Next Article in Journal
EDDA: An Efficient Distributed Data Replication Algorithm in VANETs
Previous Article in Journal
A Maximum Feasible Subsystem for Globally Optimal 3D Point Cloud Registration
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems

1
School of Computer and Information Technology, Xinyang Normal University, Xinyang 464000, Henan, China
2
School of Computer and Electronic Information, Guangxi University, Nanning 530004, China
3
Global Big Data Technologies Centre, University of Technology Sydney, Ultimo 2007, Australia
4
Data61, CSIRO, Sydney NSW 1466, Australia
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 546; https://doi.org/10.3390/s18020546
Submission received: 16 January 2018 / Revised: 6 February 2018 / Accepted: 8 February 2018 / Published: 10 February 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
In the post-Cloud era, the proliferation of Internet of Things (IoT) has pushed the horizon of Edge computing, which is a new computing paradigm with data processed at the edge of the network. As the important systems of Edge computing, wireless sensor and actuator networks (WSANs) play an important role in collecting and processing the sensing data from the surrounding environment as well as taking actions on the events happening in the environment. In WSANs, in-network data storage and information discovery schemes with high energy efficiency, high load balance and low latency are needed because of the limited resources of the sensor nodes and the real-time requirement of some specific applications, such as putting out a big fire in a forest. In this article, the existing schemes of WSANs on data storage and information discovery are surveyed with detailed analysis on their advancements and shortcomings, and possible solutions are proposed on how to achieve high efficiency, good load balance, and perfect real-time performances at the same time, hoping that it can provide a good reference for the future research of the WSANs-based Edge computing systems.

1. Introduction

With the fast development of Internet of Things (IoT) [1] and the coming fifth generation mobile communication systems (5G) [2,3], we are now arriving in the post-Cloud era, where a large quality of data are generated by things and many applications will also be deployed at the edge of the network to consume these data. Because data are produced at the edge of the network increasingly, it would also be more efficient to process the data at the edge, which leads to a novel computing paradigm, namely Edge computing [4,5].
In recent years, an important network paradigm of Edge computing, namely Wireless Sensor and Actuator Networks (WSANs) [6,7], has entered a stage of rapid development, and more and more WSANs-based Edge computing systems have been used in a lot of applications, such as new energy resources [8], industrial automation [9], smart agriculture [10], intelligent transportation [11], building automation [12], and environment monitoring and protection [13,14]. Unlike Wireless Sensor Networks (WSNs) [15,16,17], which mainly contain sensor nodes organized in a wireless and Ad-hoc manner, WSANs are heterogeneous networks and consist of not only sensor nodes but also actuators. The sensor nodes in WSANs take the similar tasks as they are in WSNs, such as data collection, while the actuators are responsible for taking actions on the events happening in the monitored field as well as processing and storing the data collected by the sensor nodes. Generally speaking, the actuators have much more resources, such as the storage space and the energy, much stronger computation capability and longer communication radius than the sensor nodes. Thus, protocols and schemes should be designed specifically for WSANs rather than immigrating them directly from WSNs.
In this paper, we focus on the data storage and information discovery technologies, which are the core technologies of the WSANs-based Edge computing systems, in WSANs and conduct a survey of the existing related schemes. In summary, the main contributions of this paper are listed as follows:
  • We first summarize the data-storage and information-discovery schemes proposed for WSNs, and analyze why those schemes are not fit for the WSANs-based Edge computing systems. We do this because there are many similarities between the WSANs-based Edge computing systems and the WSNs-based systems.
  • The existing schemes proposed for WSANs on data storage and information discovery are surveyed and compared with each other, and detail analysis on their advancements and shortcomings is also presented.
  • Possible solutions are given on how to achieve high efficiency, high load balance, and perfect real-time performances at the same time for data storage and information discovery in the WSANs-based Edge computing systems.
The remainder of this paper is organized as follows: in Section 2, we summarize the existing related schemes for WSNs, and analyze why they are not fit for the WSANs-based Edge computing systems. In Section 3, we survey the schemes on data storage and information discovery proposed for WSANs, and discuss their advancements and shortcomings. In Section 4, possible solutions to achieving the aforementioned multi-objectives in the WSANs-based Edge computing systems are proposed. In Section 5, we conclude the paper.

2. Analyzing Whether the Data-Storage and Information-Discovery Schemes Proposed for WSNs Fit for WSANs

Before surveying the data-storage and information-discovery schemes for the WSANs-based Edge computing systems, we first categorize schemes proposed for WSNs because there are many commonalities between WSNs and WSANs. In WSNs, the problem of data storage and information discovery has been studied for many years. In a nutshell, data are stored in WSNs mainly based on the following three models: (1) data are stored among the sensor nodes in a distributed manner [18,19,20,21,22,23,24,25,26,27,28]; (2) data are stored at the static Sink node/nodes intensively [29,30,31,32,33]; (3) data are collected and stored at some mobile elements [34,35,36,37,38,39,40,41], such as mobile Sinks. For the first model, queries should be launched across the sensor nodes to search for and discover the needed information; for the second and third models, the needed information can be discovered directly at the static Sink node/nodes or the mobile elements.
Although these models work well in WSNs, they may not be fit for WSANs. First of all, a storage model that allows all the sensing data to be stored among the sensor nodes may not be suitable for WSANs. Unlike WSNs, which mainly consist of sensor nodes, WSANs are heterogeneous and composed of not only the sensor nodes but also the actuators. The actuators have more resources and longer communication ranges than the sensor nodes. Thus, if all data are stored at sensor nodes, there can be a waste of the resources and the capabilities of the actuators. Moreover, the data-storage and information-discovery schemes based on this model in WSNs have not taken into account the problem of coordination between the sensor nodes and the actuators, which only exists in WSANs. Secondly, the centralized storage model, which relies on static Sink nodes, is not applicable to WSANs. The reason is because: on the one hand, the storage schemes proposed for WSNs based on this model still lack negotiation and the coordination mechanisms between the sensor nodes and the actuators; on the other hand, the actuators in WSANs are usually mobile and can respond to the events that may happen in other regions. Finally, the data collection model utilizing mobile Sinks or elements are not unsuitable for WSANs either. In WSANs, the actuators have to move to the locations where events occur to take some actions. Because the events may happen anywhere at any time, the destinations for the actuators to move to can be random, and the frequencies for actuators to move are also random. Moreover, because a quick response is required in WSANs to respond to the events occurring in the monitored field, the actuators need to move to the destinations directly as fast as possible. Thus, it is impossible to design the moving paths and the time duration to stay in each of the locations for the actuators to collect data, as the mobile elements typically do in WSNs.
From the analysis presented above, we can see that it is non-trivial to migrate the data-storage and information-discovery schemes developed for WSNs directly to WSANs, and specially designed novel schemes need to be developed for the WSANs-based Edge computing systems.

3. Analysis of the Data-Storage and Information-Discovery Schemes Proposed for WSANs

To the best of our knowledge, the WSANs-based Edge computing systems on data storage and information discovery are emerging research areas, and not much research has to date been carried out [42,43,44,45,46,47,48,49,50,51,52,53,54]. Those existing schemes mainly follow two basic models: the query-driven model and the event-driven model. In the following, we describe these two models separately and analyze the related schemes based on them.

3.1. Schemes Based on the Query-Driven Model

As for the query-driven model, sensing data generated by the sensor nodes are stored in a distributed manner in WSANs, and queries are launched across the network to search the information that the consumers (sensor nodes, actuators, or other network users) are interested in. The typical storage method based on this model is data-centric storage [42], where a distributed storage system is constructed according to the data or event type. In the distributed storage system, each event type has a mapping node, also known as rendezvous node or home node. Because of the limited storage capacity of a mere sensor node, the mapping node may have one or more replicas in the storage system. When data are generated by the sensor nodes, the data will be sent to the mapping node or its replicas and stored according to the type of the data. A consumer interested in retrieving the data needs to launch and send a query to the mapping node or its replicas according to the interesting data type.
In 2011, Cuevas et al. analyzed several data-centric-storage and information-discovery schemes and found that the schemes using more than one rendezvous node perform much better than those just using a single rendezvous node for each data type in terms of minimizing the overall network traffic [42]. They classify the applications of data storage and information discovery into four profiles according to the taxonomy whether the data are aggregated or not and whether the consumption traffic dominates the production traffic or the other way around: (1) the consumption traffic dominates the production one with no data aggregation; (2) the production traffic dominates the consumption one with no data aggregation; (3) the consumption traffic dominates the production one with data aggregation; and (4) the production traffic dominates the consumption one with data aggregation. For each profile, they design a data-storage and information-discovery scheme. Specifically, in the first application profile, event data that are generated by any producer are first sent to the closest replica of the producer to get stored, and then the replica sends the copies of the event data to the remaining replicas. Any consumer just needs to send a query to the nearest replica to retrieve the data that it is interested in; in the second application profile, any producer stores its own data just at the closest replica. To discover the interesting information, any consumer first sends a query to its closest replica, and then the query will be forwarded in turn to the remaining replicas; in the third application profile, the way to store the data and discover the information is similar to that in the first profile, and the mere difference is that the event data in the third profile should be aggregated at the replicas before being forwarded to the left ones rather than forwarded directly; the last application profile is similar to the second one, the difference is that, after a consumer forwards a query along a data replication tree, which is rooted at the closest replica, all the retrieved data should be aggregated at all the replicas they pass in the replication tree. The mechanisms of data storage and information discovery in the four application profiles are illustrated in Figure 1.
Although the authors in [42] have considered many scenarios to make the data-storage and information-discovery schemes as perfect as possible and they even have designed four analysis models to compute the optimal number of replicas corresponding to the four application profiles (Figure 1), there is something more they need to do because they did not consider the update of the replicas. Generally speaking, the loads of the replicas are much heavier than other normal sensor nodes. If the replicas cannot exchange roles with the normal sensor nodes, they will die much faster and the network lifetime will be shrunk greatly. Moreover, if the replicas never have been changed, the data stored on the replicas will not last long, and they will be overwritten within a short time period because of the limited storage capacity of the replicas.
In 2014, to support long-term storage as well as prolonging the lifetime of WSANs, Angel Cuevas et al. proposed a novel data-centric storage framework [44], in which the rendezvous nodes are updated periodically based on periods of fixed duration called epochs so that it is possible to perform temporal queries to previous rendezvous nodes in order to discovery information from the past [44]. The significant contribution in [44] is that it presents a model to compute the optimal number of replicas that can maximize the data availability. Specifically, suppose r sensor nodes out of N nodes are selected out as the replicas, then the optimal value of r is the one to minimize the probability P(Ai(0, t] > S, ∀i = 1, 2, …, r), which is shown in Equation (1) [44], assuming that N >> r:
P ( A i ( 0 , t ] > S ,   i = 1 , 2 , ) = ( 1 i = 1 S ( t i ) ( r N ) i ( 1 r N ) t i ) r .
In Label (1), Ai(0, t] denotes the times that the ith node is selected as a replica after epoch 0 and before epoch t, and S symbolizes the ratio of the number of events for which a replica can store in its storage space to the number of events a sensor node needs to store in an epoch.
From our point of view, the schemes mentioned above are generally unsuitable for WSANs because they are similar with those proposed for WSNs and can be seen as a straightforward extension of WSNs to WSANs. Those schemes cannot effectively utilize the rich resources of the actuators, and they do not consider the mobility feature of the actuators either. In fact, because of the mobility of the actuators, it is challenging to take actuators as the rendezvous nodes traditional data-centric storage schemes should not be straightforwardly applied. Moreover, using such a data-centric storage model can hardly achieve real-time information discovery because event data are not sent directly to the actuators.

3.2. Schemes Based on the Event-Driven Model

In the schemes with event-driven models, when sensor nodes detect the events happing in the monitored field, they send them directly to actuators. Thus, actuators can acquire the event data without launching queries, and the real-time information discovery can be achieved. In this model, the challenging problems include how to ensure the real-time, reliable, secure and lightweight routing algorithms from the sensor nodes to the actuators [45,46,47,48,49], how to improve the coordination among the sensor nodes and the actuators [50], as well as how to execute tasks efficiently for the actuators [51,52,53].
In 2010, to improve the reliability and the real-time performances of the event-data transmission from the sensor nodes to the actuators, Dr. Edith Ngai proposed a delay-aware reliable event-reporting framework for WSANs [45]. The overall reliability index used in [45] can be formalized as
= e ( I m p ( e ) e I m p ( e ) × r e ) ,
with the condition that the end-to-end delay of data report is smaller than or equal to the latency bound of reporting an event e. In Label (2), Imp(e) symbolizes the importance degree of the event e, and re denotes the reliability index of the event e, where re can also be comprehended as the proportion of the data reports that arrive at an actuator within a given delay bound and without data-aggregation and transmission failure. In this framework, the sensor field is divided into grids. In each grid, a random sensor node is in turn selected out as an aggregation node, it aggregates the event data from all the other sensor nodes in its own grid and then sends them to another aggregation node in another grid to get further aggregation. Finally, the aggregation result will be sent to the actuator by a reporter, which is selected from the aggregation nodes. This procedure is illustrated in Figure 2.
The core model of the framework proposed in [45] is the routing and transmission protocol from the reporter to the actuator. To make as many reports as possible reach the actuator within the latency bound and the reports that have higher importance levels reach the actuator with less latency, the protocol utilizes a priority queue model in each sensor node. In other words, each sensor node has several queues, each of which corresponds to an importance level, in its cache. Packets with higher importance levels will be placed in the corresponding higher-level queues, and will be transmitted prior to the ones with lower importance levels. Moreover, the priority queue model is also used to determine the route selection. Take Figure 3 as an example. When node i receives an event report ei, it will deliver it to node j3 because the queue with highest importance level in j3 is empty so that ei can be transmitted with less latency by j3.
To the best of our knowledge, the framework in [45] is the first to study WSANs from the data-importance point of view. However, this framework can only work well when the actuators are static. In the scenarios where the actuators can move randomly, the framework does not include a method on how to search the nearest actuators for the sensor nodes. In fact, due to the duty cycle of sensor nodes and the actor mobility, it is a challenging issue to forward the data from sensor nodes to mobile actors effectively with low delay.
In 2011, Xu et al. proposed a location-searching strategy namely ballooning [54] to find out the latest locations of the mobile actuators. In the network model presented in [54], the network field is divided into grids, and all the grids are classified into three categories: the cleared grids, the contaminated grids, and the clearing grids. By making the clearing grids form a closed source-centered balloon that packages all the cleared grids, ballooning achieves the aim that any contaminated grid is not adjacent to any cleared one, since they are separated by the clearing grids inside the balloon. As the closed balloon grows larger and larger, the latest actuator will be discovered once it is covered by the clearing grids. The ballooning strategy is illustrated in Figure 4.
Although using the ballooning strategy can ensure that the actuators can be discovered within a latency bound, there is still big space to improve its energy efficiency because of the inflation of the balloon in many directions. The worst case is that the actuator is discovered at the boundary of the network field so that the discovery message has to be broadcasted almost every node in the network during the inflation of the balloon. Moreover, in ballooning, no method is presented to solve the problem how to make the balloon stop inflating at other directions when the latest actuator is discovered at one direction.
In 2012, Xu et al. proposed another location-searching protocol, namely MLS (Mobility Location Service) [55]. In MLS, the network field is also divided into grids as in [54], and the only actuator moves in a Random Waypoint Model [56] with no pause time (in the Random Waypoint Model, an actuator repeats to do the following two steps: (1) choose a destination randomly; and (2) move to the destination with a constant speed v along a straight line.). Each time when the actuator reach a destination (x0, y0), it disseminates an update package, which includes: (1) the current timestamp t0; (2) the current location (x0, y0); (3) the destination (x1, y1); and (4) the moving time τ, to all the nodes, which act as the location servers during the moving time τ, in the grids of the same column as the actuator is currently located in. The moving time τ can be calculated as follows [55]:
τ = ( x 1 x 0 ) 2 + ( y 1 y 0 ) 2 v .
When a sensor node (the source) detects an event, it forwards the event report at both west and east directions. One of the location servers must receive the event report finally because of the intersection of the rows and the columns. Then, the location server who receives the event report estimates the current location (x′, y′) of the actuator according to Equation (4) [55], where t is the timestamp when the location server who received the event report begins to estimate the location of the actuator, and then forwards the event report to the actuator using geographic routing protocol [57]. This procedure is shown in Figure 5:
{ x = x 0 + t t 0 τ × ( x 1 x 0   ) y = y 0 + t t 0 τ × ( y 1 y 0   ) .
Although the simulation results in [55] show that MLS performs better than some of the existing schemes about location services in WSANs on energy efficiency and scalability, it cannot cover up the obvious drawback of MLS that it requires perfect time synchronization, which is hard to be achieved in WSANs.
From the above-mentioned schemes, we can find that it is very important to find out an energy-efficient and delay-bounded strategy to deliver the events detected by the sensor nodes to the actuators or the Sink (for some WSANs which include the Sink) during the procedure of data storage and information discovery in WSANs. In fact, to achieve a QoS (Quality of service)-support routing, another metric should also be considered: the delivery ratio. In 2013, Mustafa et al. proposed a dynamic-interest-based lightweight routing protocol named LRP-QS (Lightweight Routing Protocol with QoS Support) [47]. In LRP-QS, the sensor nodes can evaluate the importance rankings of the event reports corresponding to the interests, which are actually the types of the event data and disseminated from the Sink to the actuators and the sensor nodes, locally according to the variable quality of the event data of each interest. Specifically, the interest with higher value fluctuation has higher importance ranking than those with lower value fluctuation for a given time period, and the ones with higher importance rankings will be allocated more resources to ensure their delivery quality. The simulation results in [47] show that LRP-QS can achieve a higher packet delivery ratio and a lower memory consumption than the existing state-of-the-art protocols.
To a certain degree, Ref. [47] shows that differentiating data according to their importance ranking can directly affect the QoS performance of the routing protocols, and consequently affect the performances of data storage and information discovery of WSANs in terms of time and energy efficiency.
In 2016, to enable sensing data to reach actuators reliably and efficiently, Shen et al. proposed a Kautz-based REal-time, Fault-tolerant and EneRgy-efficient WSAN system(REFER) [48]. REFER divides a WSAN field into cells, and embeds Kautz graphs into the physical topology of a WSAN in each cell. Then, it connects the Kautz graphs in every cell using Distributed Hash Table (DHT) for high scalability. The architecture of the REFER system is shown in Figure 6. In this system, communications can be classified into two types: intra-cell communications and inter-cell communications. A sensor node that detects an event firstly transmits the event report to one of the actuators in its own cell using inter-cell communications, and then the event report is transmitted by the actuators using intra-cell communications. After studying the routing paths in the Kautz graph-theoretically, an efficient fault-tolerant routing protocol, an example of which is shown in Figure 6, was also proposed in [48] based on the Kautz graph.
The simulation results in [48] show that REFER can outperform many other existing WSAN systems in terms of energy efficiency, fault-tolerance, real-time communication, and scalability. However, the cell division and the maintaining of the Kautz-graph-based topology in each cell all depend on the locations of the actuators. If the actuators move randomly and frequently, it would cost much energy to maintain the Kautz-graph-based topology. Thus, REFER is much more suitable for the scenarios where actuators are static.

3.3. Comprehensive Comparison and Analysis

From the description and the analysis presented above, we can see that the existing schemes based on the query-driven model mainly store the sensing data in a distributed way among the sensor nodes, and it can hardly achieve the real-time information discovery. As for the existing schemes based on the event-driven model, although sending the data directly to the actuators to get stored can shrink the delay of discovering the event information, the energy consumption on updating the latest locations of the actuators across the network should attract our attention if the actuators move frequently. Moreover, if the amount of the sensing data is large, sending them all to the mobile actuators, which may not be located at the optimal storage locations because of carrying out the tasks, will not be energy efficient.
To illustrate the performances of the above-mentioned WSANs-based Edge computing systems on different metrics clearly, we make a tabular presentation in Table 1.

4. Possible Solutions to Achieve the Multi-Objectives on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems

In this section, we discuss potential technologies to achieve multi-objectives, such as high energy efficiency, high load balance and perfect real-time performance for data storage and information discovery in the WSANs-based Edge computing systems.
First of all, collaborative mechanisms for data storage and information discovery in WSANs should be researched and utilized. Both sensor nodes and actuators in WSANs should undertake part of the tasks of data storage and information discovery to improve the utilization ratio of the storage capacity of all types of nodes in WSANs and the load balance of WSANs. From the analysis presented in Section 3, we notice that the existing data storage schemes in WSANs either store all data on sensor nodes or store them all on actuators. It is hard for those schemes to achieve the above-mentioned multi-objectives in WSANs, the reasons of which are described as following: (1) consider the case that all data are stored on the actuators in WSANs. In this case, if sensor nodes send their sensing data directly as soon as the data are generated, each actuator must broadcast its latest location every time when it moves to a new place so that sensor nodes are able to know where to send their data. Moreover, because the events may occur at any time and any place in the network field and actuators must move to the places where the events happen to deal with them, it is impossible for the actuators to stay at the optimal storage locations all the time. Thus, it is hard to achieve high energy efficiency on data storage if all data are sent to the actuators and stored as soon as they are generated. It is straightforward to propose to let the actuators collect the data just like the data-collection schemes based on mobile elements in WSNs. Of course, this is energy-efficient, but its real-time performance would be compromised because it takes a lot of time for the actuators to move and collect the data of all the sensor nodes, especially when the network fields are large; (2) consider the case that all data are stored on sensor nodes in a distributed way. In this case, the actuators have to launch queries to search for the data that they are interested in. On one side, if the query frequencies of the actuators are low, it is impossible to achieve real-time information discovery. On the other side, if the query frequencies of the actuators are high, the energy efficiency will be low, especially when the events happen infrequently.
Considering the heterogeneous character of WSANs, to make the sensor nodes and the actuators collaborate efficiently on data storage and information discovery, a hierarchical storage model should be more suitable for WSANs. In other words, the sensor nodes are at one level while the actuators are at another level.
Secondly, task allocation for the actuators should tend to improve the load-balance performance of the schemes on data storage and information discovery in WSANs. When an event is detected in a WSAN, existing schemes on task allocation require the actuator, which is the closest to the place where the event occurs, to move to the place and deal with the event. As an alternative, choosing actuators randomly to deal with the events may be a better choice from the load-balance point of view. In this way, the distribution of the actuators can be adjusted adaptively according to the data generating rates of the sensor nodes. The final adjusting result should be that the regions with more events happening will attract more actuators. Thus, there will be more nodes with better storage capacity to share the storage load in the regions where data-generating rates are high. Moreover, for the sensor nodes that need to store their data on the actuators, choosing actuators randomly to get their data stored will also improve the load balance of the sensor nodes themselves because they should send the data along different routes to reach different actuators in different places randomly.
Finally, to achieve the aforementioned multi-objectives for data storage and information discovery, the data generated in WSANs should also be studied. By observation, we find that the data generated in WSANs are different in importance. For example, the outliers are more important than the normal data because the emergency of the outliers implies the abnormal events; the data with small emerging probabilities are more important than those with bigger emerging probabilities because the former contains much more information; the data that meet the interests of the users are more important than those do not meet the interests of the users because only the users are concerned about the data that they are interested in. Moreover, we also find that data with different importance levels (or priorities) have different characteristics and requirements for WSANs. For instance, the data with higher importance levels are generally generated with lower rates, and the total amount of them is relatively small. They have much higher requirements on the real-time performance of the data-storage and information-discovery schemes in WSANs. For the data with lower importance levels, their generating rates are relatively much higher, and they require the data-storage and information-discovery schemes to perform much better on energy efficiency and load balance. As for the data that are not important at all or even invalid [58], the sensor nodes can even drop them to save the resources. Thus, based on the hierarchical data storage model, the future proposed schemes that will involve different data-storage and information discovery mechanisms for the data with different importance degrees should be possible solutions for achieving the aforementioned multi-objectives in the WSANs-based Edge computing systems.

5. Conclusions

The WSANs-based Edge computing systems are meeting their fast developing opportunities in the post-Cloud era, and are used in more and more applications. As one of the most important technologies in the systems, the data-storage and information-discovery technology is surveyed in this paper. By analyzing existing works, we find that the existing schemes of WSNs are not suitable for WSANs because of their different network architectures and characteristics. Moreover, the existing schemes of WSANs still have many shortcomings, one of which is that they cannot achieve multi-objectives including high energy efficiency, high load balance and perfect real-time performance at the same time. Possible solutions, as proposed in this paper, to overcome the shortcomings of the existing schemes in WSANs are based on our observation and analysis, and we suggest they should be utilized during the future research on data storage and information discovery in the WSANs-based Edge computing systems.
Moreover, according to our surveys, few existing schemes of data storage and information discovery have considered the related security issues, such as how to preserve the integrity of the data stored on the actuators and how to achieve efficient mutual authentication among the nodes at different levels of WSANs in order to ensure that the important information in WSANs is only able to be discovered by the trustworthy nodes. Thus, joining the security consideration should be another future research direction of data storage and information discovery in the WSANs-based Edge computing systems.
Finally, existing schemes of data storage and information discovery in the WSANs-based Edge computing systems mainly consider the case that all sensor nodes are static. In the coming 5G era, there will be a lot of data which are generated by sensors on mobile devices [59]. Thus, how to achieve the above-mentioned multi-objectives for the WSANs-based Edge computing systems on data storage and information discovery in mobile scenarios is another open issue.

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China (61702438, 61562005, 61501393, 61402393), the Natural Science Foundation of Henan Province of China (162300410234), the Nanhu Scholars Program for Young Scholars of XYNU, and the supporting program of young backbone teachers in Xinyang Normal University in the Henan Province of China (2015GGJS06).

Author Contributions

Xingpo Ma wrote the manuscript. Junbin Liang, Renping Liu, Wei Ni, and Chuanda Qi commented on the manuscript. Ran Li, Yin Li and Wenpeng Ma collected and analyzed the references.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al-Fuqaha, A.; Guizani, M.M.; Mohammadi, M.M.; Mohammed, A.; Moussa, A. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  2. Chen, S.; Zhao, J. The requirements, challenges, and technologies for 5G of terrestrial mobile telecommunication. IEEE Commun. Mag. 2014, 52, 36–43. [Google Scholar] [CrossRef]
  3. Han, T.; Ge, X.; Wang, L.; Kwak, K.S.; Han, Y.; Liu, X. 5G converged cell-less communications in smart cities. IEEE Commun. Mag. 2017, 55, 44–50. [Google Scholar] [CrossRef]
  4. Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge Computing: Vision and Challenges. IEEE Internet Things J. 2016, 3, 637–646. [Google Scholar] [CrossRef]
  5. Taleb, T.; Dutta, S.; Ksentini, A.; Lqbal, M.; Flinck, H. Mobile edge computing potential in making cities smarter. IEEE Commun. Mag. 2017, 55, 38–43. [Google Scholar] [CrossRef]
  6. Xu, Y.; Chen, X.; Liu, A.; Hu, C.A. Latency and Coverage Optimized Data Collection Scheme for Smart Cities Based on Vehicular Ad-hoc Networks. Sensors 2017, 17, 888. [Google Scholar] [CrossRef] [PubMed]
  7. Curiac, D.I. Towards wireless sensor, actuator and robot networks: Conceptual framework, challenges and perspectives. J. Netw. Comp. Appl. 2016, 63, 14–23. [Google Scholar] [CrossRef]
  8. Alves, M.; Pirmez, L.; Rossetto, S.; Delicato, F.; de Farias, C.; Pires, P.; dosSantos, I.; Zomaya, A. Damage prediction for wind turbines using wireless sensor and actuator networks. J. Netw. Comp. Appl. 2017, 80, 123–140. [Google Scholar] [CrossRef]
  9. Kan, Y.; Akerberg, J.; Gidlund, M.; Bjorkman, M. Realization and measurements of industrial wireless sensor and actuator networks. In Proceedings of the 2015 IEEE International Conference on Automation Science and Engineering, Gothenburg, Sweden, 24–28 August 2015; pp. 131–137. [Google Scholar]
  10. Sales, N.; Remedios, O.; Arsenio, A. Wireless sensor and actuator system for smart irrigation on the cloud. In Proceedings of the 2nd IEEE World Forum on Internet of Things, Milan, Italy, 14–16 December 2015; pp. 693–698. [Google Scholar]
  11. Zhou, J.; Chungui, L.; Zhang, Z. Intelligent transportation system based on SIP/ZigBee architecture. In Proceedings of the 2011 International Conference on Image Analysis and Signal Processing, Wuhan, China, 21–23 October 2011; pp. 405–409. [Google Scholar]
  12. Celtek, S.A.; Soy, H. An application of building automation system based on wireless sensor/actuator networks. In Proceedings of the 9th International Conference on Application of Information and Communication Technologies, Rostov-on-Don, Russia, 14–16 October 2015; pp. 450–453. [Google Scholar]
  13. Ghatak, S.; Bose, S.; Roy, S. Intelligent wall mounted wireless fencing system using wireless sensor actuator network. In Proceedings of the 2014 International Conference on Computer Communication and Informatics (ICCCI 2014), Coimbatore, India, 3–5 January 2014; pp. 1–5. [Google Scholar]
  14. Kułakowski, P.; Calle, E.; Marzo, J.L. Performance study of wireless sensor and actuator networks in forest fire scenarios. Int. J. Commun. Syst. 2013, 26, 515–529. [Google Scholar] [CrossRef]
  15. Tang, J.; Liu, A.; Zhao, M.; Wang, T. An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks. Secur. Commun. Netw. 2018, 6328504. [Google Scholar] [CrossRef]
  16. Chen, X.; Xu, Y.; Liu, A. Cross Layer Design for Optimizing Transmission Reliability, Energy Efficiency, and Lifetime in Body Sensor Networks. Sensors 2017, 17, 900. [Google Scholar] [CrossRef] [PubMed]
  17. Ma, F.; Liu, X.; Liu, A.; Zhao, M.; Huang, C.; Wang, T. A Time and Location Correlation Incentive Scheme for Deeply Data Gathering in Crowdsourcing Networks. Wirel. Commun. Mob. Comput. 2018, 2018, 8052620. [Google Scholar] [CrossRef]
  18. Gonizzi, P.; Ferrari, G.; Gay, V.; Laguay, J. Data dissemination scheme for distributed storage for IoT observation systems at large scale. Inf. Fusion 2015, 22, 16–25. [Google Scholar] [CrossRef]
  19. Maia, G.; Guidoni, D.; Viana, A.; Aquino, A.; Mini, R.; Loureiro, A. A distributed data storage protocol for heterogeneous wireless sensor networks with mobile sinks. Ad Hoc Netw. 2013, 11, 1588–1602. [Google Scholar] [CrossRef]
  20. Shao, M.; Zhu, S.; Zhang, W.; Cao, G.; Yang, Y. pDCS: Security and privacy support for data-centric sensor networks. IEEE Trans. Mob. Comput. 2009, 8, 1023–1038. [Google Scholar] [CrossRef]
  21. Ren, Y.; Oleshchuk, V.; Li, F. Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. Comput. Commun. 2013, 36, 1067–1077. [Google Scholar] [CrossRef]
  22. Talari, A.; Rahnavard, N. CStorage: Decentralized compressive data storage in wireless sensor networks. Ad Hoc Netw. 2016, 37, 475–485. [Google Scholar] [CrossRef]
  23. Albano, M.; Chessa, S. Replication vs. Erasure coding in data centric storage for wireless sensor networks. Comput. Netw. 2015, 77, 42–55. [Google Scholar] [CrossRef]
  24. Shen, H.; Zhao, L.; Li, Z. A distributed spatial-temporal similarity data storage scheme in wireless sensor networks. IEEE Trans. Mob. Comput. 2011, 10, 982–996. [Google Scholar] [CrossRef]
  25. Yu, Z.; Xiao, B.; Zhou, S. Achieving optimal data storage position in wireless sensor networks. Comput. Commun. 2010, 33, 92–102. [Google Scholar] [CrossRef]
  26. Ma, X.; Gao, J.; Wang, W.; Wang, J. A virtual-ring-based data storage and retrieval scheme in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 143, 869–876. [Google Scholar] [CrossRef]
  27. Liu, X.; Huang, Q.; Zhang, Y. Balancing push and pull for efficient information discovery in large-scale sensor networks. IEEE Trans. Mob. Comput. 2007, 6, 241–251. [Google Scholar]
  28. Lin, C.; Kuo, J.; Liu, B.; Tsai, M. GPS-free, boundary-recognition-free, and reliable double-ruling-based information brokerage scheme in wireless sensor networks. IEEE Trans. Comput. 2012, 62, 885–898. [Google Scholar]
  29. Liang, J.; Wang, J.; Li, T.; Chen, J. Maximum lifetime algorithm for precise data gathering based on tree in wireless sensor networks. Chin. J. Softw. 2010, 21, 2289–2303. [Google Scholar]
  30. Liu, C.; Wu, K.; Pei, J. An energy-efficient data collection framework for wireless sensor networks by exploiting spatiotemporal correlation. IEEE Trans. Parallel Distrib. Syst. 2007, 18, 1010–1023. [Google Scholar] [CrossRef]
  31. Dong, M.; Ota, K.; Liu, A.; Guo, M. Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 225–236. [Google Scholar] [CrossRef]
  32. Jiang, H.; Jin, S.; Wang, C. Prediction or Not? An energy-efficient framework for clustering-based data collection in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 1064–1071. [Google Scholar] [CrossRef]
  33. Liu, Y.; Dong, M.; Ota, K.; Liu, A.; Guo, M. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2013–2027. [Google Scholar] [CrossRef]
  34. Kumar, A.; Sivalingam, K.; Kumar, A. On reducing delay in mobile data collection based wireless sensor networks. Wirel. Netw. 2013, 19, 285–299. [Google Scholar] [CrossRef]
  35. Francesco, M.; Das, S.; Anastasi, G. Data collection in wireless sensor networks with mobile elements: A Survey. ACM Trans. Sens. Netw. 2011, 8, 7–41. [Google Scholar] [CrossRef]
  36. Gao, S.; Zhang, H.; Das, S. Efficient data collection in wireless sensor networks with path-constrained mobile sinks. IEEE Trans. Mob. Comput. 2011, 10, 592–608. [Google Scholar] [CrossRef]
  37. Khan, A.; Abdullah, A.; Anisi, M.; Bangash, J. A comprehensive study of data collection schemes using mobile sinks in wireless sensor networks. Sensors 2014, 14, 2510–2548. [Google Scholar] [CrossRef] [PubMed]
  38. Dhamdhere, S.; Guru, S. Robust data collection in wireless sensor networks with mobile sinks. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 4999–5002. [Google Scholar]
  39. Yang, S.; Adeel, U.; Tahir, Y.; Mccann, J. Practical opportunistic data collection in wireless sensor networks with mobile sinks. IEEE Trans. Mob. Comput. 2017, 16, 1420–1433. [Google Scholar] [CrossRef]
  40. Zhang, X.; Dai, H.; Xu, L.; Chen, G. Mobility-assisted data-gathering strategies in WSNs. Chin. J. Softw. 2013, 24, 198–214. [Google Scholar] [CrossRef]
  41. Sugihara, R.; Gupta, R. Path planning of data mules in sensor networks. ACM Trans. Sens. Netw. 2011, 8, 1–30. [Google Scholar] [CrossRef]
  42. Cuevas, Á.; Urueña, M.; Romeral, R.; Larrabeiti, D. Data centric storage technologies: Analysis and enhancement. Sensors 2010, 10, 3023–3056. [Google Scholar]
  43. Cuevas, Á.; Urueña, M.; Cuevas, R.; Romeral, R. Modelling data-aggregation in multi-replication data centric storage systems for wireless sensor and actuator Networks. IET Commun. 2011, 5, 1669–1681. [Google Scholar] [CrossRef]
  44. Cuevas, Á.; Urueña, M.; Veciana, G.; Cuevas, R.; Crespi, N. Dynamic data-centric storage for long-term storage in wireless sensor and actuator networks. Wirel. Netw. 2014, 20, 141–153. [Google Scholar] [CrossRef] [Green Version]
  45. Ngai, E.; Zhou, Y.; Lyu, M.; Liu, J. A delay-aware reliable event reporting framework for wireless sensor–actuator networks. Ad Hoc Netw. 2010, 8, 694–707. [Google Scholar] [CrossRef]
  46. Karimi, H.; Medhati, O.; Zabolzadeh, H.; Jamalpoor, A. Implementing a reliable, fault tolerance and secure framework in the wireless sensor-actuator networks for events reporting. Proc. Comput. Sci. 2015, 73, 384–394. [Google Scholar] [CrossRef]
  47. Mustafa, A.; Turgut, D. Lightweight routing with dynamic interests in wireless sensor and actuator networks. Ad Hoc Netw. 2013, 11, 2313–2328. [Google Scholar]
  48. Shen, H.; Li, Z. A Kautz-based wireless sensor and actuator network for real-time, fault-tolerant and energy-efficient transmission. IEEE Trans. Mob. Comput. 2016, 15, 1–16. [Google Scholar] [CrossRef]
  49. Kakarla, J.; Majhi, B.; Battula, R. Comparative analysis of routing protocols in wireless sensor–actuator networks: A review. Int. J. Wirel. Inf. Netw. 2015, 22, 220–239. [Google Scholar] [CrossRef]
  50. Mo, L.; Cao, X.; Chen, J.; Sun, Y. Collaborative estimation and actuation for wireless sensor and actuator networks. IFAC Proc. Vol. 2014, 47, 5544–5549. [Google Scholar] [CrossRef]
  51. Zeng, Y.; Li, D.; Vasilakos, A. Real-time data report and task execution in wireless sensor and actuator networks using self-aware mobile actuators. Comput. Commun. 2013, 36, 988–997. [Google Scholar] [CrossRef]
  52. Konstantopoulos, C.; Pantziou, G.; Venetis, I.; Gavalas, D. Efficient event handling in wireless sensor and actuator networks: An on-line computation approach. J. Netw. Comput. Appl. 2016, 75, 181–199. [Google Scholar] [CrossRef]
  53. Yi, J.; Shi, W.; Tang, Y.; Xu, L. A dynamic task scheduling for wireless sensor and actuator networks. Chin. J. Electron. 2010, 38, 1239–1244. [Google Scholar]
  54. Xu, Z.; Chen, C.; Guo, Y.; Guan, X. Ballooning: An agent-based search strategy in wireless sensor and actuator networks. IEEE Commun. Lett. 2011, 15, 944–946. [Google Scholar] [CrossRef]
  55. Xu, Z.; Chen, C.; Cheng, B.; Guan, X. Sharing mobility strategy improves location service in wireless sensor and actuator networks. IEEE Commun. Lett. 2012, 16, 858–861. [Google Scholar]
  56. Bettstetter, C.; Hartenstein, H.; Pérezcosta, X. Stochastic properties of the random waypoint mobility model. Wirel. Netw. 2004, 10, 555–567. [Google Scholar] [CrossRef]
  57. Bose, P.; Morin, P.; Stojmenovi’c, I.; Urrutia, J. Routing with guaranteed delivery in ad hoc wireless networks. Wirel. Netw. 2001, 7, 609–616. [Google Scholar] [CrossRef]
  58. Li, J.; Liu, X. An important aspect of big data: Data usability. J. Comput. Res. Dev. 2013, 50, 1147–1162. [Google Scholar]
  59. Ota, K.; Dong, M.; Gui, J.; Liu, A. QUOIN: Incentive Mechanisms for Crowd Sensing Networks. IEEE Netw. Mag. 2018. [Google Scholar] [CrossRef]
Figure 1. Data storage and information discovery in the four application profiles: (a) consumption traffic dominates production traffic with no data aggregation; (b) production traffic dominates consumption traffic with no data aggregation; (c) consumption traffic dominates production traffic with data aggregation; (d) production traffic dominates consumption traffic with data aggregation.
Figure 1. Data storage and information discovery in the four application profiles: (a) consumption traffic dominates production traffic with no data aggregation; (b) production traffic dominates consumption traffic with no data aggregation; (c) consumption traffic dominates production traffic with data aggregation; (d) production traffic dominates consumption traffic with data aggregation.
Sensors 18 00546 g001
Figure 2. Data aggregation and transmission in the framework proposed in [45].
Figure 2. Data aggregation and transmission in the framework proposed in [45].
Sensors 18 00546 g002
Figure 3. Route selection utilizing the priority queue model (priority: q1 > q2 > q3).
Figure 3. Route selection utilizing the priority queue model (priority: q1 > q2 > q3).
Sensors 18 00546 g003
Figure 4. The ballooning strategy (the keepers are the sensor nodes who received the searching messages generated by the source; the white grids represent the cleared grids, the deep blue grids are the contaminated grids, and the light blue grids represent the clearing grids) [54].
Figure 4. The ballooning strategy (the keepers are the sensor nodes who received the searching messages generated by the source; the white grids represent the cleared grids, the deep blue grids are the contaminated grids, and the light blue grids represent the clearing grids) [54].
Sensors 18 00546 g004
Figure 5. MLS: mobility strategy sharing location service [55].
Figure 5. MLS: mobility strategy sharing location service [55].
Sensors 18 00546 g005
Figure 6. The architecture of the REFER system [48] (source node 210 wants to send an event report to node 201, and it sends the report along the route 210→102→020→201 where “→” denotes an unidirectional link. In the case that node 020 is broken, node 102 can independently find out an alternative route, namely 102→021→212→120→201, to route the report to the destination without requiring the source node to retransmit the report).
Figure 6. The architecture of the REFER system [48] (source node 210 wants to send an event report to node 201, and it sends the report along the route 210→102→020→201 where “→” denotes an unidirectional link. In the case that node 020 is broken, node 102 can independently find out an alternative route, namely 102→021→212→120→201, to route the report to the destination without requiring the source node to retransmit the report).
Sensors 18 00546 g006
Table 1. Performances of different WSANs-based Edge computing systems.
Table 1. Performances of different WSANs-based Edge computing systems.
SystemsEnergy EfficiencyReal-Time SupportLoad BalanceFault ToleranceActuator Movement Support
Traditional data-centric WSANs [42]high×badbad
Long-term storage WSANs [44]high×goodgood
Delay-aware WSANs [45]highgoodgood×
Ballooning [54]lowgoodgood
MLS [55]lowgoodgood
LRP-QS [47]highgoodgood×
REFER (REal-time, Fault-tolerant and EneRgy-efficient WSAN) [48]highgoodgood×

Share and Cite

MDPI and ACS Style

Ma, X.; Liang, J.; Liu, R.; Ni, W.; Li, Y.; Li, R.; Ma, W.; Qi, C. A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems. Sensors 2018, 18, 546. https://doi.org/10.3390/s18020546

AMA Style

Ma X, Liang J, Liu R, Ni W, Li Y, Li R, Ma W, Qi C. A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems. Sensors. 2018; 18(2):546. https://doi.org/10.3390/s18020546

Chicago/Turabian Style

Ma, Xingpo, Junbin Liang, Renping Liu, Wei Ni, Yin Li, Ran Li, Wenpeng Ma, and Chuanda Qi. 2018. "A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems" Sensors 18, no. 2: 546. https://doi.org/10.3390/s18020546

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop