Next Article in Journal
End-to-End Automatic Pronunciation Error Detection Based on Improved Hybrid CTC/Attention Architecture
Next Article in Special Issue
A Path-Length Efficient, Low-Overhead, Load-Balanced Routing Protocol for Maximum Network Lifetime in Wireless Sensor Networks with Holes
Previous Article in Journal
Improve Temporal Fourier Transform Profilometry for Complex Dynamic Three-Dimensional Shape Measurement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Effective Sensor Deployment Scheme that Ensures Multilevel Coverage of Wireless Sensor Networks with Uncertain Properties

Department of Applied Mathematics, National Chiao Tung University, Hsinchu 300, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(7), 1831; https://doi.org/10.3390/s20071831
Submission received: 10 February 2020 / Revised: 21 March 2020 / Accepted: 23 March 2020 / Published: 25 March 2020
(This article belongs to the Special Issue Deployment and Control of Wireless Sensor Networks)

Abstract

:
The coverage problem is a fundamental problem for almost all applications in wireless sensor networks (WSNs). Many applications even impose the requirement of multilevel (k) coverage of the region of interest (ROI). In this paper, we consider WSNs with uncertain properties. More precisely, we consider WSNs under the probabilistic sensing model, in which the detection probability of a sensor node decays as the distance between the target and the sensor node increases. The difficulty we encountered is that there is no unified definition of k-coverage under the probabilistic sensing model. We overcome this difficulty by proposing a “reasonable” definition of k-coverage under such a model. We propose a sensor deployment scheme that uses less number of deployed sensor nodes while ensuring good coverage qualities so that (i) the resultant WSN is connected and (ii) the detection probability satisfies a predefined threshold p th , where 0 < p th < 1 . Our scheme uses a novel “zone 1 and zone 1–2” strategy, where zone 1 and zone 2 are a sensor node’s sensing regions that have the highest and the second highest detection probability, respectively, and zone 1–2 is the union of zones 1 and 2. The experimental results demonstrate the effectiveness of our scheme.

1. Introduction

A wireless sensor network (WSN) has various applications in health-care, smart home, security, environmental exploration, and the military [1,2]. A sensor node (or simply node) is the basic component of a WSN. A WSN usually consists of numerous nodes deployed in a region of interest (ROI). Two nodes can communicate with each other if each is within the transmission range of the other, in which case we say that there is a link between them or that they are neighbors. Each node is able to collect data and process information and communicate with neighboring nodes.
Among various issues in WSNs, the coverage problem and the connectivity problem have been regarded as crucial foundations because many applications rely on them. Surveys for the coverage problem can be found in [3,4]. A good sensor deployment strategy should consider both coverage and connectivity. Sensor deployment not only determines the cost of constructing the network but also affects how well the given ROI will be monitored. This paper assumes that each node’s sensing region is of a disk shape (see Figure 1a) and all nodes have the same sensing range r s and communication range r c .
Let u be a location in the ROI, s i be a node in the WSN, and d ( u , s i ) be the Euclidean distance between u and s i . Most of the past researches use the binary sensing model [5,6,7], where nodes are assumed to be accurate in detecting targets within their sensing ranges. More precisely, under the binary sensing model (see Figure 1b for an illustration), the detection probability p ( u , s i ) of u by s i is defined as
p ( u , s i ) = 1 if   d ( u , s i ) r s , 0 otherwise .
In physical scenarios, the distance decay effect cannot be ignored. That is, the detection probability of a node decays as the distance between the target and the node increases. Based on this, the coverage problem under a more realistic model, called the probabilistic sensing model, has been investigated; see [7,8,9,10,11]. A survey for the coverage problem with uncertain properties can be found in [12]. Do notice that unlike the binary sensing model, which has a unified definition of p ( u , s i ) , there is no unified definition of p ( u , s i ) under the probabilistic sensing model; see Section 2 for details. We now give the definition of p ( u , s i ) used in [7] and in this paper. Under the probabilistic sensing model (see Figure 1c for an illustration), the detection probability p ( u , s i ) of u by s i is defined as
p ( u , s i ) = e λ d ( u , s i ) if   d ( u , s i ) r s , 0 otherwise ,
where λ is a sensor-dependent parameter.
Many real-world applications impose the requirement of multilevel k > 1 coverage. For example, k 2 for military or surveillance applications, k 3 for positioning protocols using triangulation [13], conducting data fusion [14], and minimizing the impact of sensor failure [15]. Sensor deployment with multilevel (k) coverage have been discussed in [7,15,16,17].
Under the binary sensing model, an ROI is said to be k-covered if every location in the ROI can be detected by at least k nodes (i.e., every location in the ROI is within k nodes’ sensing regions). Unfortunately, to the best of our knowledge, there is no unified definition of k-coverage under the probabilistic sensing model. We now are ready to elaborate this issue. Let A = { s 1 , s 2 , , s n } be the set of sensor nodes deployed in the ROI. In [7], a location u in the ROI is considered as k-covered if the probability that there are at least k nodes that can detect u is not smaller than a predefined threshold p th , where 0 < p th < 1 . More precisely, in [7], a location u in the ROI is said to be k-covered if
s i A p ( u , s i ) p th , for some A A with | A | = k .
For clarity, we call this definition of k-coverage the k-threshold coverage. In [18], a location u in the ROI is said to be k-covered if
s i A p ( u , s i ) k .
For clarity, we call this definition of k-coverage the k-expectation coverage. In both [7] and [18], the ROI is said to be k-covered if every location u inside the ROI is k-covered. The p ( u , s i ) used in [18] is defined as (4), which is a generalization of (1) and is introduced in Section 2. By (3), the event of u detected by s i is independent of the event of u detected by s j for j i . Reference [18] proves that the ROI is k-covered by A if, among all locations inside the ROI, the minimum expected number of nodes is k (there is a typo and k should be at leastk k).
Three main considerations in WSNs’ coverage are: maximizing coverage quality, maximizing network lifetime, and minimizing the number of deployed nodes. The coverage quality and lifetime are two conflict factors with respect to energy consumption. Reference [12] points out that the k-coverage requirement makes the problem more sophisticated because more nodes are needed; deploying less nodes by decreasing the overlap region and prolonging the network lifetime become complicated. The k-expectation coverage [18] has the drawback that the user cannot specify his/her preference for the threshold p th , meaning that the user cannot specify their desired coverage quality. Moreover, it is possible that the entire ROI is regarded as k-covered but some locations inside it are detected by a lot of nodes each with a small detection probability. The k-threshold coverage [7] has the drawback that it tends to use too many sensor nodes; we give the calculation details in Section 2. In short, Wang and Tseng [7] first calculate r th (notice that r th is denoted as r s p in [7]) and then replace the original r s with r th in the deployment.
The objective of this paper is to propose a sensor deployment scheme to use less number of nodes while ensuring the following two important coverage qualities: (i) the resultant WSN is connected and (ii) the detection probability satisfies a predefined threshold p th , where 0 < p th < 1 . Although k-threshold coverage [7] achieves the same objective, we find that the nature of k-threshold coverage makes r th tend to become much smaller than the original r s . For example, suppose k = 3 and m denotes meters. Then:
  • If λ = 0.05 and r s = 30 m, then r th for p th = 0.7, 0.8, 0.9 are 2.377 m, 1.487 m, and 0.702 m, respectively.
  • If λ = 0.08 and r s = 30 m, then r th for p th = 0.7, 0.8, 0.9 are 1.486 m, 0.929 m, and 0.439 m, respectively.
These very small r th ’s cause a large number of nodes to be deployed. Since the number of nodes is very large, the overall detection probability might be underestimated.
In this paper, we try to propose a “reasonable” solution to the k-coverage problem under the probabilistic sensing model. The main contributions of this paper are as follows.
  • We propose a “reasonable” definition of k-coverage under the probabilistic sensing model, called the k-layer coverage, and propose a scheme to achieve k-layer coverage.
  • We propose a novel “zone 1 and zone 1–2” strategy to fulfill k-layer coverage scheme and ensure good coverage quality. We propose an efficient algorithm to calculate the radius r 1 of zone 1, which takes at most 18 iterations when error tolerance ϵ = 10 6 .
  • Experimental results shows that our k-layer coverage scheme indeed uses less sensor nodes, thereby demonstrating the effectiveness of our scheme.
Our k-layer coverage scheme partitions the nodes into k subsets, each forming one layer of coverage, and ensures that for every location u inside the ROI, the detection probability for u by nodes in “each layer” is not smaller than p th . In particular, our k-layer coverage scheme ensures that every location u inside the ROI is within zone 1 of at least k nodes and within zone 1–2 of at least another 2 · k nodes (zone 1 and zone 1–2 are defined in Section 4). When coverage quality is considered, our k-layer coverage scheme provides a good solution. Different from the k-threshold coverage [7], which replaces the original r s with r th , our k-layer coverage replaces the original r s with r 1 . We prove that as long as 3 r 1 < r s , we have r 1 > k · r th , meaning that our k-layer coverage will use less nodes. When the number of nodes is considered, our k-layer coverage scheme also provides a good solution.
The rest of this paper is organized as follow. Section 2 introduces the related works. Section 3 gives preliminaries, assumptions, and objectives. Section 4 gives the basics of the k-layer coverage. Section 5 gives our k-layer coverage scheme. Section 6 illustrates experimental results. Concluding remarks are given in the final section.

2. Related Works

Recall that a good sensor deployment should consider both coverage and connectivity. Assuming that the ROI is a convex set, Zhang and Hou [19] investigate the relationship between coverage and connectivity and prove that r c 2 r s is both necessary and sufficient to ensure that coverage implies connectivity. With such a proof, one can then focus only on the coverage problem. As long as r c 3 r s , nodes can be deployed according to the regular triangular lattice pattern (triangular pattern for short; see Figure 2) so that both coverage and connectivity can be ensured [7,20]. Using the triangular pattern, neighboring nodes will be regularly separated by a distance of 3 r s . A deployment using the triangular pattern is sometimes called an optimal deployment since it is asymptotically optimal in terms of the number of nodes needed to achieve full coverage of the ROI.
In some applications, r c 2 r s or r c 3 r s may not hold. Wang and Tseng [7] therefore consider an arbitrary relationship between r s and r c , thus relaxing the limitations of existing results. In [7], for the the binary sensing model, two solutions to achieve k-coverage are proposed: the naive duplicate placement scheme (duplicate scheme for short) and the interpolating placement scheme (interpolating scheme for short). The idea of the duplicate scheme is to use a good sensor placement method to ensure 1-coverage and connectivity and then duplicate k nodes on each designated location. However, since the duplicate scheme may result in some regions in the ROI having a much higher coverage levels than k, the interpolation scheme is therefore being proposed to “reuse” these regions to generate a multilevel coverage. When k = 1 or k = 2 or ( k 3 and r c > 2 + 3 3 r s ), it is found that the interpolation scheme will not save nodes compared to the duplicate scheme, thereby adopting the duplicate scheme. For clarity, we summarize the schemes used in [7] in Table 1. Notice that the interpolation schemes used in the ( r c 3 2 r s )-case and the ( 3 2 r s < r c 2 + 3 3 r s )-case are different.
Wang and Tseng [7] adapt the schemes of the binary sensing model to the probabilistic sensing model. Set (★) = ( k 3 and r c 3 r s ) for convenience. We now use the (★)-case as an illustration to show how [7] performs the adaption. According to Table 1 (shown in Section 2), under the binary sensing model, [7] will use the duplicate scheme and triangular pattern in the (★)-case. Under the probabilistic sensing model, in the (★)-case, [7] first calculates r th (notice that r th is denoted as r s p in [7]). Then, [7] replaces the original r s with r th in the deployment to ensure that every location inside the ROI is k-covered under the probabilistic sensing model. Since the duplicate scheme places k nodes on each designated location, [7] calculates r th by
s i A p ( u , s i ) e k λ r th
and
e k λ r th p th r th ln p th k λ
where u is a location in the ROI having the minimum k-covered probability and u is detected by a set A of k nodes placed at a designated location with distance r th to u.
Let u, s i , d ( u , s i ) , and  p ( u , s i ) be defined as in Section 1. In [11,18,21,22], four parameters ( λ , β , r , r e ) are used to specify a probabilistic sensing model and p ( u , s i ) is defined as
p ( u , s i ) = 1 if   d ( u , s i ) r r e , e λ ( d ( u , s i ) ( r r e ) ) β if   r r e < d ( u , s i ) r + r e , 0 otherwise ,
where λ and β are sensor-dependent parameters (see Figure 3). That is, if  d ( u , s i ) r r e , then a target at u will definitely be detected by s i ; if d ( u , s i ) > r + r e , then the detection probability will be too small and will be totally ignored. If r r e < d ( u , s i ) r + r e , then the behavior of the detection probability obeys the function e λ ( d ( u , s i ) ( r r e ) ) β . By taking β = 1 and r = r e = r s 2 , (4) coincides with (1).
Notice that besides the binary sensing model and the probabilistic sensing model, some researchers consider the evidence-based sensor coverage model and use the theory of belief functions to solve the coverage problem; see [23,24,25,26]. Notice that [23,24,25,26] consider 1-coverage and their ROI is assumed as a two- or three-dimensional grid of points. In this paper, we consider k-coverage and our ROI contains every location inside it. Some other references related to k-coverage can also be found in [27,28,29,30,31]. Before ending this section, for clarity, we summarize our most related works in Table 2.

3. Preliminaries, Assumptions, and Objectives

Typical types of coverage are target coverage, area coverage, and barrier coverage. The purpose of target coverage is to cover (monitor) a set of specific targets (or points), that of area coverage is to cover the entire ROI, and that of barrier coverage is to detect intruders who intend to cross a long belt region. In a WSN, nodes are deployed in ad-hoc or pre-planned manner. In pre-planned deployment, nodes are placed to designated locations in the ROI so that fewer nodes can provide satisfactory coverage with lower network maintenance and management cost. Area coverage is usually more difficult and can be solved by ad-hoc or pre-planned deployment, depending on the application scenario.
This paper discusses “area coverage” by “pre-planned deployment”; the following assumptions are made:
  • The ROI is of a rectangular shape.
  • Sensor nodes are homogeneous, i.e., with the same sensing range r s and communication range r c .
  • r c 3 r s .
  • The application that we are interested in allows nodes to be deployed in pre-planned manner.
  • The detection probability, p ( u , s i ) of u by s i , used in this paper is (1).
The objective of this paper is to propose a “reasonable” definition of k-coverage under the probabilistic sensing model and to develop a sensor deployment scheme that uses less number of nodes while ensuring the following two coverage qualities: (i) the resultant WSN is connected and (ii) the detection probability satisfies a predefined threshold p th , where 0 < p th < 1 .

4. Basics of the k-Layer Coverage

4.1. The Definition of k-Layer Coverage

Definition 1.
Given an ROI and a set A of a finite number of nodes deployed in the ROI, a location u in the ROI is k-layer covered (or k-covered for short) if A can be partitioned into k subsets A 1 , A 2 , , A k such that
1 s i , j A i ( 1 p ( u , s i , j ) ) p th , for each i = 1 , 2 , , k
for a predefined threshold p th , where 0 < p th < 1 . The ROI is k-layer covered (or k-covered for short) if every location inside it is k-layer covered.
For convenience, we call each A i one “layer” and call the above coverage the k-layer coverage. See Figure 4 for an illustration. The k-layer coverage ensures that the detection probability for u contributed by each layer (i.e., each A i ) is not smaller than p th . Thus, u is k-layer covered if and only if it is 1-layer covered by each A i , i = 1 , 2 , , k . Consequently, the ROI is k-layer covered if and only if it is 1-layer covered by each A i , i = 1 , 2 , , k .

4.2. “Zone 1 and Zone 1–2” Strategy

We regard each node’s sensing region as the composition of three concentric circular zones: zone 1, zone 2, and zone 3, as shown in Figure 5. We denote by r 1 the radius of zone 1 and r 2 , the outer contour radius of zone 2, where r 1 < r 2 r s . We take r 2 = 3 r 1 so that the calculations can be greatly simplified. Zone 1 has a higher detection probability than zone 2 which further has a higher detection probability than zone 3. Zone 3 might be empty and our coverage scheme will not take it into account. For convenience, denote by zone 1–2 the union of zones 1 and 2.
The following theorem states the “zone 1 and zone 1–2” strategy used in our k-layer coverage scheme, whose proof is in Section 5.
Theorem 1.
Our k-layer coverage scheme ensures that for each A i , every location inside the ROI is within zone 1 of one node in A i and within zones 1–2 of at least another two nodes in A i .

4.3. An Algorithm for Calculating the Radius r 1 of Zone 1

To use the “zone 1 and zone 1–2” strategy, we need to calculate r 1 . Let u be an arbitrary location inside the ROI. By Theorem 1, there exist three distinct nodes s a , s b , and  s c in A i such that u is within zone 1 of s a and zones 1–2 of s b and s c . By (5), we have
1 s i , j A i ( 1 p ( u , s i , j ) ) 1 ( 1 p ( u , s a ) ) node   s a ( 1 p ( u , s b ) ) node   s b ( 1 p ( u , s c ) ) node   s c 1 ( 1 e λ r 1 ) ( 1 e λ r 2 ) ( 1 e λ r 2 ) .
On the one hand, to minimize the number of nodes, r 1 should be as large as possible. On the other hand, to ensure coverage quality, r 1 cannot be too large because the following inequality is needed:
1 ( 1 e λ r 1 ) ( 1 e λ r 2 ) ( 1 e λ r 2 ) p th .
Therefore, we should find the largest possible r 1 that satisfies (6). The following algorithm finds such an r 1 and we now briefly describe the idea behind our algorithm.
Since the detection probability of any target outside r s is defined as zero, r 1 and r 2 must satisfy r 1 < r 2 r s . Since we take r 2 = 3 r 1 , the largest possible r 1 is therefore r s 3 . Substituting r 1 by r s 3 into (6), we have
1 ( 1 e λ r s 3 ) ( 1 e λ r s ) ( 1 e λ r s ) p th .
Thus, our k-layer coverage has an unavoidable lower bound p th min of p th , which is defined as
p th min = 1 ( 1 e λ r s 3 ) ( 1 e λ r s ) ( 1 e λ r s ) .
This unavoidable lower bound p th min is due to the system assumption that the detection probability of any target outside r s is zero. If p th p th min , then our algorithm enlarges p th to be p th min and returns r s 3 for r 1 . In the remaining part of this paragraph, we assume p th > p th min and show how to calculate r 1 when p th > p th min . Since
1 ( 1 e λ r 2 ) 3 1 ( 1 e λ r 1 ) ( 1 e λ r 2 ) ( 1 e λ r 2 ) 1 ( 1 e λ r 1 ) 3 ,
we have
1 ( 1 e λ r 2 ) 3 p th 1 ( 1 e λ r 1 ) 3 .
For convenience, denote by r 1 * the the largest possible r 1 that satisfies (6) under the assumption that p th > p th min . We say that a value is an ϵ-approximation of r 1 * if it satisfies (6) and satisfies a given error tolerance ϵ . The following method finds either r 1 * or an ϵ -approximation of r 1 * by using (7). Substituting 3 r 1 for r 2 in (7), we have
1 ( 1 e λ 3 r 1 ) 3 p th 1 ( 1 e λ r 1 ) 3 .
Thus
1 e λ r 1 ( 1 p th ) 1 3 1 e λ 3 r 1 .
Hence
( e λ r 1 ) 3 = e λ 3 r 1 1 ( 1 p th ) 1 3 e λ r 1 .
By using 1 ( 1 p th ) 1 3 e λ r 1 , we can obtain an approximate r 1 . Since 1 ( 1 p th ) 1 3 is a lower bound of e λ r 1 , let
l o w e r = 1 ( 1 p th ) 1 3 .
By using e λ r 1 ( 1 ( 1 p th ) 1 3 ) 1 3 , we can obtain another approximate r 1 . Since ( 1 ( 1 p th ) 1 3 ) 1 3 is an upper bound of e λ r 1 , let
u p p e r = ( 1 ( 1 p th ) 1 3 ) 1 3 .
By keeping
l o w e r e λ r 1 u p p e r ,
when our algorithm stops, it finds either r 1 * or an ϵ -approximation of r 1 * . Our full algorithm is now shown in Algorithm 1.
Algorithm 1:
Input: p th , r s , and  λ , where p th is the threshold, r s is the sensing range, and  λ is the sensor-dependent parameter given in (1).
Output: r s 3 if p th p th min ; r 1 * or an ϵ -approximation of r 1 * if p th > p th min .
1:
if p th p th min then r 1 r s 3
2:
else
3:
    found false;
4:
     ϵ 10 6 ;
5:
    lower 1 ( 1 p th ) 1 3 ;
6:
    upper ( 1 ( 1 p th ) 1 3 ) 1 3 ;
7:
    while ((found = false) and (upperlower) ≥ ϵ)) do
8:
         m i d l o w e r + u p p e r 2 ;
9:
         v a l 1 ( 1 m i d ) ( 1 m i d 3 ) ( 1 m i d 3 ) ;
10:
        if ( v a l = p th ) then f o u n d true;
11:
        else if ( v a l < p th ) then l o w e r m i d ;
12:
        else u p p e r m i d ;
13:
        end if
14:
    end while
15:
    if ( f o u n d = true) then
16:
         r 1 ln m i d λ ;   // r 1 *
17:
    else
18:
         r 1 ln u p p e r λ ;   //an ϵ -approximation of r 1 *
19:
    end if
20:
end if
21:
return r 1 ;
Theorem 2.
If p th p th min , then Algorithm 1 returns r 1 = r s 3 in O ( 1 ) time. If p th > p th min , then Algorithm 1 returns either r 1 * or an ϵ-approximation of r 1 * for ϵ = 10 6 after at most 18 iterations.
Proof. 
The first statement is obvious. Assume that p th > p th min and consider the second statement. Then, Algorithm 1 returns either r 1 = ln   m i d λ or r 1 = ln   u p p e r λ . Consider the former case. In this case, m i d = e λ r 1 . By lines 9∼10, 1 ( 1 m i d ) ( 1 m i d 3 ) ( 1 m i d 3 ) = p th . Thus r 1 is exactly r 1 * . Now, consider the latter case. In this case, r 1 < r 1 * . Hence
1 ( 1 e λ r 1 ) ( 1 e λ 3 r 1 ) ( 1 e λ 3 r 1 ) > 1 ( 1 e λ r 1 * ) ( 1 e λ 3 r 1 * ) ( 1 e λ 3 r 1 * ) = p th .
Thus r 1 satisfies (6). The execution of the while-loop ensures that r 1 satisfies the error tolerance ϵ . Therefore r 1 is an ϵ -approximation of r 1 * . We now prove that when ϵ = 10 6 , Algorithm 1 takes at most 18 iterations. Set x = 1 ( 1 p th ) 1 3 for easy writing. Since 0 < p th < 1 , we have 0 < x < 1 . By line 5, initially l o w e r = x . By line 6, initially u p p e r = x 1 3 . Therefore, initially u p p e r l o w e r = x 1 3 x . Let f ( x ) = x 1 3 x . The function f ( x ) achieves its maximum value when f ( x ) = 1 3 x 3 3 3 1 = 0 , which occurs when
x = 3 3 3 3 = 3 1 2 · 3 3 3 · 3 3 3 + 3 = 3 3 + 3 4 .
Note that f ( 3 3 + 3 4 ) 0.199572 < 0.2 . Moreover, each iteration of the while-loop cuts the search space by half. Thus after the execution of i-th iteration of the while-loop,
( u p p e r l o w e r ) < f ( 3 3 + 3 4 ) × 2 i < 0.2 × 2 i .
When 0.2 × 2 i < ϵ (i.e., when i > log 2 0.2 ϵ ), Algorithm 1 terminates its while-loop. Since ϵ = 10 6 , we have log 2 0.2 ϵ 17.61 < 18 . Thus Algorithm 1 takes at most 18 iterations. □
The following corollary follows from the proof of the above theorem.
Corollary 1.
For an arbitrary error tolerance ϵ, Algorithm 1 takes at most log 2 0.2 ϵ iterations. In particular, when ϵ = 10 x , where x is a positive integer, Algorithm 1 takes at most ( x 1 ) log 2 10 + 1 iterations.
Suppose m denotes meters. Algorithm 1 obtains:
  • If λ = 0.05 , r s = 30 m, then r 1 for p th = 0.7 , 0.8 , 0.9 are 15.685m, 12.391m, and 8.749m, respectively.
  • If λ = 0.08 , r s = 30 m, then r 1 for p th = 0.7 , 0.8 , 0.9 are 9.801m, 7.743m, and 5.468m, respectively.
To handle the probabilistic sensing model, Wang and Tseng [7] replace the original r s with r th = ln p th k λ in their deployment. To handle the probabilistic sensing model, we replace the original r s with r 1 . The relationship between r 1 and r th is given in the following lemma.
Lemma 1.
If 3 r 1 < r s and 1 ( 1 e λ r 1 ) ( 1 e λ 3 r 1 ) ( 1 e λ 3 r 1 ) = p th , then r 1 > k · r th .
Proof. 
Since r th = ln p th k λ , it is true that e λ k r th = p th . Now assume that r 1 satisfies the assumption of this lemma. Then,
1 ( 1 e λ k r th ) ( 1 e λ 3 k r th ) ( 1 e λ 3 k r th ) > 1 ( 1 e λ k r th ) = e λ k r th = p th = 1 ( 1 e λ r 1 ) ( 1 e λ 3 r 1 ) ( 1 e λ 3 r 1 ) .
Hence r 1 > k · r th . □

5. Our k-Layer Coverage Scheme

5.1. The k = 1 Case

Our 1-layer coverage scheme deploys nodes according to a “pseudo” triangular pattern deployment, in which neighboring nodes will be regularly separated by a distance of 3 r 1 (i.e.,  r 2 ) except that some of them will be separated by a distance of 3 r 1 2 or 3 r 1 2 and these exceptions only occur at the boundary of the ROI. See Figure 6 for an illustration.
Let L and H be the length and the height of the ROI, respectively. We assume that the ROI’s lower left corner is located at coordinate ( 0 , 0 ) . Then, the coordinates (i.e., locations) of nodes will be calculated row-by-row, with row 1 containing ( 0 , 0 ) , and row  containing the upper boundary of the ROI. Our full 1-layer coverage scheme is shown in Algorithm 2. Since all nodes have to be within the ROI, we may need to adjust the locations of the following nodes:
  • the first node in each even-numbered row (handled by line 6 of Algorithm 2),
  • the last node in each row (handled by line 9 of Algorithm 2), and 
  • all nodes in row  (handled by lines 11–18 of Algorithm 2).
Algorithm 2:
Input: The r 1 derived by Algorithm 1, the length L of the ROI, and the height H of the ROI.
Output: The designated locations of nodes.
1:
r 2 3 r 1 ; 2 H 3 r 1 + 1 ; n 1 L r 2 + 1 ; n 2 2 L r 2 2 r 2 + 2 ;
2:
for i = 1 to 1 do   //row 1, row 2, , row  ( 1 )
3:
    if (i is odd) then
4:
        output the location ( j · r 2 , 3 ( i 1 ) 2 r 1 ) for each j = 0 to n 1 1 ;
5:
    else   //i is even
6:
        output the location ( 0 , 3 ( i 1 ) 2 r 1 ) ;   //location of the first node in this row
7:
        output the location ( 2 j + 1 2 r 2 , 3 ( i 1 ) 2 r 1 ) for each j = 0 to n 2 2 ;
8:
    end if
9:
    output the location ( L , 3 ( i 1 ) 2 r 1 ) ;   //location of the last node in this row
10:
end for
11:
//row  (i.e., the last row)
12:
if ( is odd) then
13:
    output the location ( j · r 2 , H ) for each j = 0 to n 1 1 ;
14:
else   // is even
15:
    output the location ( 0 , H ) ;   //location of the first node in row 
16:
    output the location ( 2 j + 1 2 r 2 , H ) for each j = 0 to n 2 2 ;
17:
end if
18:
output the location ( L , H ) ;   //location of the last node in row 
Let , n 1 , and n 2 denote the number of rows, the number of nodes deployed in an odd-numbered row, and the number of nodes deployed in an even-numbered row by Algorithm 2, respectively. Three claims are made.
Claim 1. = 2 H 3 r 1 + 1 .
Proof. 
This claim follows from the fact that the distance between row i and row ( i + 1 ) , 1 i < 1 , is exactly 3 2 r 1 , and the distance between row ( 1 ) and row is 3 2 r 1 . □
Claim 2. n 1 = L r 2 + 1 .
Proof. 
Consider an arbitrary odd-numbered row and let node 1, node 2, , node n 1 be nodes in this row. Then, the distance between node i and node ( i + 1 ) , 1 i < n 1 1 , is exactly r 2 , and the distance between node ( n 1 1 ) and node n 1 is r 2 . Hence the claim. □
Claim 3. n 2 = 2 L r 2 2 r 2 + 2 .
Proof. 
Consider an arbitrary even-numbered row and let node 1, node 2, , node n 2 be nodes in this row. Then, the distance between node 1 and node 2 is r 2 2 , the distance between node i and node ( i + 1 ) , 2 i < n 2 1 , is exactly r 2 , and that between node ( n 2 1 ) and node n 2 is r 2 2 . Hence the claim. □
We now are ready to prove Theorem 1.
Proof. 
It can be easily observed from Figure 6 that every location inside the ROI is within zone 1 of at least one node. Thus, to prove this theorem, it suffices to prove that every location inside the ROI is within zones 1–2 of at least three nodes. This assertion can be easily verified by using Figure 7 and hence we have this theorem. □

5.2. The General Case

To achieve k-layer coverage for k > 1 , we begin with the 1-layer coverage and duplicate k sensor nodes on each designated location of the 1-layer coverage. See Figure 8 for an illustration. See also Appendix A and Figure A1 for possible improvements. The following corollary follows from Claims 1∼3.
Corollary 2.
The number N of nodes deployed by our k-layer coverage scheme equals to
N = k · ( n 1 + n 2 ) 2 + k · n 1 i f     i s   o d d , k · ( n 1 + n 2 ) 2 i f     i s   e v e n .

6. Experimental Results

Our experimental results are obtained by using Visual C++ programming language under the environment of a 64-bit personal computer with win 10 operating system. Parameters used in our experimental results are listed in Table 3.
Our experimental results are shown in Table 4, Table 5 and Table 6. These results demonstrate r th used in k-threshold coverage [7] and r 1 used in our k-layer coverage. Recall that both r th and r 1 are served as a substitution radius for the original sensing radius r s . As can be observed in Table 4, Table 5 and Table 6, r th is much smaller than r s and r 1 is more reasonable. Table 4, Table 5 and Table 6 also demonstrate the number of nodes required by k-threshold coverage [7] and our k-layer coverage. It is not difficult to see that the number of nodes required by k-threshold coverage [7] is quite large, especially when k is large. On the other hand, the number of nodes required by our k-layer coverage is much less.

7. Concluding Remarks

This paper considers the multilevel (k) coverage problem in WSNs with uncertain properties (i.e., under the probabilistic sensing model). We find that the nature of the previous k-threshold coverage [7] makes its substitution radius r th tend to be much smaller than the original sensing range r s and therefore will use too many nodes. We thus try to propose a more reasonable solution and yield the k-layer coverage. In k-layer coverage, each node’s sensing region is regarded as the composition of zone 1, zone 2, and zone 3. Although regarding each node’s sensing region as the composition of several zones has been proposed in the literature, to the best of our knowledge, we are the first ones to use the “zone 1 and zone 1–2” strategy to solve the probabilistic multilevel (k) coverage problem. By using such a “zone 1 and zone 1–2” strategy, our k-layer coverage achieves a better coverage quality and uses less nodes. A preliminary version of this paper was in [32]; see also [33]. One future work for this research is to extend k-layer coverage to the probabilistic sensing model in (4) and to more realistic regions of interest. Another future work is to explore the relationship between coverage and energy consumption.

Author Contributions

Conceptualization, Y.-N.C. and C.C.; methodology, Y.-N.C. and C.C.; validation, Y.-N.C., W.-H.L. and C.C.; investigation, Y.-N.C., W.-H.L. and C.C.; data curation, Y.-N.C.; writing–original draft preparation, Y.-N.C. and C.C.; writing–review and editing, W.-H.L. and C.C.; supervision, C.C.; project administration, C.C.; funding acquisition, W.-H.L. and C.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially supported by the Ministry of Science and Technology of Taiwan under grants MOST-108-2115-M-009-006 and MOST-108-2115-M-009-013.

Acknowledgments

The authors would like to thank Yu-Chee Tseng for his valuable comments that greatly improve the presentation of this paper. The authors would also like to express their deepest gratitude to the anonymous reviewers for their constructive comments and time spent to analyze this paper.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Appendix: Balanced k-Layer Coverage

In Figure 8, some locations in the ROI get a much higher coverage than the other locations. We show how to obtain a more balanced k-layer coverage. Let L denote the 1-layer coverage obtained by Algorithm 2. The balanced 1-layer coverage is L . Instead of duplicating each node twice, the balanced 2-layer coverage is L together with a shift L of L ; see Figure A1a. Instead of duplicating each node thrice, the balanced 3-layer coverage is L together with two shifts L and L of L ; see Figure A1b. Notice that some nodes have to be added to L (respectively, L ) (all of these nodes are close to the ROI’s boundary) so that L (respectively, L ) can ensure a 1-layer coverage; we omit the details. For k > 3 , let q = k 3 and r = k % 3 . The balanced k-layer coverage is applying the balanced 3-layer coverage q times and applying the balanced r-layer coverage once. For example, if k = 5 , then apply the balanced 3-layer coverage once and the balanced 2-layer coverage once.
Figure A1. (a) The balanced 2-layer coverage. (b) The balanced 3-layer coverage. L consists of all nodes colored black, L consists of all nodes colored yellow, and L consists of all nodes colored green.
Figure A1. (a) The balanced 2-layer coverage. (b) The balanced 3-layer coverage. L consists of all nodes colored black, L consists of all nodes colored yellow, and L consists of all nodes colored green.
Sensors 20 01831 g0a1

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayichi, E. Wireless sensor network: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  2. Huo, H.; Xu, Y.; Zhang, H.; Chuang, Y.H.; Wu, T.C. Wireless-sensor-networks-based healthcare system: A survey on the view of communication paradigms. Int. J. Ad Hoc Ubiquitous Comput. 2011, 8, 135–154. [Google Scholar] [CrossRef]
  3. Farsi, M.; Elhosseini, M.A.; Badawy, M.; Ali, H.A.; Eldin, H.Z. Deployment techniques in wireless sensor networks, coverage and connectivity: A survey. IEEE Access 2019, 7, 28940–28954. [Google Scholar] [CrossRef]
  4. Wang, B. Coverage problems in sensor networks: A survey. ACM Comput. Surv. 2011, 43, 32. [Google Scholar] [CrossRef]
  5. Mini, S.; Udgata, S.; Sabat, S. Sensor deployment and scheduling for target coverage problem in wireless sensor networks. IEEE Sens. J. 2014, 14, 636–644. [Google Scholar] [CrossRef]
  6. Rebai, M.; Snoussi, H.; Hnaien, F.; Khoukhi, L. Sensor deployment optimization methods to achieve both coverage and connectivity in wireless sensor networks. Comput. Oper. Res. 2015, 59, 11–21. [Google Scholar] [CrossRef]
  7. Wang, Y.C.; Tseng, Y.C. Distributed deployment scheme for mobile wireless sensor networks to ensure multilevel coverage. IEEE Trans. Parallel Distrib. Syst. 2008, 19, 1280–1294. [Google Scholar] [CrossRef] [Green Version]
  8. Dhillon, S.S.; Chakrabarty, K. Sensor placement for effective coverage and surveillance in distributed sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’03), New Orleans, LA, USA, 16–20 March 2003; pp. 1609–1614. [Google Scholar]
  9. Yang, Q.; He, S.; Li, J.; Chen, J.; Sun, Y. Energy-efficient probabilistic area coverage in wireless sensor networks. IEEE Trans. Veh. Technol. 2015, 64, 367–377. [Google Scholar] [CrossRef]
  10. Yun, Z.; Bai, X.; Xuan, D.; Lai, T.H.; Jia, W. Optimal deployment patterns for full coverage and k-connectivity wireless sensor networks. IEEE/ACM Trans. Netw. 2010, 18, 934–947. [Google Scholar]
  11. Zou, Y.; Chakrabarty, K. Sensor deployment and target localization based on virtual forces. In Proceedings of the IEEE Infocom Conference (INFOCOM 2003), San Francisco, CA, USA, 30 March–3 April 2003; pp. 1293–1303. [Google Scholar]
  12. Wang, Y.; Wu, S.; Chen, Z.; Gao, X.; Chen, G. Coverage problem with uncertain properties in wireless sensor networks: A survey. Comput. Netw. 2017, 123, 200–232. [Google Scholar] [CrossRef]
  13. Nicules, D.; Nath, B. Ad-hoc positioning system (APS) using AoA. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’03), Dallas, TX, USA, 30 March–3 April 2003; pp. 1734–1743. [Google Scholar]
  14. Klein, L.A. A Boolean algebra approach to multiple sensor voting fusion. IEEE Trans. Aerosp. Electron. Syst. 1993, 29, 317–327. [Google Scholar] [CrossRef]
  15. Sun, T.; Chen, L.J.; Han, C.C.; Gerla, M. Reliable sensor networks for planet exploration. In Proceedings of the IEEE International Conference on Networking, Sensing, and Control (ICNSC’05), Tucson, AZ, USA, 19–22 March 2005; pp. 816–821. [Google Scholar]
  16. Chakrabarty, K.; Iyengar, S.S.; Qi, H.; Cho, E. Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans. Comput. 2002, 51, 1448–1453. [Google Scholar] [CrossRef] [Green Version]
  17. Huang, C.F.; Tseng, Y.C. The coverage problem in a wireless sensor network. Mob. Netw. Appl. 2005, 10, 519–528. [Google Scholar] [CrossRef]
  18. Wang, H.L.; Chung, W.H. The generalized k-coverage under probabilistic sensing model in sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks (WCNC), Shanghai, China, 1–4 April 2012; pp. 1737–1742. [Google Scholar]
  19. Zhang, H.; Hou, J.C. Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens. Wirel. Netw. 2005, 1, 89–124. [Google Scholar]
  20. Kershner, R. The number of circles covering a set. Am. J. Math. 1939, 61, 665–671. [Google Scholar] [CrossRef]
  21. Zou, Y.; Chakrabarty, K. Uncertainty-aware and coverage-oriented deployment for sensor networks. J. Parallel Distrib. Comput. 2004, 64, 788–798. [Google Scholar] [CrossRef]
  22. Zou, Y.; Chakrabarty, K. A distributed coverage- and connectivity-centric technique for selecting active nodes in wireless sensor networks. IEEE Trans. Comput. 2005, 54, 978–991. [Google Scholar] [CrossRef]
  23. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. Uncertainty-aware sensor network deployment. In Proceedings of the IEEE Globecom, Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  24. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. An evidence-based sensor coverage model. IEEE Commun. Lett. 2012, 16, 1462–1465. [Google Scholar] [CrossRef]
  25. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. Efficient uncertainty-aware deployment algorithms for wireless sensor networks. In Proceedings of the IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks, Paris, France, 1–4 April 2012; pp. 2163–2167. [Google Scholar]
  26. Senouci, M.R.; Mellouk, A.; Oukhellou, L.; Aissani, A. WSNs deployment framework based on the theory of belief functions. Comput. Netw. 2015, 88, 12–26. [Google Scholar] [CrossRef]
  27. Ammari, H.M.; Das, S.K. Centralized and clustered k-coverage protocols for wireless sensor networks. IEEE Trans. Comput. 2012, 61, 118–133. [Google Scholar] [CrossRef]
  28. Elhoseny, M.; Tharwat, A.; Farouk, A.; Hassanien, A.E. K-coverage model based on genetic algorithm to extend WSN lifetime. IEEE Sens. Lett. 2017, 1, 7500404. [Google Scholar] [CrossRef]
  29. Liu, Q. K-coverage reliability evaluation for wireless sensor networks using 2 dimensional k / r×s / m×n:F system. In Proceedings of the 2018 12th International Conference on Reliability, Maintainability, and Safety (ICRMS), Shanghai, China, 17–29 October 2018; pp. 83–87. [Google Scholar]
  30. Özdağ, R. The solution of the k-coverage problem in wireless sensor networks. In Proceedings of the 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey, 16–19 May 2016; pp. 873–876. [Google Scholar]
  31. Rezaee, A.A.; Zahedi, M.-H.; Dehghan, Z. Coverage optimization in wireless sensor networks using gravitational search algorithm. J. Soft Comput. Inf. Technol. (JSCIT) 2019, 8, 20–31. [Google Scholar]
  32. Chen, Y.-N. Multilevel (k) Coverage Based on Probabilistic Sensing Model in Wireless Sensor Networks. Master’s Thesis, National Chiao Tung University, Hsinchu, Taiwan, June 2019. [Google Scholar]
  33. Chen, Y.-N.; Chen, C. Sensor deployment under probabilistic sensing model. In Proceedings of the 2nd High Performance Computing and Cluster Technologies Conference (HPCCT), Beijing, China, 22–24 June 2018; pp. 33–36. [Google Scholar]
Figure 1. (a) Disk shape. (b) Binary sensing model. (c) Probabilistic sensing model.
Figure 1. (a) Disk shape. (b) Binary sensing model. (c) Probabilistic sensing model.
Sensors 20 01831 g001
Figure 2. Triangular pattern: (a) three neighboring nodes, (b) the general case.
Figure 2. Triangular pattern: (a) three neighboring nodes, (b) the general case.
Sensors 20 01831 g002
Figure 3. (a) r r e and r + r e . (b) The generalized probabilistic sensing model.
Figure 3. (a) r r e and r + r e . (b) The generalized probabilistic sensing model.
Sensors 20 01831 g003
Figure 4. The concept of k-layer coverage.
Figure 4. The concept of k-layer coverage.
Sensors 20 01831 g004
Figure 5. Zone 1, zone 2, zone 3, r 1 , r 2 , and r s . We take r 2 = 3 r 1 .
Figure 5. Zone 1, zone 2, zone 3, r 1 , r 2 , and r s . We take r 2 = 3 r 1 .
Sensors 20 01831 g005
Figure 6. Sensor placement in 1-layer coverage scheme; notice that only zone 1 of each node is shown in this figure. This ROI has 3 r 1 | L and 3 r 1 2 | H and therefore no adjustment for rows 1 , 3 , , .
Figure 6. Sensor placement in 1-layer coverage scheme; notice that only zone 1 of each node is shown in this figure. This ROI has 3 r 1 | L and 3 r 1 2 | H and therefore no adjustment for rows 1 , 3 , , .
Sensors 20 01831 g006
Figure 7. Sensor placement in 1-layer coverage scheme; notice that only zone 1–2 of each node is shown in this figure.
Figure 7. Sensor placement in 1-layer coverage scheme; notice that only zone 1–2 of each node is shown in this figure.
Sensors 20 01831 g007
Figure 8. (a) 2-layer coverage. (b) 3-layer coverage.
Figure 8. (a) 2-layer coverage. (b) 3-layer coverage.
Sensors 20 01831 g008
Table 1. Scheme used by [7]: “k” means “to make the ROI k-covered”, “duplicate” means “duplicate scheme”, “interpolation” means “interpolation scheme”, and “tri. pattern” means “triangular pattern”.
Table 1. Scheme used by [7]: “k” means “to make the ROI k-covered”, “duplicate” means “duplicate scheme”, “interpolation” means “interpolation scheme”, and “tri. pattern” means “triangular pattern”.
kCase r c 3 2 r s Case 3 2 r s < r c 2 + 3 3 r s Case 2 + 3 3 r s < r c < 3 r s Case r c 3 r s
k = 1 duplicateduplicateduplicateduplicate and tri. pattern
k = 2 duplicateduplicateduplicateduplicate and tri. pattern
k 3 interpolationinterpolationduplicateduplicate and tri. pattern
Table 2. Definitions of k-coverage: A = { s 1 , s 2 , , s n } is the set of sensor nodes deployed in the ROI and “det. prob.” means “detection probability”.
Table 2. Definitions of k-coverage: A = { s 1 , s 2 , , s n } is the set of sensor nodes deployed in the ROI and “det. prob.” means “detection probability”.
k-Coverage byDefinitiondet. prob. p Given by
k-expectation [18] s i A p ( u , s i ) k Equation (4)
k-threshold [7] s i A p ( u , s i ) p th , for some A A with | A | = k Equation (1)
k-layer (this paper)see Definition 1Equation (1)
Table 3. Parameters used: m denote meters.
Table 3. Parameters used: m denote meters.
Size of the ROI1000 m × 1000 m
sensing range r s 30 m
error tolerance ϵ used in Algorithm 1 10 6
sensor-dependent parameter λ used in (1)either 0.05 or 0.08
Table 4. The number of nodes for k = 1 coverage: “# nodes” means “the number of nodes required”.
Table 4. The number of nodes for k = 1 coverage: “# nodes” means “the number of nodes required”.
λ = 0.05 λ = 0.08
k -Threshold [7]Our k -Layer k -Threshold [7]Our k -Layer
p th r th # nodes r 1 # nodes r th # nodes r 1 # nodes
0.77.133779015.68516724.45819,7819.8034200
0.84.46219,78112.39126402.78950,3697.7446688
0.92.10787,7688.74952261.317223,5205.46813,161
Table 5. The number of nodes for k = 3 coverage: “# nodes” means “the number of nodes required”.
Table 5. The number of nodes for k = 3 coverage: “# nodes” means “the number of nodes required”.
λ = 0.05 λ = 0.08
k -Threshold [7]Our k -Layer k -Threshold [7]Our k -Layer
p th r th # nodes r 1 # nodes r th # nodes r 1 # nodes
0.72.377206,42415.68550161.486526,5009.80312,600
0.81.487526,50012.39179200.9291,343,8117.74420,064
0.90.7022,350,8728.74915,6780.4396,005,5205.46839,483
Table 6. The number of nodes for k = 5 coverage: “# nodes” means “the number of nodes required”.
Table 6. The number of nodes for k = 5 coverage: “# nodes” means “the number of nodes required”.
λ = 0.05 λ = 0.08
k -Threshold [7]Our k -Layer k -Threshold [7]Our k -Layer
p th r th # nodes r 1 # nodes r th # nodes r 1 # nodes
0.71.426952,07015.68583600.8912,433,7509.80321,000
0.80.8922,430,50512.39113,2000.5576,217,6007.74433,440
0.90.42110,881,0008.74926,1300.26327,857,9505.46865,805

Share and Cite

MDPI and ACS Style

Chen, Y.-N.; Lin, W.-H.; Chen, C. An Effective Sensor Deployment Scheme that Ensures Multilevel Coverage of Wireless Sensor Networks with Uncertain Properties. Sensors 2020, 20, 1831. https://doi.org/10.3390/s20071831

AMA Style

Chen Y-N, Lin W-H, Chen C. An Effective Sensor Deployment Scheme that Ensures Multilevel Coverage of Wireless Sensor Networks with Uncertain Properties. Sensors. 2020; 20(7):1831. https://doi.org/10.3390/s20071831

Chicago/Turabian Style

Chen, Yu-Ning, Wu-Hsiung Lin, and Chiuyuan Chen. 2020. "An Effective Sensor Deployment Scheme that Ensures Multilevel Coverage of Wireless Sensor Networks with Uncertain Properties" Sensors 20, no. 7: 1831. https://doi.org/10.3390/s20071831

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop