than 1/5, because for a black dot located at the border of H-R, it sends the token to a star with a probability of 1/5, for the black dot locating at the center, it can’t send the token to the stars. As the H-R’s density increases, the probability that a token will walk out of H-R decreases, which would consume lots of energy and does not help get the top- k readings in the network.
Figure 1. The token trapped by a high-density region.
Figure 1. The token trapped by a high-density region.
Sensors 15 12273 g001
Motivated by the D-T problem, we note that the full graph G , shown in Figure 2a, is not suitable for a token to randomly walk on, because there are some redundant choices, especially for an H-R when choosing the next step for a token. An intuitive choice is to let the tokens walk on the Minimum Spanning Tree (MST) of G , as shown in Figure 2b, which can solve the D-T problem. However, walking on MST, the tokens always walk to the dead end and as a result, the tokens have to go back along the way they walked. Therefore, we employ the Relative Neighborhood Graph (RNG) [16], as shown in Figure 2c, which is a well-known planar graph to solve the D-T phenomenon. RNG is a subset of the full graph G and a superset of MST. In Figure 2, a comparison of the full graph G , its MST and RNG are presented.
As in [13], given a collection of vertexes C with known locations, the Relative-Neighbors (RNs) and the RNG are defined as follows:
Given two points v i and v j in C , they are RNs if, for each v k C , d ( v i ,   v j ) max [ d ( v i ,   v k ) , d ( v j ,   v k ) ] .
Figure 2. Comparison of (a) The full graph G ; (b) MST of G ; (c) RNG of G .
Figure 2. Comparison of (a) The full graph G ; (b) MST of G ; (c) RNG of G .
Sensors 15 12273 g002
An edge in RNG exists between vertexes v i and v j for all i ,   j = 1 , 2 , , N , i   j , if and only if the two vertexes are RNs.
Several algorithms have been proposed for constructing RNG [17]. To reduce the transmission cost in the network, we employ a distributed fashion algorithm proposed in [13]. Given the full list of the neighbors L , each node can get the RNs-List RNs L as follows:
Algorithm 3: Constructing RNG
Input: Full list of the neighbors, L
Output: RNs L of the node
1) for each v i ϵ L
2)  for each v j ϵ L
3)   if v i = = v j
4)    continue
5)   else if d ( v i ,   v j ) > max [ d ( v i ,   v k ) , d ( v j ,   v k ) ]
6)    eliminate edge ( v i ,   v j )
7)    break
8)   end if
9)  end for
10) end for
Based on the pseudo-code shown in Algorithm 3, each sensor node can get the RNs L . As a result, each sensor node can send the tokens based on the RNs L rather than L which can significantly release the D-T problem. In addition, employing the RNG makes it easy to use GPSR to exchange data between BS and the nodes.

4. Extending Random Walk to Directed Walk

In Section 3, we developed a top- k query approach based on a random walk, which is suitable for WSNs in which each node’s readings are absolutely independent of any other nodes’ readings. However, as described in Section 1, the reading of a node has strong correlations with that of its neighbors, because the information of most physical phenomena strongly correlates to spatial locations. To further improve the efficiency and reduce transmission cost, we propose the aggressive use of spatial correlations. RWTQ is thus extended to DWTQ which carefully considers these spatial correlations.
As shown in Figure 3, there is a “mountain” with an extreme point and DWTQ is comprised of four modes, i.e., Random-Walk (RW) Mode, Directed-Walk (DW) Mode, Extreme-Point (EP) Mode and Leave (L) mode, to search the extreme point efficiently. Initially, there is no information about which direction the token should walk and then get the top- k readings with a high probability. Therefore, the token needs to collect and process the information of the readings by RW Mode which is slightly different to RWTQ. When a node finds that there is a clear target direction in which the values of the readings always increase, the mode of the token is changed to DW Mode until the value of the readings reach an extreme point where the mode of the token is changed to EP Mode. After EP Mode, the token’s mode becomes L Mode immediately, which can lead the token out of the “mountain” quickly and then becomes RW Mode when the node finds that the value of the readings stops decreasing. If the pedometer count is smaller than a threshold, the mode of the token can switch between these four modes; if the pedometer count is larger than a threshold and the mode of the token is not DW and EP Mode, the token is transmitted to the base station directly; if the pedometer count is larger than a threshold and the mode of the token is DW Mode, the token is transmitted to the base station after the mode of the token changes to L Mode.
Figure 3. The “mountain” the data and DWTQ algorithm.
Figure 3. The “mountain” the data and DWTQ algorithm.
Sensors 15 12273 g003
The four modes, i.e., RW, DW, EP, and L mode, are presented in Section 4.1, Section 4.2, Section 4.3 and Section 4.4, respectively.

