Next Article in Journal
Hot Anchors: A Heuristic Anchors Sampling Method in RCNN-Based Object Detection
Previous Article in Journal
Mutually Coupled Time-to-Digital Converters (TDCs) for Direct Time-of-Flight (dTOF) Image Sensors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Value of Information Based Data Retrieval in UWSNs

1
Department of Electrical Engineering and Computer Science, University of Central Florida, Orlando, FL 32816, USA
2
Department of Electrical Engineering and Computer Science, University of Engineering & Technology Lahore, Punjab 54890, Pakistan
*
Authors to whom correspondence should be addressed.
Sensors 2018, 18(10), 3414; https://doi.org/10.3390/s18103414
Submission received: 24 August 2018 / Revised: 4 October 2018 / Accepted: 8 October 2018 / Published: 11 October 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
Sensor nodes in underwater sensor networks may acquire data at a higher rate than their ability to communicate over underwater acoustic channels. Autonomous underwater vehicles may mitigate this mismatch by offloading high volumes of data from the sensor nodes and ferrying them to the sink. Such a mode of data transfer results in high latency. Occasionally, these networks need to report high priority events such as catastrophes or intrusions. In such a scenario the expectation is to have a minimal end-to-end delay for event reporting. Considering this, underwater vehicles should schedule their visits to the sensor nodes in a manner that aids efficient reporting of high-priority events. We propose the use of the Value of Information metric in order to improve the reporting of events in an underwater sensor network. The proposed approach classifies the recorded data in terms of its value and priority. The classified data is transmitted using a combination of acoustic and optical channels. We perform experiments with a binary event model, i.e., we classify the events into high-priority and low-priority events. We explore a couple of different path planning strategies for the autonomous underwater vehicle. Our results show that scheduling visits to sensor nodes, based on algorithms that address the value of information, improves the timely reporting of high priority data and enables the accumulation of larger value of information.

1. Introduction

Monitoring in underwater sensor networks (UWSNs) has emerged as a subject of active research with applications such as maritime security operations, infrastructure surveillance and maintenance, sea-life monitoring and sea pollutant and contaminant measurements [1,2]. Routing techniques in UWSNs differ from traditional sensor networks [1,2]. The physical deployment and maintenance of the nodes are difficult and underwater sensing abilities can be hindered by cloudy water and debris. Radio waves travel only very short distances under water. This is because water tends to absorb a large part of the electromagnetic spectrum. This limitation can be mitigated by using an acoustic communication medium. Acoustic signals can travel long distances underwater but they have relatively high latency and low bandwidth. Such bandwidth maybe sufficient for transmitting compressed data [3] but is not appropriate for large volumes of data such as video recordings.
As an alternative, the research community has proposed the use of mobile sinks to gather and offload the data in wireless multimedia networks [4,5]. In the case of UWSNs, an autonomous underwater vehicle (AUV) can be used as a mobile sink [6,7,8,9,10]. In such a scenario, the acoustic channel can be used for transmitting messages such as signaling information [11]. While an optical communication channel can be used to offload large quantities of data from the sensor nodes to AUVs which are in close proximity [11].
An important issue for offloading data from sensor nodes using AUVs is the path planning for the AUV, i.e., the sequence in which the AUV visits the nodes for data offloading. An efficiently planned path can reduce the overall data delivery latency and increase the information accumulated over a set period of time. The visitation sequence also determines the order of priority in which emergency reporting nodes are catered to. Let us assume that there is a surveillance or monitoring application that must report a significant event on an urgent basis. In a traditional sensor network, the information can be sent to the sink node instantaneously by initiating a data transfer from either the sink or the source nodes. However, for UWSNs with mobile sinks, the sensor nodes must signal the event to a remote agent that controls the AUV. The AUV must travel to the required node for data collection. The tour time of an AUV depends upon the speed of the AUV and the weather and oceanic conditions. The timing of delivery of data from the sensor nodes to the sink is determined by the schedule of resurfacing, diving and node visitation. Therefore, the time taken to report the information about an event depends upon the choices made by the path planning algorithm for the AUV. Figure 1 describes a generalized example of such a monitoring application where an AUV has been deployed to retrieve data from the underwater sensor nodes.
In this paper, we extend our work regarding the use of the value of information (VoI) in UWSNs [12]. We employ VoI in a similar spirit to as it has been described in [13,14,15]. We argue the advantage of employing VoI in UWSNs through an example. We propose the use of VoI functions, which we have named as Infotentials. Infotentials are monotonically decreasing functions that model the temporal depreciation of VoI. Drawing from intuition based on these functions, we develop heuristics that are to be used for the AUV path planning. We formulate five different path planning algorithms for the AUVs for data collection purposes. In the end, we provide a detailed comparative analysis of the path planners for VoI maximization.
This paper has been organized in the following manner. Section 2 provides a literature survey of the usage of mobile sink nodes in underwater sensor networks, routing schemes involved in path planning and previous research work involving VoI. In Section 3.1 we introduce the concept of VoI for our scenario. Section 3.3 describes the UWSN setting that we are considering for our theory and experiments. Section 3.4 formulates the AUV path planning problem for the given UWSN setting. Section 4 outlines the path planning algorithms. Section 5.2 describes the setup of our simulation experiments. The results and conclusion are discussed in Section 5.3 and Section 6 respectively.

2. Related Work

2.1. Relationship between QoS, QoI, VoI and Routing

The over-arching goal of this article is to improve the QoI (quality of information) that can be obtained from a UWSN. In terms of the performance objectives, QoI is to sensor networks what QoS (quality of service) is to conventional computer and wireless networks [13,14,15]; although, technically speaking, in terms of implementation, QoI is built upon a QoS layer in sensor networks [16,17]. It is shown in [13,15] that the construct of QoI is intrinsically related to VoI, therefore, we use VoI for path planning purposes so as to improve QoI garnered from the system. Design of good routing algorithms is one of the fundamental aspects that dictates QoS and QoI in conventional networks [18], sensor networks [17,19,20,21,22] and networks with mobile elements [23,24]. Routing in networks is tailored to meet certain application-level or operational objectives. With the advent of IoT [25] and Fog-computing [26] paradigms, there continues to remain a keen interest in the development of routing algorithms to meet the new emergent objectives and constraints [27,28]. In this article, we employ a mobile sink (AUV) as part of the routing effort to deliver a better measure of VoI and hence QoI.

2.2. Some Applications of IQ and VoI in Sensor Networks

IQ (information quality) aware routing schemes make data routing decisions based on the threshold of information required by application or mission objectives [29,30,31]. The data is fused en-route to the sink node and routed on paths which can potentially satisfy the aggregated IQ threshold or constraints. Data is kept fusing incrementally on each next forwarding node until it reaches the IQ threshold. When the threshold is met, the information is sent to the main fusion center or sink node.
We use VoI in an event driven context. An event-based information quality aware routing (IQAR) has been proposed in [32]. The unique aspect about IQAR is its use of event-based data fusion, whereas, in the previous IQ aware routing algorithms, the fusion process would be initiated from the fusion centers. In the initial phase of the IQAR method, an aggregation tree is constructed that spans the whole network. In the case of an event, the sensors in vicinity forward the data using the preexisting links as established during the tree initialization. After data reaches the fusion center, the network uses a greedy approach to prune the initial tree in order to maximize the information retrieved and to minimize the energy consumption of the nodes on the data forwarding links.
One of the applications where IQ and VoI have been used in sensor networks is for tracking [30,33]. In [33] a VoI-based approach has been proposed for intruder tracking objectives. The sensor network, based on predictive measures centered around VoI, makes data routing decisions in the network for more efficient target tracking. The network is able to prioritize among high and low-value targets. Tracking a higher value target should result in a higher amount of VoI accumulated. In [34], the authors further proposed IVE which is an improved version of the VoI-based intruder tracking system. The network is able to control the demand of data packets while balancing trade-offs between network energy consumption and required VoI.
Concepts of quality and utility have been frequently applied to a variety of scheduling activities in sensor networks. Some examples of scheduling algorithms and protocols, which employ concepts of quality based on priority and utility metrics, are [35,36,37,38,39,40,41].

2.3. Using Mobile Sinks in Underwater Sensor Networks

Mobile sinks have been used as data mules in both sensor networks [5,42,43,44,45] and UWSNs [2,4,6,7,10]. Mobile sinks in UWSNs have been used in the form of AUVs [6,7] as well as dolphins [46]. In [46] it has been proposed to use a DDD (delay-tolerant data dolphin) to harvest the data from sensor nodes in the region of interest. The data collection event can be triggered by both the DDD or the sensor node. The DDD uses a bi-directional acoustic communication medium. As the movement of DDDs is random, therefore, there is a randomness associated with the event data collection, and this inhibits optimal performance.
VoI-based transmission scheduling of sensor nodes via acoustic links to the sink has been explored in [47]. While VoI-based path planning of an AUV to collect data from sensor nodes has also been explored in [12,48,49,50].

