Next Article in Journal
A Multi-Task Framework for Facial Attributes Classification through End-to-End Face Parsing and Deep Convolutional Neural Networks
Previous Article in Journal
Performance Analysis of a Lower Limb Multi Joint Angle Sensor Using CYTOP Fiber: Influence of Light Source Wavelength and Angular Velocity Compensation
Previous Article in Special Issue
Towards Efficient Data Collection in Space-Based Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Successive Interference Cancellation Based Throughput Optimization for Multi-Hop Wireless Rechargeable Sensor Networks †

1
Institute of Industry and Equipment Technology, HeFei University of Technology, Hefei 230009, China
2
School of Computer and Information, Hefei University of Technology, Hefei 230009, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Zhang, P.; Ding, X.; Wang, J.; Xu, J. Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Honolulu, HI, USA, 24–26 June 2019.
Sensors 2020, 20(2), 327; https://doi.org/10.3390/s20020327
Submission received: 17 November 2019 / Revised: 21 December 2019 / Accepted: 23 December 2019 / Published: 7 January 2020
(This article belongs to the Special Issue IoT-Enabled Sensor Networks: Vision and Challenges)

Abstract

:
Wireless Sensor Networks are constrained by low channel utilization and limited battery capacity, so they are widely regarded as the mainly performance bottlenecks. In this paper, in order to improve channel utilization and prolong network lifetime, we investigate the cooperation of multi-hop Wireless Rechargeable Sensor Networks (WRSNs) with Successive Interference Cancellation (SIC) technology. In WRSNs, since the flow rate of each node is unknown, the power of the nodes is not constant. However, SIC will not work if the signal power levels at receive node cannot be sorted. To solve this issue, we first construct a minimum energy routing and unify the transmit rate to determine the transmit power. We can also obtain the time scheduling scheme after determining the routing and power. Next, we formulate an optimization problem, with the objective of maximizing the mobile charger’s vacation time over the rechargeable cycle. Finally, we provide a near-optimal solution and prove its feasible performance. Simulation results present that SIC can achieve the better upper boundary on throughput (compared to inference avoidance increasing about 180–450%) and no extra transmit and receive energy consumption in the multi-hop WRSNs.

1. Introduction

Wireless Sensor Networks (WSNs) have been attracted increasing attention in the field of theory and application [1]. With the evolution of wireless communication techniques and sensor manufacturing techniques, WSNs are widely used in forest fire alarms [2], disaster self-help [3], environmental monitoring [4], and medical care [5]. Actually, on the one hand, the finite battery capacitance is one of the crucial limitations to the lifetime of WSNs, and it also remains another one of the key bottlenecks to hinder the large-scale deployment of sensor nodes. On the other hand, the interference signal will have an ill influence on the throughput and the channel utilization. Especially, while a large number of sensor nodes are deployed in a limited area, the issue of interference will become serious in WSNs.
For the problem of limited lifetime, the solutions are generally divided into two categories: energy conservation [6,7] and energy harvesting [8]. Energy conservation is an inevitably part of the sensor node’s behavioral model, but it can play a very limited role. In [9], the online and off-line data collection maximization model are proposed for the energy-harvesting sensor networks, but the harvesting energy is calculated by probability rather than a certain value. Therefore, the success of energy harvesting is still limited in practice due to relying intensively on the environment. Further, in the deployment of a WSN, there is also a great concern about the size of the energy-harvesting device, especially whether its size may, at times, exceed that of the sensor device.
For the lifetime of sensor nodes, there is a breakthrough technology on wireless charging technique (WCT) based on magnetic resonant coupling [10]. Kurs et al. showed that energy could be transferred efficiently. Further, they proved both the feasibility and practicality of the WCT. There is a revolutionary influence on WCT on WSNs or other energy-constrained devices, as an infinite lifetime of the WSN can be obtained by periodically recharging. For example, in health-care industry, WCT has already been used to recharge the battery in medical implantable devices [11].
For communication interference, fortunately, Interference Management (IM) [12] gives us an opportunity to reduce the ill effect of interference on open channel communications. IM is a set of many technologies, rather than one single technique, such as Successive Interference Cancellation (SIC) [13], Interference Alignment [14], Interference Coordination [15], etc. The essential idea of IM is to reduce the ill effect of interference signals on the sensor node so that they can transmit or receive more intended data. For instance, R in Figure 1a and R 1 and R 2 in Figure 1b are unable to decode the intended signals due to interference. However, if SIC is used, the receive node may implement correctly decoding of all intended signals. When the receive node receives a set of signals from several transmit nodes, it can iteratively decode the received signals if the remaining strongest signal meets the signal-to-interference noise ratio (SINR) threshold (i.e., decodes the strongest signal and views the other signals and the noise as a noise signal). For example, in [16], a heuristic algorithm is proposed for multi-hop wireless network, and Liu et al. showed a bandwidth-aware high-throughput protocol with SIC. In [17], Jiang et al. provided a cross-layer optimization framework with SIC for multi-hop wireless network and presented that the throughput increased about 47%. In [18], Ma et al. employed SIC technology in the Device-to-Device (D2D) cellular network, which is a special wireless network. They studied a framework for the performance in SIC and proposed some general expressions for the successful transmission probabilities in SIC. For the Multiple-Input Multiple-Output (MIMO) degree-of-freedom model, Jalaian et al. [19] eliminated loop interference through SIC technique. We find the SIC technology can make receive nodes receive more intended signals and the wireless networks work more powerfully. In the above article, the transmit power is, however, often a constant, and this transmit power of different transmit nodes is the same. Zhang et al. [20] proposed a quite efficient model, it make SIC well used in multi-hop WRSNs.
In this paper, we analyze a mathematical model for multi-hop WRSNs with SIC technology. The main contributions of this paper are listed as follows:
  • We formulate constraints on the network and the energy consumption model, and we meet the SIC constraints under a different power of the multi-hop WRSNs.
  • Based on this energy consumption model, we construct an optimization model in which the optimization objective is to maximize the vacation time percentage of the mobile charger (MC).
  • We reformulate the original problem into a linear problem with only one quadratic term, and we finally calculate a feasible near-optimal solution to the original problem within the level of error setting in advance.
The rest of this paper is organized as follows: In Section 2, we describe the basic scope of the issue for the multi-hop WRSNs with SIC technique. In Section 3, we propose the mathematical model for a multi-hop WSN with SIC. Section 4 shows the problem formulation and a near-option solution acquired by reformulation. Section 5 presents the numerical results to show the performance for our solution.