4.1. RW Mode

The only different point between RW Mode and RWTQ is that the token has to record the information which would be used to decide its walking direction. In this work, the token records the latest l readings and their locations, called Discover-Information, in RW Mode. The nodes receive a RW-Mode token need to analyze the Discover-Information to check whether there is a clear target direction in which the readings always increase.
Figure 4. The route of a RW Mode token.
Figure 4. The route of a RW Mode token.
Sensors 15 12273 g004
In the example shown in Figure 4, there are 10 records stored in the token and a record which is generated by the node itself. For each record, the first part in the braces is the order number and the second part is the reading value. In Figure 4, there is a clear target direction presented by the arrow in which the readings always increase and, intuitively, the token should walk down in the arrow’s direction. We design the Decide-Direction algorithm to find the clear target direction. Assume that l pieces of records are contained in a token of the form [ Reading i , Location i ] as shown in Table 1, where i = 1 ,   2 ,   ,   l .
Table 1. The Discover-Information contained in the token.
Table 1. The Discover-Information contained in the token.
OrderReadingLocation (x, y)
11(1.5, 3.0)
24(3.0, 3.3)
34(2.8, 1.9)
45(2.3, 0.9)
53(4.3, 0.4)
65(5.8, 1.3)
76(5.4, 2.9)
87(4.3, 4.0)
93(2.2, 4.4)
102(3.7, 5.7)
1110(6.3, 4.7)
An important parameter is n which indicates the number of the nodes that comprise the arrow. The larger of n , the more accurate the target direction. In order to get the arrow, there must be n nodes nearly located on a line which can be indicated by | Corr ( X , Y ) | , where X and Y are the sets of x coordination and y coordination values of the n nodes. Corr ( X , Y ) can be calculated as follows:
Corr ( X , Y ) = Cov ( X , Y ) Var ( X ) Var ( Y )
where Cov ( X , Y ) = E [ ( X E ( X ) ) ( Y E ( Y ) ) ] . As examples, the Corr ( X , Y ) of 1st, 2nd, 8th and 11th records is 0.9888 and that of 6th, 7th, 8th and 10th is −0.9710. If the absolute value of Corr ( X , Y ) beyond a threshold t , we need to fit the locations of these records by the least square methods and get the direction vector v ; as shown in Figure 5. Then, a location ( x , y ) can be mapped to a one-dimensional point xy locates on the fitting result by Equation (5):
xy = ( x , y ) v
As shown in Figure 5, the locations (1.5, 3.0), (3.0, 3.3), (4.3, 4.0), (6.3, 4.7) can be reduced to the responding values 2.46, 3.98, 5.44, 7.57, respectively. Based on the responding value, the locations can be sorted in ascending order, i.e., (1.5, 3.0) < (3.0, 3.3) < (4.3, 4.0) < (6.3, 4.7). If the readings always increase with the sorted locations, the direction of v is where the token should walk down; else if the readings always decrease with the sorted locations, the negative direction is where the token should walk down; otherwise, there is no target direction.
Figure 5. An example of fitting the locations.
Figure 5. An example of fitting the locations.
Sensors 15 12273 g005
Note that, to reduce time complexity of Decide-Direction algorithm, the node has no need to consider all the combinations of n locations and can find all the sets of n 1 locations and add its own location to them to comprise n locations. This is reasonable, because the previous node has checked most of the combinations of n locations. Obviously, if there is no clear target direction, the token continues walking in the RNG of the full graph.
The pseudo-code of Decide-Direction algorithm is shown as follows:
Algorithm 4: Decide-Direction
Input: Discover-Information, i.e., l pieces of records
Output: The direction vector
1) for each n locations
2)  if the covariance coefficient of X and Y don’t beyond t
3)   break
4)  else
5)   fit the locations by least square method and get v
6)   map the locations to a one-dimensional value locating on the direction of fitting result
7)   sort the locations by the value in ascent order
8)   if the readings always increases with the sorted locations
9)   the direction of v is target direction
10)   else if the readings always decreases with the sorted locations
11)   the negative direction of v is target direction
12)  else
13)   there is no clear target direction
14)  end if
15)   end if
16) end for

4.2. DW Mode

When a node receives a RW Mode token and finds that there is a clear target direction, it will first change the token’s mode to DW Mode. Because the direction of v is decided by n pieces of records rather than all the records contained in the token, the redundant records can be deleted. A node that receives a DW Mode token needs to fine tune the target direction based on its own locations and the method is the same to algorithm of Decide-Direction. A big challenge for a node is to decide which neighbor is the best choice to send the token. To get the best result, each node sends the token to one node in the full list of neighbors rather than in that of the RNG-Neighbor and before sending the token, it needs to collect the readings of its neighbors that locate “close” to the direction of v and has a reading with high value.
In this work, when node i choices its neighbor, node j that “close” to the direction of v means that the included angle between v and i j is smaller than a threshold a n g . If several nodes are all “close” to v , the node k with the highest reading R k is chosen as the next hop of the token if R k R i . If there is no node with a reading higher than R i that close to v , send the token to the node in the full list of neighbors with highest reading R m , if R m R i . However, if all the neighbors of i have no readings higher than R i , node i changes the token’s mode to EP Mode.

4.3. EP Mode

When a node receives a token with DW Mode and finds that all the readings of its neighbors are smaller than its own reading, the token will be switched to EP Mode. In EP Mode, the node needs to collect all the readings of its neighbors and update the token based on the readings which is presented in Figure 2. After EP Mode, the token’s mode is switched into L mode immediately.

4.4. L Mode

When a node receives a token with L mode; it realizes that the token should be transmitted to the region that out of the “mountain” of the data. L mode is a reverse mode of DW Mode. The only difference between L mode and DW Mode is that the token walks in the negative direction of the target direction in Section 4.1. When a node finds that there is no neighbor close to v that has a smaller reading than itself; the token is out of the mountain region and the token’s mode will be switched into RW Mode.
As discussed previously, the most important content in this section is how to decide the direction that the token(s) walk down, therefore we called the method DWTQ. In the next section, we evaluate the performance of RWTQ and DWTQ, and compare them with the aggregation-based top- k query approach TAG, filter-based top- k query approaches FILA and EXTOK in transmission cost, query accuracy, energy cost and network lifetime.
Table 2. Parameters and their meanings.
Table 2. Parameters and their meanings.
Domain of the ParametersSymbolMeaning
Query ModelkNumber of readings queried by the BS
Network TopologynNumber of nodes in each row
NTotal number of nodes in the network
dDistance between neighboring nodes
Message Model l i d The size of a sensor identify
l r The size of a sensor reading
l f k The size of a filtering window for the top-k readings
l f n The size of a filtering window for the non-top-k readings
l p The size of a probe message
Energy Cost Model α Electronics energy
β Amplifier energy
q Attenuation coefficient
Dynamics of the Readings R i The i-th reading of the sensors in descending order
f i The filter between the i-th and ( i + 1 ) -th reading
wThe average window width of the readings
Physical Phenomenon Model P m a x The maximum value of physical phenomenon
P m i n The minimum value of physical phenomenon
P i The i-th real value of physical phenomenon in descending order
M i p h y The mean value of the i-th physical phenomenon
V a r i p h y The variance of the i-th physical phenomenon
Measurement Error Model E i The measurement error of i-th reading
M i e r r The mean value of the i-th measurement error
V a r i e r r The variance of the i-th measurement error

5. Theoretical Analysis and Simulation

In this section, we evaluate the performance of RWTQ and DWTQ by both theoretical analysis and simulation. First, in Section 5.1, we discuss how the performances of the filter-based approaches are affected by the size of the network, dynamics of sensors’ readings and decline of the whole readings’ range through a theoretical analysis based on a simple model. We first set up a simple wireless senor network with a square topology and then model the message, energy consumption, readings, physical phenomenon and the measurement error. The performance of filter-based approaches is compared with that of a representative aggregation-based approach TAG [3]. The analysis results are presented in Figure 8, Figure 9, Figure 10 and Figure 11. Through theoretical analysis, we can find that the filter-based approaches are useless in certain situations and it is essential to develop a novel top- k query method. Then, in Section 5.2, Section 5.3, Section 5.4 and Section 5.5, we use the simulator ns-3 [18] (version 3.21) to evaluate the performances of RWTQ and DWTQ. We compare them to TAG, FILA and EXTOK in terms of transmission cost, query accuracy, energy cost and network lifetime. Finally, in Section 5.6, we give a concluding discussion of the simulations. Table 2 is given for users to index the parameters.

5.1. The Failure of Filter-Based Top-k Query Approaches

Various metrics can be employed to evaluate the performance of a top- k query approach and transmission cost is one of the most essential metrics. Therefore, our goal is to analyze the average transmission cost of filter-based approaches with different sizes of a network and the dynamics of the readings. The transmission cost is defined as the total amount of data transmitted in the whole network in a round of a top- k query.
Figure 6. Square-grid topology.
Figure 6. Square-grid topology.
Sensors 15 12273 g006
For analytic tractability, consider a square grid consisting of N nodes and the BS located at the center as shown in Figure 6. For FILA and EXTOK, a TAG routing tree [3] is employed by the nodes to communicate with the BS. In the initial phase of constructing the routing tree, the BS needs to broadcast a message asking the nodes to organize a routing tree. In addition, to improve the robust, the tree needs to be updated periodically. For the sake of convenience, the transmission cost of initializing and updating the routing tree is ignored. At the beginning, both FILA and EXTOK need to collect all the readings from the nodes to set filters and the corresponding transmission cost is also ignored.
Figure 7. Initial distribution of the readings and filters.
Figure 7. Initial distribution of the readings and filters.
Sensors 15 12273 g007
In our analysis, the real value P i of a physical phenomenon for n o d e i is modeled by a normal distribution with parameters M i p h y and V a r i p h y . The parameters M i p h y ,   i = 1 ,   2 , ,   N are assumed to be uniformly distributed on the interval [ P m i n , P m a x ], as shown in upper half of Figure 7. We assume that the initial readings of the sensors equals to the mean values of physical phenomenon, i.e.,
R i = M i p h y = P m a x P m a x P m i n 2 * N × ( 2 i 1 ) ,   i = 1 ,   2 ,   3 ,   ,   N
Based on these readings, the BS calculates the filters based on the method in [1]. A unique filter [ f i 1 , f i ] is designed for the i -th node in the top- k members and all the other nodes share a common filter f k as shown in lower half of Figure 7. In addition, each node has a normal distributed measurement error E i . The reading of i -th node consists of two parts, i.e.,
R i = P i + E i
where P i and E i both are random variable and normal distributed, i.e.,
P i ~ N ( M i p h y ,   V a r i p h y )
E i ~ N ( M i e r r ,   V a r i e r r )
Based on the properties of the normal distribution, we can get that:
R i ~ N ( M i p h y + M i e r r ,   V a r i p h y + V a r i e r r )
When a new query task comes, the reading R i is very likely to change because of two reasons: the changes of P i and affections of the measurement errors E i . Therefore, j o i n events, i.e., the readings of non- top- k members beyond f k , and l e a v e events, i.e., the readings of top- k members become lower than f k , possibly happen. The probability of j o i n event and l e a v e event for the i -th reading is shown as follows:
P i ( j o i n ) = P ( R i > f k ) = 1 F i ( f k ) ,   i > k
P i ( l e a v e ) = P ( R i < f k ) = F i ( f k ) ,   i < k
where F i ( w k ) is the cumulative distribution function of N ( M i p h y + M i e r r ,   M i e r r + V a r i e r r ) and it is presented as follows:
F i ( f k ) = 1 2 π ( V a r i p h y + V a r i e r r ) f k e ( t ( M i p h y + M i e r r ) ) 2 2 ( V a r i p h y + V a r i e r r ) d t
As illustrated in [1,2], the number of j o i n events and l e a v e events can significantly influence the transmission cost. If | l e a v e | | j o i n | , it is not necessary to probe any nodes that are not in the top- k members and the new filters are sent to the relevant nodes rather than all the nodes in the network. However, If | l e a v e | > | j o i n | , to get the top- k readings, all the nodes that are not in the top- k members need to be probed and a new filter is reset for each of them. The probabilities of | l e a v e | | j o i n | and | l e a v e | > | j o i n | are shown as follows:
P ( | leave | | join | ) = i = 0 ,   1 , 2 , k P ( l e a v e = i ) i < j < k P ( j o i n = j )
P ( | l e a v e | > | j o i n | ) = i = 1 , 2 , k P ( l e a v e = i ) j < i P ( j o i n = j )
In most practical applications, the parameter k is much less than N which is the size of the network. We can draw this conclusion from actual observations which are described in [1,2]. Therefore, the transmission cost in the condition of | l e a v e | | j o i n | is also much less than that in the condition of | l e a v e | > | j o i n | . For the sake of convenience, we focus our attention on the transmission cost in the condition of | l e a v e | > | j o i n | and ignore the transmission cost in the condition of | l e a v e | | j o i n | .
In a query, having found that | l e a v e | > | j o i n | , the BS sends a probe message to all the nodes in the network asking them to upload the readings. The transmission cost in this phase is shown as follows:
C 1 = l p * N
where l p is the length of a probe message. Having received the probe message, each node transfers its reading to the BS based on a routing tree (e.g., the TAG Tree). Assume that an aggregation technique is employed to reduce the transmission cost and the transmission cost is:
C 2 = k * ( l i d + l r ) * N
where l i d is the length of a node’s ID and l r is the length of a reading. After the BS calculates the top- k readings, a unique filter is generated for each top- k member and a common filter is generated for all the non-top- k members. Then, the BS injects these filters into the network. First, the unique filters are installed by the top- k members. Then, the common filter is broadcasted in the whole network and all the non- top- k members need to install the new common filter. The transmission cost for the filters of top- k members depends on the locations of the members which is random. In average, the transmission cost is k * n 2 * l f k in the network as shown in Figure 6. Therefore, the transmission cost of updating the filters is:
C 3 = k * n 2 * ( l i d + l f k ) + N * l f c
So the expectation of the total transmission cost for a new query is:
C t o t a l = P ( | l e a v e | > | j o i n | ) * ( C 1 + C 2 + C 3 )
As in Equation (19), C t o t a l is affected by two parts, i.e., P ( | l e a v e | > | j o i n | ) and ( C 1 + C 2 + C 3 ) . However, ( C 1 + C 2 + C 3 ) is constant for a given network. As a result, P ( | l e a v e | > | j o i n | ) is the most important parameter that affect C t o t a l significantly. Based on Equation (15), we can find that P ( | l e a v e | > | j o i n | ) is mainly affected by the probabilities of a node join or leave the top- k members which are affected by the variance of the readings and the distance between the filter f k and the mean of the reading ( M i p h y + M i e r r ). As a result, when the range of the readings [ P m i n , P m a x ] is constant, N , k and the variance of the readings can significantly affect the transmission cost. What’s more, the dynamics of [ P m i n , P m a x ] can affect the performance of filter-based top- k query even more significantly.
In order to give a visual presentation, we instantiate the parameters and then plot the transmission cost in figures. The parameters are set as in Table 3. First, we fix the range [ P m i n , P m a x ] of the readings and present the probability of | leave | > | join | and corresponding transmission cost with different parameters including k , N and V a r i e r r + V a r i p h y in Figure 8, Figure 9 and Figure 10. Then, we assume that the reading of n o d e i decreases m times of w i which is the width of n o d e i ’s filter in a period of query and the simulation results are presented in Figure 11.
Table 3. Instantiation of parameters.
Table 3. Instantiation of parameters.
SymbolValue
k 1, 2, 5, 10
N100, 200, 500, 1000, 2000
l i d , l r , l f n , l p , f i 4 bytes
l f k 8 bytes
P m a x 30 (constant)
Decrease by m times of wi in each period of query, m =   0, 0.1, 0.2, 0.5, 1, 2
P m i n 25 (constant)
Decrease by m times of wi in each period of query, m =0, 0.1, 0.2, 0.5, 1, 2
M i p h y R max R max R min n × ( 2 i 1 )
M i e r r 0
V a r i e r r + V a r i p h y 10 5 , 10 4 , 10 3 , 2.5 × 10 3 , 10 2 , 10 1 , 1
As shown in Figure 8a, with the increase of k , the probability of | l e a v e | > | j o i n | also increases especially when k is small. As a result, the transmission cost increases as plotted in Figure 8b. However, the performance of the filter-based query is always slightly better than that of the aggregation-based query.
As shown in Figure 9, like k , with the increase of N , both P ( | leave | > | join | ) and corresponding transmission cost increase significantly. The performance of the filter-based query is always slightly better than that of the aggregation-based query.
As shown in Figure 10, the transmission cost of an aggregation-based query is independent of the decrease of the readings’ range, i.e., the transmission cost is always constant. The transmission cost of a filter-based query increases with the increase of V a r i e r r + V a r i p h y , however it outperforms the aggregation-based query all the time.
Though the performance of a filter-based query is affected by k , N and V a r i e r r + V a r i p h y , the filter-based query always outperforms an aggregation-based query. Note that, only part of the real transmission cost is presented and the others are ignored. In the following, we present the impact of readings’ range decline on the performance of transmission cost in Figure 11.
Figure 8. P ( | leave | > | join | ) and co.rresponding transmission cost with different k . (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Figure 8. P ( | leave | > | join | ) and co.rresponding transmission cost with different k . (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Sensors 15 12273 g008
Figure 9. P ( | leave | > | join | ) and corresponding transmission cost with different N . (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Figure 9. P ( | leave | > | join | ) and corresponding transmission cost with different N . (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Sensors 15 12273 g009
Figure 10. P ( | leave | > | join | ) and corresponding transmission cost with different V a r i e r r + V a r i p h y     (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Figure 10. P ( | leave | > | join | ) and corresponding transmission cost with different V a r i e r r + V a r i p h y     (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Sensors 15 12273 g010
Figure 11. P ( | leave | > | join | ) and corresponding transmission cost with the decreasing of readings’ range. (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Figure 11. P ( | leave | > | join | ) and corresponding transmission cost with the decreasing of readings’ range. (a) P ( | leave | > | join | ) ; (b) Transmission cost.
Sensors 15 12273 g011
Figure 11 shows that the decrease of the readings’ range has a huge impact on P ( | leave | > | join | ) which is much bigger than the other parameters discussed previously. As shown in Figure 8, Figure 9 and Figure 10, the limit value of P ( | leave | > | join | ) is about 0.5 with the increase of the parameters. However, in Figure 11, the limit value of P ( | leave | > | join | ) is 1. As a result, when m 0.5 , we can find in Figure 11b that the transmission cost of a filter-based query is much larger than that of the aggregation-based query. In this situation, filters in the network are useless and a more efficient top- k query approach is needed.
In conclusion, filter-based top- k query approaches are very sensitive to the size of the networks, dynamics of the sensors’ readings and decline of the whole range of the readings. In some situations, the filters can’t improve the performance of query approaches significantly. What’s more, in some certain situations, the filters are useless and even become the burden of approaches. Therefore, it is very meaningful to design a more efficient top- k query approach.

5.2. Simulation Setup

In our simulation, 500 homogeneous sensor nodes are randomly scattered in a 200 m × 200 m region. For each simulation, to reduce the randomness of the simulation result, we do the same experiment for 10 times and present the average result. The temperatures contained in Intel Berkeley dataset [19] is used to simulate the readings of the sensor nodes. Millions of pieces of recordings, including temperature, humidity, light and voltage, comprise the dataset generated by 54 sensor nodes deployed in the Intel Berkeley Research lab. Figure 12 presents the temperature readings of the No. 1 node from March 1st to 3rd. For each day, we find that the temperatures increase from about 7 o’clock to 14 o’clock, fluctuate from about 14 o’clock to 18 o’clock and decrease from about 18 o’clock to 7 o’clock in the next day. As discussed previously in Section 5.1, the decrease of the readings has a strong effect on the performance of the approaches. Therefore, we can perform an overall evaluation on the top- k query approaches using the dynamics of the readings.
As the number of sensor nodes in the dataset is 54 and it is much smaller than that of our network, we need to design a dispatcher to dispatch the readings to 500 nodes considering the spatial correlation of sensor readings. First, we divide the 500 nodes into five clusters based on algorithm 1 and, for each cluster, select a representation located in the center.
Figure 12. The temperature readings of the No.1 node from March 1st to 3rd.
Figure 12. The temperature readings of the No.1 node from March 1st to 3rd.
Sensors 15 12273 g012
Then, the readings of five nodes in the Intel Berkeley dataset are randomly selected and we extract the readings of each node in a random day. Then the readings of the five nodes are dispatched to the five clusters in our network respectively, i.e., every node’s readings in a day are dispatched to a cluster. In Intel Berkeley dataset, one node generates about 2000 readings in a day and the largest cluster in our network has about 150 nodes. As a result, it is enough that every node in our network can receive 10 readings and, therefore, each experiment can perform the query 10 rounds. Considering the temporal correlation, first, the readings for a node in Intel Berkeley dataset in a day are divided into 10 subsets based the time sequence. Then the number of the nodes in a cluster in our network is calculated and denoted by N i . In each subset, we randomly select N i readings. Intuitively, considering the spatial correlations between the readings, for each cluster, the representation has the highest reading and the other nodes’ readings decrease with the increase of the distance to the representation.
An example of the readings for a round of query is shown in Figure 13. There are five extreme values in the overall network and the spatial correlation is also presented. In our simulation, each sensor node has ten readings in chronological order and each reading corresponding to one query round. The ten readings fluctuate as shown in Figure 14, which is similar to a period of the readings shown in Figure 12 to some extent. Note that the ten rounds rather than one round of top- k query comprise an experiment.
We compare our approaches with TAG, FILA and EXTOK in terms of transmission cost, query accuracy, energy cost and network lifetime. In our simulation, a sensor node identifier and reading both take 4 bytes.
Figure 13. An example of the readings in a query round.
Figure 13. An example of the readings in a query round.
Sensors 15 12273 g013
Figure 14. An example of the readings of a node in a simulation.
Figure 14. An example of the readings of a node in a simulation.
Sensors 15 12273 g014

5.3. Transmission Cost and Query Accuracy

For TAG and EXROK, the query results are the exact top- k readings in the networks, however, the query results of FILA have deviations which are affected by the properties of the network and the queries. The results of RWTQ and DWTQ also can’t be guaranteed to be the exact top- k readings. We define the query accuracy ρ as follows:
ρ = | R e s u l t s T o p k | | T o p k |
where R e s u l t s is the query results of the base station and T o p k is the real top- k readings in the network. In this part, five tokens are injected into the network and we set k = l = 10 , m = 4 , t = 0.7 , a n g = 90 ° . For the different parameter T which controls the walk distance of a token, the transmission cost and query accuracy of RWTQ and DWTQ are significantly different. The simulation results are presented in Figure 15.
Figure 15. Transmission cost and query accuracy.
Figure 15. Transmission cost and query accuracy.
Sensors 15 12273 g015
As the walk steps increase, the transmission cost and query accuracy of both DWTQ and RWTQ increase significantly. As shown in Section 3 and Section 4, the information contained in the tokens of DWTQ is larger than that of RWTQ, therefore, the transmission cost of DWTQ is always larger than that of RWTQ when their walk steps are equal. In addition, for the same walk steps, the query accuracy of DWTQ is much higher than that of RWTQ. However, we focus on the relationship between the transmission cost and the query accuracy. We can find in Figure 15 that when the transmission cost is similar, then the accuracy of DWTQ is much higher than that of RWTQ. As an example, when DWTQ takes 1600 bytes in a round, the average accuracy is about 0.98 and the accuracy of RWTQ is smaller than 0.4. In conclusion, DWTQ outperforms RWTQ in transmission cost when the accuracy is set to be a constant in our simulation environment. In the following simulations, we use DWTQ to compare with the existing approaches.
We now compare the transmission cost between DWTQ, TAG, FILA and EXTOK. In this simulation, each token walks 25 steps in the network. Different with traditional simulation, each experiment contains ten rounds of queries in a day in chronological order. The initial transmission cost for constructing routing trees and installing filters in TAG, FILA and EXTOK are ignored.
As shown in Figure 16, at any time, the transmission cost of TAG and DWTQ is always relatively constant; on the contrary, the performances of FILA and EXTOK are very sensitive to the fluctuation of the temperature. When the temperature increases, the transmission costs of FILA and EXTOK are much smaller than that of TAG; when the temperature decreases, TAG outperforms FILA and EXTOK in transmission cost.
Figure 16. Transmission cost versus different time.
Figure 16. Transmission cost versus different time.
Sensors 15 12273 g016
In most cases, the transmission cost of DWTQ is smaller than that of three other approaches. The reason is that the transmission cost of DWTQ is independent with the fluctuation of the readings and DWTQ makes full use of the spatial correlations between the readings. We should note that DWTQ trade query accuracy for communication overhead though the decreasing of the accuracy is very small in most cases.

5.4. Energy Cost

As in [2], to escape the technology affection, we assume that the unit of energy required for transmission of a single bit, E t x , and we use a parameter, R c , to link transmission and reception cost, E r x , via R c = E r x E t x . In our simulation, R c is assigned values from the set {0.2, 0.4, 0.6, 0.8, 1.0} and the other parameters is the same to that in Section 5.3. The simulation result is shown in Figure 17.
Figure 17. Total energy cost for a node in a day with different R c .
Figure 17. Total energy cost for a node in a day with different R c .
Sensors 15 12273 g017
As the cost of reception increases, the overall energy increases for all the approaches and we can find that the increase of DWTQ is the slowest.

5.5. Network Lifetime

At last, we evaluate the performance with respect to the network lifetime which is defined as the number of rounds before the first node runs out of its energy. The initial energy for each node is set to 10 8 energy units and the network lifetime with different R c is presented in Figure 18.
Figure 18. Network lifetime with different R c .
Figure 18. Network lifetime with different R c .
Sensors 15 12273 g018
As the R c increases, the network lifetime of all the approaches decreases. However, the simulation results reveal that the DWTQ significantly prolongs the lifetime compared with the three other approaches. In particular, when R c = 0.6 , DWTQ can be operated about 120 rounds, i.e., 12 days, which is about 1.5 times the duration of EXTOK and 2 times that of TAG.

5.6. Concluding Discussion of DWTQ

Through a series of simulations, we can find that DWTQ outperforms TAG, FILA and EXTOK in transmission cost, energy cost and network lifetime. This can be explained by the fact that DWTQ makes full use of the spatial correlation of the readings and its performance is robust to the decline of the overall range of the readings. However, DWTQ can’t guarantee the query results are exactly the top- k readings in the network. This is the weakness of DWTQ compared with TAG and EXTOK. Therefore, the users have to choose a proper top- k query approach for different conditions. Obviously, if the users can tolerate some random errors, DWTQ would be the best choice.

6. Conclusions

In WSNs, most of the top- k query approaches employ aggregation or filtration techniques to reduce the transmission cost and save network energy. Often, the filter-based approaches outperform the aggregation-based approach, however, they are too sensitive to the parameters, especially the overall descent of the readings. In addition, the approach based either on aggregation or filtering technique doesn’t consider the spatial correlations of the readings. Leveraging the random and directed walk techniques, two novel top- k query approaches, RWTQ and DWTQ, are proposed. A series of simulations presented in Section 5.2 illustrate that the proposed paradigm DWTQ is very robust against the dynamics of the sensors’ readings and decline of the whole range of the readings. In addition, we find that aggregation-based approaches are very general methods and they have a large traffic; filter-based approaches on the other hand are too sensitive to the temporal characteristics of the readings and have a small traffic when the readings are stable to some degree; DWTQ is very sensitive to the spatial characteristics of the readings and RWTQ is general has a low accuracy. In applications of WSNs, the spatial correlation is very common and, in this condition, DWTQ outperforms other approaches in transmission cost and lifetime of the networks.
As future work, we plan to explore the following topics: (1) whether we can further improve the performance of the proposed approaches based on employing sophisticated optimization methods or not; (2) whether we can reduce the time complexity for the nodes when deciding the walking direction or not; (3) whether we can design a self-adjusting filter to defend against the dynamics of the physical phenomena based on the temporal correlations of the readings or not.

Acknowledgments

This research is supported by National Natural Science Foundation under Grant 61371071, Beijing Natural Science Foundation under Grant 4132057, Beijing Science and Technology Program under Grant Z121100007612003, Academic Discipline and Postgraduate Education Project of Beijing Municipal Commission of Education.

Author Contributions

In this paper, the main idea is proposed by Jun-Song Fu. The algorithms are designed by Jun-Song Fu according to the suggestions of Yun Liu. At last, Yun Liu and Jun-Song Fu conducted the simulation and analysis of the paper together.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, M.; Xu, X.Y.; Tang, X.Y.; Lee, W.C. Top-k Monitoring in Wireless Sensor Networks. IEEE Trans. Knowl. Data Eng. 2007, 19, 962–976. [Google Scholar] [CrossRef]
  2. Malhotra, B.; Nascimento, M.A.; Nikolaidis, I. Exact Top-k Queries in Wireless Sensor Networks. IEEE Trans. Knowl. Data Eng. 2011, 13, 1513–1525. [Google Scholar]
  3. Madden, S.; Franklin, M.J.; Hellerstein, J.M.; Hong, W. TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks. ACM SIGOPS Oper. Syst. Rev. 2002, 36, 131–146. [Google Scholar] [CrossRef]
  4. Olston, C.; Loo, B.T.; Widom, J. Adaptive Precision Setting for Cached Approximate Values. ACM SIGMOD Record. 2001, 30, 355–366. [Google Scholar] [CrossRef]
  5. Brian, B.; Olston, C. Distributed Top-k Monitoring. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA, USA, 9–12 June 2003; pp. 28–39.
  6. Olston, C.; Jing, J.; Jennifer, W. Adaptive Filters for Continuous Queries over Distributed Data Streams. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA, USA, 9–12 June 2003; pp. 563–574.
  7. Xue, W.W.; Luo, Q.; Chen, L.; Liu, Y.H. Contour Map Matching for Event detection in Sensor Networks. In Proceedings of the 2006 ACM SIGMOD International Conference on Management of Dat, Chicago, IL, USA, 27–29 June 2006; pp. 145–156.
  8. Papadimitriou, S.; Anthony, B.; Christos, F. Adaptive, Hands-Off Stream Mining. In Proceedings of the 29th International Conference on Very Large Data Bases, Berlin, Germany, 9–12 September 2003; pp. 560–571.
  9. Cho, Y.H.; Jihoon, S.; Yon, D.C. POT: An Efficient Top-k Monitoring Method for Spatially Correlated Sensor Readings. In Proceedings of the 5th Workshop on Data Management for Sensor Networks, British Columbia, BC, Canada, 9–12 June 2008; pp. 8–13.
  10. Yoon, S.; Cyrus, S. The Clustered AGgregation (CAG) Technique Leveraging Spatial and Temporal Correlations in Wireless Sensor Networks. ACM Trans. Sens. Netw. 2007, 3, 3. [Google Scholar] [CrossRef]
  11. Heinzelman, W.B.; Chandrakasan, A.P.; Balakrishnan, H. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. Wirel. Commun. 2002, 1, 660–670. [Google Scholar] [CrossRef]
  12. Intanagonwiwat, C.; Govindan, R.; Estrin, D. Directed Diffusion: A Scalable and Robust Communication pAradigm for Sensor Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6–11 August 2000; pp. 56–67.
  13. Karp, B.; Kung, H.T. GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6–11 August 2000; pp. 243–254.
  14. IEEE Standards Assicociation. Available online: http://standards.ieee.org/findstds/standard/802.11-1997.html (accessed on 5 April 2015).
  15. Bluetooth Specifications V1. 0. 1999. Available online: http://www.bluetooth.com/ (accessed on 5 April 2015).
  16. Toussaint, G.T. The Relative Neighbourhood Graph of a Finite Planar Set. Pattern Recognit. 1980, 12, 261–268. [Google Scholar] [CrossRef]
  17. Jaromczyk, J.W.; Godfried, T. Toussaint. Relative Neighborhood Graphs and Their Relatives. IEEE Proc. 1992, 80, 1502–1517. [Google Scholar]
  18. The Network Simulator-ns3. Available online: http://www.nsnam.org/ (accessed on 26 January 2014).
  19. Intel Berkeley Data Set. Available online: http://db.csail.mit.edu/labdata/labdata.html/ (accessed on 26 January 2014).

Share and Cite

MDPI and ACS Style

Fu, J.-S.; Liu, Y. Random and Directed Walk-Based Top- Queries in Wireless Sensor Networks. Sensors 2015, 15, 12273-12298. https://doi.org/10.3390/s150612273

AMA Style

Fu J-S, Liu Y. Random and Directed Walk-Based Top- Queries in Wireless Sensor Networks. Sensors. 2015; 15(6):12273-12298. https://doi.org/10.3390/s150612273

Chicago/Turabian Style

Fu, Jun-Song, and Yun Liu. 2015. "Random and Directed Walk-Based Top- Queries in Wireless Sensor Networks" Sensors 15, no. 6: 12273-12298. https://doi.org/10.3390/s150612273

Article Metrics

Back to TopTop