Next Article in Journal
Towards the Development of a Low Cost Airborne Sensing System to Monitor Dust Particles after Blasting at Open-Pit Mine Sites
Previous Article in Journal
Study on Pyroelectric Harvesters with Various Geometry
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Trajectory-Based Coverage Assessment Approach for Universal Sensor Networks

1
Key Laboratory of Advanced Process Control for Light Industry Ministry of Education, College of IOT Engineering, Jiangnan University, Wuxi 214122, China
2
School of Electrical and Electronic Engineering, Newcastle University, Newcastle Upon Tyne NE1 7RU, UK
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(8), 19649-19666; https://doi.org/10.3390/s150819649
Submission received: 8 June 2015 / Revised: 29 July 2015 / Accepted: 6 August 2015 / Published: 11 August 2015
(This article belongs to the Section Sensor Networks)

Abstract

:
To solve the problem of coverage performance assessment, this study proposes an evaluation method based on the trajectory of the target, which is applicable to universal sensor networks, including both heterogeneous and homogeneous sensor networks. Different from the traditional Voronoi algorithm, the proposed Improved Coverage Force Division (ICFD) plans a coverage force division map whichscales the qualitative coverage performancebasedon both covering intensities andlocations of the nodes. Furthermore, the Trajectory-based Evaluating Schedule (TES) is responsible for solving the quantitative coverage evaluationproblem by measuringthe resulting trajectories’ Balance Values (BVs). A model of weak-point ranking conjoined in consideration of coverage force and distance can guide future deployment to compensate coverage. Comparative trials using the greedy algorithm, Voronoi algorithm, and the proposed TES verify that TES achieves the approximate results for two-stage and multistage heterogeneous sensor networks with acceptable difference and lower complexity, and it is superior to the Voronoi algorithm in homogeneous sensor networks interms of breaking the four-point circle block.

1. Introduction

With widespread applications of wireless sensor networks [1], it is well known that nodes perform various tasks, such as detection, process, and communication. Sometimes, more than one job must be assigned to some particular nodes. Thus, nodes hardly have the same abilities [2] when fulfilling tasks. Working conditions affect the abilities of the nodes; consequently, their energy affects perception precision, communication distance, and lifetime. Thus, given the influences of physical and environmental factors, nodes cannot be guaranteed to hold exactly the same properties even if they have the same tasks. These non-uniformnodes constitute a type of universal and remarkablenetwork model, named a heterogeneous sensor network [3,4,5].
Clearly, heterogeneity has become a general phenomenon in sensor networks. Many existing outstanding results [6,7,8,9] based on homogeneous sensor networks have been unable to deal with several challenges caused by heterogeneous sensor networks. Therefore, research on heterogeneous sensor networks is important [3,4,5]. As the basis for quality services, heterogeneous sensor networks also haveproblems with coverage evaluation and improvement, which is just similar to normal homogeneous networks. Users should know whether a given sensor network is qualified for certain tasks. Heterogeneous sensor networks are difficult to distribute evenly [6,7] in such a way that all arbitrary nodes can achieve full coverage without any central guidance. Blind and weak spots frequently occur in the monitoring area, which decrease network service quality.
Therefore, an effective quantitative coverage measure method should be implemented to improve coverage performance and mend weak areas, as well as to provide a comprehensive and accurate evaluation report for the network. As a type of non-uniform network, the heterogeneous sensor network should follow the said method without exception.
Several issues to solve the coverage assessment problem should be considered. Particularly, the questions to be asked are as follows:
(1) How is the quality and the quantity of coverage for universal sensor networks, including homogenous and heterogeneous sensor networks, verified?
(2) How can the overdependence on the whole network information be decreased?
(3) How should future deployment be instructed?
Generally, when coverage performance is assessed, significant attention focuses on the effectiveness of the sensor network standing by the sensor nodes. It is likely that views on the assessment of coverage performance can be changed. If an intruding target is able to easily move through the monitored region, the network is regarded as having inferior coverage quality. Conversely, a network is considered to have better coverage performance if the moving target can be detected with high probability. This new view necessitates a new method to evaluate coverage. As a unique advantage, our study focuses on an intruding moving target of which the moving trajectories are measured through various types of sensor networks to identify the network that has better coverage. To solve the problem, our idea can be described as follows:
Given a region monitored by a certain sensor network, one fixed starting point, one fixed destination, and one virtual movable target, our study identifies the right moving trajectory, where “right” means minimal detected probability, or the shortest length and other requirements based on the applications. Obviously, the moving trajectories should be different from the various networks although with the same starting point and destination. For example, a low detected probability of a trajectory means better coverage performance of the network. Thus, the difference among trajectories can indicate various coverage qualities.
In our coverage study, we focus on the minimal accumulation of detected probability on a trajectory.Besides coverage judgment, the presented trajectory-based method can also be good for intrusion detections to preventnetworks against invasion by means of its prediction of the intruding trajectory, especially forsurveillance in military scenarios [8,9]. Under coverage guidance lighted by our assessment results, the sensor network can better serve for other jobs includingvehicle detection [10,11]. Our research accomplishes several tasks and makes the following contributions:
(1)
Unfreezing the reliant requirement for global network data. This study presents Improved Coverage Force Division (ICFD) to extend the present local Coverage Force Algorithm (simply as CFA) [12] by proposing the coverage force division map on the basis of absolute coordinates. As a qualitative research result, this map can find the weak sensing points (simply called Weak Points or WPs) without a priori knowledge of the overall network topology.
(2)
A novel force overlay model of sensing is defined to calculate the sensing force on WPs received from surrounding heterogeneous or homogenous nodes. All WPs are sorted based on this model. Furthermore, the second deployment will be arranged to promote coverage guided by the sorted array of WPs in the future.
(3)
Finding the network topology with the best coverage performance is a practical problem in more than one network topology. A Trajectory-based Evaluating Schedule (TES) is designed to evaluate the coverage performance quantitatively, which can help users realize the network that can detect targets effectively among many network distributions.
The study is organized as follows. Section 2 investigates related works and beneficial results. Section 3 includes several valuable notions, models, and assumptions. Section 4 proposes ICFD that can scale the qualitative coverage quality for the universal sensor network and TES, which is responsible for solving the quantitative evaluation problem. Section 5 evaluates the proposed model and schemes by extensive simulations. Section 6 concludes the study.

2. Related Works

Numerous research works [13,14,15] have investigated the sensor network coverage performance in terms of various measurement scales, such as point coverage,-coverage [13], coverage holes [14], regional coverage, and target path coverage [15]. Although these methods are effective, most of them must be supported by the overall network information, which is a demanding task and a heavy burden for wireless sensor networks with limited resources.
The Voronoi diagram [15] algorithmwas an indirect assessment of regional coverage performance although its original objective was to solve the best coverage problem. Its theoretical foundation was that the perpendicular bisector of the two nodes was a crossing trajectory with the weakest coverage force. For three adjacent nodes, three perpendicular bisectors met at the center of gravity, which was obviously the Weak Coverage Point (WP) within the node triangle. For n > 3 nodes, perpendicular bisectors and WPs were repeatedly drawn in each node triangle until a Voronoi that has n cells (sub-regions) was built. Figure 1 shows cases with two, three, and more nodes. As shown in Figure 1c, considering that any point within the sub-region is not farther from its base node than the other nodes, they cannot receive less coverage force from its base node than theothers. The judgment, that boundaries of cells are the division lines where coverage forces are weaker than beyond, can be achieved. So, Voronoican apply our trajectory-based idea to evaluate the network performance and will be consideredin the later simulation analysis. However, the algorithm was not strongly recommended because of its limited estimation of coverage quality based on its distribution, whether sparse or not. Moreover, as a type of qualitative evaluation method, the Voronoi algorithm lacked quantitative details and universality. Simultaneously, the Voronoi algorithm wasunavailable for the heterogeneous network and specific topology of a four-point circle (i.e., four points lying on the same circle).
Figure 1. Coverage force division for different uniform nodes. (a) Two nodes; (b) Three nodes; (c) More than three nodes.
Figure 1. Coverage force division for different uniform nodes. (a) Two nodes; (b) Three nodes; (c) More than three nodes.
Sensors 15 19649 g001
Voronoi was employed to detect coverage holes [14] and coverage optimization [16] considering that the vertex of the cell was farthest from the base node. However, these methods could only roughly measure and did not provide sufficient details of the coverage quality.
In addition to computational geometry such as Voronoi, some concepts in algebraic topology, such as complex and homology theory, were also included in coverage assessment. These concepts are good at rapid detection of coverage holes [17,18] and optimization compensation [19]. Furthermore, compared with the rigorous Ĉech complex that has difficulty in satisfying its application conditions, the Rips complex was verified to have a missing rate problem that could be mended in coverage hole detection by adjusting the ratio between the communication radius and the sensing radius [20].
In terms of the exposure path as a scale, [21] designed a method of measurement by monitoring the moving track of an unauthorized accessing target in a given area. The target trajectory measurement opened a new prospect in studying coverage assessment, although its original focus wasto solve the largest detection interval but to evaluate coverage and improve network performance. Subsequently, Amaldi [22] optimized node positions and analyzed the track exposure on the basis of the detected probability for a moving target. In addition, [14] demonstrated a greedy algorithm which divided a region into approximately infinitegrids based on multiple directions. Based on its division graph, an approximate optimal trajectory with minimal exposure could be found.Although its huge computation is not satisfied, its resulting trajectory canbe taken as the criterion to scale the results of other algorithms in simulations that follow.
Noticeably, the aforementioned methods are constrained within uniform sensor networks. The results which are directly pulled into the heterogeneous networks are not sufficient. Moreover, many existing studies were embodied by the hybrid sensor network [23], which meant that only two types of node would be contained. These were two-stage heterogeneous sensor networks with nodes that have strong or weak abilities [24], or were movable or static [4,23,25], or audio or video [26]. For the three-stage heterogeneous network, Wang [27] set three types of heterogeneous nodes based on the three dimensions of the directional sensor to the optimal deployment. Gupta [28] assumed not more than types of nodes and analyzed the redundancy coverage problem for the heterogeneous network. If the type of node in the network was not among the three types, several existing intelligent algorithms usually became the most popular solutions. Li [29] usedsimulated annealing (SA) and differential evolution to discuss optimal coverage for the heterogeneous network. Genetic optimization [30], cloning [31], swarm intelligence [32], and biological inspiration [33] were also applied to heterogeneous network applications. However, the hardware requirements of these approaches in processing and storage far exceeded the node in terms of applications.
To the best of our knowledge, these algorithms have strong requirements in global information. However, a practical desirable algorithm should depend only on a small amount of local information. Thus, effectively evaluating the coverage performance without the support of whole network data is an urgent issue that drives our research.

3. System Model

3.1. Trajectory-Based Idea

Two issues are included in solving the trajectory-based coverage assessment problem. The first issue is how to plan the sensing/coverage force boundaries or the coverage force division, and the second is how to design the right trajectory. The former transforms the huntingzonefrom the infinite plane area into the finite dividing line segment set. The latter is about defining a convenient scale and arranging a schedule to search and assess trajectories.
In terms of the first problem, most of the methods for dividing were inspired by computation geometry, such as the Voronoi algorithm [15,34], greedy algorithm [15,34], and coverage force algorithm (CFA) [12] presented in our early studies, which have been able to partition an area into cells for every node, where all the points can receivemore sensing force from the base node inside than the others outside. These dividing methods fulfill the overall qualitative descriptions for the different kinds of sensor networks. Obviously, these borderlines of adjacent cells are the sensing force boundaries among the nodes. According to the union of all nodes that have sensing capabilities denoting coverage performance, these borderlines were later redefined as coverage force boundaries with no ambiguities.
Given the weights of the boundary segments, understanding that the trajectory problem is the minimal weight route problem is easy. The second problem is solved on the basis of the weighted path table. Many existing and worthwhile routing methods can strongly support our present study. The accumulated weight of the trajectory is a quantitative assessment result.

3.2. Network Model

The n static sensor nodes S = { s i | i = 1 , 2 , , n } tasked to detect the moving target T are distributed randomly and independently in the given 2D plane area Ι 2 . The sensing parameter λ i is identified as the sensing capability of each node s i and Λ = { λ i | i = 1 , 2 , , n } , where λ i > 0 . Assuming that a linear relationship exists between the sensing ability and the sensing radius and r is regarded as one coverageradius unit,the sensing/coverage radius of nodes s i can be mapped into r i = λ i × r .
Nodes, whichare able to probe object independently, are be assumed toobtain their distances and calculatepositions through GPS [23], directional antennas technology [28] or others recommended technologies [16,17,19,20,22,26]. Just like many researches [1,2,3,4,5,6,7,8,9], given the position of T , its Euclidean distance to s i d i s i = d i s ( s i , T ) is regarded as an important adjustment factor in the detection/sensing job. The order-asymptotic sensing model (O-ASM) [35] S e n ( s i , T ) = λ i / d i s i k is used to show nodes’ sensing fluctuation with distanceto T , where integer k is an adjustment parameter for distance, usually k ≥ 2.

3.3. Exposure Model

To measure the quantitative value, the coverage force amount should be calculated during the continuous moving process of the target. According to the concept of exposure [15], the integral formulation from the original temporal space into the special space [34] can be transformed. The resulting line integral helps to achieve an evaluable coverage force amount for the trajectory, which is a critical foundation for comparison of many trajectories in different scenarios.
During the period of ( t b , t b + 1 ) , b Z + , target T moves at a constant speed from position p o s ( t b ) to position p o s ( t b + 1 ) along arbitrary p ( t ) = ( x ( t ) , y ( t ) ) in Ι 2 , here t ( t b , t b + 1 ) , Z + is a positive integer set. If the length of p ( t ) is L = l e n g t h ( p ( t ) ) and the n i node is present to be involved in the detection in subset S i , then s k i S i S . The exposure of p ( t ) can be expressed as follows:
E x p o s u r e ( p ( t ) , S i ) = L k n i S e n ( s k i , T ) d l , k = 1 , 2 , , n i
Equation (1) shows that the updated expression is only concerned with the length of the track. Exposure is used to indicate the weight. Weight of p ( t ) is defined as follows:
W e i g h t ( p ( t ) ) = E x p o s u r e ( p ( t ) , S i )

3.4. Weak Point Queuing

The WP is the position where the sensing resultant force is minimal within a given local sub-region which is outlined by the least amount of nearest nodes and no others inside.
If W P i j k is WP within Δ s i s j s k , its Euclidean distances to s i , s j and s k , respectively are d i s i , d i s j and d i s k , and their sensing parameters are λ i , λ j and λ k . Figure 2 shows a triangle sub-region example. We define W e a k i j k to present the resultant sensing force for position W P i j k , which can be calculatedon the basis of the following Equation:
W e a k i j k = w i λ i d i s i 2 + w j λ j d i s j 2 + w k λ k d i s k 2
where weights w i , w j , and w k must satisfy w i + w j + w k = 1 , 0 w i , w j , w k 1 .
Equation (3) shows that larger W e a k i j k means weaker force. W e a k i j k is inversely proportional to the distances from nearby nodes and directly proportional to the sensing parameters.
Figure 2. WP within one triangle sub-region, here λi > λj > λk.
Figure 2. WP within one triangle sub-region, here λi > λj > λk.
Sensors 15 19649 g002
Of course, the resultant sensing force W e a k i j k includes the influences of these nodes that join to build a sub-region. Other nodes outside the sub-region are ignored in the study because of the essential influence from distance. They are farther than the ones lying on the hull of the triangle sub-region. Depending on the value of W e a k i j k , the sorting queue for all the WPs can be achieved.
If a sub-region is not triangular, Equation (3) should be extended by adding corresponding polymerizations and weights.

3.5. Quantitative Model of Trajectory

It is quite possible that notable cases exist where the trajectory takes an elaborate detour to avoid including larger weighted segments. To control the trajectory length, a new Balance Value (simply as BV) is defined as conjoining both the length and the weight, as shown in the following Equation:
B a l a n c e V a l u e ( p ( t ) , S i ) = η E x p o s u r e ( p ( t ) , S i ) + μ l e n g t h ( p ( t ) )
The balancing coefficients, η and μ are sourced from the different requirements in applications. Theyhave no links to the sensors’ features, but balance the influencing intensities from the exposure and length of trajectory, where 0 η , μ 1 and η + μ = 1 . For example, corresponding todecreasing μ to sacrifice length standard, the value of η is increasedwhich means the detection requirements areenhanced in the assessment process. Without ignoring the various sensing intensities and node distributions, BV can also be defined as the weight for a boundary segment and taken as a scale to measure the network coverage performance. Given the fixed η and μ , greater B a l a n c e V a l u e ( p ( t ) , S i ) indicates better coverage performance. As a commendable virtue, the proposed BV is available for both the uniform homogeneous network and the heterogeneous network.

4. Methodology

In our coverage research, without loss of generality, our study maintains the key idea that all different intensities among heterogeneous nodes are considered various sensing magnitude values [12]. In other words, the details of the differences are unimportant compared with the size of the fluctuation that can affect the sensing abilities (coverage forces) of the nodes.Before introducing our proposed ICFD and TES, one important notion and two rules need to be given, where the Division Point (DP) will be defined for the beginning of coverage division, the Conflict Resolution Rule (CRR) will adjust the locations of DPs and the Supplementary Division Rule (SDR) will extend the division results.

4.1. Dividing Points

The DPs are composed of Splitting Points (SPs) and WPs. The former is depended on two nodes, and the latter is defined by three nodes.
Given O-ASM, k = 2 and two adjacent nodes s i ( x i , y i ) , s j ( x j , y j ) with sensing parameter λ i , λ j , an Equipotential Line (shortly EL) exists where sensing forces sourcing from s i , s j are equal. The EL can be easily calculated by building the equation for required points based on the sensing forces received from s i , s j .
If λ i λ j and λ = λ i / λ j , the EL is an Isopotential Circle (shortened as IC), which has a radius of λ | ( λ + 1 ) / ( λ 1 ) | and a center point ( x c e n t r e , y c e n t r e ) located on the line of s i s j ¯ , where
x c e n t r e = 2 λ ( x j x i ) 1 λ 2 y c e n t r e = 2 λ ( y j y i ) 1 λ 2 + x j y i x i y j x j x i
The IC and s i s j ¯ can meet on point SP S P i j ( x i j S P , y i j S P ) . The location of S P i j can be deduced as shown in the following Equations:
x i j S P = ( x j x i ) / ( λ + 1 ) + x i y i j S P = ( y j y i ) / ( λ + 1 ) + y i
If and only if λ i = λ j , the EL becomes the perpendicular bisector of s i s j ¯ and its SP is the midpoint of s i s j ¯ . For any point beyond the EL, its coverage forces received from the nearer node is larger than the farther one. In other words, the sensing force of SP is smaller than anywhere of s i s j ¯ .
On the basis of the WP definition, the objective function to find W P i j k ( x i j k W P , y i j k W P ) can be constructed based on the given node triangle Δ s i s j s k , as shown in the following Equation:
M i n | λ i d i s j 2 λ j d i s i 2 | + | λ k d i s j 2 λ j d i s k 2 | + | λ i d i s k 2 λ k d i s i 2 | S.T. ( x i j k W P , y i j k W P ) Δ s i s j s k

4.2. The Conflict Resolution Rule and the Supplementary Division Rule

Sometimes, SPs and WPs share the same edge. CRR is presented to adjust their positions. A logical explanation for the coexistence of multiple points is that one SP can be calculated based on one certain edge; However, one or two WPs may be conducted separately by two adjacent triangles that share one edge if one of them is an obtuse triangle.
CRR: If more than one candidate DP (including SPs and WPs) has coexisted on the same edge in one node triangle, the DP with low priority updates its location, and the new location is the same as the one with high priority. The WP is prior to the SP, and a first-come-first-served (FCFS) basis is used for the same priority DP.
In CRR, the WP hasthe higher prioritybecause of the three nodes calculated, which are more than the two nodes required by SP. Figure 3 presents several desirable cases of CRR. Regardless of the location, four DPs are present and they include one WP and three SPs in one node triangle although they might be located on the same position. All these points are defined as the DPs for the basic division phase.
However, in the basic division phase, only the division lines can be drawn in the convex hull of the network. Our study supplies SDR to add several division lines between the neighbor nodes on the boundary of the convex hull for the division to be expanded from the inside hull to the entire monitoring region.
SDR: For every boundary edge on the convex hull, two cases have to be considered. For only one DP (regardless of what SP or WP is) located on it, the division line is directly extended outside. Otherwise, a new division line that is perpendicular to the boundary edge is drawn from these DPs to outside (these DPs lie on the same position). The Figure 4 shows the details of the SDR.
Figure 3. Cases based on CRR where the positions of DPs that share the same edge are updated.
Figure 3. Cases based on CRR where the positions of DPs that share the same edge are updated.
Sensors 15 19649 g003
Figure 4. Extension of segment based on SDR (a) Two boundarynodes in Δ s i s j s k and W P i j k = S P i k ; (b) Two boundary nodes in Δ s i s j s k and W P i j k S P i k ; (c) All three boundary nodes belong to Δ s i s j s k .
Figure 4. Extension of segment based on SDR (a) Two boundarynodes in Δ s i s j s k and W P i j k = S P i k ; (b) Two boundary nodes in Δ s i s j s k and W P i j k S P i k ; (c) All three boundary nodes belong to Δ s i s j s k .
Sensors 15 19649 g004

4.3. Improved Coverage Force Division

Superior to the original CFA [12], the DPs proposed in this study areupdatedusing absolute coordinates. In the obtained division, the division line segments have exhibited that desired feature where the coverage force received from the base node is not less than other nodes. A coverage force division map is generated as follows in Algorithm 1:
Algorithm 1: ICFD
1-1 Initialization: Ι 2 , S , Λ , Starting, Destination, S P = , W P = , and E d g e =
1-2 Δ = Delaunay triangle partition ( S )
1-3 For each Δ s i s j s k in set Δ
1-4 Calculate S P i j , S P j k , S P i k within each pair of adjacent nodes % Using Equation (6)
1-5 Calculate W P i j k within Δ s i s j s k % Using Equation (7)
1-6 ( S P i j , S P j k , S P i k , W P i j k ) = C R R ( S P i j , S P j k , S P i k , W P i j k )
1-7Update S P = S P { S P i j , S P j k , S P i k } and W P = W P { W P i j k }
1-8 Basic Division Phase: Drawing division lines S P i j W P i j k ¯ , S P j k W P i j k ¯ , and S P i k W P i j k ¯
1-9 E d g e = E d g e { S P i j W P i j k ¯ , S P j k W P i j k ¯ , S P i k W P i j k ¯ }
-10 End For
1-11 E d g e = E d g e S D R ( C o n v e x H u l l ( S ) )
1-12 End ICFD
After the initiation phase, Steps 1–4~1–7 calculate, adjust, and accord DPs’ positions, Steps 1–8~1–9 draw division lines for every cell. And then, the extended edges are added into the E d g e set in the last step. These DPs and division lines constitute a coverage force division map.
Our ICFD can partition the region into many cells on the basis of the different coverage forces of the nodes. Unlike the Voronoi algorithm, the ICFD is available for both homogenous and heterogeneous networks.

4.4. Trajectory-Based Evaluating Schedule

Inspired by the idea of trajectory-based coverage assessment, we have planned a TES that can produce a quantitative evaluation result. The flow of this TES can be shown as follows in Algorithm 2:
Algorithm 2: TES
2-1 ( E d g e , S P , W P ) = I C F D ( S , Λ ) % To build coverage force division map
2-2 For each W P i j k in W P
2-3 Calculate W e a k i j k % Using Equation (3)
2-4 End For
2-5 T o p _ W e a k _ P o int = S o r t ( W P )
2-6 E d g e W e i g h t ( E d g e ) % Each division line is weighed based on Equation (2)
2-7 T r a j e c t o r y = P a t h ( E d g e , S P , W P ) % Using minimal weight path algorithm
2-8 B a l a n c e V a l u e ( T r a j e c t o r y , S ) % Using Equation (4)
2-9 End TES
By B a l a n c e V a l u e ( T r a j e c t o r y , S ) , a judgment on which network has better coverage performance among the various network topologies can be obtained. The returned result T o p _ W e a k _ P o int identifies the next optimal position for the second deployment.
Regardless of the network being heterogeneous or homogeneous, TES can finish the evaluation effectively, such that the four nodes lying on one circle are no longer obstacles to the evaluation process. Undoubtedly, the aforementioned methods have exciting merits over Voronoi. Furthermore, our schedule can complete the division and valuation tasks without requiring the total network information because the data of only three adjacent nodes are sufficient to drive our schedule. The in-out correlation between the ICFD and the TEShas been shown in Figure 5.
Figure 5. The in-out correlation between the ICFD and the TES.
Figure 5. The in-out correlation between the ICFD and the TES.
Sensors 15 19649 g005

5. Simulation Result Analysis

In the Matlab platform, our study simulated several scenarios and problems to validate the ICFD and TES. The public parameter settings are n nodes that are randomly distributed in 2D plane monitoring region Ι 2 = 100 × 100 ; the starting point and destination are positioned on the opposite sides outside and the nearest boundary line to enter or exit is selected. The distance parameter is set as k = 2 for sensing model O-ASM. For each node, the sensing force is effective for the entire region and the basic sensing radius is r = 150 > Ι 2 . Ι 2 is the largest spanning distance of the monitoring region. In simulations, the effectivityof trajectory is considered with the same importance as its efficiency. So, η = μ = 0.5 is set for BV assessment. Based on the premise of lossless data characteristics, a new relative error model is redefined as ε = lg ( δ φ 1 ) , where δ is absolute error and φ is standard error, whereas the result of the greedy algorithm is considered as a reference for comparison. Based on the results of the greedy algorithm, ε can be definedand calculated in order to evaluate other algorithms.

5.1. Division, Trajectory and Weak Points

This experiment compares the moving trajectories produced by TES, the greedy algorithm, and Voronoi algorithm, as well as identifies the distribution for WPs. All simulations are repeated in three network scenarios, including homogeneous ( λ i = 1 ), two-stage heterogeneous ( λ i { 1 , 2 } ), and multistage heterogeneous ( λ i [ 1 , 3 ] ). n = 20 sensor nodes in the monitoring region.For fair comparison, Equation (2) is also usedfor weighting in the greedy algorithm and Voronoi algorithm, as in our TES.
The sensing intensity, resulting trajectories, and WPs are shown in these three scenarios. The top 10 of WPs with tabbed order number are marked as rhombus shapes, which indicate a qualitative analysis of coverage performance. Tags P and M are the entry and exit points for the trajectory. The trajectory connects the “Starting” point to P as the same as “Destination” point to M with a straight line because no sensing force is outside the monitoring region. Figure 6a,b shows no results for the Voronoi algorithm because of its limitations. Figure 6c shows Voronoi only in the homogeneous network.
TES tracking trend follows the resulting trajectory of the greedy algorithm with slight differences because the WP, which is one of the smallest sensing force points within the local node triangle, is difficult to match consistently with the one found within the larger region in the greedy algorithm. Similarly, WP has dislocation in the obtuse triangle compared with the Voronoi algorithm because of its barycenter outside the triangle. As a result, all trajectories do not completely coincide even in the homogeneous network.
Compared with the greedy algorithm ( o ( | V e r t e x N u m G r e e d y | 3 ) o ( m 6 ) ), TES shows steady and effective working abilities with lower computation load, where V e r t e x N u m G r e e d y is the number of division points in whole monitoring region, and m isthe dividedamountin each edge of unit grid.For TES, the main computing load is calculation of WP with complex o ( n 3 ) , where n is the sampling pointsnumber inside the node triangle. Compared with Voronoiwhich has working limitations, ICFD is devised for both homogeneous and heterogeneous networks. Although differences cannot be avoided in the ICFD method, these differences are acceptable on the basis of error analysis in the next section.
Figure 6. Comparison of trajectories between TES, greedy algorithm, and Voronoi algorithm. (a) Two-stage heterogeneous network; (b) Multi-stage heterogeneous network; (c) Homogeneous network. Where, tag ( i , λ i ) nearby node means its label and sensing parameter.
Figure 6. Comparison of trajectories between TES, greedy algorithm, and Voronoi algorithm. (a) Two-stage heterogeneous network; (b) Multi-stage heterogeneous network; (c) Homogeneous network. Where, tag ( i , λ i ) nearby node means its label and sensing parameter.
Sensors 15 19649 g006

5.2. Two-Stage Heterogeneous Network Analysis

In this section, the method is tested for its capability to fulfill coverage assessment in a two-stage heterogeneous network and implement several quantitative analyses on exposure, length, and BV. Given a two-stage random heterogeneous network, the numbers of nodes are set as 15, 20, 25, 30, and 35 with random distribution to show the different node densities. λ i is randomly set as 1 or 2. For these five scenarios, the TES and greedy algorithms were independently trialed 30 times, and then all results have been averaged for every scenario.
Figure 7 displays the averagederrors ε for exposure, length, and BV for TES. As a referenced trajectory, the greedy algorithm obviously does not need to shown ε . Because that the Voronoi can only work in homogeneous network, there aren't any results for Voronoiin this simulation and later simulation about multistage heterogeneous network.With varying density, the averaged ε of ICFD can be stably controlled within [−0.14, −0.01] for exposure, within [−0.72, −0.54] for length, and within [−0.69, −0.55] for BV. Their maximum spans are 0.13, 0.18, and 0.14, which show that ICFD has high stability.
Understandably, because of its smaller path table compared with that of the greedy algorithm, TES is almost unable to find the shorter trajectory. Thus, the longer trajectory of TES can likely lead to closer nodes compared with the greedy algorithm. As exposure is sharply influenced by distance and length, exposure sharply increases with lengthening trajectory in TES, which also explains why the length error is less than the exposure error. Of course, these errors are acceptable because the complexity has been greatly reduced from the TES to greedy algorithm, which not only saves substantial computing resources but also provides a utilitarian method to rapidly assess the coverage performance of the heterogeneous network.
Figure 7. Averaged ε analyses for TES in two-stage heterogeneous network.
Figure 7. Averaged ε analyses for TES in two-stage heterogeneous network.
Sensors 15 19649 g007

5.3. Multistage Heterogeneous Network Analysis

Widespread multistage heterogeneous networks are used in applications such as surveillance [8,9,12,26] and vehicle detection [10,11]. In this experiment, each λ i is set randomly in the range of [ 0 , 3 ] . Other settings and experimental procedures are retained. Error analysis of multistage heterogeneous networks is presented in Figure 8.
Fluctuations in TES are not extremely high and their averaged errors vary within the range of [−0.26, −0.07] for exposure, [−0.73,−0.52] for length, and [−0.64, −0.53] for BV. Its effective and stable operating availabilities are suitable for the quantitative coverage assessment of the multistage heterogeneous network. Moreover, the TESrequires only three neighboring nodes for the algorithm to work. Undoubtedly, its localization can serve as a basis for broad applications in the future.
Figure 8. Averaged ε analyses for TES in multistage heterogeneous network.
Figure 8. Averaged ε analyses for TES in multistage heterogeneous network.
Sensors 15 19649 g008

5.4. Homogeneous Network Analysis

Compared with the Voronoi and greedy algorithms, TES is effective for the homogeneous network, as verified in this section. In simulations, the homogeneous network is easily built by setting λ i = 1 . Five scenarios were tested 30 times to achieve the averaged ε . The experimental data are shown in Figure 9.
Figure 9. Averaged ε analyses for homogeneous network.
Figure 9. Averaged ε analyses for homogeneous network.
Sensors 15 19649 g009
Our findings show that TES and Voronoi are not significantly different, which proves that the former can gain results similar to the latter in the homogeneous network. However, existing differences, albeit minimal, must be explained. The different locations of WPs lead to different coverage force divisions even in the same homogeneous network, as mentioned in the preceding section. As shown in Figure 9, the errors should be deemed as an acceptable cost that is offset by desirable values, such as simple, local information requirements and extensive availability.

6. Conclusions

In this paper, we develop a localized coverage force division algorithm, ICFD which can providequalitative assessment for coverage quality in a universal sensor network. Moreover, our study presents a quantitative assessment approach, TES to find better coverage performance from various universal sensor networks. Compared with similar assessment methods, ourapproach can serve not only for homogeneous networks but also for heterogeneous networks besides releasing bounds of a four-point circle; and the lower compute load is more suitable for the sensor network. Based on localized coverage force map and trajectory-based assessment, future worksare oriented to solve the more application problems such as optimal deployment and node resource conservation for universal sensor networks.Undeniably, the research for 2D problems is only the beginning. And, assessment problems in 3D will be an interesting challenge. As a bottleneck, energy efficiency will be brought into the trajectory-based assessment in future research.

Acknowledgments

This authors appreciate the supports from the 11th Batch of Jiangsu “Six Level Talents Peak” Project, No.DZXX-026, the China Scholarship CouncilProject of 2014 National Senior Researcher Fellow and Visiting Scholar (including postdoctoral), the National Natural Science Foundation of China, No.61304264, the Priority Academic Program Development of Jiangsu Higher Education Institutions, the Prospective Joint Research Projects of Jiangsu Province Joint Enterprises, Universities Innovation Fund, No.BY2014023-31. The authors give thanks for help from Yaqin Cao and Shucai Zhu. The authors would like to thank EU to fund the work through FP7 CONHEALTH projectwww.conhealth.eu.

Author Contributions

All the authors gave their contributions for this research, where Ningning Qin designed the ICFD and TES; Xin Zheng completed the simulations and analyzesresulting data; Guiyun Tian provided advice for improving the quality of this work; Ningning Qin wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Karmokar, A.; Anpalagan, A. Green Computing and Communication Techniques for Future Wireless Systems and Networks. IEEE Potentials 2013, 32, 38–42. [Google Scholar] [CrossRef]
  2. Samundiswary, P.; Priyadarshini, P.; Dananjayan, P. Performance evaluation of heterogeneous sensor networks. In Proceedings of the 2009 International Conference on Future Computer and Communication (ICFCC2009), Kuala Lumpur, Malaysia, 3–5 April 2009; pp. 264–267.
  3. Zhu, S.; Chen, C.; Guang, X. Distributed optimal consensus filter for target tracking in heterogeneous sensor networks. IEEE Trans. Cybern. 2013, 43, 806–811. [Google Scholar] [CrossRef] [PubMed]
  4. Wang, X.; Han, S.; Wu, Y.; Wang, X. Coverage and Energy Consumption Control in Mobile Heterogeneous Wireless Sensor Networks. IEEE Trans. Autom. Control 2013, 4, 975–988. [Google Scholar] [CrossRef]
  5. Tsai, R.G.; Kuo, H.C.; Wang, H.L.; Huang, Y.M. Target coverage QoS control with multiple sensing units in wireless heterogeneous sensor networks. In Proceedings of the Sixth International Conference on Sensing Technology (ICST’2012), Kolkata, India, 18–21 December 2012; pp. 428–433.
  6. Wang, X.; Chen, J. Wireless Sensor Network Node Cover Iterative. Comput. Simul. 2013, 4, 204–207. [Google Scholar]
  7. Song, M.; Yang, L. Improving coverage of wireless sensor network using enhanced adaptive PSO algorithm. Appl. Res. Comput. 2013, 30, 3472–3475. [Google Scholar]
  8. Vana, J.; Michele, M.; Davide, B.; Vedran, B.; Benini, L. Benefits of Wake-Up Radio in Energy-Efficient Multimodal Surveillance Wireless Sensor Network. IEEE Sens. J. 2014, 14, 3210–3220. [Google Scholar]
  9. Anis, K.; Khelil, A. Cooperative Robots and Sensor Networks; Springer Heidelberg: Berlin, Germany, 2015. [Google Scholar]
  10. Borstell, H.; Kluth, J.; Jaeschke, M.; Plate, C.; Gebert, B.; Richter, K. Pallet monitoring system based on a heterogeneoussensor network for transparent warehouse processes. In Proceedings of the Sensor Data Fusion: Trends, Solutions, Applications (SDF), Bonn, Germany, 8–10 October 2014; pp. 1–6.
  11. Tolga, Z.; Hwa, C. Delay tolerant network for autonomous robotic vehicle charging and hazarddetection. In Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), Taiyuan, China, 4–6 June 2014; pp. 1–7.
  12. Qin, N.; Zhang, L.; Xu, B. The Coverage force algorithm for heterogeneous wireless sensor networks. J. Electron. Inf. Technol. 2010, 32, 189–194. [Google Scholar] [CrossRef]
  13. Du, X.; Lin, F. Maintaining differentiated coverage in heterogeneous sensor networks. EURASIP J. Wirel. Commun. Netw. 2005, 4, 565–572. [Google Scholar] [CrossRef]
  14. Babaie, S.; Pirahesh, S.S. Hole detection for increasing coverage in wireless sensor networks using triangular structure. Int. J. Comput. Sci. Issues 2012, 1, 213–218. [Google Scholar]
  15. Meguerdichian, S.; Koushanfar, F.; Qu, G.; Potkonjak, M. Exposure in wireless ad hoc sensor networks. In Proceedings of the ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking, Rome, Italy, 16–21 July 2001; pp. 139–150.
  16. Mahboubi, H.; Moezzi, K.; Aghdam, A.G.; Sayrafian-Pour, K. Self-deployment algorithms for field coverage in a network of nonidentical mobile sensors: Vertex-based approach. In Proceedings of the 2011 American Control Conferenceon O’Farrell Street, San Francisco, CA, USA, 29 June–1 July 2011; pp. 1–6.
  17. Kanno, J.; Buchart, J.G.; Selmic, R.R.; Phoha, V. Detecting coverage holes in wireless sensor networks. In Proceedings of the 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece, 24–26 June 2009; pp. 452–457.
  18. Ghrist, R.; Muhammad, A. Coverage and hole-detection in sensor networks via homology. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN’05), LosAngeles, CA, USA, 25–27 April 2005; pp. 254–260.
  19. Yan, F.; Martins, P.; Decreusefond, L. Connectivity-based distributed coverage hole detection in wireless sensor networks. In Proceedings of the IEEE Global Telecommunications Conference, Paris, France, 5–9 December 2011; pp. 1–6.
  20. Yan, F.; Martins, P.; Decreusefond, L. Accuracy of homology based approaches for coverage hole detection in wireless sensor networks. In Proceedings of the IEEE International Conference on Communications, Ottawa, ON, Canada, 10–15 June 2012; pp. 497–502.
  21. Deng, K.B.; Liu, Z. Minimum path exposure and detection interval setting for target detection using wireless sensor network. Int. J. Wirel. Inf. Netw. 2007, 14, 289–294. [Google Scholar] [CrossRef]
  22. Amaldi, E.; Capone, A.; Cesana, M.; Filippini, I. Design of wireless sensor networks for mobile target detection. IEEE/ACM Trans. Netw. 2012, 20, 784–797. [Google Scholar] [CrossRef]
  23. Dung, T.N.; Nam, P.N.; My, T.T.; Abdelsalam, H. An optimal algorithm for coverage hole healing in hybrid sensor networks. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, Turkey, 4–8 July 2011; pp. 494–499.
  24. Lee, J.; Krishnamachari, B.; Kuo, C. Impact of heterogeneous deployment on lifetime sensing coverage in sensor networks. In Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, USA, 4–7 October 2004; pp. 367–376.
  25. Liu, B.; Dousse, O.; Nain, P.; Towsley, D. Dynamic coverage of mobile sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 301–311. [Google Scholar] [CrossRef]
  26. Kushwaha, M. Feature-Level Information Fusion Methods for Urban Surveillance Using Heterogeneous Sensor Networks. Ph.D. Thesis, Vanderbilt University, Nashville, Tennessee, 2010. [Google Scholar]
  27. Wang, L.; Xu, Z.; Wu, X.; Cheng, H. Optimal Deployment Scheme in Sensing-heterogeneous Wireless Sensor Networks. J. Nanjing Univ. Sci. Technol. 2012, 3, 408–413. [Google Scholar]
  28. Gupta, H.P.; Rao, S.V.; Venkatesh, T. Analysis of the redundancy in coverage of a heterogeneous wireless sensor network. In Proceedings of the 2013 IEEE International Conference on Communciation, Budapest, Hungary, 9–13 June 2013; pp. 1904–1909.
  29. Li, M. Study on Coverage Algorithms for Heterogeneous Wireless Sensor Network. Ph.D. Thesis, Chongqing University, Chongqing, China, 2011. [Google Scholar]
  30. Abdusy, S.; Imee, B.; Abedlhafid, A.; Lhassane, I.; Riri, F.; Pascal, L. Evolutionary multi-objective based approach for wireless sensor network deployment. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, Australia, 10–14 June 2014; pp. 1831–1836.
  31. Jiang, C.; Wang, H.; Chen, L.; Shi, J. A Novel Security Algorithm Based on Biological Immune Principles in Wireless Sensor Networks. J. Jilin Univ. (Science Edition) 2012, 6, 1204–1208. [Google Scholar]
  32. Lee, J.W.; Lee, J.J. Ant-colony-based scheduling algorithm for energy efficient coverage of WSN. IEEE Sens. J. 2012, 12, 3036–3046. [Google Scholar] [CrossRef]
  33. Miao, L.; Qi, H.; Wang, F. Biologically inspiredself deployable heterogeneous mobile sensor networks. In Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2005), Knoxville, TN, USA, 2–6 August 2005; pp. 2363–2368.
  34. Qin, N.; Zhang, L.; Shan, X.; Xu, B. Locomotion trajectory with cooperative metrics in wireless sensor networks. J. China Univ. Posts. Commun. 2007, 12, 64–68. [Google Scholar] [CrossRef]
  35. Qin, N.; Jiang, M.; Xiong, W.; Xu, B. Comparison between the node sensing models and the relative works in wireless sensor networks. Appl. Res. Comput. 2010, 27, 3080–3083. [Google Scholar]

Share and Cite

MDPI and ACS Style

Qin, N.; Zheng, X.; Tian, G. A Trajectory-Based Coverage Assessment Approach for Universal Sensor Networks. Sensors 2015, 15, 19649-19666. https://doi.org/10.3390/s150819649

AMA Style

Qin N, Zheng X, Tian G. A Trajectory-Based Coverage Assessment Approach for Universal Sensor Networks. Sensors. 2015; 15(8):19649-19666. https://doi.org/10.3390/s150819649

Chicago/Turabian Style

Qin, Ningning, Xin Zheng, and Guiyun Tian. 2015. "A Trajectory-Based Coverage Assessment Approach for Universal Sensor Networks" Sensors 15, no. 8: 19649-19666. https://doi.org/10.3390/s150819649

Article Metrics

Back to TopTop