2. Problem Description

We first introduce the principle of SIC technique in a multi-hop wireless network scenario. Subsequently, based on SIC, we study the energy consumption and supplement model of each sensor node.

2.1. Multi-Hop Network Scenario with SIC

There is a fixed base station B in the WRSN, as shown in Figure 2, which is the sink for all sensor nodes. Define N as a set of sensor nodes, with N = N . Define E m a x as the battery capacity of each sensor node that all the sensor nodes are fully charged initially. And also denote E m i n as the threshold of each node keeping alive. The rate of sensing data is R i (in b / s , i N ) generated by node i. Denote R i j as the data flow rate from transmit node i to receive node j and R i B as the data flow rate from transmit node i to the base station B. The wireless channel model is the independent Rayleigh fading model. Furthermore, we also suppose that perfect instantaneous channel state information can be obtained. Our future work will relax this supposition to make the network scenarios more practical.
As the number of sensor nodes increases in WSNs, the situation of interference grows severely within the wireless network, which causes a lot of communication conflicts and makes an ill influence on the throughput. Based on signal processing, SIC is a powerful physical technology used in multi-user detection. It allows the receive node to cancel multiple interference signals from different unintended transmit nodes through decoding each signal (receive the intended signal and subtract the unintended signal) iteratively. Based on SIC, the receive node can decode the received superposed signals in order, according to the signal strength. For instance, a receive node decodes the strongest signal from the aggregate received signals and considers all the other signals as noise. If the strongest signal meets the SINR threshold, it can be decoded correctly. Then, the receive node removes it from the set of received superposed signals and rebuilds a new combined signal. And then it repeats the procedure for the second strongest signal, and so forth, until all the intended signals are decoded correctly or the SINR threshold is no longer satisfied at any stage. Therefore, we utilize SIC to eliminate the interference signals in WSNs, so that it increases the throughput.

2.2. Sensor Power Supply Model

In the WRSN, we employ a mobile charger (MC) to recharge the battery in each sensor node. During traversal, MC recharges all sensor nodes with the driving speed of V (in m / s ) from the fixed service station (S) to each sensor node in turn and returns to the place of departure S to prepare for the next travel (like replacing or rechargeable its battery). Denote τ as one recharge cycle and τ v a c as the vacation time of MC in τ , respectively. Denote τ i as the rechargeable time of node i in τ . After recharging, MC leaves node i and travels to the next node. We hypothesize that MC always has enough energy within one single trip.
We aimed to design a rechargeable cycle for MC to obtain more vacation time in the multi-hop WRSNs scenario based on SIC. That is, it is to maximize the vacation ratio in a signal rechargeable cycle ( τ v a c τ ).

3. The Mathematical Model for SIC Multi-Hop Wireless Networks

In this section, we present the energy consumption model and the time scheduling scheme for a multi-hop WSN with SIC. Energy consumption and the communication model are the sufficient conditions for constructing the complete rechargeable model.

3.1. The Mathematical Model for SIC Multi-Hop Wireless Networks

We utilize SIC to improve the network throughput in the physical layer. Simultaneously, we employ the time scheduling scheme in the link layer. Assume one time frame divided equally into T time slots. Define x i j [ t ] as a binary variable to indicate whether transmit node i transmits data to receive node j in time slot t. x i j [ t ] = 1 if transmit node i transmits data to receive node j in time slot t and 0, otherwise. Similarly, define x i B [ t ] as a binary variable. x i B [ t ] = 1 if transmit node i transmits data to node the base station B in time slot t and 0, otherwise.
In time slot t, transmit node i can transmit to up to one receive node (the sink B or relay node j), and then we have the following constraint for transmit node:
j I i x i j [ t ] + x i B [ t ] 1 ( i N , 1 t T ) .
In the half-duplex model, node i cannot transmit nor receive in one time slot. Thus, we have the half-duplex constraint as follows:
h T i x h i [ t ] | T i | + j T i x i j [ t ] + x i B [ t ] 1 ( i N , 1 t T ) ,
where T i is a set of sensor nodes within the transmission range of node i.
Based on SIC technique, the receive node can decode multiple intended signals and subtract multiple unintended signals sequentially. During the SIC decoding procedure, receive node i (or the base station B) attempts to decode the received superposed signals in time slot t, and it will preserve the strongest signal (or remove the strongest signal if it is a unintended signal) in turn. Define g as the channel loss function, with g = α · d i , j λ , where α = 1 in general, d i , j is the Euclid distance between transmit node i and receive node j, and λ is the path loss index. Define N 0 as the power of the white Gaussian noise. If the SINR of the received superposed signals at receive node j is greater than or equal to the certain threshold β , this transmission from transmit node i to receive node j will be considered as a successful transmission. We then have the SIC constraints of S I N R i j [ t ] (or S I N R i B [ t ] ) at receive node j (or the base station B) as follows,
S I N R i j [ t ] = g i j p i j l i g l j p l j g i j p i j g l j p l j l T m x m l [ t ] + N 0 β ( x i j = 1 ) ,
S I N R i B [ t ] = g i B p i B l i g l B p l B g i B p i B g l B p l B l T m x m l [ t ] + N 0 β ( x i B = 1 ) ,
where p i j is the transmit power of transmit node i transmitting data streams to receive node j. l T i x i l [ t ] = 1 if node i transmits data in time slot t; otherwise, l T i x i l [ t ] = 0 . We hypothesize x i j = 1 (or x i B = 1 ), since the situation, node i transmits no data to node j (or the base station B), does not need to be considered at the time slot.
Within a time frame, the constraint of flow balance at sensor node i can be written as follows:
h T i k = 0 l R h i · x h i [ t ] + l · R i = j T i k = 0 l R i j · x i j [ t ] + k = 0 l R i B · x i B [ t ] ( i N ) .
Sensor node energy is mainly consumed by the transmission and reception of data, so we ignore other energy consumptions (such as generating and storing data) for brevity. Define P i [ t ] as the power of transmit node i in time slot t. In this paper, we use the following energy consumption model [21],
P i [ t ] = c h N h i R h i · x h i [ t ] + j N j i C i j · R i j · x i j [ t ] + C i B · R i B · x i B [ t ] ( i N ) ,
where c is the rate of energy consumption for receiving a unit of data rate from transmit node i to receive node j (or the base station B), and C i j   ( or   C i B ) is the rate of energy consumption for transmitting a unit of data rate. Furthermore, C i j = χ 1 + χ 2 d i j λ , where d i j represents the Euclid distance between transmit node i and receive node j, χ 1 is a distance-independent constant, and χ 2 is a the distance-dependent constant.
Note that R i j and R i B are variables in the optimization problem; in other words, p i j is also a variable and g i j · p i j cannot be sorted in the optimization problem, which means the SINR cannot be determined, and the SIC procedure also cannot be started. Furthermore, since x i j [ t ] and x i B [ t ] are binary variables, the optimization problem is a mixed integer problem, which is generally an NP-hard problem and cannot be solved straightly.
We show that SIC technique can achieve a better upper boundary on throughput and does not lead to a reduction in the vacation time ratio of MC. Section 6 concludes this paper.
Symbols used in this article and there meanings are listed in Table 1:

3.2. Optimization for SIC Multi-Hop Wireless Networks

There are some binary variables and the issue that the optimization variables need to be sorted. That is, the great challenge is that we find a solution for a multi-hop WRSN scenario with SIC. In the subsection, we show the minimum energy routing for calculating the SIC procedure.
Since data rate R i j (or R i B ) are unknown, the power of node i cannot be determined. Lemma 1 can be used to determine the energy consumption of each node merely demanding the amount of data instead of its power.
Lemma 1.
The total sum of energy consumption of each node is only related to the amount of data which receives and transmits.
Proof. 
Note that P i [ t ] is the power of node i at time slot t, and during a time frame (i.e., T time slots), k = 0 l P i [ t ] · t k is total energy consumption, where t k is the time of one time slot. Therefore, the energy consumption constraint can be represented as follows:
k = 0 l P i [ t ] · t k = c h N h i k = 0 l R h i · x h i [ t ] t k + j N j i k = 0 l C i j · R i j · x i j [ t ] t k + k = 0 l C i B R i B · x i B [ t ] t k ,
where j N j i k = 0 l R i j · x i j k represent the amount of data that transmit node i transmits to receive node j within one time frame. The three elements on the right side are the sum of energy consumption of the node i reception data by intended transmit nodes, the energy consumption of the node i for transmitting data to the intended receive node j, and the base station B, respectively.
With determining a route in advance, since the amount of generated data is a constant at each sensor node and it transmits the data streams to the base station B straightly or forwards the data streams to the next node, the amount of data streams is a constant.
Thus, the sum of energy consumption of each node is only related to the amount of data transmission and reception. In other words, there is no need to care about the rate of transmission and reception.
This completes the proof. □
With Lemma 1, we unite all R i j to a constant R, then we have the energy consumption constraint as follows:
P i [ t ] = c h N h i R · x h i [ t ] + j N j i C i j · R · x i j [ t ] + C i B · R · x i B [ t ] .
with the transmit power of each node, we can calculate the S I N R i j [ t ] correctly and determine whether S I N R i j [ t ] meets the criterion threshold. If the data streams can be received and decoded at node j correctly (i.e., S I N R i j [ t ] β ), then we have x i j [ t ] = 1 . Similarly, if the data streams can be received and decoded at the sink B, then we have x i B [ t ] = 1 .
In order to reduce calculation and complexity, we now determine the upper boundary on the number of signals that can be decoded by the sink B or relay node j in a time slot. Denote B i as the upper boundary on the number of signals.
Lemma 2.
The number of successful decoded signals at node i is less than or equal to B i = min { 1 + l o g β + 1 P i m a x β N 0 , I i } , in a time slot t, where P i m a x is the strongest power of intended signal in the set of received superposed signal at node i.
Proof. 
Without loss of generality, suppose that the power levels of the signals from the k transmit nodes received at node i are in a non-decreasing order as g 1 i p 1 i g 2 i p 2 i g k i p k i .
g 1 i p 1 i = β N 0 g 2 i p 2 i = β ( N 0 + g 1 i p 1 i ) = β 1 + β N 0 g 3 i p 3 i = β ( N 0 + g 2 i p 2 i + g 1 i p 1 i ) = β 1 + β 2 N 0 g k i p k i = β 1 + β ( k 1 ) N 0 ,
Then, we have k = 1 + l o g ( 1 + β ) g k i p k i / β N 0 . In addition, we can find that g k i p k i P i m a x . Since g k i p k i β 1 + β k 1 N 0 , we get the constraint of the number of successful decoded signals as follows,
k β 1 + β k 1 N 0 = B i ,
and define I i as a set of nodes within the interference range of node i, which has I i elements. Since the number of received superposed signal cannot exceed the number of adjacent nodes, B i = min{ I i , 1 + l o g β + 1 P i m a x β N 0 } is the upper boundary on the number of signals which can be decoded by receive node i.
This completes the proof. □
Based on Lemmas 1 and 2, we utilize the minimum hopping routing to obtain the minimal energy consumption at each node for transmission and reception. Furthermore, by Lemmas 1 and 2 and constraint (1)–(10), we can achieve an appropriate time scheduling scheme.

4. The Mathematical Model for Recharging Cycle

In this section, we first construct a rechargeable cycle model, then transform the formulation into get a near-optimal solution by change-of-variable technology. The entire rechargeable cycle τ is divided into three parts: the vacation time τ v a c , the rechargeable time τ i and the traversal time τ t s p .

4.1. Rechargeable Energy Cycle Construction

We have constructed constraints and lemmas to solve the issue of the dynamic power in the multi-hop WSNs scenario with SIC. In other words, the energy consumption model of each node is complete, and now we start to construct the energy supplement model.
For different rechargeable cycles, node i has the same curve of energy consumption. Each node has to comply with the following energy restrictions: In each cycle of τ , (i) its remaining battery starts and ends with the same level of energy, and ( i i ) its remaining battery is always greater than or equal to E m i n .
Define a set of node locations as Ψ = ψ 1 , , ψ n and define the location of the service station S as ψ 0 . Define d ψ i , ψ ( i + 1 ) as the distance between two nodes. Denote P = ( ψ 0 , ψ 1 , , ψ n , ψ 0 ) as the physical path over a trip cycle, which starts from the service station, passes through each node for recharging it, and finally returns to the service station. In each rechargeable cycle, define a i as MC arrival time at node i. Then, we have the constraint as follows:
a ψ i = k τ + l = 0 i 1 d ψ l , ψ l + 1 V + l = 1 i 1 τ l   ( k = 0 , 1 , 2 , ) .
Define D t s p as the physical path distance of the shortest Hamiltonian cycle, thus denoting τ t s p = D t s p V as the traveling time over the shortest Hamiltonian cycle. For one singal rechargeable cycle τ , we have the constraint as follows:
τ = τ t s p + τ v a c + i N τ i .
During the cycle τ , we analyze the power consumption of node i by utilizing the average power P ¯ i = k τ k + 1 τ P i τ ,   ( k = 0 , 1 , 2 , ) . The amount of energy consumption of node i over τ is equal to the amount of supplement energy over τ i . Therefore, we have the energy balance constraint as follows:
τ · P ¯ i = τ i · u i N
During a rechargeable energy cycle, when MC reaches at node i (i.e., a i ), As shown in Figure 3, there are two rechargeable strategies that can be selected: (i) fully recharge (i.e., MC recharges the battery of node i to E m a x straightly) and (ii) not fully recharge (i.e., MC leaves before fully recharging). These two choices are not different from the results [22]. For the sake of convenience, we select the strategy of fully rechargeable case. When the average power P ¯ i replaces the real-time power P i [ t ] , it is notable that there are only two approximate slopes of the energy consumption curve over one single rechargeable cycle [ k τ , k + 1 τ ]: When MC does not recharge node i, the energy consumption slope of node i is ( P ¯ i ) ; when MC is recharging node i, the energy supplement slope of node i is ( u P ¯ i ) , where u is the power of recharging. The node residual energy cannot exceed the battery capacity E m a x or be less than the minimum energy threshold E m i n , and the energy constraint can be written as follows:
E m i n e i ( a i ) e i ( t ) e i ( a i + τ i ) E m a x ,
For a rechargeable energy cycle, E i = e i ( 2 τ ) = e i ( a i + τ i ) ( 2 τ ( a i + τ i ) ) · P ¯ i = E m a x ( 2 τ ( a i + τ i ) ) · P ¯ i , so e i ( a i ) = E i ( a i τ ) · P ¯ i = E m a x ( 2 τ ( a i + τ i ) ) · P ¯ i ( a i τ ) · P ¯ i . Therefore, the residual energy of the node always needs to be greater than the minimum energy threshold. We have:
E m a x ( τ τ i ) · P ¯ i E m i n ( i N ) .
The Property 1 in [22] shows that there always exists at least one "bottleneck" node in the WRSN for an optimal solution, and when MC arrives at these nodes and starts to recharge their batteries, the energy level of these nodes is exactly equal to E m i n (i.e., E ( a i ) = E m i n ).
Property 1.
In an optimal solution, there exists at least one node in the network with its battery energy dropping to E m i n when MC arrives at this node and recharges its battery.

4.2. Mathematical Formulation

We summarize the optimal objective and all the constraints to formulate the optimization problem as O P T r a w and show it as follows,
O P T r a w max τ v a c τ
s.t. r m i n r ( f ) ,   ( f F ) ;
Half duplex constraint: (1), (2);
Recharging cycle constraint: (8);
Flow balance constraints: (5);
Energy constraints: (6), (10), (11);
τ , τ i , τ v a c 0   ( i , j N , i j )
Variables: τ i , τ v a c , τ
Constants: P ¯ i , R , R i , c , C i j , C i B , u , E m i n , E m a x , τ t s p
In this problem O P T r a w , there is a nonlinear objective τ v a c τ . Note that since the path traveled by MC is independent of the direction of travel along the shortest Hamiltonian cycle, an optimal solution to O P T r a w can work in either direction (i.e., clockwise or counterclockwise).

4.3. Reformulation

We employ change-of-variable technology to simplify the formulation. For instance, denote η v a c = τ v a c τ , replacing the nonlinear objective τ v a c τ .
For constraint (8), we divide both sides of the formula by τ , and this constraint can be rewritten as 1 = τ t s p τ + η v a c + i N τ i τ . We, respectively, denote η v a c = τ i τ and η 0 = 1 τ to replace the nonlinear terms 1 τ and τ i τ . Then, constraint (8) is rewritten as follows:
η 0 = 1 i N η i τ v a c τ t s p .
Through the same method, the energy constraints (10) and (11) are reformulated as
P ¯ i = u · η i ,
( 1 η i ) · P ¯ i ( E m a x E m i n ) · η 0   ( i N ) .
By constraints (12) and (13), we reformulate (14) as follows.
η v a c 1 l N η l u · τ t s p E m a x E m i n · η i · ( 1 η i ) ( i N ) .
By constraint (13), constraint (6) is rewritten as
c h N h i k = 0 l ( R · x h i [ t ] ) + j N j i k = 0 l ( R · x i j [ t ] ) + C i B k = 0 l ( R · x i B [ t ] ) u · η i = 0 .
The optimization problem O P T r a w is reformulated as O P T S , and we show it as follows,
O P T S max η v a c
s.t.Flow balance constraints: (5)
Vaction constraints: (15);
Energy balance constraints: (16);
0 η i , η v a c 1   ( i N ) .
variables η i ,   η v a c .
constants R i ,   R ,   c ,   C i j ,   C i B ,   u ,   E m a x ,   E m i n ,   x i j k ,   x i B k   a n d   τ t s p .
It is not difficult to find that all the variables in O P T S are transferred from the variables in O P T r a w .
The constraints (11) become (16), which is a linear except, through reformulation (i.e., by change-of-variable technique), but there is still a quadratic term η i 2 . In Section 4.4, we will present how to fit the parabola by a useful technology and show a feasible near-optimal solution to O P T r a w within a feasible target error.

4.4. A Near-Optimal Solution

In this subsection, we replace the parabola (term η i 2 ) by piecewise straight lines in the reformulation O P T S . The approximation transforms the corresponding nonlinear constraints into the linear constraints, so that an off-the-shelf solver, like G u r o b i [23], etc., can calculate the solution. Then, we use this solution to determine a feasible solution to the initial problem O P T r a w . Finally, we prove the feasibility of gap between the solution to O P T S and the optimal solution to O P T r a w .
It is notable that there is merely one nonlinear term in reformulation O P T S that is the quadratic terms η i 2 , and it lies at the interval ([0, 1]), which is a very small interval. Therefore, we fit the nonlinear term η i 2 by a piecewise linear approximation.
The essential idea is replacing the parabola by m piecewise linear segments. For the parabola f( η i ) = η i 2 ( 0 η i 1 ), we connect each point’s ( s m , s 2 m 2 ) to build a piecewise linear approximation. The value of m can be determined by Lemma 3 in Section 4.5.
Then, we present a method to mathematically describe ( η i , γ i ) (i.e., the piecewise linear segment). For the s th segment, all points on the piecewise linear curve can be described by the following constraints.
η i = λ i , s 1 · s 1 m + λ i , s · s m , s = 0 , 1 , , m ,
γ i = λ i , s 1 · ( s 1 ) 2 m 2 + λ i , s · s 2 m 2 , s = 0 , 1 , , m ,
in which λ i , s 1 and λ i , s are two weights, and they satisfy the constraints as follows:
λ i , s 1 + λ i , s = 1 ,
0 λ i , s 1 , λ i , s 1 .
Since the quadratic function f ( η i ) = η i 2 is convex, the piecewise linear curve ( s m , s 2 m 2 ) lies above the convex curve f ( η i ) = η i 2 , and the end of the approximation curve (i.e., the point η i and γ i ) falls on the parabola. For the upper boundary of a feasible error γ i η i 2 , Lemma 3 can quantify it [22], if γ i η i 2 is divided into m segment [22].
Lemma 3.
γ i η i 2 1 4 m 2 ( i N ) .
Although the above formulas can describe λ i s , the expression of is only suitable for a given linear segment (i.e., known the sequence number s) and cannot represent a general situation. Now, we present the general mathematical formulas for the entire piecewise linear curve. Denote a binary indicator variable as l i s ( 1 s m ). l i s = 1 if s 1 m η i < s m ; otherwise, l i s = 0 . Because η i must fall into only one of the m segments:
s = 1 m l i s = 1 .
Based on l i s , we reformulate λ i s for the entire piecewise linear curve. We first present the relationship between λ i s and l i s ( 1 s m ). After transforming O P T r a w into O P T S , we have, at most, two positive values (i.e., λ i , s 1 and λ i , s ), while the others are λ i , j = 0   ( j s 1 ,   s ) . In other words, if η i falls only into the first segment at l i 1 = 1 , we have λ i 0 > 0 ; if η i falls into the sth segment l i s = 1 or l i , s + 1 = 1 , we have λ i s > 0 ; only if η i falls into the last segment l im = 1 , we have λ im > 0 . These three constraints are formulated as follows:
λ i 0 l i 1 ,
λ i s l i s + l i , s + 1 ,
λ i m l i m .
The constraints (22)–(24) indicate that there are at most two positive value λ i k for η i . And if there are the two positive λ i k , they must be adjacent. Then, for the piecewise linear fitted curve, we rebuild the mathematical expression as follows,
η i = s = 0 m λ is · s m ,
γ i = s = 0 m λ is · s 2 m 2 ,
s = 0 m λ is = 1 .
For constraint (15), substitute η i 2 with γ i in η v a c 1 l N η l u · τ t s p E m a x E m i n · η i · ( 1 η i ) ; that is,
η v a c = 1 l N η l u · τ t s p E m a x E m i n · ( η i γ i ) ( i N )
After reformulating these constraints, we have the following linear relaxed formulation called O P T R as follows:
O P T R max η v a c
s.t.(10), (28), (21)∼(27)
0 η i , η v a c , γ i 1   ( i , j N , i j )
l ik { 0 , 1 }   ( i N , 1 s m )
0 λ i k 1   ( i N , 0 s m ) .
Variables: γ i , η i , η t s p , η v a c , l i s , λ i k
Constants: E m i n , E m a x , u , c , C i j , C i B , x i j k , x i B k , R
The off-the-shelf solver, like Gurobi, is able to calculate the solution to formulation O P T R because O P T R has been transformed into a linear formulation from a non-linear formulation.
The two solutions to the linear relaxed formulation O P T R and the reformulation O P T S seem to not be same. In fact, we can derive a feasible near-optimal solution to O P T S through the solution to O P T R . Assume the solution to problem O P T R is Π = ( η i , η v a c , l i s , λ i s , γ i ) . It is notable that ( η i , η v a c ) satisfies all constraints in O P T S . We attempt to calculate a feasible solution Π = ( η i , η v a c ) to O P T S ; we first assume η i = η i , and then we rewrite η v a c as follows to meet the constraint (15) in O P T S .
η v a c = min i N { 1 l N η l u · τ t s p E m a x E m i n · η i · ( 1 η i ) } .
We can calculate a feasible solution to the original problem O P T r a w after obtaining a solution to O P T S .

4.5. Proof of Near-Optimality

We now attempt to quantify the error between the optimal objective to O P T r a w and the relaxed objective to O P T R . We hope the gap of the error to be controlled by m (i.e., we can control the gap by tuning the number of the piecewise linear curve). Though Lemma 4, we reverse the value m by a given feasible error ξ ( 0 < ξ 1 ).
Lemma 4.
η v a c η v a c u · τ t s p 4 E m a x E m i n · 1 m 2 , where η v a c is the objective value for the feasible solution Π to the original problem O P T r a w .
Proof. 
η v a c is the result for the solution Π to O P T R , and η v a c always is greater than or equal to η v a c (i.e., η v a c η v a c ), since the problem O P T R is a relaxation of the convex reformulation problem O P T S . Therefore,
η v a c η v a c η ^ v a c η v a c = [ 1 s N η ^ s u · τ t s p E m a x E m i n · η ^ i · ( 1 η ^ i ) ]   [ 1 s N η ^ s u · τ t s p E m a x E m i n · η m a x · ( 1 η m a x ) ] = u · τ t s p E m a x E m i n γ m a x η m a x 2 u · τ t s p 4 E m a x E m i n · 1 m 2 ,
where the first equality proofed in [22], and the second inequality holds by Lemma 1.
This completes the proof. □
Next, we introduce Theorem 1 and present a method to set an appropriate m for η v a c η v a c ξ by a given target error ξ .
Theorem 1.
For a given target error ξ ( 0 < ξ 1 ), if m = u · τ t s p 4 ξ E m a x E m i n , then we have η v a c η v a c ξ .
Proof. 
Note that the gap is η v a c η v a c u · τ t s p 4 E m a x E m i n · 1 m 2 in Lemma 4. Therefore, set m = u · τ t s p 4 ξ E m a x E m i n , and then we have η v a c η v a c = ξ :
η v a c η v a c u · τ t s p 4 ( E m a x E m i n ) · 1 m 2   u · τ t s p 4 ( E m a x E m i n ) · 4 ξ ( E m a x E m i n ) u · τ t s p   = ξ .
This completes the proof. □
Through Theorem 1, we show the complete procedure on determining the solution to O P T R and present its five steps as follows,
  • Preset a feasible target error ξ .
  • Set m = u · τ t s p 4 ξ E m a x E m i n .
  • Calculate the relaxed linear optimization problem O P T R with m linear segment and gain its solution Π = η v a c , η i , l i k , λ i k , γ i through the solver Gurobi.
  • Construct a feasible solution Π = ( η v a c , η i ) for the linear fitted problem O P T S by setting η v a c = η v a c ,   η i = η i and η v a c = min i N {1 - l N η l - u · τ t s p E m a x E m i n · η i · ( 1 η i ) }
  • Gain a feasible near-optimal solution ( τ v a c , τ , τ i ) to the original optimization problem O P T r a w .

5. Simulation

In this section, we present the numerical results to evaluate the performance that our solution can prolong the lifetime of WRSNs to infinity, and SIC technology can improve the upper boundary on throughput by compared with interference avoidance technology.

5.1. Simulation Setting

For WRSNs (30, 50, and 80 nodes), we generate the sensor nodes randomly over square areas (0.8 km × 0.8 km, 1 km × 1 km and 1.5 km × 1.5 km). The base station is assumed to be located at (400 m, 400 m) for 0.8 km × 0.8 km, (500 m, 500 m) for 1.0 km × 1.0 km and (750 m, 750 m) for 1.5 km × 1.5 km. The service station is assumed to be located at the origin (0 m, 0 m). Set V, the speed of MC, equal to 5 m/s. We assume to randomly generate the data sense rate R i within [1, 20] kb/s and data transmit rate R is twice as much as the upper boundary of R i (i.e., R = 40 kb/s).
We choose a conventional NiMH battery with E m a x = 1 . 08 × 10 4 J and E m i n = 540 J ( E m i n = 0 . 05 × E m a x ) . The power consumption coefficients are χ 1 = 50 nJ/b, χ 2 = 1 . 3 × 10 3 pJ (b· m 4 ), c = 50 nJ/b, and the path loss index λ = 4 . For the final numerical results, since we accept the gap between this solution and the optimal solution to O P T r a w is no more than 1%, we set the feasible target error ξ = 0 . 01 ,

5.2. Result

For brevity, we first randomly generate a small WSN with 10 sensor nodes over a square area of 0.8 km× 0.8 km, as shown in Figure 4a. The coordinate position and the data generation rate of each node are shown in detail in Table 2. Based on SIC technology, within a time frame (T time), the total amount of reception data at the base station increases about 450% compared with that of interference avoidance technology without SIC.
We utilize the solver Concorde [24] to get the shortest Hamiltonian cycle for the network with 10 nodes, and the cycle is shown as Figure 5a. For this shortest Hamiltonian cycle, the path distance is D t s p = 2593 m, and the traveling time of MC is τ t s p = 518 . 6 s. For the presetting target error ξ = 0 . 01 , we obtain a small value m = u · τ t s p 4 ξ E m a x E m i n = 4.
Table 3 demonstrates the numerical results of throughput and η v a c for ten different WRSNs, in which the upper boundary on throughput is obviously increased, while causing no ill effects on objective value η v a c . Since our model and the comparative scheme are using a similar energy consumption model [21] (i.e., formula (6)), and the amount of data remains the same, the difference of numericals in the experimental results is small. In general, our model is a good combination of SIC technology and WCT, and it has a strong applicability to meet the needs of different scales of WRSNs.

6. Conclusions

We investigated the issue of the lifetime of node and the upper boundary of throughput in WRSNs. SIC technology would allow WRSNs to reap the benefits of increasing the upper boundary on throughput, while retaining the rechargeable cycle of WCT without increasing. We researched a optimization problem of practical application with the target of maximizing the ratio of MC’s vacation time over one entire cycle time; however, it is a non-linear problem. Furthermore, we presented and proved a near-optimal solution to the original non-linear optimization problem. The numerical results illustrate SIC technology will increase the upper boundary on throughput immensely and never cause additional energy consumption compared with the scheme of interference avoidance without SIC.

Author Contributions

P.Z.: Contribute to the writing of this manuscript, references, analysis of experimental results and data interpretation. X.D.: Contributed to the research ideas, research directions, research acquisition, research design. J.X.: Contributed to document retrieval, research content, algorithm flow, data analysis, algorithm analysis, and manuscript writing. J.W.: Contributed to the experimental design, algorithm implementation, experimental analysis, and manuscript review of this manuscript. L.S.: Contributed to the experimental algorithm implementation, chart making, data collection, and data analysis of this manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

Supported by National Natural Science Foundation of China l (Grant No.61701162)and Fundamental Research Funds for the Central Universities (GRANT NO.JZ2019YYPY0017).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Antonio, P.; Grimaccia, F.; Mussetta, M. Architecture and methods for innovative heterogeneous wireless sensor network applications. Remote Sens. 2012, 4, 1146–1161. [Google Scholar] [CrossRef] [Green Version]
  2. Yu, L.; Wang, N.; Meng, X. Real-Time forest fire detection withwireless sensor networks. In Proceedings of the 2005 International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, 26 September 2005; pp. 1214–1217. [Google Scholar]
  3. Liu, M.; Gong, G.H.; Wen, Y.G.; Chen, G.H.; Cao, J.N. The last minute: Efficient data evacuation strategy for sensor networks in postdisaster applications. In Proceedings of the IEEE Conference on Computer Communications, Shanghai, China, 10–15 April 2011; pp. 1–5. [Google Scholar]
  4. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A surveyon environmental monitoring. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  5. Kim, S.; Pakzad, S.; Culler, D.; Demmel, J.; Fenves, G.; Glaser, S.; Turon, M. Health monitoring of civil infrastructures using wireless sensor networks. Inf. Process. Sens. Netw. 2007, 365, 254–263. [Google Scholar]
  6. Meninger, S.; Mur-Miranda, J.O.; Amiranda, R.; Amirtharajah, R.; Chandrakasan, A. Vibration-to-electric energy conversion. IEEE Trans. Very Large Scale Integr. Syst. 2001, 9, 64–76. [Google Scholar] [CrossRef]
  7. Arunraja, M.; Malathi, V.; Sakthivel, E. Energy conservation in WSN through multilevel data reduction scheme. Microprocess. Microsyst. 2015, 39, 348–357. [Google Scholar] [CrossRef]
  8. Prak, C.; Chou, P.H. Ambimax: Autonomous energy harvesting platform for multi-supply wireless sensor nodes. IEEE Commun. Mag. 2007, 1, 168–177. [Google Scholar]
  9. Ren, X.; Liang, W.; Xu, W. Data collection maximization in renewable sensor networks via time-slot scheduling. IEEE Commun. Comput. 2015, 64, 168–177. [Google Scholar] [CrossRef]
  10. Kurs, A.; Karalis, A.; Moffatt, R.; Joannopoulos, J.D.; Fisher, P.; Soljacic, M. Wireless power transfer via strongly coupled mangentuc resonances. Science 2007, 317, 83–86. [Google Scholar] [CrossRef] [Green Version]
  11. Zhang, F.; Liu, X.; Hackworth, S.A.; Sclabassi, R.J.; Sun, M. In vitro and vivo studies on wireless powerung of medical sensors and implantable devices. In Proceedings of the IEEE/NIH Life Science Systems and Applications Workshop (LiSSA), Bethesda, MD, USA, 9–10 April 2009; pp. 84–87. [Google Scholar]
  12. Noura, M.; Nordin, R. A survey on interference management for device-to-deviceF(D2D) communication and its challenges in 5G networks. J. Netw. Comput. Appl. 2016, 71, 130–150. [Google Scholar] [CrossRef]
  13. Weber, S.P.; Andrews, J.G.; Yang, X.; Veciana, G.D. Transmission capacity of wireless ad hoc networks with successive interference cancellation. IEEE Trans. Inf. Theory 2007, 51, 2799–2814. [Google Scholar] [CrossRef]
  14. Ma, J.; Zhang, S.; Li, H.; Zhao, N.; Leung, V.C.M. Interference-Alignment and Soft-space-reuse based cooperative transmission for multi-cell massive MIMO networks. IEEE Trans. Wirel. Commun. 2018, 17, 1907–1922. [Google Scholar] [CrossRef] [Green Version]
  15. Gupta, V.K.; Nambiar, A.; Kasbekar, G.S. Complexity analysis, potential game characterization and algorithms for the inter cell interference coordination with fixed transmit power problem. IEEE Trans. Veh. Technol. 2018, 4, 3054–3068. [Google Scholar] [CrossRef]
  16. Liu, R.; Shi, Y.; Liu, K.S.; Shen, M.; Wang, Y.; Li, Y. Bandwith-aware High-throughput routing with successive interference cancelation in multihop wireless networks. IEEE Trans. Veh. Technol. 2015, 64, 5866–5877. [Google Scholar] [CrossRef]
  17. Jiang, C.; Shi, Y.; Yuan, X.; Hou, Y.T.; Lou, W.; Kompella, S.; Midkiff, S.F. Cross-layer optimization for multi-hop wireless networks with successive interference cancellation. IEEE Trans. Wirel. Commun. 2016, 17, 5819–5831. [Google Scholar] [CrossRef]
  18. Ma, C.; Wu, W.; Cui, Y.; Wang, X. On the performance of successive interference cancellation in D2D-enabled cellular networks. In Proceedings of the 2015 IEEE Conference on Computer Communications, Hong Kong, China, 25 April–1 May 2015; pp. 37–45. [Google Scholar]
  19. Jalaian, C.T.; Yuan, X.; Shi, Y.; Hou, Y.T.; Lou, W.; Midkiff, S.F.; Dasari, V. On the integration of SIC and MIMO DoF for interference cancellation in wireless networks. Wirel. Netw. 2018, 24, 2357–2374. [Google Scholar] [CrossRef]
  20. Zhang, P.; Ding, X.; Wang, J.; Xu, J. Multi-Hop Recharging Sensor Wireless Networks Optimization With Successive Interference Cancellation. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Honolulu, HI, USA, 24–26 June 2019; pp. 482–493. [Google Scholar]
  21. Hou, Y.T.; Shi, Y.; Sherali, H.D. Rate alloction and network lifetime problems for wireless sensor networks. IEEE/ACM Trans. Netw. 2008, 16, 321–334. [Google Scholar] [CrossRef]
  22. Shi, Y.; Xie, L.; Hou, Y.T.; Sherali, H.D. On Renewable Sensor Networks with Wireless Energy Transfer; Technical Report; The Bradley Department of Electrical and Computer Engineering, Virginia Tech: Blacksburg, VA, USA, 2010. [Google Scholar]
  23. The Fastest Solver Gurobi Optimization. Available online: https://www.gurobi.com/ (accessed on 2 January 2020).
  24. Concorde TSP Solver. Available online: http://www.tsp.gatech.edu/concorde/ (accessed on 2 January 2020).
Figure 1. A wireless sensor network with a mobile charger. SIC = Successive Interference Cancellation.
Figure 1. A wireless sensor network with a mobile charger. SIC = Successive Interference Cancellation.
Sensors 20 00327 g001
Figure 2. A wireless sensor network with a mobile charger.
Figure 2. A wireless sensor network with a mobile charger.
Sensors 20 00327 g002
Figure 3. The energy level of a sensor node i during two rechargeable cycles (fully re-charged and partially re-charged).
Figure 3. The energy level of a sensor node i during two rechargeable cycles (fully re-charged and partially re-charged).
Sensors 20 00327 g003
Figure 4. The 10-node sensor network and schemes in the two different techniques.
Figure 4. The 10-node sensor network and schemes in the two different techniques.
Sensors 20 00327 g004
Figure 5. Two optimal traveling paths for the 10-node and 50-node sensor network.
Figure 5. Two optimal traveling paths for the 10-node and 50-node sensor network.
Sensors 20 00327 g005
Table 1. Notation.
Table 1. Notation.
SymbolDefinition
BThe base station in the Wireless Rechargeable Sensor Networks (WRSNs)
B j The maximum number of signals for a SIC receive node j can decode
cThe rate of energy consumption for receiving a unit of data rate
C i j The rate of energy consumption for transmitting a unit of data rate
g i j Channel gain from receive node i to transmit node j
I i The set of nodes within the interference range of node i
N The set of nodes in the WRSN
P i The power of node i
p i j [ t ] The transmit power of receive node i to transmit node j in time slot t
P i ¯ [ t ] The average transmission power of node i in time slot t
P i The transmission power of node i with the data rate R
R i The data rate generated by node i
R i j The flow rate from receive node i to transmit node j
RThe fixed flow rate from receive node i to transmit node j
x i j [ t ] A binary variable indicating weather node i is sending data to node j in time slot t
τ The time of one single travel cycle for mobile charger (MC)
τ i The time of recharging node i
τ T S P The time of one single travel through the shortest Hamiltonian cycle
τ v a c The vacation time of MC
η v a c τ v a c divide by τ (i.e., τ v a c τ )
mThe number of piecewise linear segments to approximate the parabola
ξ The presetting target error
γ i A substitute for τ i in piecewise linear approximation
λ i s The weight about k / m ( k = 0 , 1 , , m )
z i s A binary variable indicating weather η i falls within the kth segment
Table 2. The coordinates (in m) and the R i (in k b / s ) of each node in the network.
Table 2. The coordinates (in m) and the R i (in k b / s ) of each node in the network.
iCoordinates R i iCoordinates R i iCoordinates R i iCoordinates R i
1(235,635)42(580,130)93(311,354)164(708,240)5
5(268, 6)146(432,160)177(509,93)198(775,454)13
9(149,312)1310(461,247)16
Table 3. The numerical results in the four different networks.
Table 3. The numerical results in the four different networks.
The Size of SquareB N η vac The Increasing in Throughput
800×800(400,400)1091.06%450.00%
800×800(400,400)3089.99%340.01%
800×800(400,400)5088.01%334.78%
800×800(400,400)8087.43%291.43%
1000×1000(500,500)3067.85%264.78%
1000×1000(500,500)5069.89%253.34%
1000×1000(500,500)8074.86%223.26%
1500×1500(750,750)8049.04%195.62%
1500×1500(750,750)10034.20%183.37%
1500×1500(750,750)15028.01%170.83%

Share and Cite

MDPI and ACS Style

Zhang, P.; Ding, X.; Xu, J.; Wang, J.; Shi, L. Successive Interference Cancellation Based Throughput Optimization for Multi-Hop Wireless Rechargeable Sensor Networks. Sensors 2020, 20, 327. https://doi.org/10.3390/s20020327

AMA Style

Zhang P, Ding X, Xu J, Wang J, Shi L. Successive Interference Cancellation Based Throughput Optimization for Multi-Hop Wireless Rechargeable Sensor Networks. Sensors. 2020; 20(2):327. https://doi.org/10.3390/s20020327

Chicago/Turabian Style

Zhang, Peng, Xu Ding, Juan Xu, Jing Wang, and Lei Shi. 2020. "Successive Interference Cancellation Based Throughput Optimization for Multi-Hop Wireless Rechargeable Sensor Networks" Sensors 20, no. 2: 327. https://doi.org/10.3390/s20020327

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop