204
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
Design of a Probability Density Function Targeting Energy-Efficient Node Deployment in Wireless Sensor Networks Subir Halder and Sipra DasBit, Member, IEEE
Abstract—In wireless sensor networks the issue of preserving energy requires utmost attention. One primary way of conserving energy is judicious deployment of sensor nodes within the network area so that the energy flow remains balanced throughout the network and prevents the problem of occurrence of energy holes. Firstly, we have analyzed network lifetime, found node density as the parameter which has significant influence on network lifetime and derived the desired parameter values for balanced energy consumption. Then to meet the requirement of energy balancing, we have proposed a probability density function (PDF), derived the PDF’s intrinsic characteristics and shown its suitability to model the network architecture considered for the work. A node deployment algorithm is also developed based on this PDF. Performance of the deployment scheme is evaluated in terms of coverage-connectivity, energy balance and network lifetime. In qualitative analysis, we have shown the extent to which our proposed PDF has been able to provide desired node density derived from the analysis on network lifetime. Finally, the scheme is compared with three existing deployment schemes based on various distributions. Simulation results confirm our scheme’s supremacy over all the existing schemes in terms of all the three performance metrics. Index Terms—Energy balance, network lifetime, node deployment, probability density function, wireless sensor network.
I. I NTRODUCTION HE advent of efficient short range radio communication and advances in miniaturization of computing devices have made possible for large-volume commercial production of wireless sensor nodes as well as large-scale real-world deployment of the same to form a wireless sensor network (WSN). Such a network typically suffers from a number of unavoidable problems such as resource constrained nodes, random node deployment sometimes in an unattended open field where it is very difficult to replace/ recharge battery etc. So the network as a whole must minimize the energy usage in order to enable untethered and unattended operation for an extended period of time. Therefore, a critical consideration in designing such WSNs is conserving energy to maximize the post deployment network lifetime [1]. The rate of energy
T
Manuscript received May 11, 2013; revised October 10 and December 28, 2013. The associate editor coordinating the review of the paper and approving it for publication was I.-R. Chen. S. Halder is with the Department of Computer Science and Engineering, Dr. B. C. Roy Engineering College, Durgapur, India 713206 (e-mail:
[email protected]). S. DasBit is with the Department of Computer Science and Technology, Bengal Engineering and Science University, Shibpur, India 711103 (e-mail:
[email protected]). Digital Object Identifier 10.1109/TNSM.2014.031714.130583
depletion in the network primarily depends on the deployment nature of the nodes. The nature of deployment, on the other hand, mainly depends on the application environment [2]. In WSNs, nodes can be deployed either randomly or in pre-determined manner. In random deployment, nodes are deployed randomly, generally in an inaccessible terrain. For example, in the application domain of disaster recovery or in forest fire detection, nodes are dropped by helicopter in random manner [3]. On the contrary, in pre-determined deployment, the locations of the nodes are specified. This type of deployment is used in applications when sensors are expensive or when their operations are significantly affected by their positions. The applications include placing imaging and video sensors, populating an area with highly precise seismic sensors, underwater WSN applications, monitoring manufacturing plants etc. One important way of conserving energy is by uniform energy consumption or load distribution throughout the network. Non-uniform dissipation of energy in any part of the network may stop functioning of that part of the network leading to a phenomenon known as the energy hole problem [4]. Sometimes even after the network lifetime is over, due to energy hole problem a substantial amount of energy still remains in the nodes leading to significant wastage of energy. The energy hole problem arises when more data are transmitted by certain nodes of the network than the other nodes resulting in extra energy dissipation of those nodes [5]. Therefore, if any part of the network is affected by the energy hole problem, the whole network gets affected badly as uneven consumption of energy in the network leads to premature shortening of network lifetime. To avoid this, care should be taken during node deployment such that energy dissipation of all the nodes takes place uniformly ensuring load balancing throughout the network. A. Motivation Due to the nature of operation of WSN, nodes near the sink bear the major share of data forwarding compared to the nodes in rest of the network. So it is a common problem that nodes near the sink get drained off more quickly than the other nodes, thereby, creating energy holes near the sink resulting in loss of connectivity while most of the nodes are alive. Further, it is well known that sensor nodes have limited battery life and it is sometimes infeasible to replenish energy via battery replacements and therefore prolonging network
c 2014 IEEE 1932-4537/14/$31.00
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
lifetime is of utmost importance. In such a network with energy constraints, in order to prolong network lifetime, nodes should be deployed with varying densities depending upon its position from the sink. One important issue that arises in such energy-constrained networks is to avoid energy holes in order to improve a network lifetime. To be more specific, we are interested in finding the answer for the following question-“Is it possible that all sensor nodes die simultaneously irrespective of their positions from the sink so that there will be no energy hole in a WSN, thereby, prolonging network lifetime?” This motivates us to explore a solution by providing varying node density in different parts of the network area based upon its proximity from the sink.
205
able to provide desired network lifetime. In addition to the contribution in [6], here we show the impacts of routing and medium access control (MAC) protocols on the performance of the scheme. The rest of the paper is organized as follows. In Section II, results from the literature review are presented. The network model considered for the present work is presented in Section III. Analysis on network lifetime is done in Section IV. Section V presents the proposed node deployment scheme along with the proposed PDF based on which the scheme is developed. In Section VI, the performance of the scheme is evaluated based on both qualitative and quantitative analyses. Finally the paper is concluded with some mention about the future scope of the work in Section VII.
B. Contributions and Organization One of the solutions to avoid energy hole problem in WSN while maintaining coverage and connectivity is to deploy nodes with varying densities based on their positions from the sink. On the contrary, another promising approach may be to design a dedicated distribution function which perfectly conforms to such a need of varying densities. We have proposed a PDF based on which we have developed a node deployment strategy which not only keeps energy hole problem away from the network but also ensures enhancement of network lifetime while maintaining coverage and connectivity of the network. To the best of our knowledge we are the first to propose such a tailored-made PDF to be used in node deployment to avoid energy hole problem. The preliminary version of this work was reported in [6]. Our proposed PDF based node deployment strategy is pre-determined in nature. We extend our earlier work [6] in several aspects. The main contributions of this paper are as follows: • Unlike [6] here, we analyze the method of controlling network lifetime and found node density as a major parameter which has significant role to control network lifetime. The main question to be addressed is: How many nodes per unit area should be deployed in different parts of the sensor field in order to achieve energy balancing throughout the network and enhancement of network lifetime? The desired node densities derived out of the said analysis, guarantee that all the nodes exhaust their energy at the same time, and hence, energy balancing is achieved. • Based on the analysis, we propose a PDF and derive the PDF’s intrinsic characteristics e.g. expectation, covariance etc. • We develop a node deployment algorithm based on the PDF. It provides the node density to avoid energy hole problem, thereby, achieves enhanced network lifetime while maintaining coverage and connectivity of the network. • Performance of the scheme is evaluated both through qualitative and quantitative analyses. In qualitative analysis unlike [6], we analyze whether the PDF based scheme has been able to achieve the desired target set prior to the designing of PDF, towards energy hole elimination. • Similar to qualitative analysis, we show through simulation the extent to which our proposed PDF has been
II. L ITERATURE R EVIEW Many works have been reported so far that deal with the issue of balancing the load throughout the network with a goal to reduce the energy hole problem for prolonging network lifetime. All these works have been conducted through different approaches for achieving this goal. Each type of the above schemes has their own strengths and limitations. We have categorized the existing works based on their commonality in approaches which are presented below.
A. Transmission Paths Based Strategies In each of the works described below, nodes choose routing path differently. 1) Data Traffic and Distance Based Strategies: In these types of strategies, network lifetime is prolonged by making the nodes choose routing path judiciously considering data traffic along the path and distance. The distance considered is either transmission distance between the node and the sink or the distance between the node and neighbouring nodes towards sink. Azad and Kamruzzaman [7] have proposed energy balanced transmission range regulation policies for maximizing network lifetime in WSNs with corona based architecture. Firstly, they have analyzed and found two parameters- ring thickness and hop size - responsible for energy balancing. They have proposed a transmission range regulation scheme of each node and determined the optimal ring thickness and hop size for maximizing network lifetime. Simulation results show substantial improvements in terms of network lifetime and energy usage distribution over existing policies. However, before implementation of the proposed transmission policies, it requires significant computation to determine the optimal ring thickness and hop size. Song et al. [8] have presented two algorithms viz. centralized and distributed for the same corona based network architecture. Network lifetime has been optimized using a proposed decision factor computed by selecting the right transmission range of nodes in each corona. They have claimed that the algorithms not only reduce the complexity for searching right transmission range of node but also obtain results approximated to the optimal solution.
206
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
2) Probability Based Strategies: These types of strategies employ probability based routing path selection with a target to balance energy consumption and enhance network lifetime. Boukerche et al. [9] have studied the problem of energybalanced data propagation in corona based WSNs for uniform and non-uniform deployments. The authors have proposed a density based probabilistic data propagation protocol towards balancing the energy consumption. In each step a node in a corona that holds data on-line, calculates the probability of data delivery either by hop-by-hop or directly to the sink based on the density information of the neighbouring coronas. Finally, the authors have shown that the proposed protocol works well for both uniform and non-uniform network deployments. Powell et al. [10] have proposed a probability based data propagation algorithm where the nodes compute off-line the probability of number of times data sent directly to the sink and data sent to a next hop neighbour. They have observed that by controlling the ratio of these two, energy consumption in each layer/slice is balanced but individual node in each slice is not well balanced. It is due to the unequal number of neighbouring nodes in the adjacent slices. Jarry et al. [11] have analyzed the data gathering and network lifetime maximization problems and based on the analysis, the authors have designed probabilistic on-line distributed routing strategies for different network structures. They have formulated the conditions to compute an energybalanced data propagation pattern for WSNs. Cheng et al. [12] have proposed a spatio-temporal compressive data gathering mechanism, where nodes send/forward sensory data to the sink as per a predefined probability. Since the data is forwarded with predefined probability, only a fraction of the readings from each node are transmitted to the sink, leading to reduced traffic and prolonged lifespan. B. Deployment Based Strategies The following works on enhancement of network lifetime are based on judicious node deployment. Wu et al. [13] have proposed a non-uniform node distribution, where, the number of nodes to be distributed in a layer is determined based on the minimum number of nodes required in the upper adjacent layer. They have concluded that only subbalanced energy depletion in the network is possible. Chang et al. [14] have proposed two node deployment strategies viz. distance-based and density-based strategies, with an objective for balanced energy consumption among the nodes. They have shown that the proposed strategies can efficiently balance energy consumption of each node and prolong network lifetime. Wang et al. [15] have given an analytical model for the coverage and network lifetime issues using a 2-D Gaussian distribution. They have proposed two deployment algorithms that achieve larger coverage and longer network lifetime using limited number of sensor nodes. They have concluded that the proposed algorithms effectively increase network lifetime with polynomial time complexity. Liu et al. [16] have proposed a node deployment algorithm for optimizing target surveillance in WSNs. The proposed deployment algorithm is designed in such a way that one can obtain predetermined network lifetime by deploying minimum number of nodes. Through
extensive simulation, the authors have shown that the proposed algorithm gives close-to-optimal solution. C. Mobile Sink/Agent Based Strategies In these types of strategies, load among all the nodes are distributed in a balanced manner by changing the position of the sink or using mobile agent so that network lifetime is enhanced. Luo and Hubaux [17] have proposed a deployment algorithm by considering mobile sink where the nodes lying nearer the sink keep on changing resulting in even distribution of load among the nodes. They have also proposed an appropriate routing protocol which supports mobility of sink. Ammari and Das [18] have also provided three different solutions for eliminating energy hole problem. In one of the three solutions, the authors have proposed a localized energy aware Voronoi diagram based data forwarding protocol considering homogeneous nodes and mobile sink. Lin et al. [19] have developed an energy balancing scheme for network lifetime maximization in WSNs using mobile agents. They have designed an energy prediction strategy by means of which mobile agents know about the remaining energy of all sensor nodes. Accordingly the mobility of agents is controlled so that the nodes with less remaining energy can communicate through mobile agent and avoid long-distance communication, thereby, evading uneven energy consumption. In the above, a number of existing works on node deployment are reviewed under different categories. Our scheme generally belongs to the category of ‘Deployment Based Strategies.’ The existing works reviewed under this category either have not used any mathematical model to implement the node deployment scheme or even if any such model is used, it has not addressed energy balance and network lifetime together. Our scheme, on the contrary, presents a node deployment strategy based on a proposed PDF and addresses energy balance and network lifetime together. III. N ETWORK M ODEL In this section, we describe the network architecture along with the assumptions. Definitions of coverage and connectivity in association with sensing and communication model respectively are described next. The energy model is presented at the end of this section. A. Architecture The authors in [20] have proposed a realistic network model for WSNs where the network area is covered by a set of concentric circles centered at the sink. They have also provided an in-depth discussion of its real life implementation. Further, in [17] it is proved that in case of the said network model, for enhancement of network lifetime, the best position for a sink is the center of the circle. Primarily these two works [17], [20] along with other relevant works [13], [15], [21] motivate us to consider present network architecture. However, in this architecture, energy consumption in annuli can be kept balanced but individual nodes in the annuli may remain imbalanced [10] and this has been mitigated by considering q-switch [13] routing policy elaborated in Section VI.B.1.
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
207
adding further complexity in theoretical analysis. However, in simulations to make the assumption realistic, additionally we consider a real MAC protocol for investigating the impact of the protocol on network lifetime.
Nr LN
a
2r
r
L1
L2
Sink
a Fig. 1.
Layered network area.
We consider a square shaped network area a × a which is covered by a set of uniform-width coronas or annuli (Fig. 1) [13], [21]. Each such annulus is designated with width r as layer. The sink is considered to be located at the center of the network area and responsible for collecting data from the sensors nodes. Nodes are placed in different layers surrounding the sink. A layer is identified as Li where i = 1, 2, . . . , N . Here i = 1 indicates the layer nearest to the sink andi = N indicates the layer farthest from the sink a . where N = 2r We assume that all the sensor nodes are homogeneous with respect to their initial energy, sensing and communication ranges while an unlimited amount of energy is set for the sink. The nodes are static and need to be distributed in each layer within the network with certain node density. The node density [5], [13] is the ratio of number of nodes in an area (layer) and the area (of the layer). It is also assumed that there is no local coordination among the nodes and therefore, the nearby nodes report same events to the sink. Periodic data gathering applications are considered where sensory data generation rate is proportional to the area (1 square unit) irrespective of the shape of the network area. Given a unit area, if the data generation rate is ρ bits per sec, it is meant that this unit area generates ρ bits/sec of data to be transmitted towards the sink. So, the data that needs to be reported from a given area a × a is ρ × a × a bits. The data is collected by the nodes and sent to the sink through multi-hop communication after a unit time-interval. A single sink is responsible for gathering the sensors’ data and controlling network operations. Further, we have assumed that both the time-intervals between two successive generations of data per area and two successive collections of data at the node as 1 sec. During theoretical analysis, for the sake of simplicity, an ideal MAC layer with no collision and retransmission is assumed and that does not lose any generality. The reason for not considering real MAC in theoretical analysis is the complexity involved in real MAC, such as need of control packet (TDMA scheduling), retransmission in case of collision (CSMA/CA) etc. Moreover, some of the overheads such as retransmission are a real time parameter which needs probabilistic formulation
B. Sensing and Communication Model 1) Sensing Model: We define a unit area to be covered, if every point in that area is within the sensing range of at least one active node. Alternatively, if each point in an area is covered by at least α nodes, it is known as α-coverage. The nodes perform observation [22] at an angle of 360◦ . The maximal circular area centered around a node ν that can be covered by it is defined as its sensing area S(ν). The radius of S(ν) is called the ν’s sensing range [14] Rs . We assume the relationship between r and Rs must satisfy the condition r ≤ 2Rs [6], [15] for covering the network area (Fig. 1). In case of 1-coverage, node density (λ) = 1/S (ν). Also, the coverage area C(X) of a set of nodes X is the union of the sensing areas covered by each node in X i.e. C(X) = ∪∀ν∈X S (ν) [22]. 2) Communication Model: We define a network as connected if any active node can communicate with any other active node, possibly using intermediate nodes as relays, so that the information collected by the nodes can be relayed back to sink [23]. We assume that two nodes can directly exchange messages if their Euclidean distance is not larger than the communication range Rc . Further, we assume that the relationship between r and Rc must satisfy the condition r ≤ Rc [6], [15] for ensuring connectivity in the network area (Fig. 1). Lemma 1: For a given network area a × a, in order to maintain connectivity of the network, the number of layers a and to maintain (N ) stands in relation with Rc as N = 2R c coveragethe number of layers (N ) stands in relation with Rs a . as N = 4R s Proof: If the radius of each layer in the layered architecture is r, then the distance between the center of the network area and the periphery of a layer-i is i × r (Fig. 1). Now for the farthest layer (i.e., layer-N ), the distance between the center and the periphery of layer-N is N × r and N r = a2 a (Section III.A) or, N r = 2R (putting r = Rc ). Therefore, for c a given network area a×a, in order to maintain connectivity of the network relationship between Rc and N should stand the a as N = 2Rc . a a Similarly, we have N = 2r = 4R (replacing r = 2Rs ). s Therefore, for a given network area a× a, in order to maintain coverage of the network relationship between Rs and N the a should stand as N = 4Rs . C. Energy Model We have considered the first order radio model [15] as the energy model where energy consumption of a node is dominated by its wireless transmissions and receptions; so the other energy consumption factors such as for sensing and processing are neglected. According to this radio model, energy consumed by a node for transmission and reception is as follows:
208
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
Energy consumption for transmitting n-bits data over a distance d is et (n, d) = eelec n + eamp nd2 . Since we have assumed the transmission range of a node as Rc , the above can be rewritten by replacing d with Rc : et (n, Rc ) = eelec n + eamp nRc2 = et n
(1)
where et = eelec + eamp Rc2 and et is energy required to transmit one bit of data. Energy consumption for receiving n-bits data is er (n) = eelec n = er n
(2)
where er is energy required to receive one bit of data and er = eelec . IV. A NALYSIS ON N ETWORK L IFETIME This section presents an analysis on network lifetime with an objective to find out the parameter(s) which have significant influence on network lifetime so that the lifetime can be extended by controlling the parameter values. In presence of several existing state-of-the-art definitions of network lifetime [1] and lifetime of a node, the present work considers the following definitions throughout the paper. Definition 1. The node lifetime (measured in unit time) is defined as the time when the initial energy of a node is completely drained out so that it is neither able to transmit its own data nor able to forward any data. It is measured as the ratio of the initial energy of a node and the energy consumption rate of the node. Considering initial energy of each sensor node as ε0 and the energy consumption rate of a node in layer-i as ECRi , the lifetime of a node in layer-i is ε0 . LTi = ECR i Definition 2. The network lifetime is defined as the time interval from the beginning of the network operation until the proportion of dead nodes exceeds a certain threshold, which may result in loss of coverage of a certain region, and/or network partitioning [5]. If the total number of nodes in layer-i is Ti , the lifetime of a layer-i in the network is ε0 ×Ti ε0 Ti ×ECRi = ECRi . It is same as the lifetime of a node in layer-i as defined previously. If any of the layer’s lifetime terminates which causes loss of coverage within the layer, it results in termination of network lifetime. Therefore, the network lifetime can be determined by the shortest lifetime of a layer and it is ε0 . expressed as min∀i ECR i We assume that a node requires minimum energy consumption for transmitting/forwarding data to the sink. Therefore, the node should transmit data to the sink via the shortest path i.e. a node in layer-i (Section III.A) requires i hops to transmit data to the sink. This routing policy is basically a simplified version of the q-switch, shortest path routing policy proposed in [13] which is used in our scheme and briefed in Section VI.B.1. In this analysis the simplification is made by considering a node in layer-i finds only one node in layer-(i − 1) to forward data towards sink. Further, we assume that area of a layer-i (Fig. 1) is Ai = π(2i − 1)r2 , where r is the width of a layer and λi is the node density of layer-i. Therefore, the total number of nodes in layer-i is given as Ti = λi × Ai for i = 1, 2, . . . , N . The nodes of all the layers except the farthest layer from the
sink spend their energy by transmitting their own sensory data, receiving data from the nodes of adjacent layers farther away from the sink and forwarding the received data. Nodes in the farthest layer spend energy only for transmitting their own data. Therefore, the data transmission rate of a node (for transmitting its own sensory data) in layer-i is ρ ρ × Ai = . λi × Ai λi
(3)
Further, a node in layer-i receives data from the nodes of layer(i + 1) i.e. the nodes in layer-(i + 1) transmit data towards the nodes of layer-i to forward the same towards the sink. So, the average data transmission rate of layer-(i + 1) towards a node in layer-i is λi+1 π (2i + 1) r2 ρ λi+1 (2i + 1) ρ λi+1 Ai+1 ρ . = = λi Ai λi π (2i − 1) r2 λi (2i − 1) The rate of data relayed by a node of layer-i is the sum of the above quantity for all the farther layers i.e., N h=i+1 λh (2h − 1) ρ . (4) λi (2i − 1) Therefore, the total data transmission rate per node in layer-i (mi ) can be obtained from (3) and (4) as follows: N ρ h=i+1 λh (2h−1)ρ + for i = 1, 2, . . . , (N − 1) λ λi (2i−1) i mi = ρ for i = N λN (5) The first component of the above expression of mi i.e. ρ/λi is for transmitting the node’s sensory data and the second component is for forwarding the outward adjacent layers’ data. Now the energy consumption rate of a node in layer-i for transmission is: For transmitting the node’s own data: ρ × et λi
(6)
where et is energy required to transmit one bit of data. For transmitting the relay data received from the farther adjacent layers: N h=i+1 λh (2h − 1) ρ × et . (7) λi (2i − 1) So the energy consumption rate of each node in layer-i due
Tx is computed from (6) and (7) as to transmission ECRi (8), at the top of the next page. Similarly, we calculate the energy consumption rate of each node in layer-i for receiving ECRiRx data from the farther layers as follows:
N h=i+1 λh (2h − 1) ρ Rx er ECRi = (9) λi (2i − 1) where i = 1, 2, . . . , (N − 1) and er is the energy required to receive one bit of data. Hence the total energy consumption rate of each node in a layer-i is ECRi = ECRiTx + ECRiRx .
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
ECRiTx =
⎧ ⎨ ⎩
ρ λi + ρ λN et
N
λh (2h−1)ρ λi (2i−1)
h=i+1
209
et
for i = 1, 2, . . . , (N − 1) for i = N
(8)
So, the total energy consumption rate of the nodes of layer-i is
ECRi =
ECRiTx + ECRiRx Tx ECRN
for i = 1, 2, . . . , (N − 1) . for i = N (10)
We know, energy depletion across the network is balanced [13] when all the nodes of the network exhaust their energy at the same time. To be more specific, if balanced energy depletion is attained in the network then all nodes located in any layer have the same lifetime. Alternatively, all the nodes exhaust their energy at the same time. Therefore, for energy balancing, the following condition must be satisfied-ECRi = ECRi+1 = · · · = ECRN . Now rewriting (10) with the help of (8) and (9), we have the equation at the top of the next page. After simplification and basic transformations, we obtain (11), at the top of the next page. Equation (11) implies that the ratio of node density between two consecutive layers depends on layer number i and the total number of layers N . Further, the node density in a layer is uniform but this node density varies in different layers. The nature of variation is such, that the node density is maximum at the layer nearest to the sink and it decreases in the layers farther away form the sink i.e., λ1 > λ2 > · · · > λN . Now, (11) is a non-linear equation and computation of λi is fairly complex. However, it suggests that one can compute λi , for i = 1, 2, . . . , (N − 1), if λN is known. Considering 1-coverage (Section III.B.1), λN = 1/S (ν) where S (ν) = πRs2 . Moreover, the balanced energy consumption can be obtained in different layers of the network if the nodes are distributed in accordance with the desired node density given in (11). When the nodes are distributed according to (11) to get balanced energy consumption, we can ensure that all the nodes deployed in the sensor field completely deplete their energy at the same time. Now, from the Definition 1/2, the lifetime of a node/the network lifetime (LT ) can be expressed as: ε0 for i = 1, 2, . . . , N . Replacing the denominator LTi = ECR i with the help of (10), (8) and (9) we have LTi in (12), at the top of the next page. As we have assumed earlier that the nodes in a layer report data to the sink in minimum hops, therefore the derived network lifetime (see (12)) provides the upper bound of the network lifetime. Also we can say that the upper bound of the network lifetime is achievable by controlling node density λi in each layer, as given in (11). V. P ROBABILITY D ENSITY F UNCTION BASED N ODE D EPLOYMENT (PDFND) From the analysis of network lifetime provided in the previous section, we have found that the ratio of node density between two consecutive layers depends on layer number i and the total number of layers N . Further, for balanced
Fig. 2.
3-D graph (surface plot) of the PDF.
energy consumption, the required node density is maximum in the layer nearest to the sink and it decreases in the layers farther away from the sink. Considering these observations and taking guidelines from the analysis, in this section, we have designed a PDF targeting its implementation in lifetimeenhancing node distribution in WSNs. Also, we have presented a node deployment algorithm based on the proposed PDF [6]. A. Proposed Probability Density Function [6] The mathematical domain under consideration is divided into a number of concentric circles having radii increasing arithmetically from r to (N × r ) with a difference of r . In the mathematical domain, if (x, y) be a point and it lies between circles (i − 1) and i, then the probability density at that point is 2 k (2i − 1) 2 f x, y; N, i, r = , ∀ (i − 1)2 r < x2 + y 2 ≤ ir N 2 i4 (13)
where i = 1, 2, . . . , N and k is a constant as follows: −1 2 52 (2N − 1) 32 2 2 k = N π (r ) 1 + 4 + 4 + · · · + . 2 3 N4 Fig. 2 is the 3-D graph of the proposed PDF. The characteristics of the PDF show decrease of the functional value with increase in the value of i implying lower probability and vice versa. Theorem 1: The value of constant k is: −1 2 52 (2N − 1) 32 2 2 k = N π (r ) 1 + 4 + 4 + · · · + . 2 3 N4 Theorem 2: If the random variables X and Y follow a proposed PDF with parameters N and i, then the cumulative distribution function (CDF) of X and Y is given as
210
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
ρ et + λi
N
N λh (2h − 1) ρ ρ h=i+2 λh (2h − 1) ρ (et + er ) = (et + er ) et + λi (2i − 1) λi+1 λi+1 (2i + 1)
h=i+1
λi = λi+1 LTi =
F [X ≤ x, Y ≤ y] =
2
kπ (r ) N2
i j=1
2i + 1 2i − 1
et (2i − 1) + (et + er ) et (2i + 1) + (et +
λi (2i−1)ε0 ρ(2i−1)et +(et +er ) N h=i+1 λh (2h−1)ρ λN ε0 ρ(2i−1)et
2
2
2
(2j − 1) η −i + j4 i4
.
2
We choose (x, y) such that 0 ≤ x2 + y 2 ≤ η 2 (r ) , where i ≤ η ≤ i + 1. The proofs of Theorem 1 and Theorem 2 are omitted due to space limitations. We refer the reader to Theorem 1 and Theorem 2 in [6] for the detail proof. Theorem 3: If the two random variables X and Y follow the proposed PDF with parameters N and i, then the expectation of X and Y is given as 2 N 2 3 1 k (r ) 2 + − − . E [XY ] = N 2 i=1 i i3 i2 2i4 Proof: The expectation of the two variables X and Y with parameters N and i can be given as E [XY ] = E1 [XY ] + E2 [XY ] + · · · + EN [XY ] =
i i=1
Ei [XY ] (14)
where Ei [XY ] is the expectation of X and Y for a given value of i. Now, Ei [XY ]
Ei [XY ]
Ei [XY ]
=
=
=
k N 2 i4 4k N 2 i4
ir
xy ⎡ ⎢ x⎢ ⎣
dy dx (ir )2 − x2
((i − 1) r )2 − x2 4 2 k (r ) 2 3 1 + − − . N2 i i3 i2 2i4
⎤ y
⎥ dy ⎥ ⎦ dx
0
(15)
So, replacing Ei [XY ] in (14) with the value of (15) we get 4 N k (r ) 2 2 3 1 E [XY ] = + 3− 2− 4 . (16) N 2 i=1 i i i 2i Theorem 4: If the two random variables X and Y follow a proposed PDF with parameters N and i, then the covariance of X and Y is given as the equation at the top of the next page. Proof: From the definition of covariance [24] we know that Cov (X, Y ) = E [XY ] − E [X] E [Y ]. We can find the covariance of the two discrete and random variables X and Y for a particular value i in the domain. The
N
h=i+1 N er ) h=i+2
λh (2h − 1)
(11)
λh (2h − 1)
for i = 1, 2, . . . , (N − 1)
(12)
for i = N
covariance of the two discrete and random variables X and Y for the entire domain is obtained by summing different values of the parameter i, where i = 1, 2, . . . , N Cov (X, Y ) = Cov (X, Y ) =
N i=1 N
Covi (X, Y ) [Ei [XY ] − Ei [X] Ei [Y ]] .
i=1
We get the expectation of X and Y for a particular value of i, i.e. Ei [XY ] from (15) 4 2 k (r ) 2 3 1 Ei [XY ] = + 3− 2− 4 . N2 i i i 2i The expectation of X for a particular value of i, i.e. Ei [X] can be calculated as k Ei [X] = x dy dx N 2 i4 ⎡ ⎤ 2 2 ir (ir ) − x ⎢ ⎥ 4k ⎢ dy ⎥ Ei [X] = x ⎣ ⎦ dx 2 4 N i 2 2 0 ((i − 1) r ) − x 3 3 4k (r ) 3 1 + − Ei [X] = . 3N 2 i2 i3 i4 From the above equations, the expectation of X in the entire domain is 3 N 3 1 4k (r ) 3 + 3− 4 . E [X] = (17) 3N 2 i=1 i2 i i As our network model is symmetric, so the expectation of the random variables X and Y in the entire domain is same. We can say that Ei [X] = Ei [Y ]. The covariance of random variables X and Y is N
2 N Ei [XY ] − Ei [X] Cov (X, Y ) = i=1
Cov (X, Y )
i=1 2
= E [XY ] − [E [X]] .
(18)
In (18), replacing by (16) and (17) we get covariance of random variables X and Y as the second equation at the top of the next page. Although in preliminary version [6] of this work, the PDF was proposed, the proofs of the Theorem 3 & 4 are provided in this present work only.
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
211
2 N 2 k (r )3 2 3 1 3 1 4 3 + 3− 2− 4 − Cov (X, Y ) = + 3− 4 r N 2 i=1 i i i 2i 3 i2 i i 2 N 2 k (r )3 2 3 1 3 1 4 3 + 3− 2− 4 − Cov (X, Y ) = + 3− 4 r N 2 i=1 i i i 2i 3 i2 i i
B. Proposed PDF-based Node Deployment The PDF proposed in the previous section is discrete in nature. Our objective is to deploy sensor nodes in the layered network area (Fig. 1) with the proposed PDF. The PDF is mapped with the node deployment in a layered network area as follows: the parameter i represents the layer number for both the proposed PDF and layered network area (see Fig. 1) where i = 1, 2, . . . , N ; the parameter r of the proposed PDF corresponds to the width r of the annuli/layer. Therefore, the relationship between r and Rc is r ≤ Rc , whereas, between r and Rs is r ≤ 2Rs . The density function is designed as per the analysis in Section IV. It is a non-uniform one i.e. the value of PDF is higher for the nodes deployed around the sink whereas the value is lower as one moves away from the sink. The PDF of deploying a sensor node at point f (x, y) located in layer-i is given as follows: k (2i − 1) /N 2 i4 where i = 1, 2, . . . , N and k is the proportionality constant. Further, the probability for the nodes deployed within a layer is k (2i − 1) Ai /N 2 i4 , where Ai is the area of layeri and k is as follows: −1 N 2 2 2 4 (2i − 1) /i (19) k = N πr i=1
where r is the width of the layer-i. The area of layer-i is given as " # ! $ 2 Ai = πi2 r2 − π (i − 1) r2 = π (2i − 1) r2 . By replacing the value of Ai , the probability (pi ) of deploying nodes at a layer-i is given as # $−1 2 pi = k (2i − 1) πr2 N 2 i4 . (20) The number of nodes in a layer-i (Ti ) is equal to the probability (pi ) of deployment of nodes at layer-i multiplied by the total number of nodes (Ttotal ) i.e. Ti = pi × Ttotal . Therefore, the node density of a layer-i (for i = 1, 2, . . . , N ) according to our proposed PDF is given as N pi pi × Ttotal = × λ × Aj λi = j=1 j Ai Ai k (2i − 1) πr2 N λi = (2j − 1) λj . (21) j=1 N 2 i4 The above expression implies that the node density determined by the proposed PDF is controlled by the parameters i and N and that conforms to the guideline provided in Section IV. Further, the node density in a layer is uniform and probability of deploying nodes is equal, but this node density as well as probability varies in different layers. The nature of variation is that the node density is maximum in the layer nearest to
the sink and it decreases in the layers farther away form the sink. Therefore, we have λ1 > λ2 > · · · > λN . C. Algorithm for Node Deployment Algorithm 1 Input: a, r, Ttotal ; Output: λi // area parameter, width of layer, and total number of nodes to be deployed compute maximum number of layers N using Lemma 1 compute constant k using Theorem 1 for i = N to 1 do compute pi using (20) compute λi using (21) end for
D. Illustrative Example Let us consider a 200 × 200 sq unit area where 100 nodes with Rc = 25 units are deployed employing the proposed probability density function. The number of layers N is: % & % & a 200 N= = = 4 (using Lemma 1). 2 × Rc 2 × 25 Now replacing the values of N and Rc in (19), the value of k can be computed as −1 52 72 32 2 2 k = 4 π (25) 1 + 4 + 4 + 4 2 3 4 k = 0.004 [where r = Rc ]. Now the probability of deploying nodes in each of the four layers is obtained by replacing k by 0.004, r by 25 and N by 4 in (20). For example, pi is obtained as, 2 pi = 0.49 (2i − 1) /i4 . Probability of deployment of nodes in layer-1, p1 = 0.49. Similarly p2 = 0.27, p3 = 0.15 and p4 = 0.09. Using (21), node density in each of the 4 layers is as follows: in layer-1, λ1 = 0.00024 × 100 = 0.024, in layer-2, λ2 = 0.0045, in layer-3, λ3 = 0.0015, in layer-4, λ4 = 0.00065. We observe that the node density in each layer obtained from the algorithm conforms to the non-uniform nature of the PDF. Therefore, it fulfils our objective of deploying more number of nodes towards the sink and decreasing the number of nodes as the distance from the sink increases. Finally, we claim that the proposed deployment is feasible. As reported in state-of-the-art works [25], [26] on design and deployment of WSN, air-dropped deployment in a controllable manner is feasible even in an inaccessible terrain. We propose to compute the node density in each part (layer/annuli) of the
212
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
Node density (node/sq. m)
network off-line prior to the actual deployment. At last, the nodes are to be dropped (e.g. from helicopter) using a point (sink) as the center following the pre-computed node densities of the proposed PDF. One important application of PDFND based node deployment is battlefield surveillance where more detailed information is needed around the headquarters and the sink may be placed at the headquarters. Unlike the preliminary version [6], in the proposed node deployment (Sections V.B, V.C, and V.D) we have considered node density instead of number of nodes in each layer as the parameter of concern for making the scheme energy balanced, thereby, getting enhanced network lifetime. This is as per the guideline of the analysis done in Section IV.
Now replacing the value of et and using (5), we have (using energy model in Section III.C) N ' ( λh (2h − 1) ρ mi et + h=i+1 er = mN eelec + eamp Rc20 . λi (2i − 1) After rearranging the above equation, we have the equation at the top of the next page. Similar to the farthest layer, for the rest of the layers we can have the equation at the top of the next page. Let us assume that the network lifetime under the regulated transmission policy is LT . The lifetime maximization thus can be formulated as the following optimization problem: max LT Subject to (22)–(26) at the top of the next page. The objective function is the lifetime of the network. The constraints (22) and (23) specify the transmission range of the nodes for balanced energy consumption where the nodes are located in the farthest layer and in the other layers respectively. The constraint (24) limits the maximum transmission range of
Achieved node density
1.5
Desired node density
1 0.5 0 -0.5 -1 1
2
3
Layer number
4
5
Node density (node/sq. m)
(a) 5-layer network.
E. Formulating Network Lifetime Maximization as an Optimization Problem In addition to solving network lifetime maximization by varying node density in each layer, in this section we show that the same can be achieved by regulating transmission range of nodes in each layer. Precisely, we formulate network lifetime maximization as transmission range regulation based optimization problem. We assume that the nodes in the farthest layer have the longest transmission range Rc0 (i = N ) and the nodes in the other layers (i = 1, 2, . . . , (N − 1)) have transmission range Rci in decreasing order. As mentioned in Section IV the nodes in all the layers i (i = 1, 2, . . . , (N − 1)) consume energy for transmitting their own sensory data and for carrying relay data. However, the nodes in the farthest layer (i = N ) from the sink do not carry any relay data. So, let us assume that the energy required to transmit one bit of data in the farthest layer is et = eelec + eamp Rc20 . Further, in order to obtain energy balancing the average energy consumption rate of each layer must be same i.e., ECRi = ECRN , where ECRN is energy consumption rate of the nodes of layer-N under the transmission range regulation policy. Now using (8), (9), and (10) we get the following: N λh (2h − 1) ρ ρ ρ (et + er ) = et + h=i+1 e. λi λi (2i − 1) λN t
-3 2 ×10
-3 11 ×10
Achieved node density
9
Desired node density
7 5 3 1 -1 1
2
3
4
5
6
7
8
9
10
Layer number (b) 10-layer network. Fig. 3.
Node densities in each layer for various network sizes.
a node whereas constraint (25) specifies that the total energy consumed by each node should not exceed its initial energy reserve. VI. P ERFORMANCE A NALYSIS Performance of the present node deployment strategy is measured based on two parameters such as energy balance and network lifetime. Both qualitative and quantitative analyses are presented here. A. Qualitative Analysis In this section we have analyzed the performance of the proposed PDF qualitatively to show in which extent our node deployment scheme (Section V) is close to fulfill the desired objective (Section IV). 1) Energy Balance: The network is said to be energy balanced when the nodes located in any layer have the same lifetime. Based on this condition we have derived the desired node density (λi ) of a layer using (11) (see Section IV) as follows: λi = (2i + 1) λi+1 (2i + 1)
et (2i − 1) + (et + er ) et (2i + 1) + (et +
N
h=i+1 er ) N h=i+2
λh (2h − 1) λh (2h − 1)
.
On the other hand, in our node deployment strategy, nodes are deployed in different layers with varying node density (λi )
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
Rc0
1 = mN eamp
Rc0
1 = mN eamp
1 Rci = mi eamp
N
ρ e − λN t
N
h=i+1 λh (2h − 1) ρ er − mi eelec λi (2i − 1)
N
h=i+1 λh (2h − 1) ρ er − mN eelec λi (2i − 1)
mi e t +
ρ e − λN t
λh (2h − 1) ρ er − mN eelec λi (2i − 1)
h=i+1
mi e t +
1 Rci = mi eamp
N
h=i+1 λh (2h − 1) ρ er − mi eelec λi (2i − 1)
213
12
12
12 , ∀TN
(22)
, ∀Ti , i < N
(23)
12
(N × r) ≥ Rc0 > Rci > 0 ∀Ti , 1 ≤ i ≤ N
ECRi × LTi − ε0 ≤ 0 ∀i ∈ {1, 2, . . . N }
(24) (25)
ECRi , LTi ≥ 0 ∀i ∈ {1, 2, . . . N }
which is achieved node density and is given as (Section V.B, see (21)) λi =
k (2i − 1) πr2 N (2j − 1) λj . j=1 N 2 i4
It is observed from both the above equations that node density among the layers is non-uniform in nature but uniform within the layers. Moreover, as A1 < A2 < · · · < AN , the nature of variation of node density is that it is maximum in the layer nearest to the sink and it decreases in the layers farther away form the sink. To see the effectiveness of the proposed scheme, Fig. 3 plots both the desired and achieved node densities for two different network sizes. After deriving (see Section IV) the node density in the farthest layer for both the cases, desired and achieved node densities of the remaining layers are calculated iteratively using (11) and (21) respectively. It is clear from the plot, in all the cases desired and achieved node densities are almost same and that indicates the proposed scheme has been able to achieve energy balancing. 2) Network Lifetime: The desired lifetime, according to (12), is as the equation at the top of the next page. Now following the method for calculating LTi (Section IV, see (12)) we derive LTi as the equation at the top of the next page. If we compare LTi (desired) and LTi (achieved), as λi and λi are found almost same, LTi and LTi are also same. 3) Coverage and Connectivity: In addition to the energy balance and network lifetime, we have also measured coverage and connectivity to show the extent of maintaining coverage and connectivity by the proposed node deployment strategy. This section formulates necessary constraints to be satisfied for maintaining coverage and connectivity. It also contains a couple of Lemmas along with the proofs with an objective to show the extent of maintaining coverage and connectivity by the PDF. To measure the coverage, the concept of coverage
(26)
density (Ci ) [27] has been used. If the sensing area S(ν) (refer to Section III.B.1) of each node is mutually exclusive, the coverage density of layer-i Ci is defined as Ci =
Ti × S(ν) . Ai
If Ci = 1 i.e., 1-coverage (Section III.B.1), we say that Ai is covered by minimum number of nodes and coverage area of each node is mutually exclusive. If Ci > 1 i.e., αcoverage, we say that Ai is covered by more than the minimum number of nodes and therefore, coverage area of a node is overlapped with the coverage area of the other nodes in the area. The sensing accuracy would increase proportionally with the overlapping of coverage area, thus making the scheme more robust against sensing failure. Lemma 2: For a given network area, the proposed PDF gives the coverage density of a layer-i as Ci = Ti /4 (2i − 1). Proof: Let us consider Ti numbers of nodes are deployed in layer-i. The S(ν) of each sensor is calculated as πRs2 where Rs is the sensing radius of each sensor. So, C (Ti ) = ∪∀ν∈Ti S(ν) = Ti × S(ν) = Ti × πRs2 . From the definition of Ci we have Ci =
Ti × S(ν) T × πRs2 = i . Ai (2i − 1) πr2 T ×πR2
T
i s i Replacing r by 2Rs , we have Ci = (2i−1)π4R 2 = 4(2i−1) . s From the above expression it is observed that, the coverage density of layer-i depends on the number of nodes deployed in layer-i and it is inversely proportional to layer number i, which suits the requirement for energy balancing (Section IV). Also, one can achieve the desired coverage density by controlling the number of deployed nodes Ti in various layers within the network.
214
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
LTi
=
λi (2i−1)ε0 N
[ρ(2i−1)et +(et +er )
LTi =
λN ε0 ρ(2N −1)et
⎧ ⎨ ⎩
h=i+1
λh (2h−1)ρ]
ε0 (2i−1)λi ρ(2i−1)et +(et +er ) N h=i+1 λi (2h−1)ρ ε0 λN ρ(2N −1)et
Lemma 3: For a network, if coverage is ensured, connectivity of the network is also ensured. Proof: We have discussed that when the network area is covered by minimum number of nodes, then Ci = 1. Now when the network is covered by minimum number of nodes, the maximum distance between the two nodes is 2Rs . In our communication model we have assumed that two nodes can communicate with each other if the Euclidean distance between them is less or equal to Rc and we have considered Rc ≤ 2Rs . As the maximum distance between the nodes is 2Rs and Rc ≤ 2Rs , so we can say that the connectivity is guaranteed if coverage is ensured. B. Quantitative Analysis The effectiveness of the proposed node deployment scheme, reported in Section V.B is evaluated through simulation. Moreover, all the theoretical claims made through qualitative analysis presented in Section VI.A are justified by simulation results. Simulation results of our scheme PDFND are compared with three existing node deployment schemes namely non-uniform node distribution strategy (NNDS) [13], node deployment with Gaussian distribution (NDGD) [15] and node deployment with Uniform distribution (NDUD) [28]. 1) Simulation Environment: The simulation is performed using MATLAB (version 7.1). We have done qualitative analysis considering simplified q-switch routing [13]. However, in simulation we have used the same routing protocol with no simplification for all the three schemes. This routing protocol is briefed along with the scheme [13] in the next paragraph. In NNDS the authors have proposed a non-uniform node distribution strategy for the uniform-width corona model. Here the nodes are deployed in such a way that the node densities in a corona increases in geometric proportion with common ratio q(> 1) from corona (N − 1) to corona 1. We assume that the number of nodes deployed at the farthest corona and the common ratio are known a priori. Once the number of nodes deployed at the farthest corona and the common ratio are known, nodes for the remaining coronas are computed and these computed numbers are exponentially increasing function of the common ratio q. The NNDS uses q-switch routing where the source node always selects one reachable relay node with maximum remaining energy in its subsequent inner layer to forward data. If there is more than one relay node with the same maximum remaining energy, one of them is chosen randomly. Once the source node selects the relay node, it forwards the data of its own as well as those received from the nodes of adjacent layers farther away from the sink. The selected relay node repeats this process until the data
for i = 1, 2, . . . , (N − 1) for i = N
for i = 1, 2, . . . , (N − 1) for i = N
arrives at a node in layer-1, after which the data is sent to the sink. Hence, the routing itself takes care of individual node’s load balancing and that eliminates the problem [10] of annuli architecture as stated in Section III.A. In NDGD, the authors have considered that the nodes are deployed using two dimensional Gaussian distribution and node density function at point f (xi , yi ) as − 1 f (x, y) = e 2πσx σy
(x−xi )2 2 2σx
+
(y−yi )2 2 2σy
,
where σx and σy are the standard deviations for x and y dimensions. Further, the authors have considered two deployment types: σx = σy and σx = σy . However, during simulation we have considered σx = σy = σ, which conforms to a disk model and that is similar to our network model. So, the probability density function of deploying a sensor node for point (x, y) is: 1 − x2 +y2 2 e 2σ . 2πσ 2 It is evident from the above equation that any two points in the disk having same distance from the center-point, have the same deployment probability. In NDUD, nodes are uniformly and independently distributed in the layered network area, the probability fa that a point is covered by sensor nodes is f (x, y) =
2
fa = 1 − e−λπRs
where Rs is the sensing range of the nodes and λ is the node density. We simulate our work both under ideal scenario and realistic scenario. Here, by ideal scenario we mean the scenario considered during theoretical analysis (Section IV and Section VI.A) i.e., simplified q-switch routing protocol, ideal MAC layer and the energy consumption only for transmission and reception. On the other hand, in realistic scenario we consider q-switch routing protocol and real MAC protocol which includes idle/sleep schedule of the nodes. Moreover, unlike ideal scenario, in realistic scenario energy consumption is considered for idle, sleeping and sensing in addition to transmission and reception. The real MAC protocol has been implemented by funneling-MAC [29]. The funneling-MAC is a hybrid MAC protocol where TDMA (schedule-based) is used in nodes located within a few hops from the sink whereas CSMA/CA (contention-based) is used in nodes located far away from the sink. The sink broadcasts a beacon for nodes located within a smaller number of hops by controlling the transmission power of the beacon. The nodes which receive the beacon are considered as f -nodes and perform TDMA
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
TABLE I PARAMETER VALUES U SED IN S IMULATION
Average residual energy per node (Avg RE per node): It is defined as the residual energy in a node of a particular layer after the network lifetime ends. It is evaluated as follows: Avg RE per node =
while the nodes that do not receive the beacon perform CSMA/CA. During simulation we have considered the nodes located within layer-2 use TDMA schedule whereas nodes beyond layer-2 use CSMA/CA. We have considered energy consumption rates for sensing, remaining idle and remaining sleeping are 20%, 5%, 2.5% of the energy consumption rate of reception respectively. Further, in simulation, all the funnelingMAC implementing parameter (e.g. slot size, superframe size, moving average factor) values are considered same as in [29]. During implementation of all the schemes, we have deployed 500 and 2000 nodes for network with 5 and 10 layers respectively. For all the schemes, in order to have an integer number of sensor nodes for each layer, the upper ceil function is employed. We consider the energy cost to run the transmitter/receiver radio circuitry per bit processed (eelec ) as 50 nJ/bit. Also, we consider the energy used by the transmitter amplifier (eamp ) to achieve an acceptable signal to noise ratio (30 dB) as 10 pJ/bit/m2 . This setting requires receiver sensitivity -52 dBm. Furthermore, we consider data ready delay/measurement delay as 1 sec in our simulation. Our routing protocol [13] and MAC protocol [29] does not rely on any synchronization protocol and therefore, the synchronization parameters are not considered during simulation. For NNDS, the common ratio q is considered as 2 and for NDGD, standard deviation σ is considered as 70. All the parameters and their corresponding values used for simulation are listed in Table I. Extensive simulation has been performed with a confidence level of 95% and 5% accuracy. To achieve this, we collect results in groups of 2,000 observations per group. In one group, we obtain a mean out of 2,000 observations collected. We run at least 5 groups to get a minimum of 5 means from which we calculate the grand mean and estimate the difference of the grand mean from the true mean with 95% confidence. If the accuracy obtained is greater than 5%, we run more groups and collect more observations until the specified 5% accuracy requirement is achieved. 2) Simulation Metrics: Similar to qualitative analysis, (Section VI.A) energy balance, network lifetime and coverageconnectivity have been considered as performance metrics in simulation. We define two more parameters namely energy consumption rate per node and average residual energy per node for evaluating the extent of energy balance in the network. Further, we evaluate coverage-connectivity using the parameter coverage density (Section VI.A.3). Energy consumption rate per node (ER): It is defined as energy consumption of a node per unit time.
215
Sum of residual energy of nodes in a layer . Number of nodes in the layer
We have conducted two sets of experiments. One set of experiment is to compare simulation results with analytical results considering network lifetime as the parameter. In the other set of experiments, our scheme is compared with three other competing schemes considering both ideal and realistic scenarios. In this set of experiments again energy balance, network lifetime and coverage-connectivity are considered as performance metrics. 3) Comparison of Results (Analytical vs Simulated): In this section, the analytical (Section IV) performance of the scheme in terms of network lifetime is compared with the simulated (Section V) performance and the results are plotted in Fig. 4. Here both the set of results consider ideal scenario including ideal MAC. To be more specific, to make the comparison platform at par, both set of results are plotted considering ideal MAC. We observe from the plot that the nature of graph for the analytical result is perfectly straight irrespective of network sizes whereas the simulation result is fairly straight and that indicates the algorithm has been able to provide almost perfect energy-balanced network lifetime as desired by the theoretical analysis. We also observe that the network lifetime decreases with the increase of network sizes. This is because the data traffic increases while the network size increases, especially for the layers nearer the sink. Finally, the most important observation is, for both the 5-layer (Fig. 4(a)) and 10-layer (Fig. 4(b)) network sizes, analytical results and the average of simulation results are almost same. The slight differences between the analytical and simulated results are due to the minute variation of desired and achieved node densities (refer Fig. 3). 4) Comparison of Results (Competing schemes): This section compares our scheme’s performance with the three competing schemes considering both ideal and realistic scenarios. a) Energy balancing [6] In this section energy balancing of the scheme is evaluated in terms of the following two parameters. (1) ER (Energy consumption rate per node) Fig. 5 shows the ER for different network sizes. We observe that in PDFND, for both ideal and realistic scenarios, the ER for a particular network size is constant for all the layers and this rate varies with network sizes. Precisely, ER increases with increase in network size. For example, in case of ideal scenario, the ER is 1.01 mJ/sec for 5-layer network whereas for 10-layer network it is 1.19 mJ/sec. Similarly, in realistic scenario, these values are 1.21 mJ/sec and 1.45 mJ/sec respectively. On the contrary, in NNDS, NDGD and NDUD it is observed that the ER varies in different layers for a given network size. Further, in NNDS, NDGD and NDUD, irrespective of network size, nodes in layer-1 have maximum ER and nodes in the farthest layer have the lowest ER. Therefore, nodes deployed in the layers nearer the sink drain
216
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
9.5
816.23
For λ' (Simulated)
8.5
For λ (Analytical)
7.5
ER (mJ/sec)
Network lifetime (mins)
816.25
816.21 816.19 816.17
P DFND (Ideal) NNDS (Ideal) NDGD (Ideal) NDUD (Ideal)
6.5 5.5 4.5 3.5 2.5 1.5
816.15
0.5
1
2
3
4
Layer number
5
1
2
(a) 5-layer network.
3
4
Layer nember
5
(a) 5-layer network.
683.11
16.5
683.106
For λ' (Simulated)
14.5
For λ (Analytical)
12.5
ER (mJ/sec)
Network lifetime (mins)
P DFND (Real) NNDS (Real) NDGD (Real) NDUD (Real)
683.102 683.098
P DFND (Ideal) NNDS (Ideal) NDGD (Ideal) NDUD (Ideal)
P DFND (Real) NNDS (Real) NDGD (Real) NDUD (Real)
10.5 8.5 6.5 4.5
683.094 2.5 0.5
683.09 1
2
3
4
5
6
7
8
9
1
10
Layer number (b) 10-layer network.
2
3
4
5
6
Layer number
7
8
9
10
(b) 10-layer network.
Fig. 4. Network lifetime for various network sizes (analytical vs simulated).
Fig. 5.
out their energy much more quickly in comparison to nodes deployed in layers farther away from the sink. This justifies our claim that PDFND is relatively more energy balanced compared to all the competing schemes NNDS, NDGD and NDUD. Now for all the schemes, if we compare the results of ideal and realistic scenario, it is observed that ER (realistic) in all the cases is higher compared to ER (ideal). The additional energy usage for realistic scenario is due to the implementation of MAC protocol. Another important observation in realistic scenario is that, ER nearer the sink is less compared to ER away from the sink. As CSMA/CA is used in nodes away from the sink, unlike TDMA, number of collisions, however infrequent, is non-zero and this justifies the above result. In numerical value, for PDFND irrespective of network sizes, the average increase in ER, in realistic scenario compared to the ideal scenario are 19% and 20%, for the nodes nearer the sink and far away from the sink respectively. Similarly these values are 20% and 22% for NNDS, 22% and 24% for NDGD, 5% and 10% for NDUD.
(Fig. 6) nodes in each of the two layers viz. layer-5 and layer6, have drained off completely, though the nodes of other layers in the network have sufficient energy for carrying out normal network operation, causing the phenomenon known as energy hole. Similarly, in NDUD, the energy in nodes of layer-1 has drained off completely though the nodes of other layers in the network have adequate energy for normal network operation. So, both NDGD and NDUD suffer from energy hole problem. In NNDS, the plots upto certain layers starting from the nearest layer from the sink are relatively flat compared to the results in rest of the layers and that implies energy wastage caused by imbalance in energy consumption among the layers. Therefore, NNDS also suffer from energy imbalance problem affecting network lifetime. However, the PDFND plot is almost a straight line indicating that all the nodes in each layer exhaust energy almost completely ending the network lifetime. For example, in case of ideal scenario, it leaves less than 0.2 nJ energy for 5-layer network whereas for 10-layer network it is 0.32 nJ. Similarly, in case of realistic scenario, it leaves less than 0.25 nJ energy for 5-layer network whereas for 10-layer network it is 0.29 nJ. Therefore, we can say that PDFND is energy balanced and utilizes energy, the scarcest resource, more efficiently than the other deployment schemes.
(2) Avg RE per node (Average residual energy per node) Fig. 6 illustrates the comparison considering avg RE per node as a performance metric. We observe that node deployment using NDGD or NDUD results in relatively abrupt change in avg RE per node in each layer and this nature remains independent of network size. For example, in NDGD
Energy consumption rate per node.
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
1250
71
P DFND (Ideal) P DFND (Real) NNDS (Ideal) NNDS (Real) NDGD (Ideal) NDGD (Real) NDUD (Ideal) NDUD (Real)
53 47 41 35 29 23 17
P DFND (Ideal) NNDS (Ideal) NDGD (Ideal) NDUD (Ideal)
1100
Network lifetime (mins)
Avg. RE per node (J)
65 59
11 5
950
650 500 350 200 50
5
4
3
2
Layer number
1
1
2
(a) 5-layer network.
3
4
Layer number
5
(a) 5-layer network. 1050
65
P DFND (Ideal) P DFND (Real) NNDS (Ideal) NNDS (Real) NDGD (Ideal) NDGD (Real) NDUD (Ideal) NDUD (Real)
53 47 41 35 29 23
P DFND (Ideal) NNDS (Ideal) NDGD (Ideal) NDUD (Ideal)
950
Network lifetime (mins)
59
Avg. RE per node (J)
P DFND (Real) NNDS (Real) NDGD (Real) NDUD (Real)
800
-1
17 11
850 750
P DFND (Real) NNDS (Real) NDGD (Real) NDUD (Real)
650 550 450 350 250 150
5 -1
50 10
9
8
7
6
5
4
3
2
1
1
Layer number
2
(b) 10-layer network. Fig. 6.
217
Average residual energy (RE) per node.
3
4
5
6
Layer number
7
8
9
10
(b) 10-layer network. Fig. 7.
Network lifetime for various network sizes.
30
In this section network lifetime is evaluated for various network sizes. The graphs illustrated in Fig. 7 represent the network lifetime for two different network sizes. For ideal scenario, it is observed that the network lifetime of PDFND is 18.28%, 48.40%, and 350% more than that of NNDS, NDGD and NDUD respectively for 5-layer network. For 10-layer network it is 19.83%, 42.30%, and 380% more than that of NNDS, NDGD and NDUD respectively. It is also observed that with increase in network size network lifetime decreases, e.g. for 5layer network it is 816.21 mins whereas for 10-layer network it is 683.06 mins. This is due to the fact that with increase in network size, the nodes in the innermost layer need to relay increased volume of data from the outer layers, thereby, causing higher energy consumption. Moreover, in PDFND the flat nature of the plot ensures that in all the layers, network lifetime terminates in more or less same time as compared to NNDS, NDGD and NDUD. This ensures that energy in PDFND is balanced to a greater extent than all the competent schemes. Now if we compare the simulation results of network lifetime, both for ideal and realistic scenarios, network lifetime is reduced in realistic scenario, as there is additional energy consumption due to the implementation of MAC protocol. Further, in realistic scenario, irrespective of network sizes, the
Coverage density
b) Network lifetime [6]
PDFND
25
NDGD 20
NNDS
15
NDUD
10 5 0 1
Fig. 8.
2
3
Layer number
4
5
Coverage density for 5-layered network area.
reduction in network lifetime is less near the sink compared to other parts of the network. To be more specific, in PDFND when reduction is 19% near the sink, it is 20% in rest of the network. Similarly, in NNDS, NDGD and NDUD these values are 20% & 22%, 22% & 24% and 4% & 10% respectively. As CSMA/CA is used in the entire network area except near the sink, due to collision and retransmission additional energy is consumed compared to near the sink where TDMA is used. From the above observations, it is also revealed that the impact caused by inclusion of realistic scenario on network lifetime
218
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 11, NO. 2, JUNE 2014
is the highest in NDGD and the least in NDUD. Although a subset of results on energy balancing and network lifetime was presented in [6], here the entire result set is compared (Figs. 5, 6, 7) with one additional competing scheme NNDS [13]. Moreover, for all the competing schemes including ours, an additional set of results are plotted using real MAC. c) Coverage and connectivity In Fig. 8, we plot coverage density in all the layers for 5layered network. Our primary observation is that except the scheme NDUD, in all the other schemes i.e., PDFND, NDGD and NNDS, coverage density reduces in layers as the distance of layers from the sink increases fulfilling the objective of deploying more nodes near the sink. The next observation is NDGD gives more overlapping sensing coverage in layer-2, and NDUD in layer-5 but NDGD fails to give any overlapping sensing coverage (see Section VI.A.3) in layer-5. To be more specific, in layer-5, coverage density is less than one implying NDGD’s incapability of providing coverage. On the other hand, NDUD provides uniform coverage density in all the layers but that does not provide energy balancing requirement. However, NNDS provides coverage density as per the requirement of energy balancing. Finally, if we compare PDFND with the most competent scheme NNDS, we find that in PDFND coverage density of layers 1, 4, 5 are 74%, 58.36%, 2% more, respectively, than NNDS. However, in layer 2, 3 these values are marginally less (10.66%, 4.86%) than the NNDS. Therefore, we claim that our scheme PDFND not only provides coverage density as per the requirement of energy balancing but also provides higher average coverage density throughout the network compared to the most competing scheme NNDS. VII. C ONCLUSION AND F URTHER W ORK In this work we have proposed a node deployment scheme for multi-hop WSNs using a PDF defined by us. The target of the scheme is to achieve energy balancing and enhancing network lifetime while maintaining coverage and connectivity. To start with, we have analyzed network lifetime and identified node density as a parameter which has significant influence on network lifetime. Then, theoretical formulation of node density for balanced energy consumption is presented. Based on the analysis of network lifetime we have designed a PDF targeting its implementation in lifetime-enhancing node distribution in WSNs. Intrinsic characteristics of the PDF and its suitability for modeling the network architecture of this work are discussed. A node deployment algorithm is also developed based on the proposed PDF to implement the scheme. Further, we have provided theoretical formulation of coverage-connectivity, energy balancing, network lifetime and have derived certain constraints, involving some important network parameters, to be satisfied to achieve the target. We claim that our scheme successfully achieves the target. The claims are substantiated by performing both qualitative and quantitative analyses. Finally, the results of quantitative analysis are compared with three existing works [13], [15], [28] on node deployment and that clearly demonstrates our scheme’s dominance over the existing works.
As a future extension of our work, the deployment strategy may be made more realistic by considering 3-D environment. Moreover, the scheme may be analyzed with a target to obtain optimal node density by considering various QoS parameters. R EFERENCES [1] I. Dietrich and F. Dressler, “On the lifetime of wireless sensor networks,” ACM Trans. Sensor Netw., vol. 5, pp. 1–39, Feb. 2009. [2] S. Halder, A. Ghosal, and S. DasBit, “A pre-determined node deployment strategy to prolong network lifetime in wireless sensor network,” Comput. Commun., vol. 34, pp. 1294–1306, July 2011. [3] M. Younis and K. Akkaya, “Strategies and techniques for node placement in wireless sensor networks: a survey,” Ad Hoc Netw., vol. 6, pp. 621–655, June 2008. [4] A. Liu, X. Jin, G. Cui, and Z. Chen, “Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network,” Inf. Sci., vol. 230, pp. 197–226, May 2013. [5] J. Li and P. Mohapatra, “Analytical modeling and mitigation techniques for the energy hole problem in sensor networks,” Pervasive Mobile Comput., vol. 3, pp. 233–254, June 2007. [6] S. Halder, A. Ghosal, A. Chaudhuri, and S. DasBit, “A probability density function for energy-balanced lifetime-enhancing node deployment in WSN,” in Proc. 2011 LNCS Int. Conf. Computational Sci. Appl., vol. 6018, pp. 472–487. [7] A. K. M. Azad and J. Kamruzzaman, “Energy-balanced transmission policies for wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 10, pp. 927–940, July 2011. [8] C. Song, M. Liu, J. Cao, Y. Zheng, H. Gong, and G. Chen, “Maximizing network lifetime based on transmission range adjustment in wireless sensor networks,” Comput. Commun., vol. 32, pp. 1316–1325, July 2009. [9] A. Boukerche, D. Efstathiou, S. Nikoletseas, and C. Raptopoulos, “Exploiting limited density information towards near-optimal energy balanced data propagation,” Comput. Commun., vol. 35, pp. 2187–2200, Nov. 2012. [10] O. Powell, P. Leone, and J. Rolim, “Energy optimal data propagation in wireless sensor networks,” J. Parallel Distrib. Comput., vol. 67, pp. 302–317, Mar. 2007. [11] A. Jarry, P. Leone, S. Nikoletseas, and J. Rolim, “Optimal data gathering paths and energy-balance mechanisms in wireless networks,” Ad Hoc Netw., vol. 9, pp. 1036–1048, Aug. 2011. [12] J. Cheng, Q. Ye, H. Jiang, D. Wang, and C. Wang, “STCDG: an efficient data gathering algorithm based on matrix completion for wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 12, pp. 850–861, Feb. 2013. [13] X. Wu, G. Chen, and S. K. Das, “Avoiding energy holes in wireless sensor networks with nonuniform node distribution,” IEEE Trans. Parallel Distrib. Syst., vol. 19, pp. 710–720, May 2008. [14] C. Y. Chang and H. R. Chang, “Energy-aware node placement, topology control and MAC scheduling for wireless sensor networks,” Comput.Netw., vol. 52, pp. 2189–2204, Aug. 2008. [15] D. Wang, B. Xie, and D. P. Agrawal, “Coverage and lifetime optimization of wireless sensor networks with Gaussian distribution,” IEEE Trans. Mobile Comput., vol. 7, pp. 1444–1458, Dec. 2008. [16] H. Liu, X. Chu, Y. Leung, and R. Du, “Minimum-cost sensor placement for required lifetime in wireless sensor-target surveillance networks,” IEEE Trans. Parallel Distrib. Syst., vol. 24, pp. 1783–1796, Sep. 2013. [17] J. Luo and J. P. Hubaux, “Joint sink mobility and routing to maximize the lifetime of wireless sensor networks: The case of constrained mobility,” IEEE/ACM Trans. Netw., vol. 18, pp. 871–884, June 2010. [18] H. Ammari and S. Das, “Promoting heterogeneity, mobility, and energyaware Voronoi diagram in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 19, pp. 995–1008, July 2008. [19] K. Lin, M. Chenb, S. Zeadally, and J. J. P. C. Rodrigues, “Balancing energy consumption with mobile sgents in wireless sensor networks,” Future Generation Comput. Syst., vol. 28, pp. 446–456, Feb. 2012. [20] S. Olariu, A. Wadaa, L. Wilson, and M. Eltoweissy, “Wireless sensor networks: leveraging the virtual infrastructure,” IEEE Netw., vol. 18, pp. 51–56, July 2004. [21] F. Barsi, A. A. Bertossi, C. Lavault, A. Navarra, S. Olariu, M. C. Pinotti, and V. Ravelomanana, “Efficient location training protocols for heterogeneous sensor and actor networks,” IEEE Trans. Mobile Comput., vol. 10, pp. 377–391, Mar. 2011. [22] D. Tian and N. D. Georganas, “Connectivity maintenance and coverage preservation in wireless sensor networks,” Ad Hoc Netw., vol. 3, pp. 744–761, Nov. 2005.
HALDER and DASBIT: DESIGN OF A PROBABILITY DENSITY FUNCTION TARGETING ENERGY-EFFICIENT NODE DEPLOYMENT IN WIRELESS . . .
[23] M. Cardei and J. Wu, “Energy-efficient coverage problems in wireless ad-hoc sensor networks,” Comput. Commun., vol. 29, pp. 413–420, Feb. 2006. [24] Available: http://en.wikipedia.org/wiki/Covariance [25] M. Bernard, K. Kondak, I. Maza, and A. Ollero, “Autonomous transportation and deployment with aerial robots for search and rescue missions,” J. Field Robotics, vol. 28, pp. 914–931, Nov. 2011. [26] W. Z. Song, R. Huang, M. Xu, B. A. Shirazi, and R. LaHusen, “Design and deployment of sensor network for real-time high-fidelity volcano monitoring,” IEEE Trans. Parallel Distrib. Syst., vol. 21, pp. 1658–1674, Nov. 2010. [27] X. Han, X. Cao, E. L. Lloyd, and C. C. Shen, “Deploying directional sensor networks with guaranteed connectivity and coverage,” in Proc. 2008 IEEE Int. Conf. Sensing Commun. Netw., pp. 153–160. [28] B. Liu and D. Towsley, “A study of the coverage of large-scale sensor networks,” in Proc. 2004 IEEE Int. Conf. Mobile Ad hoc Sensor Syst., pp. 475–483. [29] G. S. Ahn, E. Miluzzo, A. T. Campbell, S. G. Hong, and F. Cuomo, “Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks,” Tech. Rep. CU/EE/TAP-TR-200608-003. Available: http://www.cs.dartmouth.edu/~sensorlab/funnelingmac/TAPTR-2006-08-003.pdf
219
Subir Halder received the B.Tech. degree in electronics and communication engineering and the M.Tech. degree in computer science and engineering from Kalyani Government Engineering College, Kalyani, India, in 2003 and 2006, respectively. He is an Assistant Professor of Computer Science and Engineering at Dr. B. C. Roy Engineering College, Durgapur, India. Currently, he is pursuing the Ph.D. in computer science and technology at Bengal Engineering and Science University, India. His current research interests include network modeling and analysis, performance evaluation and optimization, and wireless sensor networks. He has published research works in reputed conference proceedings and journals in his field. Sipra DasBit is a Professor and Head of the Department of Computer Science and Technology, Bengal Engineering and Science University, Shibpur, West Bengal, India. A recipient of the Career Award for Young Teachers from the All India Council of Technical Education (AICTE), she has more than 20 years of teaching and research experience. She has published many research papers in reputed journals and refereed international conference proceedings. She also has two books and one book chapter on mobile computing to her credit. Her current research interests include wireless sensor networks and mobile computing.