You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

25 March 2020

An Effective Sensor Deployment Scheme that Ensures Multilevel Coverage of Wireless Sensor Networks with Uncertain Properties

,
and
Department of Applied Mathematics, National Chiao Tung University, Hsinchu 300, Taiwan
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Deployment and Control of Wireless Sensor Networks

Abstract

The coverage problem is a fundamental problem for almost all applications in wireless sensor networks (WSNs). Many applications even impose the requirement of multilevel (k) coverage of the region of interest (ROI). In this paper, we consider WSNs with uncertain properties. More precisely, we consider WSNs under the probabilistic sensing model, in which the detection probability of a sensor node decays as the distance between the target and the sensor node increases. The difficulty we encountered is that there is no unified definition of k-coverage under the probabilistic sensing model. We overcome this difficulty by proposing a “reasonable” definition of k-coverage under such a model. We propose a sensor deployment scheme that uses less number of deployed sensor nodes while ensuring good coverage qualities so that (i) the resultant WSN is connected and (ii) the detection probability satisfies a predefined threshold p th , where 0 < p th < 1 . Our scheme uses a novel “zone 1 and zone 1–2” strategy, where zone 1 and zone 2 are a sensor node’s sensing regions that have the highest and the second highest detection probability, respectively, and zone 1–2 is the union of zones 1 and 2. The experimental results demonstrate the effectiveness of our scheme.

1. Introduction

A wireless sensor network (WSN) has various applications in health-care, smart home, security, environmental exploration, and the military [1,2]. A sensor node (or simply node) is the basic component of a WSN. A WSN usually consists of numerous nodes deployed in a region of interest (ROI). Two nodes can communicate with each other if each is within the transmission range of the other, in which case we say that there is a link between them or that they are neighbors. Each node is able to collect data and process information and communicate with neighboring nodes.
Among various issues in WSNs, the coverage problem and the connectivity problem have been regarded as crucial foundations because many applications rely on them. Surveys for the coverage problem can be found in [3,4]. A good sensor deployment strategy should consider both coverage and connectivity. Sensor deployment not only determines the cost of constructing the network but also affects how well the given ROI will be monitored. This paper assumes that each node’s sensing region is of a disk shape (see Figure 1a) and all nodes have the same sensing range r s and communication range r c .
Figure 1. (a) Disk shape. (b) Binary sensing model. (c) Probabilistic sensing model.
Let u be a location in the ROI, s i be a node in the WSN, and d ( u , s i ) be the Euclidean distance between u and s i . Most of the past researches use the binary sensing model [5,6,7], where nodes are assumed to be accurate in detecting targets within their sensing ranges. More precisely, under the binary sensing model (see Figure 1b for an illustration), the detection probability p ( u , s i ) of u by s i is defined as
p ( u , s i ) = 1 if   d ( u , s i ) r s , 0 otherwise .
In physical scenarios, the distance decay effect cannot be ignored. That is, the detection probability of a node decays as the distance between the target and the node increases. Based on this, the coverage problem under a more realistic model, called the probabilistic sensing model, has been investigated; see [7,8,9,10,11]. A survey for the coverage problem with uncertain properties can be found in [12]. Do notice that unlike the binary sensing model, which has a unified definition of p ( u , s i ) , there is no unified definition of p ( u , s i ) under the probabilistic sensing model; see Section 2 for details. We now give the definition of p ( u , s i ) used in [7] and in this paper. Under the probabilistic sensing model (see Figure 1c for an illustration), the detection probability p ( u , s i ) of u by s i is defined as
p ( u , s i ) = e λ d ( u , s i ) if   d ( u , s i ) r s , 0 otherwise ,
where λ is a sensor-dependent parameter.
Many real-world applications impose the requirement of multilevel k > 1 coverage. For example, k 2 for military or surveillance applications, k 3 for positioning protocols using triangulation [13], conducting data fusion [14], and minimizing the impact of sensor failure [15]. Sensor deployment with multilevel (k) coverage have been discussed in [7,15,16,17].
Under the binary sensing model, an ROI is said to be k-covered if every location in the ROI can be detected by at least k nodes (i.e., every location in the ROI is within k nodes’ sensing regions). Unfortunately, to the best of our knowledge, there is no unified definition of k-coverage under the probabilistic sensing model. We now are ready to elaborate this issue. Let A = { s 1 , s 2 , , s n } be the set of sensor nodes deployed in the ROI. In [7], a location u in the ROI is considered as k-covered if the probability that there are at least k nodes that can detect u is not smaller than a predefined threshold p th , where 0 < p th < 1 . More precisely, in [7], a location u in the ROI is said to be k-covered if
s i A p ( u , s i ) p th , for some A A with | A | = k .
For clarity, we call this definition of k-coverage the k-threshold coverage. In [18], a location u in the ROI is said to be k-covered if
s i A p ( u , s i ) k .
For clarity, we call this definition of k-coverage the k-expectation coverage. In both [7] and [18], the ROI is said to be k-covered if every location u inside the ROI is k-covered. The p ( u , s i ) used in [18] is defined as (4), which is a generalization of (1) and is introduced in Section 2. By (3), the event of u detected by s i is independent of the event of u detected by s j for j i . Reference [18] proves that the ROI is k-covered by A if, among all locations inside the ROI, the minimum expected number of nodes is k (there is a typo and k should be at leastk k).
Three main considerations in WSNs’ coverage are: maximizing coverage quality, maximizing network lifetime, and minimizing the number of deployed nodes. The coverage quality and lifetime are two conflict factors with respect to energy consumption. Reference [12] points out that the k-coverage requirement makes the problem more sophisticated because more nodes are needed; deploying less nodes by decreasing the overlap region and prolonging the network lifetime become complicated. The k-expectation coverage [18] has the drawback that the user cannot specify his/her preference for the threshold p th , meaning that the user cannot specify their desired coverage quality. Moreover, it is possible that the entire ROI is regarded as k-covered but some locations inside it are detected by a lot of nodes each with a small detection probability. The k-threshold coverage [7] has the drawback that it tends to use too many sensor nodes; we give the calculation details in Section 2. In short, Wang and Tseng [7] first calculate r th (notice that r th is denoted as r s p in [7]) and then replace the original r s with r th in the deployment.
The objective of this paper is to propose a sensor deployment scheme to use less number of nodes while ensuring the following two important coverage qualities: (i) the resultant WSN is connected and (ii) the detection probability satisfies a predefined threshold p th , where 0 < p th < 1 . Although k-threshold coverage [7] achieves the same objective, we find that the nature of k-threshold coverage makes r th tend to become much smaller than the original r s . For example, suppose k = 3 and m denotes meters. Then:
  • If λ = 0.05 and r s = 30 m, then r th for p th = 0.7, 0.8, 0.9 are 2.377 m, 1.487 m, and 0.702 m, respectively.
  • If λ = 0.08 and r s = 30 m, then r th for p th = 0.7, 0.8, 0.9 are 1.486 m, 0.929 m, and 0.439 m, respectively.
These very small r th ’s cause a large number of nodes to be deployed. Since the number of nodes is very large, the overall detection probability might be underestimated.
In this paper, we try to propose a “reasonable” solution to the k-coverage problem under the probabilistic sensing model. The main contributions of this paper are as follows.
  • We propose a “reasonable” definition of k-coverage under the probabilistic sensing model, called the k-layer coverage, and propose a scheme to achieve k-layer coverage.
  • We propose a novel “zone 1 and zone 1–2” strategy to fulfill k-layer coverage scheme and ensure good coverage quality. We propose an efficient algorithm to calculate the radius r 1 of zone 1, which takes at most 18 iterations when error tolerance ϵ = 10 6 .
  • Experimental results shows that our k-layer coverage scheme indeed uses less sensor nodes, thereby demonstrating the effectiveness of our scheme.
Our k-layer coverage scheme partitions the nodes into k subsets, each forming one layer of coverage, and ensures that for every location u inside the ROI, the detection probability for u by nodes in “each layer” is not smaller than p th . In particular, our k-layer coverage scheme ensures that every location u inside the ROI is within zone 1 of at least k nodes and within zone 1–2 of at least another 2 · k nodes (zone 1 and zone 1–2 are defined in Section 4). When coverage quality is considered, our k-layer coverage scheme provides a good solution. Different from the k-threshold coverage [7], which replaces the original r s with r th , our k-layer coverage replaces the original r s with r 1 . We prove that as long as 3 r 1 < r s , we have r 1 > k · r th , meaning that our k-layer coverage will use less nodes. When the number of nodes is considered, our k-layer coverage scheme also provides a good solution.
The rest of this paper is organized as follow. Section 2 introduces the related works. Section 3 gives preliminaries, assumptions, and objectives. Section 4 gives the basics of the k-layer coverage. Section 5 gives our k-layer coverage scheme. Section 6 illustrates experimental results. Concluding remarks are given in the final section.

3. Preliminaries, Assumptions, and Objectives

Typical types of coverage are target coverage, area coverage, and barrier coverage. The purpose of target coverage is to cover (monitor) a set of specific targets (or points), that of area coverage is to cover the entire ROI, and that of barrier coverage is to detect intruders who intend to cross a long belt region. In a WSN, nodes are deployed in ad-hoc or pre-planned manner. In pre-planned deployment, nodes are placed to designated locations in the ROI so that fewer nodes can provide satisfactory coverage with lower network maintenance and management cost. Area coverage is usually more difficult and can be solved by ad-hoc or pre-planned deployment, depending on the application scenario.
This paper discusses “area coverage” by “pre-planned deployment”; the following assumptions are made:
  • The ROI is of a rectangular shape.
  • Sensor nodes are homogeneous, i.e., with the same sensing range r s and communication range r c .
  • r c 3 r s .
  • The application that we are interested in allows nodes to be deployed in pre-planned manner.
  • The detection probability, p ( u , s i ) of u by s i , used in this paper is (1).
The objective of this paper is to propose a “reasonable” definition of k-coverage under the probabilistic sensing model and to develop a sensor deployment scheme that uses less number of nodes while ensuring the following two coverage qualities: (i) the resultant WSN is connected and (ii) the detection probability satisfies a predefined threshold p th , where 0 < p th < 1 .

4. Basics of the k-Layer Coverage

4.1. The Definition of k-Layer Coverage

Definition 1.
Given an ROI and a set A of a finite number of nodes deployed in the ROI, a location u in the ROI is k-layer covered (or k-covered for short) if A can be partitioned into k subsets A 1 , A 2 , , A k such that
1 s i , j A i ( 1 p ( u , s i , j ) ) p th , for each i = 1 , 2 , , k
for a predefined threshold p th , where 0 < p th < 1 . The ROI is k-layer covered (or k-covered for short) if every location inside it is k-layer covered.
For convenience, we call each A i one “layer” and call the above coverage the k-layer coverage. See Figure 4 for an illustration. The k-layer coverage ensures that the detection probability for u contributed by each layer (i.e., each A i ) is not smaller than p th . Thus, u is k-layer covered if and only if it is 1-layer covered by each A i , i = 1 , 2 , , k . Consequently, the ROI is k-layer covered if and only if it is 1-layer covered by each A i , i = 1 , 2 , , k .
Figure 4. The concept of k-layer coverage.

4.2. “Zone 1 and Zone 1–2” Strategy

We regard each node’s sensing region as the composition of three concentric circular zones: zone 1, zone 2, and zone 3, as shown in Figure 5. We denote by r 1 the radius of zone 1 and r 2 , the outer contour radius of zone 2, where r 1 < r 2 r s . We take r 2 = 3 r 1 so that the calculations can be greatly simplified. Zone 1 has a higher detection probability than zone 2 which further has a higher detection probability than zone 3. Zone 3 might be empty and our coverage scheme will not take it into account. For convenience, denote by zone 1–2 the union of zones 1 and 2.
Figure 5. Zone 1, zone 2, zone 3, r 1 , r 2 , and r s . We take r 2 = 3 r 1 .
The following theorem states the “zone 1 and zone 1–2” strategy used in our k-layer coverage scheme, whose proof is in Section 5.
Theorem 1.
Our k-layer coverage scheme ensures that for each A i , every location inside the ROI is within zone 1 of one node in A i and within zones 1–2 of at least another two nodes in A i .

4.3. An Algorithm for Calculating the Radius r 1 of Zone 1

To use the “zone 1 and zone 1–2” strategy, we need to calculate r 1 . Let u be an arbitrary location inside the ROI. By Theorem 1, there exist three distinct nodes s a , s b , and  s c in A i such that u is within zone 1 of s a and zones 1–2 of s b and s c . By (5), we have
1 s i , j A i ( 1 p ( u , s i , j ) ) 1 ( 1 p ( u , s a ) ) node   s a ( 1 p ( u , s b ) ) node   s b ( 1 p ( u , s c ) ) node   s c 1 ( 1 e λ r 1 ) ( 1 e λ r 2 ) ( 1 e λ r 2 ) .
On the one hand, to minimize the number of nodes, r 1 should be as large as possible. On the other hand, to ensure coverage quality, r 1 cannot be too large because the following inequality is needed:
1 ( 1 e λ r 1 ) ( 1 e λ r 2 ) ( 1 e λ r 2 ) p th .
Therefore, we should find the largest possible r 1 that satisfies (6). The following algorithm finds such an r 1 and we now briefly describe the idea behind our algorithm.
Since the detection probability of any target outside r s is defined as zero, r 1 and r 2 must satisfy r 1 < r 2 r s . Since we take r 2 = 3 r 1 , the largest possible r 1 is therefore r s 3 . Substituting r 1 by r s 3 into (6), we have
1 ( 1 e λ r s 3 ) ( 1 e λ r s ) ( 1 e λ r s ) p th .
Thus, our k-layer coverage has an unavoidable lower bound p th min of p th , which is defined as
p th min = 1 ( 1 e λ r s 3 ) ( 1 e λ r s ) ( 1 e λ r s ) .
This unavoidable lower bound p th min is due to the system assumption that the detection probability of any target outside r s is zero. If p th p th min , then our algorithm enlarges p th to be p th min and returns r s 3 for r 1 . In the remaining part of this paragraph, we assume p th > p th min and show how to calculate r 1 when p th > p th min . Since
1 ( 1 e λ r 2 ) 3 1 ( 1 e λ r 1 ) ( 1 e λ r 2 ) ( 1 e λ r 2 ) 1 ( 1 e λ r 1 ) 3 ,
we have
1 ( 1 e λ r 2 ) 3 p th 1 ( 1 e λ r 1 ) 3 .
For convenience, denote by r 1 * the the largest possible r 1 that satisfies (6) under the assumption that p th > p th min . We say that a value is an ϵ-approximation of r 1 * if it satisfies (6) and satisfies a given error tolerance ϵ . The following method finds either r 1 * or an ϵ -approximation of r 1 * by using (7). Substituting 3 r 1 for r 2 in (7), we have
1 ( 1 e λ 3 r 1 ) 3 p th 1 ( 1 e λ r 1 ) 3 .
Thus
1 e λ r 1 ( 1 p th ) 1 3 1 e λ 3 r 1 .
Hence
( e λ r 1 ) 3 = e λ 3 r 1 1 ( 1 p th ) 1 3 e λ r 1 .
By using 1 ( 1 p th ) 1 3 e λ r 1 , we can obtain an approximate r 1 . Since 1 ( 1 p th ) 1 3 is a lower bound of e λ r 1 , let
l o w e r = 1 ( 1 p th ) 1 3 .
By using e λ r 1 ( 1 ( 1 p th ) 1 3 ) 1 3 , we can obtain another approximate r 1 . Since ( 1 ( 1 p th ) 1 3 ) 1 3 is an upper bound of e λ r 1 , let
u p p e r = ( 1 ( 1 p th ) 1 3 ) 1 3 .
By keeping
l o w e r e λ r 1 u p p e r ,
when our algorithm stops, it finds either r 1 * or an ϵ -approximation of r 1 * . Our full algorithm is now shown in Algorithm 1.
Algorithm 1:
Input: p th , r s , and  λ , where p th is the threshold, r s is the sensing range, and  λ is the sensor-dependent parameter given in (1).
Output: r s 3 if p th p th min ; r 1 * or an ϵ -approximation of r 1 * if p th > p th min .
1:
if p th p th min then r 1 r s 3
2:
else
3:
    found false;
4:
     ϵ 10 6 ;
5:
    lower 1 ( 1 p th ) 1 3 ;
6:
    upper ( 1 ( 1 p th ) 1 3 ) 1 3 ;
7:
    while ((found = false) and (upperlower) ≥ ϵ)) do
8:
         m i d l o w e r + u p p e r 2 ;
9:
         v a l 1 ( 1 m i d ) ( 1 m i d 3 ) ( 1 m i d 3 ) ;
10:
        if ( v a l = p th ) then f o u n d true;
11:
        else if ( v a l < p th ) then l o w e r m i d ;
12:
        else u p p e r m i d ;
13:
        end if
14:
    end while
15:
    if ( f o u n d = true) then
16:
         r 1 ln m i d λ ;   // r 1 *
17:
    else
18:
         r 1 ln u p p e r λ ;   //an ϵ -approximation of r 1 *
19:
    end if
20:
end if
21:
return r 1 ;
Theorem 2.
If p th p th min , then Algorithm 1 returns r 1 = r s 3 in O ( 1 ) time. If p th > p th min , then Algorithm 1 returns either r 1 * or an ϵ-approximation of r 1 * for ϵ = 10 6 after at most 18 iterations.
Proof. 
The first statement is obvious. Assume that p th > p th min and consider the second statement. Then, Algorithm 1 returns either r 1 = ln   m i d λ or r 1 = ln   u p p e r λ . Consider the former case. In this case, m i d = e λ r 1 . By lines 9∼10, 1 ( 1 m i d ) ( 1 m i d 3 ) ( 1 m i d 3 ) = p th . Thus r 1 is exactly r 1 * . Now, consider the latter case. In this case, r 1 < r 1 * . Hence
1 ( 1 e λ r 1 ) ( 1 e λ 3 r 1 ) ( 1 e λ 3 r 1 ) > 1 ( 1 e λ r 1 * ) ( 1 e λ 3 r 1 * ) ( 1 e λ 3 r 1 * ) = p th .
Thus r 1 satisfies (6). The execution of the while-loop ensures that r 1 satisfies the error tolerance ϵ . Therefore r 1 is an ϵ -approximation of r 1 * . We now prove that when ϵ = 10 6 , Algorithm 1 takes at most 18 iterations. Set x = 1 ( 1 p th ) 1 3 for easy writing. Since 0 < p th < 1 , we have 0 < x < 1 . By line 5, initially l o w e r = x . By line 6, initially u p p e r = x 1 3 . Therefore, initially u p p e r l o w e r = x 1 3 x . Let f ( x ) = x 1 3 x . The function f ( x ) achieves its maximum value when f ( x ) = 1 3 x 3 3 3 1 = 0 , which occurs when
x = 3 3 3 3 = 3 1 2 · 3 3 3 · 3 3 3 + 3 = 3 3 + 3 4 .
Note that f ( 3 3 + 3 4 ) 0.199572 < 0.2 . Moreover, each iteration of the while-loop cuts the search space by half. Thus after the execution of i-th iteration of the while-loop,
( u p p e r l o w e r ) < f ( 3 3 + 3 4 ) × 2 i < 0.2 × 2 i .
When 0.2 × 2 i < ϵ (i.e., when i > log 2 0.2 ϵ ), Algorithm 1 terminates its while-loop. Since ϵ = 10 6 , we have log 2 0.2 ϵ 17.61 < 18 . Thus Algorithm 1 takes at most 18 iterations. □
The following corollary follows from the proof of the above theorem.
Corollary 1.
For an arbitrary error tolerance ϵ, Algorithm 1 takes at most log 2 0.2 ϵ iterations. In particular, when ϵ = 10 x , where x is a positive integer, Algorithm 1 takes at most ( x 1 ) log 2 10 + 1 iterations.
Suppose m denotes meters. Algorithm 1 obtains:
  • If λ = 0.05 , r s = 30 m, then r 1 for p th = 0.7 , 0.8 , 0.9 are 15.685m, 12.391m, and 8.749m, respectively.
  • If λ = 0.08 , r s = 30 m, then r 1 for p th = 0.7 , 0.8 , 0.9 are 9.801m, 7.743m, and 5.468m, respectively.
To handle the probabilistic sensing model, Wang and Tseng [7] replace the original r s with r th = ln p th k λ in their deployment. To handle the probabilistic sensing model, we replace the original r s with r 1 . The relationship between r 1 and r th is given in the following lemma.
Lemma 1.
If 3 r 1 < r s and 1 ( 1 e λ r 1 ) ( 1 e λ 3 r 1 ) ( 1 e λ 3 r 1 ) = p th , then r 1 > k · r th .
Proof. 
Since r th = ln p th k λ , it is true that e λ k r th = p th . Now assume that r 1 satisfies the assumption of this lemma. Then,
1 ( 1 e λ k r th ) ( 1 e λ 3 k r th ) ( 1 e λ 3 k r th ) > 1 ( 1 e λ k r th ) = e λ k r th = p th = 1 ( 1 e λ r 1 ) ( 1 e λ 3 r 1 ) ( 1 e λ 3 r 1 ) .
Hence r 1 > k · r th . □

5. Our k-Layer Coverage Scheme

5.1. The k = 1 Case

Our 1-layer coverage scheme deploys nodes according to a “pseudo” triangular pattern deployment, in which neighboring nodes will be regularly separated by a distance of 3 r 1 (i.e.,  r 2 ) except that some of them will be separated by a distance of 3 r 1 2 or 3 r 1 2 and these exceptions only occur at the boundary of the ROI. See Figure 6 for an illustration.
Figure 6. Sensor placement in 1-layer coverage scheme; notice that only zone 1 of each node is shown in this figure. This ROI has 3 r 1 | L and 3 r 1 2 | H and therefore no adjustment for rows 1 , 3 , , .
Let L and H be the length and the height of the ROI, respectively. We assume that the ROI’s lower left corner is located at coordinate ( 0 , 0 ) . Then, the coordinates (i.e., locations) of nodes will be calculated row-by-row, with row 1 containing ( 0 , 0 ) , and row  containing the upper boundary of the ROI. Our full 1-layer coverage scheme is shown in Algorithm 2. Since all nodes have to be within the ROI, we may need to adjust the locations of the following nodes:
  • the first node in each even-numbered row (handled by line 6 of Algorithm 2),
  • the last node in each row (handled by line 9 of Algorithm 2), and 
  • all nodes in row  (handled by lines 11–18 of Algorithm 2).
Algorithm 2:
Input: The r 1 derived by Algorithm 1, the length L of the ROI, and the height H of the ROI.
Output: The designated locations of nodes.
1:
r 2 3 r 1 ; 2 H 3 r 1 + 1 ; n 1 L r 2 + 1 ; n 2 2 L r 2 2 r 2 + 2 ;
2:
for i = 1 to 1 do   //row 1, row 2, , row  ( 1 )
3:
    if (i is odd) then
4:
        output the location ( j · r 2 , 3 ( i 1 ) 2 r 1 ) for each j = 0 to n 1 1 ;
5:
    else   //i is even
6:
        output the location ( 0 , 3 ( i 1 ) 2 r 1 ) ;   //location of the first node in this row
7:
        output the location ( 2 j + 1 2 r 2 , 3 ( i 1 ) 2 r 1 ) for each j = 0 to n 2 2 ;
8:
    end if
9:
    output the location ( L , 3 ( i 1 ) 2 r 1 ) ;   //location of the last node in this row
10:
end for
11:
//row  (i.e., the last row)
12:
if ( is odd) then
13:
    output the location ( j · r 2 , H ) for each j = 0 to n 1 1 ;
14:
else   // is even
15:
    output the location ( 0 , H ) ;   //location of the first node in row 
16:
    output the location ( 2 j + 1 2 r 2 , H ) for each j = 0 to n 2 2 ;
17:
end if
18:
output the location ( L , H ) ;   //location of the last node in row 
Let , n 1 , and n 2 denote the number of rows, the number of nodes deployed in an odd-numbered row, and the number of nodes deployed in an even-numbered row by Algorithm 2, respectively. Three claims are made.
Claim 1. = 2 H 3 r 1 + 1 .
Proof. 
This claim follows from the fact that the distance between row i and row ( i + 1 ) , 1 i < 1 , is exactly 3 2 r 1 , and the distance between row ( 1 ) and row is 3 2 r 1 . □
Claim 2. n 1 = L r 2 + 1 .
Proof. 
Consider an arbitrary odd-numbered row and let node 1, node 2, , node n 1 be nodes in this row. Then, the distance between node i and node ( i + 1 ) , 1 i < n 1 1 , is exactly r 2 , and the distance between node ( n 1 1 ) and node n 1 is r 2 . Hence the claim. □
Claim 3. n 2 = 2 L r 2 2 r 2 + 2 .
Proof. 
Consider an arbitrary even-numbered row and let node 1, node 2, , node n 2 be nodes in this row. Then, the distance between node 1 and node 2 is r 2 2 , the distance between node i and node ( i + 1 ) , 2 i < n 2 1 , is exactly r 2 , and that between node ( n 2 1 ) and node n 2 is r 2 2 . Hence the claim. □
We now are ready to prove Theorem 1.
Proof. 
It can be easily observed from Figure 6 that every location inside the ROI is within zone 1 of at least one node. Thus, to prove this theorem, it suffices to prove that every location inside the ROI is within zones 1–2 of at least three nodes. This assertion can be easily verified by using Figure 7 and hence we have this theorem. □
Figure 7. Sensor placement in 1-layer coverage scheme; notice that only zone 1–2 of each node is shown in this figure.

5.2. The General Case

To achieve k-layer coverage for k > 1 , we begin with the 1-layer coverage and duplicate k sensor nodes on each designated location of the 1-layer coverage. See Figure 8 for an illustration. See also Appendix A and Figure A1 for possible improvements. The following corollary follows from Claims 1∼3.
Figure 8. (a) 2-layer coverage. (b) 3-layer coverage.
Corollary 2.
The number N of nodes deployed by our k-layer coverage scheme equals to
N = k · ( n 1 + n 2 ) 2 + k · n 1 i f     i s   o d d , k · ( n 1 + n 2 ) 2 i f     i s   e v e n .

6. Experimental Results

Our experimental results are obtained by using Visual C++ programming language under the environment of a 64-bit personal computer with win 10 operating system. Parameters used in our experimental results are listed in Table 3.
Table 3. Parameters used: m denote meters.
Our experimental results are shown in Table 4, Table 5 and Table 6. These results demonstrate r th used in k-threshold coverage [7] and r 1 used in our k-layer coverage. Recall that both r th and r 1 are served as a substitution radius for the original sensing radius r s . As can be observed in Table 4, Table 5 and Table 6, r th is much smaller than r s and r 1 is more reasonable. Table 4, Table 5 and Table 6 also demonstrate the number of nodes required by k-threshold coverage [7] and our k-layer coverage. It is not difficult to see that the number of nodes required by k-threshold coverage [7] is quite large, especially when k is large. On the other hand, the number of nodes required by our k-layer coverage is much less.
Table 4. The number of nodes for k = 1 coverage: “# nodes” means “the number of nodes required”.
Table 5. The number of nodes for k = 3 coverage: “# nodes” means “the number of nodes required”.
Table 6. The number of nodes for k = 5 coverage: “# nodes” means “the number of nodes required”.

7. Concluding Remarks

This paper considers the multilevel (k) coverage problem in WSNs with uncertain properties (i.e., under the probabilistic sensing model). We find that the nature of the previous k-threshold coverage [7] makes its substitution radius r th tend to be much smaller than the original sensing range r s and therefore will use too many nodes. We thus try to propose a more reasonable solution and yield the k-layer coverage. In k-layer coverage, each node’s sensing region is regarded as the composition of zone 1, zone 2, and zone 3. Although regarding each node’s sensing region as the composition of several zones has been proposed in the literature, to the best of our knowledge, we are the first ones to use the “zone 1 and zone 1–2” strategy to solve the probabilistic multilevel (k) coverage problem. By using such a “zone 1 and zone 1–2” strategy, our k-layer coverage achieves a better coverage quality and uses less nodes. A preliminary version of this paper was in [32]; see also [33]. One future work for this research is to extend k-layer coverage to the probabilistic sensing model in (4) and to more realistic regions of interest. Another future work is to explore the relationship between coverage and energy consumption.

Author Contributions

Conceptualization, Y.-N.C. and C.C.; methodology, Y.-N.C. and C.C.; validation, Y.-N.C., W.-H.L. and C.C.; investigation, Y.-N.C., W.-H.L. and C.C.; data curation, Y.-N.C.; writing–original draft preparation, Y.-N.C. and C.C.; writing–review and editing, W.-H.L. and C.C.; supervision, C.C.; project administration, C.C.; funding acquisition, W.-H.L. and C.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially supported by the Ministry of Science and Technology of Taiwan under grants MOST-108-2115-M-009-006 and MOST-108-2115-M-009-013.

Acknowledgments

The authors would like to thank Yu-Chee Tseng for his valuable comments that greatly improve the presentation of this paper. The authors would also like to express their deepest gratitude to the anonymous reviewers for their constructive comments and time spent to analyze this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Appendix: Balanced k-Layer Coverage

In Figure 8, some locations in the ROI get a much higher coverage than the other locations. We show how to obtain a more balanced k-layer coverage. Let L denote the 1-layer coverage obtained by Algorithm 2. The balanced 1-layer coverage is L . Instead of duplicating each node twice, the balanced 2-layer coverage is L together with a shift L of L ; see Figure A1a. Instead of duplicating each node thrice, the balanced 3-layer coverage is L together with two shifts L and L of L ; see Figure A1b. Notice that some nodes have to be added to L (respectively, L ) (all of these nodes are close to the ROI’s boundary) so that L (respectively, L ) can ensure a 1-layer coverage; we omit the details. For k > 3 , let q = k 3 and r = k % 3 . The balanced k-layer coverage is applying the balanced 3-layer coverage q times and applying the balanced r-layer coverage once. For example, if k = 5 , then apply the balanced 3-layer coverage once and the balanced 2-layer coverage once.
Figure A1. (a) The balanced 2-layer coverage. (b) The balanced 3-layer coverage. L consists of all nodes colored black, L consists of all nodes colored yellow, and L consists of all nodes colored green.

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayichi, E. Wireless sensor network: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  2. Huo, H.; Xu, Y.; Zhang, H.; Chuang, Y.H.; Wu, T.C. Wireless-sensor-networks-based healthcare system: A survey on the view of communication paradigms. Int. J. Ad Hoc Ubiquitous Comput. 2011, 8, 135–154. [Google Scholar] [CrossRef]
  3. Farsi, M.; Elhosseini, M.A.; Badawy, M.; Ali, H.A.; Eldin, H.Z. Deployment techniques in wireless sensor networks, coverage and connectivity: A survey. IEEE Access 2019, 7, 28940–28954. [Google Scholar] [CrossRef]
  4. Wang, B. Coverage problems in sensor networks: A survey. ACM Comput. Surv. 2011, 43, 32. [Google Scholar] [CrossRef]
  5. Mini, S.; Udgata, S.; Sabat, S. Sensor deployment and scheduling for target coverage problem in wireless sensor networks. IEEE Sens. J. 2014, 14, 636–644. [Google Scholar] [CrossRef]
  6. Rebai, M.; Snoussi, H.; Hnaien, F.; Khoukhi, L. Sensor deployment optimization methods to achieve both coverage and connectivity in wireless sensor networks. Comput. Oper. Res. 2015, 59, 11–21. [Google Scholar] [CrossRef]
  7. Wang, Y.C.; Tseng, Y.C. Distributed deployment scheme for mobile wireless sensor networks to ensure multilevel coverage. IEEE Trans. Parallel Distrib. Syst. 2008, 19, 1280–1294. [Google Scholar] [CrossRef]
  8. Dhillon, S.S.; Chakrabarty, K. Sensor placement for effective coverage and surveillance in distributed sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’03), New Orleans, LA, USA, 16–20 March 2003; pp. 1609–1614. [Google Scholar]
  9. Yang, Q.; He, S.; Li, J.; Chen, J.; Sun, Y. Energy-efficient probabilistic area coverage in wireless sensor networks. IEEE Trans. Veh. Technol. 2015, 64, 367–377. [Google Scholar] [CrossRef]
  10. Yun, Z.; Bai, X.; Xuan, D.; Lai, T.H.; Jia, W. Optimal deployment patterns for full coverage and k-connectivity wireless sensor networks. IEEE/ACM Trans. Netw. 2010, 18, 934–947. [Google Scholar]
  11. Zou, Y.; Chakrabarty, K. Sensor deployment and target localization based on virtual forces. In Proceedings of the IEEE Infocom Conference (INFOCOM 2003), San Francisco, CA, USA, 30 March–3 April 2003; pp. 1293–1303. [Google Scholar]
  12. Wang, Y.; Wu, S.; Chen, Z.; Gao, X.; Chen, G. Coverage problem with uncertain properties in wireless sensor networks: A survey. Comput. Netw. 2017, 123, 200–232. [Google Scholar] [CrossRef]
  13. Nicules, D.; Nath, B. Ad-hoc positioning system (APS) using AoA. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’03), Dallas, TX, USA, 30 March–3 April 2003; pp. 1734–1743. [Google Scholar]
  14. Klein, L.A. A Boolean algebra approach to multiple sensor voting fusion. IEEE Trans. Aerosp. Electron. Syst. 1993, 29, 317–327. [Google Scholar] [CrossRef]
  15. Sun, T.; Chen, L.J.; Han, C.C.; Gerla, M. Reliable sensor networks for planet exploration. In Proceedings of the IEEE International Conference on Networking, Sensing, and Control (ICNSC’05), Tucson, AZ, USA, 19–22 March 2005; pp. 816–821. [Google Scholar]
  16. Chakrabarty, K.; Iyengar, S.S.; Qi, H.; Cho, E. Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans. Comput. 2002, 51, 1448–1453. [Google Scholar] [CrossRef]
  17. Huang, C.F.; Tseng, Y.C. The coverage problem in a wireless sensor network. Mob. Netw. Appl. 2005, 10, 519–528. [Google Scholar] [CrossRef]
  18. Wang, H.L.; Chung, W.H. The generalized k-coverage under probabilistic sensing model in sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks (WCNC), Shanghai, China, 1–4 April 2012; pp. 1737–1742. [Google Scholar]
  19. Zhang, H.; Hou, J.C. Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens. Wirel. Netw. 2005, 1, 89–124. [Google Scholar]
  20. Kershner, R. The number of circles covering a set. Am. J. Math. 1939, 61, 665–671. [Google Scholar] [CrossRef]
  21. Zou, Y.; Chakrabarty, K. Uncertainty-aware and coverage-oriented deployment for sensor networks. J. Parallel Distrib. Comput. 2004, 64, 788–798. [Google Scholar] [CrossRef]
  22. Zou, Y.; Chakrabarty, K. A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks. IEEE Trans. Comput. 2005, 54, 978–991. [Google Scholar] [CrossRef]
  23. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. Uncertainty-aware sensor network deployment. In Proceedings of the IEEE Globecom, Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  24. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. An evidence-based sensor coverage model. IEEE Commun. Lett. 2012, 16, 1462–1465. [Google Scholar] [CrossRef]
  25. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. Efficient uncertainty-aware deployment algorithms for wireless sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks, Paris, France, 1–4 April 2012; pp. 2163–2167. [Google Scholar]
  26. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. WSNs deployment framework based on the theory of belief functions. Comput. Netw. 2015, 88, 12–26. [Google Scholar] [CrossRef]
  27. Ammari, H.M.; Das, S.K. Centralized and clustered k-coverage protocols for wireless sensor networks. IEEE Trans. Comput. 2012, 61, 118–133. [Google Scholar] [CrossRef]
  28. Elhoseny, M.; Tharwat, A.; Farouk, A.; Hassanien, A.E. K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sens. Lett. 2017, 1, 7500404. [Google Scholar] [CrossRef]
  29. Liu, Q. K-coverage reliability evaluation for wireless sensor networks using 2 dimensional k / r×s / m×n:F system. In Proceedings of the 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS), Shanghai, China, 17–29 October 2018; pp. 83–87. [Google Scholar]
  30. Özdağ, R. The solution of the k-coverage problem in wireless sensor networks. In Proceedings of the 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey, 16–19 May 2016; pp. 873–876. [Google Scholar]
  31. Rezaee, A.A.; Zahedi, M.-H.; Dehghan, Z. Coverage optimization in wireless sensor networks using gravitational search algorithm. J. Soft Comput. Inf. Technol. (JSCIT) 2019, 8, 20–31. [Google Scholar]
  32. Chen, Y.-N. Multilevel (k) Coverage Based on Probabilistic Sensing Model in Wireless Sensor Networks. Master’s Thesis, National Chiao Tung University, Hsinchu, Taiwan, June 2019. [Google Scholar]
  33. Chen, Y.-N.; Chen, C. Sensor deployment under probabilistic sensing model. In Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference (HPCCT), Beijing, China, 22–24 June 2018; pp. 33–36. [Google Scholar]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.