2.4. AUV Path Planning

Path planning is a diverse subject and there is a lot of literature on it specifically in the artificial intelligence community [51,52]. In terms of route discovery, a path planner is an algorithm that provides a sequence of steps which give a valid route between two points on a map (usually represented by a graph or a grid). Among the sub-goals or constraints of path planners are to find the most optimal route in terms of shortest distance, minimal time, optimal fuel expenditure, and so on. They essentially convert a set of high-level goal specifications into a sequence of low-level instructions, thus breaking down the problem solution into simpler steps.
Depending upon the nature of the environment, path planners can be static or dynamic based on how the information is being updated. Path planners, therefore, can also be classified as pre-computing algorithms or reactive algorithms [52]. If the path is planned before the mobile agent starts the course then the algorithm is pre-computing, while if the plan is updated during the course, in reaction to changes in objectives, constraints or new obstacles, then the algorithm is deemed reactive. Maps represented by graphs are usually solved by planners that are variants of Dijkstra’s Algorithm. One of the well-known variants is A path planning which uses admissible heuristics to accelerate the path planning. The path planned in [12] can be seen as a two-tiered approach; the higher level algorithms, such LPP or GPP, determine the sequence of node visitation on the map, while A provides the detailed sequence of steps required to travel from a source to a destination node.
AUVs are autonomous devices and hence require path planning techniques to help them navigate beneath seas and oceans. In terms of navigation, they have certain issues that hamper them more as compared to dry-land autonomous agents, which include communication limitations, limited sensing, and power issues. AUV path planning has been around for a while now. One of the earlier path planning techniques used for AUVs is case-based reasoning [53]. One of the first efforts to use A for path planning for AUVs is in [54]. F M is developed in [55] which gives a continuous path based on a discrete representation of the environment and also takes water currents into account. The path planning approach in [56] uses methods based on potential field strategies. This approach has been further improved on in [57]. Genetic Algorithms [58,59,60] and evolutionary algorithms [61] have also been employed for AUV path planning. Path planning for data mules has also been explored from the perspective of sensor networks in [44,45]. We have proposed path planning techniques for AUVs in UWSNs [12,49,50].

3. Value of Information in Underwater Sensor Networks

3.1. Value of Information

Assume there is a situation of interest that is being monitored so that it can be kept under control. Information is knowledge that helps in developing and updating a model of such a situation. It is based on this model that certain steps are taken to keep the situation in check. Value of Information (VoI) is the valuation of an information segment that is relevant to and can be added to this model.
Consider a marine environment that is being monitored by an underwater sensor network for reporting any catastrophic event. An example could be an offshore oil-rig and pipeline system that is under surveillance for events such as potential oil spills. The sensor nodes have video cameras which record information that can be processed to ascertain aging, rust, accidental damage or oil leaks. The higher the increase in the risk of an oil spill, as concluded from a model after adding an information segment, proportional is the increase in valuation of the information segment that leads to that conclusion.
From the perspective of multi-agent systems, VoI is the price a player would pay to acquire a piece of information in a game theoretic setting. This description is consistent with the usage of the term VoI in [62,63,64,65].
To have a more abstract view, let us consider a classic control theory scenario where, based on feedback, an agent has a certain degree of observability and controllability over a system. In other words, the agent can take specific actions in response to various observations so as to bring the state of the system to a rather more desirable one. The actions taken are such that some measure of fiscal profit or loss is incurred. These profits or losses are assessed from the current and future states of the system. The observations are part of the information based on which the future discourse of steps is decided by the agent. Therefore, information is a data report that can aid in building a more accurate model of a system such that the newer model aids in alleviating e.g., fiscal consequences.

3.2. Temporality of VoI; Infotentials

Infotential is a term that we have coined for information potential. By potential we imply the potential of impact an event has on an asset, and therefore, the report of such an event can be deemed to have a certain information potential. Infotentials are functions that encode the variability of VoI. VoI of a report is subject to various factors such as the valuation of the asset being reported; the impact of the event being reported on the asset; timeliness of the report; reliability, precision, and accuracy of the report; and the fact that whether this report is a repetition or not. Asset valuation dictates VoI but as there is a temporal dynamism to this valuation, therefore, VoI should correlate with this variability across time. We quote two factors that result in asset valuation decay; the first is that assets naturally depreciate with time; the other is that events of catastrophic nature can result in a sharper decline in the valuation of an asset. As both these fiscal attributes are decaying in nature, therefore, VoI should be a monotonically decreasing function.
In the context of this paper, we define a function that encodes the temporal variability of VoI. We consider this variability to be monotonically decreasing in time and assume that at any point in time the valuation of the asset does not increase due to any other factors. These functions can be designed in a variety of different ways so as to fit the needs of an application scenario. We model depreciation with a decaying exponential so as to maintain generality. Otherwise, functions such as descending staircases or any other complex combination of exponentials can also be used. Ideally, the function should be constructed based on practical statistical data.
In this study, we employ exponential functions of the form
υ ( t ) = A e B ( t τ o )
Examples of the infotential υ ( t ) are shown in Figure 2a. The parameters that control the function are A and B and τ o . The parameter τ o is the time at which the event is reported. Parameters A and B scale the VoI across the domain and range of the function. Parameter A represents the valuation of information at t = τ o while parameter B represents the decay in information valuation A for t > τ o , i.e., after the onset of the event being reported at τ o . The two exponential functions in Figure 2a could be understood as representing two different classes of information in an application scenario. The more the valuation of an asset is, the higher the number A would be. Likewise, the higher the B value is, greater is the rate of damage to an asset.
Let there be two events E H and E L with significance and damage rate { S H , D H } and { S L , D L } respectively. The subscript H corresponds to a high-priority event while the subscript L indicates a low-priority event. We denote the corresponding VoI functions as,
υ H ( t ) = A H e B H ( t τ o H )
υ L ( t ) = A L e B L ( t τ o L )
The relationship between significance and valuation, and between damage rate and decay, is given as,
S H > S L A H > A L
D H > D L B H > B L
These inequalities are general guidelines. The actual values of parameters A x and B x need to be configured with the help of a system expert or should be based on statistical data.

3.3. UWSN Deployment Scenario

We consider a UWSN that has been deployed for monitoring the sea and its surface from below. This UWSN records video data. We assume that the UWSN has been deployed to monitor disasters such as oil spills and leaks from vessels or pipelines. Sensor nodes in the UWSN have the ability to detect and classify such disasters. Therefore, we have two classes of information reported; one is normal routine data while the other is data pertaining to disasters. Both classes of information are mapped to separate infotentials. The information for high-priority events such as oil leaks is mapped to the function υ H ( t ) while normal routine information is classified as low-priority and is mapped to υ L ( t ) . The UWSN considered in our simulation study is illustrated in Figure 1. We assume a UWSN with n sensor nodes
S = { s 1 , s 2 , , s i , , s n }
These nodes are equipped with sensors that collect high-quality video data which makes their transmission over acoustic channels unfeasible. An AUV is deployed to gather data from these sensor nodes. The sensor nodes have acoustic communication modules for long distance communication such as transmitting signaling and configuration messages while optical communication modules are used for short distance transmissions such as offloading the data from the sensor nodes to the AUVs. The sensor nodes have the ability to classify data into q different information classes
C = { c 1 , c 2 , , c p , , c q }
Each information class is characterized by a unique infotential. The VoI functions that we use, as discussed earlier, are of the form
υ ( t ) = A e B ( t τ o )
In this case, the infotentials for the high-priority and low-priority information classes are as follows respectively
υ H ( t ) = A H e B H ( t τ o H )
υ L ( t ) = A L e B L ( t τ o L )
The sensor nodes process and save the data in the form of data reports. After time t the i t h sensor node has k data reports
D i = { d i 1 , d i 2 , , d i j , , d i k }
Data reports are mapped to specific information classes such that the mapping is surjective. This means that a classification function α (a computational procedure in the sensor node) may assign more than one data report to the same information class
α : D C
In terms of the ith sensor node and jth data report, the infotentials are denoted with subscripts as
υ i j ( t ) = A i j e B i j ( t τ i j )
The information class identity is stored in a tag associated with each data report. This tag contains the necessary information required to reconstruct the infotential at the remote user’s end. The tag in our case is completely characterized by constants A, B and time stamp τ o where τ o is the time at which the data report was recorded by the sensor node. A tag is a 3-tuple entity. The tag for the jth data report at the ith sensor node is
λ i j = ( A i j , B i j , τ o i j )
Because the data reports are large in size, therefore, it is not possible to transmit them over the acoustic channel as stated earlier. The acoustic channel will be used for broadcasting the λ i j tags residing at a sensor node. The tags will be transmitted to a sink node. On the other hand, the optical channel will be used for transmitting the actual data reports to the AUV during its tour. The packets transmitted over the acoustic communication channel by the ith sensor node are composed of the payload λ i j (the VoI tag) and δ i j (protocol, header information etc.). These packets are intended for delivery to a remote agent (sink node) and on the basis of this data, i.e., λ i j the sink node will plan a schedule of node visitation for the AUV. The packets are
Γ i A c o u s t i c = { ( λ i j , δ i j ) 1 , , ( λ i j , δ i j ) x }
The packets transmitted over the optical communication channel by the ith sensor node are composed of the d i j (the data report), λ i j (the VoI tag) and δ i j (protocol, header information etc.). These packets have the actual recorded data of the events. The data is offloaded from the sensor nodes onto the AUV through this optical channel. The packets are
Γ i O p t i c a l = { ( d i j , λ i j , δ i j ) 1 , , ( d i j , λ i j , δ i j ) y }
As soon as the data is received and processed at the remote user’s end, another timestamp τ f i j is assigned to the data report which helps in determining its current VoI from the infotential. This substitution yields:
υ i j = A i j e B i j ( τ f i j τ o i j )

3.4. Problem Definition

The goal is to extract the maximum amount of VoI so as to minimize system and asset losses. To maximize the VoI retrieved, the path planners will need to determine a route that is efficient in terms of accumulating VoI from the system.

3.4.1. VoI Maximization

We use the problem definition from our previous work in [50]. It is the same problem definition that has been used in [12,49] implicitly and [50] explicitly. The subtle difference, however, lies in the way the final time-stamp τ f is determined. The VoI for a data report that is ready to be transmitted to the sink node is given as
υ i j = A i j e B i j ( τ f i j τ o i j )
The aggregated VoI as retrieved from the i t h sensor node is the combined VoI of all data reports residing on the sensor node and is given as
Υ i ( t ) = j = 1 k A i j e B i j ( t τ o i j )
Similarly, the total VoI accumulated from the UWSN by the AUV, after it has visited all the sensor nodes based on a planned tour, can be calculated as
Υ A c c ( t ) = i = 1 n Υ i ( t ) = i = 1 n j = 1 k A i j e B i j ( t τ o i j )
Therefore, the goal of maximizing VoI is defined as
max i = 1 n j = 1 k A i j e B i j ( t τ o i j )

3.4.2. Role of τ f in Infotentials

The time-stamp τ f determines the VoI extracted from an information segment based on its infotential. Therefore, VoI of a data report varies according to the time instant at which the information is gathered by an end-processing agent. In the given UWSN scenario, we have two different final time-stamp τ f definitions. The definitions are based on who the end-processing agent is; the one who is responsible for triggering an actuation response after processing the data. If the AUV is equipped with the ability to process the data such that it can initiate an actuation response then τ f is the time at which the AUV retrieves the data from the respective sensor node. However, if the end-processing agent is above the sea surface, as in [50], then τ f is determined when the information is received by the end-processing agent (for which the AUV will have to resurface [50]). The time stamp τ f definition can crucially impact the design of AUV path planning algorithms for VoI maximization. In this paper we assume the AUV to be the end-processing agent which implies that τ f will be determined by instant at which the information segment was offloaded from the sensor node on to the AUV.

3.4.3. The Path Planning Problem

The problem definition for AUV path planning is to devise an algorithm that attempts to maximize VoI accumulated from the UWSN. More formally, given sensor nodes S and VoI profile Υ A c c ( t ) of data reports D; what is the sequence of node visitation P S in S that will result in the accumulation of VoI  Υ A c c A l g P P .
[ Υ A c c A l g P P P S ] A l g P P [ S , D , Υ A c c ( t ) ]
where, Υ A c c A l g P P is the VoI accumulated from the sensor nodes S by employing the traversal sequence P S ,
  • P S is the node visitation sequence determined by A l g P P ,
  • A l g P P is a path planning algorithm that generates path P S such that Υ A c c A l g P P is accumulated,
  • S is the set of all sensor nodes,
  • D is the set of all data reports,
  • Υ A c c ( t ) is the cumulative VoI function.

4. Path Planning Algorithms

The path planning algorithms provide us with the sequence of nodes which the AUV will traverse for data collection. As suggested earlier, the sequence of node visitation by the AUV will affect the overall accumulated VoI. We propose a few different path planning algorithms for experimentation and analysis. The first algorithm is the Lawn-Mower path planner (LPP) which is based on minimizing total tour time. Then we have the Greedy path planner (GPP) which is based on greedily accumulating VoI. Greedy with Intermediate-Node-Visitation (GIPP) is a variant which is based on greedily accumulating VoI while also trying to minimize tour time. Hybrid path planner (HPP) is a combination of LPP and GPP. Hybrid with Intermediate-Node-Visitation (HIPP) is a combination of LPP and GIPP. The Random path planner (RPP) is used as a baseline algorithm for analysis purposes.

4.1. Lawn-Mower Path Planner–LPP

The LPP algorithm is based on a pre-computing strategy. It determines the route before-hand and it does not take into account the VoI profiles of the sensor nodes for its path planning decisions. The crux of this algorithm is to find the most optimal tour in terms of time traveled. This, in essence, is like solving the traveling salesman problem (TSP). The title Lawn-Mower is motivated by the analogy that the AUV will cover the area in parallel tracks in the same fashion as the grass is mowed down on a lawn using a lawn-mowing engine. A potential path planned using the LPP algorithm is shown with the blue colored trail in Figure 1.
Please note that this path planner does not explicitly take VoI into account but it should give effective results as it essentially takes into consideration the minimization of time t, which is a parameter in determining VoI as suggested by Equations (17), (19) and (20). Therefore, this algorithm implicitly improves VoI by taking care of overall visitation time.
Algorithm 1 highlights the steps involved for the Lawn-Mower path planner. The AUV maintains a history of nodes that it has already visited and the ones that it has yet to visit. Besides this, it also maintains a direction priority list. This list contains elements related to all the sensor nodes such that each element contains the information about which node among the neighbors of a sensor node needs to be visited next. For our implementation, we prioritize the selection of the next neighbor that is located on the East of the current node, then West, followed by South and finally North. The  complexity of LPP is O ( n ) where n is the number of sensor nodes.
A more generic implementation of this algorithm, for any topology other than a mesh, would be to use an algorithm that solves the TSP. However, for a mesh, instead of using a computationally expensive TSP algorithm, one can just simply use the LPP.
Algorithm 1 Shortest Path Lawn-Mower Path Planner–LPP.
1: procedure LPP(S)
2:      S { s 1 , s 2 , , s n } ▹ Set of sensor nodes
3:      V ▹ Visitation sequence
4:      P D { ( E a s t , W e s t , S o u t h , N o r t h ) } ▹ Direction priority list
5:      i s 1 ▹ Tour starting node
6:     while S do
7:          N neighborhood( i , S )
8:          j s x from N in the direction given by P D
9:         tourEculidean( i , j )
10:          V V + j
11:          S S j
12:          i j
13:     end while
14:     return V
15: end procedure

4.2. Greedy Path Planner–GPP

GPP and its variants are reactive path planning algorithms. This path planner provides a visitation sequence of nodes in descending order of their VoI aggregate profiles, i.e., the AUV will visit the node with maximum VoI available first and then other nodes in decreasing order of VoI at offer by them. The VoI is determined as the value available at the time instant when the AUV visits the sensor node. This is a greedy approach as the algorithm tries to maximize the VoI accumulated by determining which node has the highest amount to offer and then visit it. A potential path planned using the GPP algorithm is shown with the red colored trail in Figure 1.
VoI accumulation is dependent on the final time-stamps τ f as suggested by Equation (17). The lesser the value of τ f , the higher the VoI accumulated, i.e., the earlier the data is retrieved from a node, the more quickly the value decay is locked down, hence, resulting in greater value dividends. It would, therefore, make more sense to lock down VoI at nodes that have higher values to offer. Otherwise, more VoI would be potentially lost.
If there is a scenario where high-priority events are being reported because of a catastrophe, then it is imperative that it be reported at the earliest. The more the delay in reporting catastrophic data, the more would be the losses incurred. Moreover, as the UWSN has been deployed to report of catastrophic events, therefore, it is necessary that the AUV visits the nodes reporting the catastrophe first.
Algorithm 2 details the steps for the greedy approach. The algorithm maintains a history of nodes that it has already visited and the ones that it has yet to visit. From the nodes not visited yet, it selects the ones that give it the maximum VoI at its time of arrival. Once it selects a node as its next destination, it takes a direct euclidean route to it. The complexity of GPP is O ( n 2 ) where n is the number of sensor nodes.
Algorithm 2 Greedy Path Planner–GPP.
1: procedure GPP(S, s o )
2:      S { s 1 , s 2 , , s n } ▹ Set of sensor nodes
3:      V ▹ Visitation sequence
4:      i s o ▹ Tour starting node
5:     while S do
6:          j getNodeThatHasMaxVoI(S)
7:         tourEculidean( i , j )
8:          V V + j
9:          S S j
10:     end while
11:     return V
12: end procedure
13: procedure getNodeThatHasMaxVoI( S r )
14:      s x S r determine Υ s x using DetermineNodeVoI( D s x , t)
15:      k s x S r such that Υ s x is max A e B ( t τ o )
16:     return k
17: end procedure
18: procedure DetermineNodeVoI( D , t )
19:      D { d 1 , d 2 , , d k } ▹ Data reports at node
20:      Υ 0
21:      τ f t ▹ AUV arrival time at node
22:     while D do
23:          j GetNextDataReport(D)
24:          α Get A x (j)
25:          β Get B x (j)
26:          τ o Get τ o x (j)
27:          Υ + = α e β ( τ f τ o )
28:          D D j
29:     end while
30: end procedure

4.3. Greedy Path Planner with Intermediate-Node-Visitation–GIPP

It is a similar algorithm to GPP but with the added notion that while the AUV is on its way to the next node with the highest VoI offer, it can visit nodes that (by some definition e.g., distance) lie on the prescribed path.
It might be a reasonable idea to visit intermediate nodes, i.e., nodes that lie on the path to the destination node. This will help in minimizing tour time and, hence, improving VoI accumulation.
Algorithm 3 lays out the steps for GIPP. It is similar to GPP except for the intermediate node visitation which is a slight detour. For the intermediate node visitation, the algorithm selects the next node to be visited from the neighbors of the current node in a manner that the distance between the neighbor node and the node with the maximum VoI (destination node) is minimum among all the neighboring nodes. This algorithm is inspired by concepts behind both the GPP and LPP, i.e., visit sequence is greedy but tour time is minimized by visiting nodes that lie across the path. However, when it comes to reporting catastrophes at the earliest, it is a tad slower than GPP because of the intermediate node visitations. A potential path planned using the GIPP algorithm is depicted by the green colored trail in Figure 1.
The complexity of GIPP is O ( n 2 + n × d × m ) where n is the number of sensor nodes, d is the count of nodes in the longest intermediate tour, and m is the maximum number of nodes in a neighborhood definition. Because d < n and also m < n , therefore, it follows that the complexity of GIPP is O ( n 3 ) .
Algorithm 3 Greedy Path Planner with Intermediate-Node-Visitation–GIPP.
1: procedure GIPP(S, s o )
2:      S { s 1 , s 2 , , s n } ▹ Set of sensor nodes
3:      V ▹ Visitation sequence
4:      i s o ▹ Tour starting node
5:     while S do
6:          j getNodeThatHasMaxVoI(S)
7:          T
8:          T tourIntermediate( i , j , S )
9:          V V + T
10:          S S T
11:          i j
12:     end while
13:     return V
14: end procedure
15: procedure tourIntermediate( s o u r c e , d e s t i n a t i o n , S r )
16:      p s o u r c e
17:      q d e s t i n a t i o n
18:      T I ▹ Intermediate Visitation Sequence
19:     while p q do
20:          N getNeighborhood( p , S r )
21:          i s x N such that eculideanDistance( s x , q ) is minimized
22:         tourEculidean( p , i )
23:          p i
24:          T I p
25:     end while
26:     return T I
27: end procedure

4.4. Hybrid Path Planner–HPP

The algorithms for path planners HPP and HIPP were devised after studying results from our simulation experiments. What we observed was that the LPP would perform best, in terms of VoI accumulation, when there where no catastrophes, i.e., VoI profiles were similar across all the sensor nodes. Contrarily, GPP and GIPP performed better in the scenario where the sensor nodes were reporting catastrophes.
Algorithm 4 Hybrid Path planner–HPP.
1: procedure HPP(S, s o )
2:      S { s 1 , s 2 , , s n } ▹ Set of sensor nodes
3:      V ▹ Visitation sequence
4:      S H P { s m s m S s m is high-priority} ▹ Set of high-priority sensor nodes
5:      S L P S S H P ▹ Set of low-priority sensor nodes
6:      V GPP( S H P , s o )
7:      V V + LPP( S L P )
8:     return V
9: end procedure
So the thought process behind this path planner is to use a greedy algorithm (GPP or GIPP) for retrieving data from nodes that are reporting catastrophes, while, using TSP like algorithms (LPP) for retrieving data from the rest of the nodes. This implies switching a greedy and a shortest path algorithm and so the name Hybrid Path Planner. HPP switches between GPP and LPP.
The algorithm for HPP is given as Algorithm 4. The complexity of this algorithm is O ( h 2 + l ) where h is the number of high-priority sensor nodes while l is the count of low-priority sensor nodes. O ( h 2 ) is the complexity of GPP being used within HPP while O ( l ) is the complexity of LPP. As h n and l n , therefore, the complexity of HPP is determined as O ( n 2 ) .

4.5. Hybrid Path Planner with Intermediate-Node-Visitation–HIPP

HIPP has the same logic behind it as HPP but the only difference is that it uses GIPP instead of GPP. The algorithm first discovers the hot-spots, i.e., catastrophe reporting nodes and then it finds the intermediate nodes that can be visited. Afterward, these nodes are visited using GIPP while the rest of the nodes are visited using LPP.
The algorithm for HIPP is given as Algorithm 5. The complexity of this algorithm is O ( h 3 + l ) where h is the number of high-priority sensor nodes while l is the count of low-priority sensor nodes. Similarly, as in the case of HPP, h n and l n , therefore, the complexity of HIPP is determined as  O ( n 3 ) .
Algorithm 5 Hybrid Path Planner with Intermediate-Node-Visitation–HIPP.
1: procedure HIPP(S, s o )
2:      S { s 1 , s 2 , , s n } ▹ Set of sensor nodes
3:      V ▹ Visitation sequence
4:      S H P { s m s m S s m is high-priority } ▹ Set of high-priority sensor nodes
5:      i s o ▹ Sensor node to start tour from
6:     while S H P do
7:          j getNodeMaxVoI( S H P )
8:          T
9:          T tourIntermediate( i , j , S )
10:          V V + T
11:          S H P S H P T
12:          i j
13:     end while
14:      S L P S V ▹ Set low-priority sensor nodes
15:      V V + LPP( S L P )
16:     return V
17: end procedure

4.6. Random Path Planner–RPP

For evaluation purposes, we also implemented a random path planner (RPP) where the AUV randomly chooses the next sensor node for data collection. The route towards the selected node employs Euclidean shortest path. This path planner can be thought of as a planner which does not take into account VoI or time while scheduling visits to nodes, i.e., AUV schedules its visitation activity irrespective of the critical nature of the VoI in the UWSN.

5. Performance Measures, Simulation Setup and Results

5.1. Performance Measures and Experiments

The basic measures of performance that we will use are VoI accumulated ‘ Υ A c c ’ and VoI lost ‘ Υ L ’. To discuss what these measures are we refer to Figure 2b. Υ A c c ( t ) is the decaying VoI profile in the system and is represented in abstract terms by a straight line. It is a general statement on the depreciation of the valuation, whereas, in an actual situation the dynamics of this depreciation, i.e., the actual shape of the curve, will be governed by system variables and type of information recorded. This chart assumes that no measurements are recorded after t = 0 , hence, the chart only shows a monotonic decay in the valuation after t = 0 . τ s t a r t and τ f i n i s h are the start and end times for the complete AUV tour. In our case, a tour is a visitation sequence that is a permutation on the set of all sensor nodes, i.e., the tour is a ’simple path’ on a graph that has the sensor nodes as vertices. Υ A v a is the VoI available in the system at the start of the tour while the Υ A c c is the VoI accumulated by the AUV by the end of its tour. Υ L is determined as
Υ L = Υ A v a Υ A c c
Υ L = i = 1 n j = 1 k A i j e B i j ( τ S t a r t τ o i j ) A i j e B i j ( τ f i j τ o i j )
The loss in Υ A c c is a result of a combination of factors that can be attributed to physical system limitations such as the AUV speed, delay in starting time of the tour τ S t a r t , and inefficiencies resulting from the planned path. It is the path planning part of this problem that we want to explore in this paper. To filter out effects of a delay in τ S t a r t we use Υ L as it is a measure of loss between the range t = [ τ S t a r t : τ F i n i s h ] . Any loss other than Υ L is not a result of path planning inefficiencies. Υ L gives a more clear picture in terms of comparative performance as compared to Υ A c c .
Other than VoI based performance markers we can also use time as a metric to determine certain aspects of performance. Time taken by an AUV for a complete traversal of the set of sensor nodes can be employed for this purpose. The earlier an AUV completes the tour of a UWSN, the more readily it is available for a new tour of this or another neighboring UWSN. Time can be useful in understanding energy E A U V consumed by the AUV to complete its tour. Energy consumed is proportional to the distance it travels D t o u r which is proportional to the time taken by the AUV to complete the tour T t o u r . Shorter tours also result in less wear and tear of the AUVs.
Δ τ = τ f i n i s h τ s t a r t = T t o u r D t o u r E A U V
A measure of the efficiency Ω of a planner can be determined by combining Υ L and T t o u r . Ω is inversely proportional to both Υ L and T t o u r , therefore,
Ω 1 Υ L · 1 T t o u r Ω = p q Υ L · r T t o u r = k Υ L · T t o u r
where, k = p q · r is a constant and is set to 1 in this experimental study. Other than the measures of Υ A c c , Υ L , T t o u r & Ω , we also need to have some specific measures for ’response to emergency situations’. These would be VoI accumulated from first hot-spot υ H S A c c , VoI lost from first hot-spot υ H S L , time taken to arrive at first hot-spot τ H S and a measure of urgency Ψ . We define Ψ as the ratio of the score of the path planner schedule for visiting hot-spots S I to the score of an expected perfect schedule to visit hot-spots S P . Let there be n sensor nodes and m hot-spots. Then, the score S I & S P are determined as
S I = i = 0 m 1 n s e q # s i , S P = i = 1 m 1 n i
where s e q # s i is the number at which a node is visited in the schedule of visitation given by a path planner. Ψ is, therefore, determined as
Ψ = S I S P = i = 0 m 1 n s e q # s i i = 1 m 1 n i
The intuition behind urgency score Ψ can be understood by the following example. Assume that there is a sensor network with 8 sensor nodes { s 1 , s 2 , s 3 , s 4 , s 5 , s 6 , s 7 , s 8 } and 3 hot-spots { s 3 , s 6 , s 7 } . Here n = 8 & m = 3 . The hot-spots in sequence of their precedence are [ s 6 , s 3 , s 7 ] , i.e., it is most urgent to visit s 6 on priority, then s 3 and then s 7 . The perfect visitation sequence should be [ s 6 , s 3 , s 7 , ] . Let there be a path-planner P P such that it gives us the following schedule of visitation [ s 1 , s 3 , s 2 , s 6 , s 5 , s 7 , s 8 , s 4 ] . In this visitation sequence s 6 has a s e q # s 6 = 3 , s 3 has s e q # s 3 = 1 while s 7 has s e q # s 7 = 5 . In a perfect visitation sequence s 6 should have s e q # s 6 = 0 , s 3 should have s e q # s 3 = 1 while s 7 should have s e q # s 7 = 2 . We can now calculate S I and S P as S I = ( 8 3 ) + ( 8 1 ) + ( 8 5 ) = 15 and S P = ( 8 0 ) + ( 8 1 ) + ( 8 2 ) = 21 . The smaller a s e q # s i is, the higher the difference n s e q # s i will be and hence the greater the score. The urgency score for P P is Ψ = S I / S P = 15 / 21 = 0.714 .
Therefore, the complete list of measures that we use in this study for adjudication are Υ A C C , Υ L , T t o u r , Ω , υ H S L , τ H S & Ψ .

5.2. Simulation Setup

To investigate our various hypotheses regarding VoI based path planning we have used a simulation approach. We assume a scenario which has two types of classes for the events; one is normal routine events while the other events are those that require an emergency response. To monitor these events a UWSN has been deployed. The nodes in the UWSN collect multimedia information through cameras. Due to a limited finite capacity, data needs to be offloaded from these nodes by an AUV. The nodes communicate infotential data using the acoustic communication medium. A path planning agent, based on the infotential data that it receives, schedules a visitation sequence of the nodes for the AUV. During its tour, the AUV off-loads multimedia data from the nodes using the optical communication medium. A node which has recorded an event that can be classified as an emergency is marked as a hot-spot.
The simulation has 100 nodes arranged in a 10 × 10 mesh/grid. The horizontal/vertical inter-node distance is 1000 m while the diagonal distance is 1414.2 m. The AUV traverses the UWSN at a constant speed of 10 m/s.
We assume that before the AUV embarks on its tour, the UWSN has been recording data for 24 h. Each node has video data reports of length 15 min each. Therefore, the reports have been recorded starting at intervals in the multiples of 15 min and with no recording overlap. The event coverage of the nodes is such that they have minimum or no-overlap, and hence, the recorded events are unique. Each node records data reports and classifies them either as a high-priority or a low-priority event. A { v a l u a t i o n , d e c a y } tuple, corresponding to significance and damage rate, is appended to each data report. If it is a routine low-priority event, then the { v a l u a t i o n , d e c a y } tuple { A L , B L } are appended to the data report. Alternatively, if it is an emergency event, then the tuple { A H , B H } are attached to it. The UWSN nodes communicate with the remote path-planning agent over the acoustic channel and transmit to it the { v a l u a t i o n , d e c a y } and time-stamp details of the data reports that they have recorded. Based on these details, the path-planning agent determines the visitation sequence for the AUV.

5.3. Results

In this section, we attempt to make a comparative analysis of the path planning algorithms. We ascertain the performance of algorithms that take into consideration VoI or time or both, versus those algorithms, that do not. The regions where a high-priority event takes place are deemed as hot-spots. The effect of parameters such as valuation ratio A H / A L and number of hot-spots N H S is assessed.
We make a performance comparison among six path planners; RPP, LPP, GPP, HPP, GIPP, and HIPP. At various points in this section, we normalize results. The normalization is with respect to RPP as it is our base-case. Except for in anomalous cases, RPP is the worst performing among all path planning algorithms; this is expected as it does not take into account time or information valuation for generating the node visitation sequence. Each reading in the results has been averaged over 100 different VoI profiles across the same UWSN map.

5.3.1. Valuation Ratio

The first thing that we investigate is the valuation ratio. The valuation ratio is the ratio between the valuation of information of a high-priority event versus valuation of information of a low-priority event at t = τ o , i.e., the ratio A H / A L . In hindsight of the results for N H S = 0 , we found that if the VoI profile in a UWSN is similar or homogeneous, i.e., all the sensor nodes have almost a similar amount of VoI to offer, then a shortest path algorithm proved quite effective. This effectiveness is a result of distance minimization which results in minimization of time, and this time minimization helps to lock-in decaying VoI profiles at the earliest. However, so should be the case if A H A L , because, even though there are hot-spots, yet the VoI profile of the system is as if N H S = 0 . In such a case, there would be no real advantage of using a greedy planner. Therefore, there should be a particular range after which we can observe a performance gain for the greedy planners as compared to the shortest path planners. In this experiment, we determine the effective performance range for the lawn-mower, greedy and hybrid algorithms. The results for Υ A c c n and Υ L n versus A H / A L are shown in Figure 3. The superscript n implies that the results have been normalized with respect to RPP.
Υ A c c n = Υ A c c P P Υ A c c R P P , Υ L n = Υ L P P Υ L R P P
In Figure 3, the left two graphs are for the range A H / A L = [ 10 0 : 10 9 ] . The right two graphs are a magnification of the results between the range A H / A L = [ 10 4 : 10 5 ] . Also, the top two graphs are for Υ A c c n (colored in tones of blue), while the bottom two graphs are for Υ L n (colored in tones of red). We can observe that LPP performs better early on but once the ratio A H / A L becomes considerably large, the greedy algorithms start giving better performance. It is somewhere between a valuation ratio of 10 3 and 10 4 units that LPP loses its top spot on performance. At 10 4 GIPP, HPP, and HIPP start performing better. While at 10 5 GPP also starts performing better than LPP. LPP clearly performs best up to 10 3 , while afterward, the greedy or hybrid algorithms start performing better. If we magnify the range between A H / A L = [ 10 4 : 10 5 ] , we find that the switch in performance takes place at A H / A L = 3 × 10 4 .
It is based on these results that we use a setting of A H / A L = 5 × 10 4 for the rest of this paper. This is a reasonable number for practical situations as e.g., it may imply a $1 versus $50,000 valuation. However, it is to note that the hybrid or intermediate node visitation algorithms perform better as early as a fiscal value of $10,000; as suggested by the performance improvement at A H / A L = 10 4 .

5.3.2. Justification of Heuristics

The algorithms proposed in this paper are based on different heuristics. In this section, we verify whether our intuitions behind those heuristics are valid or not. We use Υ A C C n (values normalized with respect to RPP) and study the performance of the path planners for the case where the number of hot-spots N H S = { 0 , 1 , 10 } .
Our first hypothesis was that using VoI aware algorithms may help in accumulating a higher amount of VoI. From the results in Figure 4 we can see that all path planners have a value greater than 1.0 , i.e., they are all better than RPP, and hence, suggesting that the hypothesis is correct.
Our second hypothesis was that greedy path planners amass a higher VoI when there are hot-spots. However, when there are no hot-spots, a time minimization planner like the Lawn-Mower accumulates a higher VoI. This hypothesis is validated through the results in Figure 4a. When N H S = 0 LPP performs best, but in the case of hot-spots, the greedy approach accumulates more VoI.
Our third hypothesis was that inter-node traversal helps in minimizing time while still maintaining its VoI greedy character, thereby, improving the VoI accumulated. GIPP, for instance, visits hot-spots on priority but also visits other nodes that lie along the path. Figure 4b confirms this intuition where GIPP accumulates more VoI than GPP.
Our fourth hypothesis was that hybrid path planners can provide the best of both worlds, i.e., when N H S = 0 they behave like time minimization path planners and when there are hot-spots they use greedy techniques for scheduling purposes (until all hot-spots have been visited). Figure 4c,d are a proof for this. When there are no hot-spots HPP performs as good as the LPP (because their algorithmic construction, in this case, is the same) and in case of hot-spots, they accumulate more VoI than their greedy counterparts, i.e., GPP and GIPP. Figure 4c shows that the hybrid algorithm is better than both LPP and GPP while Figure 4d shows that hybrid algorithms are better than their greedy counterparts in both cases, i.e., with or without intermediate node visitation.

5.3.3. Comparative Analysis

In this section, we do a thorough comparative analysis to have a better understanding of the performance dynamics of the various path planners. The parameters we explore for this purpose are Υ A C C , Υ L , T t o u r & Ω n . We vary the number of hot-spots N H S from 0 to 10 and see the effect on the path planners’ performance.
For this section we have used stacked bar-plots (Figure 5 and Figure 6). The results have not been normalized to give a more clear picture of the actual values obtained from the simulation. Each reading for a {Planner, Hot-Spot(s)} tuple is averaged over 100 different VoI profiles and is represented by a block in the stacked bar-plot. The exact value of a block is given in a corresponding cell in the table below. The changing color gradient of the blocks matches to the index column N H S in the table. The changing color tones of the table cells correspond to a change in intensity of values. The better the performance, the darker the color tone is in the table. Color tones for comparative performance can only be compared across a row, i.e., values can be only compared across a particular N H S value.

VoI Accumulated and VoI Lost

This discussion refers to graphs in Figure 5. The bar graph in Figure 5a is for VoI accumulated Υ A C C by various path planners, while Figure 5b pertains to VoI lost Υ L . They have the same conclusions in terms of performance but the performance results for Υ L are more pronounced as compared to Υ A C C and this is because, as stated earlier, they remove the bias due to loss before t = τ S t a r t . LPP performs best when there are no hot-spots. In this case, the performance of HPP and HIPP is same as LPP. With N H S > 0 the greedy and hybrid approaches start to perform better. The hybrid algorithms always perform better than their greedy counterparts. Also, GIPP always performs better than GPP. An interesting thing to note is that initially HPP has better performance than GIPP but after N H S = 4 the GIPP path planner starts outperforming HPP; which is due to the fact that the AUV using GIPP might start encountering lesser valued hot-spots more frequently while on its way towards a higher valued hot-spot; a benefit in hindsight of using intermediate node visitation. The cumulative performance rank for N H S = [ 0 : 10 ] is: H I P P > G I P P > H P P > G P P > L P P > R P P .

Tour Time

The best performing algorithm in terms of time is shortest path algorithm LPP and this can be seen from the results in Figure 6a. HIPP and HPP come in close in terms of minimizing time, but as the number of hot-spots increase, their performance gap to LPP also widens. GIPP performs better than GPP because of using the intermediate node visitation heuristic. G P P is as worse as R P P in terms of time, which is understandable as the VoI profile is distributed randomly across the UWSN map. It is important to note that when N H S = 0 then L P P = H P P = H I P P . The performance rank precedence across N H S = [ 0 : 10 ] is: L P P > H I P P > H P P > G I P P > G P P R P P .

Efficiency

This is a useful metric as it takes into account both the VoI lost and tour time. The bar graph for this is shown in Figure 6b. The hybrid algorithms turn out to be the best in terms of this metric. This is not a surprise as they combine the best of both the shortest path and greedy algorithms. The cumulative efficiency rank is: H I P P > H P P > L P P > G P P > G I P P > R P P .

5.3.4. Scalability with an Increase in Hot-Spots

In the context of this discussion, a hot-spot is an anomalous event of probably catastrophic proportions and needs to be taken care of as quickly as possible. Such an anomalous event should be a rare occurrence and it would be a bit unlikely to find more than a few at the same time. However, then it can also be argued that the whole system is compromised if such a situation can arise. However, this scalability study is based on this hypothetical assumption that there might be a drastic increase in the number of hot-spots. Our goal is to see how the path planners behave when we vary the number of hot-spots ( N H S ) across the range of nodes.
The results are shown in Figure 7. The results are shown as heat-maps. Darker color tones imply better comparative performance in the heat-maps. We start from 5 hot-spots and ramp up to 95 hot-spots. We record percentage improvement in VoI accumulated ( Υ A C C % ), percentage reduction in VoI lost ( Υ L % ), percentage reduction in tour time ( T T o u r % ) and a normalized measure of efficiency ( Ω P P Ω R P P ). The percentages are calculated with respect to the RPP path planner performance:
Υ A C C % = Υ A C C Υ A C C R P P × 100
Υ L % = Υ L Υ L R P P × 100
T T o u r % = T T o u r T T o u r R P P × 100
Ω P P Ω R P P = Υ L R P P × T T o u r R P P Υ L × T T o u r
The first results we discuss are Υ A C C and Υ L . As the number of hot-spots increase, the performance of HPP and LPP decreases drastically. GIPP and HIPP also experience a degradation in performance but the change is not that drastic. The performance of LPP remains the same at average. The reason for this is that an increase in hot-spots results in a map that is increasingly homogeneous in terms of VoI. When there are no hot-spots, there is a homogeneity in terms of VoI in the sensor map. In such a case, as discussed earlier, LPP performs best. With one and up till a few hot-spots, greedy path-planners perform better. However, at a certain tipping point in terms of N H S , the performance falls below than that of LPP. With a large N H S , the sensor map is similar to one with no hot-spots. This explains the better performance of LPP in such a scenario.
In terms of T t o u r , there is no effect in the performance of LPP, GPP or GIPP with an increase in N H S . However, the performance of HPP deteriorates to the level of GPP eventually and HIPP degrades to GIPP. The reason lies in the algorithmic construction of the hybrid path planners. They are designed in such a way that they switch to LPP once all the hot-spots have been visited. The time performance of hybrid algorithms is good because they incorporate LPP. Therefore, if there is a large N H S , there will be a lesser involvement of LPP in the path-planning process and this leads to an increase in the T t o u r for hybrid path-planners.
The measure of efficiency, normalized to RPP, has a very high value for hybrid algorithms at 5 hot-spots. However, onward 15 hot-spots, we see a very sharp decline in this performance measure. LPP is not affected in this regard. The reason is that Ω depends upon Υ L and T t o u r and LPP is not affected in both regards by an increase in N H S .

5.3.5. Response to Emergency

The basic reason to employ VoI was to have a mechanism to distinguish between higher and lower priority situations in an organic fashion, thus enabling a more appropriate response to the situation. The greedy and hybrid algorithms were designed to address high-priority situations such as emergencies. Here, we look at some measures that shed light on how the various path planners perform under emergency. Again, all results are described with respect to RPP in terms of percentage improvement in performance. The results are shown in Figure 8. We vary N H S from 1 to 10 hot-spots. We record percentage improvement in VoI accumulated from first hot-spot ( υ H S A C C % ), percentage reduction in VoI lost at first hot-spot ( υ H S L % ), percentage reduction in tour time to first hot-spot ( τ H S % ) and the normalized urgency score ( Ψ P P Ψ R P P ). The percentages are calculated with respect to the RPP path planner performance:
υ H S A C C % = υ H S A C C υ H S A C C R P P × 100
υ H S L % = υ H S L υ H S L R P P × 100
τ H S % = τ H S τ H S R P P × 100
Ψ P P Ψ R P P = S I S P × S P R P P S I R P P
GPP and HPP are best when it comes to accumulating VoI from the first hot-spot. GIPP and HIPP follow closely in terms of performance but the gap widens with increasing N H S . The reason, as discussed earlier, is that the intermediate path planners start to hit lesser valued hot-spots on their way to the highest valued hot-spot. As an intermediate lesser valued hot-spot maybe encountered first by the AUV, therefore, υ H S A C C performance should decrease.
In terms of υ H S L , GPP and HPP are better for N H S = 1 or 2. For N H S 3 , GIPP and HIPP start performing better, i.e., they avoid a higher loss in terms of VoI from the first hot-spot encountered. The reason is the same as stated above, i.e., they encounter other hot-spots on the tour while traveling towards the highest-priority one. Because, hot-spots are encountered earlier, therefore, the respective VoI loss υ H S L at that node should be lower. This phenomenon of encountering hot-spots earlier than planned can be verified from the time to arrive at the first hot-spot τ H S results.
These results for τ H S follow exactly υ H S L in character. Again, GPP and HPP perform better for N H S = 1 or 2, while for N H S 3 , GIPP and HIPP are better. This thus corroborates the speculation that hot-spots are being encountered earlier by path planners that are based on the intermediate node visitation strategy.
The urgency measure Ψ sheds light on response to an emergency. This is because it generates a score based on the sequence of visitation to the hot-spots. It encodes, that how much priority was maintained while visiting the nodes. GPP and HPP have the highest urgency score. This is because they visit the nodes in the exact order of descending priority as dictated by VoI advertised. The intermediate node visitation algorithms, GIPP and HIPP, come in second. This is expected as intermediate nodes are being attended to en-route to the highest-priority node. The performance gap widens between algorithms with or without intermediate node visitation with an increasing N H S . The performance of LPP is as worse as RPP throughout the N H S range. This is inferred from normalized result value of Ψ L P P / Ψ R P P 1 .
This shows that GPP and HPP are best for addressing emergencies as they directly go to the highest priority node first. Close in second are GIPP and HIPP. They lose out marginally because of visiting intermediate nodes. LPP has no capacity for dealing with emergencies.

6. Conclusions

In this paper, we have proposed the use of VoI in the form of infotentials for solving data off-loading precedence issues in UWSNs. We have proposed a VoI model for UWSNs and developed various measures and metrics to asses system performance. A relationship has already been identified between the quality of information QoI and value of information VoI in [13,15]. Based on this relationship and the extensive experiments that we have performed, it is reasonable to conclude that employing VoI for path planning algorithms improves the quality of information being retrieved from a UWSN.
The path planner performance depends on the context of the situation. If the VoI profile in the system is homogeneous, i.e., there are no hot-spots or the valuation ratio A H / A L is small, then a shortest path algorithm like LPP should be used. LPP is also fuel optimal. In the case of hot-spots, given the valuation ratio A H / A L is considerably large, greedy algorithms perform better. Hybrid algorithms offer the best of both these strategies by combining greedy and shortest path algorithms.
Intermediate node visitation improves VoI by saving tour time and, therefore, GIPP and HIPP perform better than their GPP and HPP counterparts respectively. However, if an emergency is classified as so serious that its priority should not be marginalized, then GPP or HPP should be used as they directly visit the node of concern.

Author Contributions

Conceptualization, F.A.K., S.B., S.A.K., L.B. and D.T.; Methodology, F.A.K., S.B. and S.A.K.; Software, F.A.K. and S.A.K.; Validation, F.A.K. and S.A.K.; Formal Analysis, F.A.K. and S.B.; Investigation, F.A.K., S.B. and S.A.K.; Resources, F.A.K., L.B. and D.T.; Data Curation, F.A.K., S.B. and S.A.K.; Writing—Original Draft Preparation, F.A.K., S.B., S.A.K., L.B. and D.T.; Writing—Review & Editing, F.A.K., S.B., S.A.K., L.B. and D.T.; Visualization, F.A.K. and S.B.; Supervision, L.B. and D.T.; Project Administration, F.A.K., L.B. and D.T.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  2. Heidemann, J.; Stojanovic, M.; Zorzi, M. Underwater sensor networks: Applications, advances and challenges. Philos. Trans. R. Soc. A 2012, 370, 158–175. [Google Scholar] [CrossRef] [PubMed]
  3. Lv, C.; Wang, Q.; Yan, W.; Shen, Y. Energy-balanced compressive data gathering in Wireless Sensor Networks. J. Netw. Comput. Appl. 2016, 61, 102–114. [Google Scholar] [CrossRef] [Green Version]
  4. Ayaz, M.; Baig, I.; Abdullah, A.; Faye, I. A survey on routing techniques in underwater wireless sensor networks. J. Netw. Comput. Appl. 2011, 34, 1908–1927. [Google Scholar] [CrossRef]
  5. Esch, R.R.; Protti, F.; Barbosa, V.C. Adaptive event sensing in networks of autonomous mobile agents. J. Netw. Comput. Appl. 2016, 71, 118–129. [Google Scholar] [CrossRef] [Green Version]
  6. Vasilescu, I.; Kotay, K.; Rus, D.; Dunbabin, M.; Corke, P. Data collection, storage, and retrieval with an underwater sensor network. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, CA, USA, 2–4 November 2005; pp. 154–165. [Google Scholar]
  7. Forero, P.A.; Lapic, S.K.; Wakayama, C.; Zorzi, M. Rollout algorithms for data storage-and energy-aware data retrieval using autonomous underwater vehicles. In Proceedings of the International Conference on Underwater Networks & Systems, Rome, Italy, 12–14 November 2014; p. 22. [Google Scholar]
  8. Khan, J.U.; Cho, H.S. A distributed data-gathering protocol using AUV in underwater sensor networks. Sensors 2015, 15, 19331–19350. [Google Scholar] [CrossRef] [PubMed]
  9. Akbar, M.; Javaid, N.; Khan, A.H.; Imran, M.; Shoaib, M.; Vasilakos, A. Efficient data gathering in 3D linear underwater wireless sensor networks using sink mobility. Sensors 2016, 16, 404. [Google Scholar] [CrossRef] [PubMed]
  10. Hollinger, G.A.; Choudhary, S.; Qarabaqi, P.; Murphy, C.; Mitra, U.; Sukhatme, G.S.; Stojanovic, M.; Singh, H.; Hover, F. Underwater Data Collection Using Robotic Sensor Networks. IEEE J. Sel. Areas Commun. 2012, 30, 899–911. [Google Scholar] [CrossRef] [Green Version]
  11. Farr, N.; Bowen, A.; Ware, J.; Pontbriand, C.; Tivey, M. An integrated, underwater optical/acoustic communications system. In Proceedings of the OCEANS 2010 IEEE-Sydney, Sydney, Australia, 24–27 May 2010; pp. 1–6. [Google Scholar]
  12. Khan, F.A.; Khan, S.A.; Turgut, D.; Bölöni, L. Greedy path planning for maximizing value of information in underwater sensor networks. In Proceedings of the IEEE 39th Conference on Local Computer Networks Workshops (LCN Workshops), Edmonton, AB, Canada, 8–11 September 2014; pp. 610–615. [Google Scholar]
  13. Bisdikian, C.; Kaplan, L.M.; Srivastava, M.B.; Thornley, D.J.; Verma, D.; Young, R.I. Building principles for a quality of information specification for sensor information. In Proceedings of the 12th International Conference on Information Fusion, Seattle, WA, USA, 6–9 July 2009; pp. 1370–1377. [Google Scholar]
  14. Bisdikian, C.; Branch, J.; Leung, K.K.; Young, R.I. A letter soup for the quality of information in sensor networks. In Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9–13 March 2009; pp. 1–6. [Google Scholar]
  15. Bisdikian, C.; Kaplan, L.M.; Srivastava, M.B. On the quality and value of information in sensor networks. ACM Trans. Sens. Netw. 2013, 9, 48. [Google Scholar] [CrossRef]
  16. Chen, D.; Varshney, P.K. QoS Support in Wireless Sensor Networks: A Survey. In Proceedings of the International Conference on Wireless Networks, Las Vegas, NV, USA, 21–24 June 2004; Volume 233, pp. 1–7. [Google Scholar]
  17. Singh, G.T.; Al-Turjman, F.M. A data delivery framework for cognitive information-centric sensor networks in smart outdoor monitoring. Comput. Commun. 2016, 74, 38–51. [Google Scholar] [CrossRef]
  18. Aurrecoechea, C.; Campbell, A.T.; Hauw, L. A survey of QoS architectures. Multimed. Syst. 1998, 6, 138–151. [Google Scholar] [CrossRef] [Green Version]
  19. Al-Karaki, J.N.; Kamal, A.E. Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Commun. 2004, 11, 6–28. [Google Scholar] [CrossRef]
  20. Akkaya, K.; Younis, M. A survey on routing protocols for wireless sensor networks. Ad Hoc Netw. 2005, 3, 325–349. [Google Scholar] [CrossRef] [Green Version]
  21. Ehsan, S.; Hamdaoui, B. A survey on energy-efficient routing techniques with QoS assurances for wireless multimedia sensor networks. IEEE Commun. Surv. Tutor. 2012, 14, 265–278. [Google Scholar] [CrossRef]
  22. Hasan, M.Z.; Al-Rizzo, H.; Al-Turjman, F. A survey on multipath routing protocols for QoS assurances in real-time wireless multimedia sensor networks. IEEE Commun. Surv. Tutor. 2017, 19, 1424–1456. [Google Scholar] [CrossRef]
  23. Hanzo, L.; Tafazolli, R. A survey of QoS routing solutions for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 2007, 9, 50–70. [Google Scholar] [CrossRef] [Green Version]
  24. Chen, L.; Heinzelman, W.B. A survey of routing protocols that support QoS in mobile ad hoc networks. IEEE Netw. 2007, 21. [Google Scholar] [CrossRef]
  25. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  26. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and its role in the internet of things. In Proceedings of the First Edition of the MCC workshop on Mobile cloud computing, Helsinki, Finland, 17 August 2012; pp. 13–16. [Google Scholar]
  27. Rosário, D.; Zhao, Z.; Santos, A.; Braun, T.; Cerqueira, E. A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications. Comput. Commun. 2014, 45, 21–31. [Google Scholar] [CrossRef]
  28. Airehrour, D.; Gutierrez, J.; Ray, S.K. Secure routing for internet of things: A survey. J. Netw. Comput. Appl. 2016, 66, 198–213. [Google Scholar] [CrossRef]
  29. Chu, M.; Haussecker, H.; Zhao, F. Scalable information-driven sensor querying and routing for ad hoc heterogeneous sensor networks. Int. J. High Perform. Comput. Appl. 2002, 16, 293–313. [Google Scholar] [CrossRef]
  30. Zhao, F.; Shin, J.; Reich, J. Information-driven dynamic sensor collaboration. IEEE Signal Process. Mag. 2002, 19, 61–72. [Google Scholar] [CrossRef]
  31. Shen, H.; Bai, G. Routing in wireless multimedia sensor networks: A survey and challenges ahead. J. Netw. Comput. Appl. 2016, 71, 30–49. [Google Scholar] [CrossRef]
  32. Tan, H.X.; Chan, M.C.; Xiao, W.; Kong, P.Y.; Tham, C.K. Information quality aware routing in event-driven sensor networks. In Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar]
  33. Turgut, D.; Bölöni, L. A pragmatic value-of-information approach for intruder tracking sensor networks. In Proceedings of the 2012 IEEE International Conference on Communications (ICC), Ottawa, ON, Canada, 10–15 June 2012; pp. 4931–4936. [Google Scholar]
  34. Turgut, D.; Bölöni, L. IVE: Improving the value of information in energy-constrained intruder tracking sensor networks. In Proceedings of the 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9–13 June 2013; pp. 6360–6364. [Google Scholar]
  35. Pryyma, V.; Turgut, D.; Bölöni, L. Active time scheduling for rechargeable sensor networks. Comput. Netw. 2010, 54, 631–640. [Google Scholar] [CrossRef] [Green Version]
  36. Nasser, N.; Karim, L.; Taleb, T. Dynamic multilevel priority packet scheduling scheme for wireless sensor network. IEEE Trans. Wirel. Commun. 2013, 12, 1448–1459. [Google Scholar] [CrossRef]
  37. Huang, L.; Neely, M.J. Utility optimal scheduling in energy-harvesting networks. IEEE/ACM Trans. Netw. 2013, 21, 1117–1130. [Google Scholar] [CrossRef]
  38. Yu, X.; Xiaosong, X.; Wenyong, W. Priority-based low-power task scheduling for wireless sensor network. In Proceedings of the 2009 International Symposium on Autonomous Decentralized Systems, Athens, Greece, 23–25 March 2009; pp. 1–5. [Google Scholar]
  39. Hao, H.; Wang, K.; Ji, H.; Li, X.; Zhang, H. Utility-based scheduling algorithm for wireless multi-media sensor networks. In Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Hong Kong, China, 30 August–2 September 2015; pp. 1052–1056. [Google Scholar]
  40. Yigitel, M.A.; Incel, O.D.; Ersoy, C. QoS-aware MAC protocols for wireless sensor networks: A survey. Comput. Netw. 2011, 55, 1982–2004. [Google Scholar] [CrossRef]
  41. Kim, H.; Min, S.G. Priority-based QoS MAC protocol for wireless sensor networks. In Proceedings of the 2009 IEEE International Symposium on Parallel & Distributed Processing, Rome, Italy, 23–29 May 2009; pp. 1–8. [Google Scholar]
  42. He, L.; Pan, J.; Xu, J. A progressive approach to reducing data collection latency in wireless sensor networks with mobile elements. IEEE Trans. Mob. Comput. 2013, 12, 1308–1320. [Google Scholar] [CrossRef]
  43. Gu, Y.; Ren, F.; Ji, Y.; Li, J. The evolution of sink mobility management in wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 2016, 18, 507–524. [Google Scholar] [CrossRef]
  44. Sugihara, R.; Gupta, R.K. Speed control and scheduling of data mules in sensor networks. ACM Trans. Sens. Netw. 2010, 7, 4. [Google Scholar] [CrossRef]
  45. Sugihara, R.; Gupta, R.K. Path planning of data mules in sensor networks. ACM Trans. Sens. Netw. 2011, 8, 1. [Google Scholar] [CrossRef]
  46. Magistretti, E.; Kong, J.; Lee, U.; Gerla, M.; Bellavista, P.; Corradi, A. A mobile delay-tolerant approach to long-term energy-efficient underwater sensor networking. In Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, Kowloon, China, 11–15 March 2007; pp. 2866–2871. [Google Scholar]
  47. Bölöni, L.; Turgut, D.; Basagni, S.; Petrioli, C. Scheduling data transmissions of underwater sensor nodes for maximizing value of information. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 438–443. [Google Scholar]
  48. Gjanci, P.; Petrioli, C.; Basagni, S.; Phillips, C.A.; Bölöni, L.; Turgut, D. Path finding for maximum value of information in multi-modal underwater wireless sensor networks. IEEE Trans. Mob. Comput. 2018, 17, 404–418. [Google Scholar] [CrossRef]
  49. Khan, F.A.; Khan, S.A.; Turgut, D.; Bölöni, L. Scheduling multiple mobile sinks in Underwater Sensor Networks. In Proceedings of the IEEE 40th Conference on Local Computer Networks (LCN), Clearwater Beach, FL, USA, 26–29 October 2015; pp. 149–156. [Google Scholar]
  50. Khan, F.A.; Khan, S.A.; Turgut, D.; Bölöni, L. Optimizing resurfacing schedules to maximize value of information in UWSNs. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–5. [Google Scholar]
  51. LaValle, S.M. Planning Algorithms; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
  52. Hwang, Y.K.; Ahuja, N. Gross motion planning—A survey. ACM Comput. Surv. 1992, 24, 219–291. [Google Scholar] [CrossRef]
  53. Vasudevan, C.; Ganesan, K. Case-based path planning for autonomous underwater vehicles. Auton. Robot. 1996, 3, 79–89. [Google Scholar] [CrossRef]
  54. Carroll, K.P.; McClaran, S.R.; Nelson, E.L.; Barnett, D.M.; Friesen, D.K.; William, G. AUV path planning: An A* approach to path planning with consideration of variable vehicle speeds and multiple, overlapping, time-dependent exclusion zones. In Proceedings of the IEEE Symposium on Autonomous Underwater Vehicle Technology, Washington, DC, USA, 2–3 June 1992; pp. 79–84. [Google Scholar]
  55. Petres, C.; Pailhas, Y.; Patron, P.; Petillot, Y.; Evans, J.; Lane, D. Path planning for autonomous underwater vehicles. IEEE Trans. Robot. 2007, 23, 331–341. [Google Scholar] [CrossRef]
  56. Garau, B.; Alvarez, A.; Oliver, G. Path planning of autonomous underwater vehicles in current fields with complex spatial variability: An A* approach. In Proceedings of the 2005 IEEE International Conference on Robotics and Automation, Barcelona, Spain, 18–22 April 2005; pp. 194–198. [Google Scholar]
  57. Fu-guang, D.; Peng, J.; Xin-qian, B.; Hong-Jian, W. AUV local path planning based on virtual potential field. In Proceedings of the IEEE International Conference of Mechatronics and Automation, Niagara Falls, ON, Canada, 29 July–1 August 2005; Volume 4, pp. 1711–1716. [Google Scholar]
  58. Sugihara, K.; Yuh, J. GA-based motion planning for underwater robotic vehicles. In International Symposium on Unmanned Untethered Submersible Technology; University of New Hampshire-Marine Systems: Durham, UK, 1997; pp. 406–415. [Google Scholar]
  59. Fox, R.; Garcia, A.; Nelson, M.A.; Nelson, M. A Three-dimensional Path Planning Algorithm for Autonomous Vehicles. In International Symposium on Unmaned Untethered Submersible Technology; University of New Hampshire-Marine Systems: Durham, UK, 1999; pp. 546–553. [Google Scholar]
  60. Alvarez, A.; Caiti, A.; Onken, R. Evolutionary path planning for autonomous underwater vehicles in a variable ocean. IEEE J. Ocean. Eng. 2004, 29, 418–429. [Google Scholar] [CrossRef]
  61. Rathbun, D.; Kragelund, S.; Pongpunwattana, A.; Capozzi, B. An evolution based path planning algorithm for autonomous motion of a UAV through uncertain environments. In Proceedings of the 21st Digital Avionics Systems Conference, Irvine, CA, USA, 27–31 October 2002; Volume 2, pp. 8D2-1–8D2-12. [Google Scholar]
  62. Howard, R.A. Information value theory. IEEE Trans. Syst. Sci. Cybern. 1966, 2, 22–26. [Google Scholar] [CrossRef]
  63. Ponssard, J.P. On the concept of the value of information in competitive situations. Manag. Sci. 1976, 22, 739–747. [Google Scholar] [CrossRef]
  64. Kamien, M.I.; Tauman, Y.; Zamir, S. On the value of information in a strategic conflict. Games Econ. Behav. 1990, 2, 129–153. [Google Scholar] [CrossRef] [Green Version]
  65. Kamar, E.; Horvitz, E. Light at the end of the tunnel: A Monte Carlo approach to computing value of information. In Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, International Foundation for Autonomous Agents and Multiagent Systems, St. Paul, MN, USA, 6–10 May 2013; pp. 571–578. [Google Scholar]
Figure 1. The UWSN mesh setting used for the simulation study. The same arrangement will be used for simulation and experimentation in the results section. The blue colored path is of the AUV that uses LPP, red of the AUV that uses GPP and green of the AUV that uses GIPP. The GPP visits one hot-spot after another. Notice how LPP stumbles upon a hot-spot, i.e., discovers it by chance. Also, observe how GIPP visits intermediate nodes in-between hot-spot visits.
Figure 1. The UWSN mesh setting used for the simulation study. The same arrangement will be used for simulation and experimentation in the results section. The blue colored path is of the AUV that uses LPP, red of the AUV that uses GPP and green of the AUV that uses GIPP. The GPP visits one hot-spot after another. Notice how LPP stumbles upon a hot-spot, i.e., discovers it by chance. Also, observe how GIPP visits intermediate nodes in-between hot-spot visits.
Sensors 18 03414 g001
Figure 2. Infotentials: (a) The figure on the left is an example of exponentially decaying infotentials that we use for modelling and analyzing high-priority and low-priority events; (b) The figure on the right shows various parameters and measures that we use for comparative analysis of path planning algorithms.
Figure 2. Infotentials: (a) The figure on the left is an example of exponentially decaying infotentials that we use for modelling and analyzing high-priority and low-priority events; (b) The figure on the right shows various parameters and measures that we use for comparative analysis of path planning algorithms.
Sensors 18 03414 g002
Figure 3. The top two graphs (colored in blue) are for Υ A c c while the bottom two are for Υ L while the graphs on the left are for the valuation ratio range [ 10 0 : 10 9 ] while the graphs on the right are a magnification between [ 10 4 : 10 5 ] : (a) The top-left graph is for Υ A c c n which is charted in the range [ 10 0 : 10 9 ] ; (b) The top-right graph is for Υ A c c n which is charted in the range [ 10 4 : 10 5 ] ; (c) The bottom-left graph is for Υ L n which is charted in the range [ 10 0 : 10 9 ] ; (d) The bottom-right graph is for Υ L n which is charted in the range [ 10 4 : 10 5 ] .
Figure 3. The top two graphs (colored in blue) are for Υ A c c while the bottom two are for Υ L while the graphs on the left are for the valuation ratio range [ 10 0 : 10 9 ] while the graphs on the right are a magnification between [ 10 4 : 10 5 ] : (a) The top-left graph is for Υ A c c n which is charted in the range [ 10 0 : 10 9 ] ; (b) The top-right graph is for Υ A c c n which is charted in the range [ 10 4 : 10 5 ] ; (c) The bottom-left graph is for Υ L n which is charted in the range [ 10 0 : 10 9 ] ; (d) The bottom-right graph is for Υ L n which is charted in the range [ 10 4 : 10 5 ] .
Sensors 18 03414 g003
Figure 4. Bar graphs for justifying the use of various heuristics: (a) Greedy vs. Lawn-Mower; (b) Inter-Node Traversal Advantage; (c) Hybrid Advantage; (d) Hybrid vs. Greedy counterparts.
Figure 4. Bar graphs for justifying the use of various heuristics: (a) Greedy vs. Lawn-Mower; (b) Inter-Node Traversal Advantage; (c) Hybrid Advantage; (d) Hybrid vs. Greedy counterparts.
Sensors 18 03414 g004
Figure 5. Comparative analysis for Υ A C C & Υ L : (a) The top stacked bar graph is for VoI accumulated Υ A C C ; (b) The bottom stacked bar graph is for VoI lost Υ L .
Figure 5. Comparative analysis for Υ A C C & Υ L : (a) The top stacked bar graph is for VoI accumulated Υ A C C ; (b) The bottom stacked bar graph is for VoI lost Υ L .
Sensors 18 03414 g005
Figure 6. Comparative analysis for T t o u r & Ω : (a) The top stacked bar graph is for time to complete the tour T t o u r ; (b) The bottom stacked bar graph is for the efficiency measure Ω .
Figure 6. Comparative analysis for T t o u r & Ω : (a) The top stacked bar graph is for time to complete the tour T t o u r ; (b) The bottom stacked bar graph is for the efficiency measure Ω .
Sensors 18 03414 g006
Figure 7. Scaling of response w.r.t. number of hot-spots N H S : (a) Percentage improvement in VoI accumulated Υ A C C ; (b) Percentage reduction in VoI lost Υ L ; (c) Percentage reduction in tour time T T o u r ; (d) Normalized measure of efficiency Ω .
Figure 7. Scaling of response w.r.t. number of hot-spots N H S : (a) Percentage improvement in VoI accumulated Υ A C C ; (b) Percentage reduction in VoI lost Υ L ; (c) Percentage reduction in tour time T T o u r ; (d) Normalized measure of efficiency Ω .
Sensors 18 03414 g007
Figure 8. Emergency Response w.r.t. number of hot-spots N H S : (a) Percentage improvement in VoI accumulated from first hot-spot υ H S A C C ; (b) Percentage reduction in VoI lost from first hot-spot υ H S L ; (c) Percentage reduction in time to reach first hot-spot τ H S ; (d) Normalized urgency score Ψ .
Figure 8. Emergency Response w.r.t. number of hot-spots N H S : (a) Percentage improvement in VoI accumulated from first hot-spot υ H S A C C ; (b) Percentage reduction in VoI lost from first hot-spot υ H S L ; (c) Percentage reduction in time to reach first hot-spot τ H S ; (d) Normalized urgency score Ψ .
Sensors 18 03414 g008

Share and Cite

MDPI and ACS Style

Khan, F.A.; Butt, S.; Khan, S.A.; Bölöni, L.; Turgut, D. Value of Information Based Data Retrieval in UWSNs. Sensors 2018, 18, 3414. https://doi.org/10.3390/s18103414

AMA Style

Khan FA, Butt S, Khan SA, Bölöni L, Turgut D. Value of Information Based Data Retrieval in UWSNs. Sensors. 2018; 18(10):3414. https://doi.org/10.3390/s18103414

Chicago/Turabian Style

Khan, Fahad Ahmad, Sehar Butt, Saad Ahmad Khan, Ladislau Bölöni, and Damla Turgut. 2018. "Value of Information Based Data Retrieval in UWSNs" Sensors 18, no. 10: 3414. https://doi.org/10.3390/s18103414

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop