Sensor Deployment and Relocation: A Unified Scheme - CiteSeerX

0 downloads 0 Views 2MB Size Report
This work is supported by the Italian Ministry for Scientific Research (MIUR), through the MEADOW .... should be surrounded at the equilibrium by six ...... [18] P. Tipler, Physics for scientists and engineers, vol. 1, 4th ed., W.H. Freeman, 1998.
Month 200X, Vol.21, No.X, pp.XX–XX

J. Comput. Sci. & Technol.

Sensor Deployment and Relocation: A Unified Scheme Michele Garetto1, Marco Gribaudo1 , Carla-Fabiana Chiasserini2 and Emilio Leonardi2 1 Dipartimento

di Informatica, Universit` a di Torino, Torino, Italy

2 Dipartimento

di Elettronica, Politecnico di Torino, Torino, Italy

E-mail: {garetto,marcog}@di.unito.it; {chiasserini,leonardi}@polito.it Received MONTH DATE, YEAR. Abstract Sensor networks are envisioned to revolutionize our daily life by ubiquitously monitoring our environment and/or adjusting it to suit our needs. Recent progress in robotics and low-power embedded systems has made possible to add mobility to small, light, low-cost sensors to be used in teams or swarms. Augmenting static sensor networks with mobile nodes addresses many design challenges that exist in traditional static sensor networks. This paper addresses the problem of topology control in mobile wireless networks. Limitations in communication, computation and energy capabilities push towards the adoption of distributed, energy-efficient solutions to perform self-deployment and relocation of the nodes. We develop a unified, distributed algorithm that has the following features. During deployment, our algorithm yields a regular tessellation of the geographical area with a given node density, called monitoring configuration. Upon the occurrence of a physical phenomenon, network nodes relocate themselves so as to properly sample and control the event, while maintaining the network connectivity. Then, as soon as the event ends, all nodes return to the monitoring configuration. To achieve these goals, we use a virtual force-based strategy, which proves to be very effective even when compared to an optimal centralized solution. We assess the performance of our approach in presence of events with different shape, and we investigate the transient behavior of our algorithm. This allows us to evaluate the effectiveness and the response time of the proposed solution, under various environmental conditions. Keywords

1

Distributed algorithms, Mobile networks, Sensor relocation, Wireless sensor networks

Introduction

ject tracking, and disaster relief.

A flurry

of robot systems with sensing capabilities are Wireless sensor networks are well suited

being designed with scopes such as underwa-

for applications like habitat and environment

ter monitoring [1], human movement detection,

monitoring, exploration of hostile areas, ob∗

This work is supported by the Italian Ministry for Scientific Research (MIUR), through the MEADOW project

2

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

and detection/relief of chemical plumes or fires.

lution that is able to meet all of the above re-

Sub-Kilogram Intelligent Tele-Robots (SKIT)

quirements. Our network system is composed of

are also under study to build multi-agent ex-

numerous mobile sensor-actuator nodes that au-

ploratory systems for asteroids exploration [2],

tonomously organize and react to triggers from

while mini-robots (1/4 cubic inch and weighing

the environment. The specific problem we ad-

less than an ounce) with communication capa-

dress here is how to enable these nodes to both

bilities are being developed at the Sandia Na-

self-deploy and relocate in a distributed fashion.

tional Laboratories [3] to locate and disable land

Traditionally, network deployment [6] is per-

mines.

formed at the initial stage of the network

In this paper, we study mobile wireless net-

functioning, to obtain the desired geographi-

works composed of wireless devices that, besides

cal coverage or spatial sensor density. For the

featuring sensing, computing and communica-

particular applications that we consider, self-

tion capabilities, also integrate actuators [4].

deployment of mobile sensor-actuators is neces-

For the sake of concreteness, we consider the

sary since node placement cannot be performed

case of a sensor-actuator network whose task

manually and accurately, due to possible hostile

is to detect fires in a forest area and counter-

environmental conditions and/or to the large

act them by sprinkling water or other fire re-

number of nodes to deploy. The goal in our case

tardants [4]. In this case, exact deployment of

is to form a connected network with roughly

the sensor-actuators may not be possible due

the same node density and continuous cover-

to the characteristics of the environment. Also,

age, starting from an initial random topology

localization techniques based on GPS may not

or from a configuration in which nodes are pro-

be available due to the high cost (see for exam-

gressively released in the environment from a

ple [5] for the requirements that GPS receivers

single point in the area. Relocation, instead,

must meet to properly work in a forest envi-

is needed when the network has to react to a

ronment). Upon occurrence of a fire outbreak,

physical phenomenon [7], which in our applica-

sensor-actuators should be able to surround the

tion may be an environmental disaster (event-

event area and track the movement of the fire

based relocation). Here, we do not deal with

front, while keeping themselves at a safe dis-

fine-grained relocation aimed at stopping a cov-

tance, from which they can control the fire with-

erage hole created for example by a node fail-

out being damaged. Finally, the node density

ure [8,9], but focus on event-based relocation,

should be increased in proximity of the fire front

where the node positions and density have to

so as to contain its expansion.

be adapted to properly sample and control a

In this work, we present a distributed so-

large-scale event.

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

3

When developing solutions for deployment

ticular, [11] presents a centralized algorithm to

and relocation of sensor-actuator networks, it is

be executed by a cluster head, which has per-

clear that one must obey to the system con-

fect knowledge of sensor positions and is able

straints imposed by the application and the

to orchestrate the movement of all sensors to-

employed technology.

In the case of mobile

ward the desired locations. A distributed ap-

nodes, the current trends in robotics push to-

proach is proposed in [6], where three iterative

wards small, light, low-cost devices to be used in

protocols for sensor deployment are presented.

teams or swarms; it follows that mobile sensor-

Sensors move from high- to low-density zones so

actuator networks are subject to limitations

as to increase coverage; at each protocol itera-

in computation, memory and energy capabili-

tion, coverage holes are detected by sensors us-

ties and that distributed solutions are required.

ing Voronoi diagrams. The scheme in [6], how-

Several papers have addressed the problem of

ever, requires sensors to have knowledge of their

mobility-assisted deployment and relocation in

absolute position.

sensor networks. However, we are the first to

More related to our work are [12,13,14] in

propose a unified, distributed algorithm that

which distributed algorithms based on virtual

enables the network nodes to self-deploy for en-

repulsive forces exchanged by sensors are con-

vironmental monitoring, relocate upon an event

sidered for the sake of network deployment

occurrence, and return to the monitoring con-

only (i.e, no event-based movement). However,

figuration as the event ends. Also, the solution

the solutions in [12,13] require sensors to have

we define has the following features: (i) it does

knowledge of their absolute position, while the

not require the use of absolute node localiza-

scheme in [14] is applicable only to deploy sen-

tion; (ii) it meets the constraints on the devices’

sors over a limited area with well defined bound-

computation, memory and energy capabilities;

aries. Finally, in [15] the focus is on a sen-

(iii) it provides real-time response to events as

sor deployment scheme that provides workload

well as coordination among nodes as emergent

balancing, besides coverage; global information

behavior (swarm intelligence [10]).

about the sensor positions, however, is still required.

2

Related Work

With regards to self-deployment, we emphasize that our solution, in contrast to previ-

Movement-assisted deployment, driving mo-

ous work, does require neither a network-wide

bile sensor-actuators from an initial random

knowledge of the node location nor the use of

configuration to some desirable network state,

GPS. Moreover, we aim at obtaining a network

has been addressed in [6,11,12,13,14,15]. In par-

featuring a desired node density (not maximum

4

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

coverage). By achieving a regular tessellation of

the relative positions of the neighboring nodes

the network area with assigned inter-nodal dis-

are needed. Furthermore, we provide a unified,

tance, we attain our goal, while providing also

distributed algorithm which enables sensors to

load balance.

self-deploy, as well as move upon an event oc-

In the context of event-based relocation, a pioneer work is [7], where the aim is to relocate

currence and return to the monitoring configuration once the event ends.

sensors so as to approximate the spatial distribution of events taking place within the network area. Our objective is different: we do not want to approximate the event distribution, rather we want to relocate nodes in response to an oc-

3

Goals and Assumptions In this section we state more precisely the

goals and assumptions of our work, and introduce some notation and definitions.

curred event so as to provide the necessary sampling, tracking and control functionalities, and

3.1

Goals

then restore the network configuration used for normal monitoring after the event ends. In [8] sensor relocation mainly aims at filling coverage holes created by a single node that fails or moves away. The proposed scheme assumes an initial grid structure for the network

Our objective is to design a distributed solution that allows nodes to automatically relocate themselves so that the following functionalities are provided: (i) Self-deployment.

Starting from any

and the presence of grid-head nodes. Our goal

(connected) initial deployment of the

and assumptions are different from the one pro-

nodes, the network achieves a target

posed in that work. We do not address the prob-

structure at the equilibrium, called mon-

lem of filling a hole created by a single sensor

itoring configuration. As monitoring net-

that becomes unavailable; rather we deal with

work topology, ideally we would like a con-

event-based relocation, that typically requires

nected tessellation of the network area,

the simultaneous movement of several nodes.

with continuous coverage and a desired

Also, our algorithm starts from any initial de-

node density ρm . In particular, we have

ployment of the nodes and no sensor has to be

selected a regular triangular tessellation

selected for playing special logical roles.

for the following two reasons: (i) among

To conclude, we emphasize that our solution

the regular tessellations is the one provid-

differs from previous work since nodes are not

ing the highest connectivity degree; (ii)

required to learn their absolute location within

results in [16] show that, when the node

the area, nor the location of the event; only

communication range is not smaller than

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme



5

3 times the sensing range (which is typ-

communication range, and to detect any event

ically the case), a triangular tessellation

having effect on at least one spatial point within

maximizes the network area covered by a

its sensing range.

given number of nodes (conversely, it re-

We consider the triangular tessellation to

quires the minimum number of nodes to

be our network monitoring configuration, and √ we assume Rc ≥ 3Rs [16]. One of the goals

cover a given network area).

achieved by our self-deployment procedure is to (ii) Reaction to physical phenomena and environmental disasters.

When an

event occurs, the nodes detecting the event move toward its location. We require nodes to relocate around the area where the event takes place, yielding a de-

yield a triangular tessellation featuring the desired monitoring node density ρm . With this goal in mind, each node (not on the border) should be surrounded at the equilibrium by six nodes placed at the vertices of a regular hexagon of radius Dm , with:

sired sensor density in its proximity. Network connectivity is maintained throughout the nodes relocation. As the event is no longer detected, nodes move back to the network monitoring configuration (although they are not required to return to their exact initial positions).

3.2

Assumptions and Definitions

2 Dm =

2 1 √ = ρm sin 60◦ 3ρm

(1)

Indeed, by geometric considerations, one can see that a triangular tessellation with internodal distance equal to Dm corresponds to a node density: ρm = 1/Am , where Am is twice the area of an equilateral triangle of side Dm . Note that ρm should be such that Dm < Rc . Given (1), hereinafter we use interchangeably inter-nodal distance and node density.

We consider a network composed of N mo-

After deployment, we want the network to

bile sensor-actuator nodes, which are deployed

be able to react to physical phenomena or en-

over a bidimensional geographical region. Let

vironmental disasters (event-based relocation).

us denote with xi (t) the position of node i at

Note that nodes may become aware of such

time t, and with dik (t) the Euclidean distance

events either because they detect a variation

between nodes i and k at time t.

in the standard values measured by their sens-

Network nodes can move at a maximum

ing device (e.g., temperature variation in case

speed of vmax , and have common sensing range

of fire), or because they are alerted by other

Rs and communication range Rc . A node is

nodes through the transmission of notification

able to communicate with the nodes within its

messages. For simplicity, in the following we

6

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

only consider the first case.

this reason, it has also been largely used in the

In the presence of an event, sensors have

literature (see [17] and the references therein).

to relocate themselves so as to provide a new

Note that a high value of si (t) corresponds ei-

desired node density. Similarly to the case of

ther to an event of moderate intensity happen-

self-deployment, the new density is achieved by

ing close to node i, or to a very catastrophic one

specifying a target inter-node distance dTik (t)

occurring far away from the node position. In

(i, k=1, . . . , N).

both cases, some action is required by the nodes

We assume that the target

inter-node distance is a function of the event intensity sensed by each pair of nodes.

detecting the event.

By

Let us denote with Smin the minimum inten-

denoting with si (t) the intensity of the event

sity for detecting an event, and with Smax the

sensed by node i at time t, we have: dTik (t) =

maximum intensity a node can measure with-

f (si (t), sk (t)). In general, f (·) should be chosen

out damage for the device. We model the de-

such that the higher the event intensity detected

tection of an event by the generic node i at

by a node, the higher the target node density

time t by defining a function ψi (t), which can

(i.e., the smaller the target inter-node distance

take three values: {−1, 0, 1}. If no event is

to be used).

detected at time t, then ψi (t) = 0.

When

We model the event intensity as follows. In

the node i senses an event intensity si (t) s.t.:

order to simplify the presentation, let each event

Smin ≤ si (t) < Smax , then ψi (t) = 1. Finally,

have an epicenter (the case of events occurring over an extended area will be considered later).

if si (t) ≥ Smax , ψi (t) = −1. The latter condition allows us to model a node moving away

The signal sensed by the generic node i at time

from the event location to avoid a device dam-

t is given by:

age. Note that, dependently on the value of si (t) =

α(t) die (t)β

(2)

Smax , an empty area can be created around the event epicenter. We denote with De (De ≥ 0)

where die (t) is the Euclidean distance between

the distance from the epicenter at which an in-

the node position xi (t) and the epicenter loca-

tensity of Smax is sensed by a node, i.e., De is

tion at time t, α(t) is the energy emitted by the

the minimum distance that must be kept from

event at the epicenter at time t, and β is the de-

the event.

caying exponent of the event energy. We chose to use this sensing model because, in spite of its

4

The Distributed Algorithm

simplicity, it is able to represent various types of signals (e.g., radio, acoustic, etc.) and physical phenomena (e.g., heat, temperature); for

The proposed distributed algorithm exe-

7

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

cutes both node deployment and event-based re-

events, only exchange and friction forces act on

location, using a unified approach. Nodes are

the nodes, leading the network toward the de-

moved by virtual forces [6,11,,12,13,11,14], de-

sired monitoring configuration. Potential forces

termined only by the relative position of neigh-

instead come into play when an event occurs.

boring nodes and by the presence of an event.

We characterize the three components below.

We remark that, although the idea of virtual forces has been already exploited in many previous works, our specific implementation and goals differ in many ways from existing propos-

• Exchange forces are established between pairs of nodes which are sufficiently close to each other. Given two nodes, say i and ˆ (t) = xk (t)−xi (t) the k, we denote with x ik

dik (t)

als found in the literature. In the following we

normalized vector parallel to the segment

assume that only one event occurs at a time and

linking i to k.

that events do not overlap in time; later we will discuss the case where the event area enlarges over time and the case where multiple events take place simultaneously. 4.1

Sensor

Let Ii (t) be the set of nodes acting with forces on i. A node k belongs to Ii (t) if the distance between i and k does not exceed the communication range:

Movement

and

Virtual

Forces

dik (t) < Rc and there are no other nodes k ′ shielding

At time t each sensor-actuator is moved by

the action of k on i. Node k ′ shields k if k ′

a virtual force that depends on the position of

is closer to i and the angle formed by the

the other nodes and on the event location. The

ˆ ik (t) is smaller than ˆ ik′ (t) and x vectors x

trajectory of node i at time t is driven by the

600 , i.e.,

Newton motion law:

dik′ (t) < dik (t) and

d2 xi (t) = F i (t) dt2

ˆ ik (t) > cos 600 ˆ ik′ (t) · x x

where F i (t) is the virtual force acting on i at

ˆ ik (t) is the scalar product ˆ ik′ (t) · x where x

time t. F i (t) can be defined as the sum of three

ˆ ik (t). We ˆ ik′ (t) and x between vectors x

components:

emphasize that, based on the above conditions, at most six nodes concurrently

F i (t) =

F ei , (t)

+

F pi (t)

+

F fi (t).

(3)

act on node i at each time instant (i.e.,

F ei (t) is the resultant of the exchange forces

|I(i, t)| ≤ 6, ∀t).

among mobile nodes, F pi (t) is the potential force

The force that node k acts on node i de-

and F fi (t) is the friction force. In absence of

pends on the distance between i and k:

8

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

it may be either attractive or repulsive.

where P and Q are positive constants

Given the monitoring distance Dm , the

that do not depend on the event intensity

force is repulsive if dik (t) < Dm , and be-

and such that Q ≫ P . Note that, ac-

comes attractive when dik (t) > Dm :

cording to (5), a far away sensor-actuator

X (dik (t) − Dm ) ˆ ik (t) (4) F ei (t) = Gik (t) x dik (t)(Rc −dik (t)) k∈Ii (t)

In (4), in absence of potential forces the parameter Gik (t) = G is a constant whose value determines the speed of the nodes, while in presence of potential forces Gik (t)

detecting the event will be attracted toward the event location, while nodes sensing an event intensity greater than Smax (ψi (t) = −1) will be pushed away so as to make nodes locate at a distance not smaller than De from the epicenter.

is dynamically updated to achieve the de-

Finally we remark that, if the event ex-

sired node density in the event proximity.

ˆ ie (t) is tends over a closed finite region, x

Note that: F ei (t) → +∞ (i.e., attractive

force) as dik (t) → Rc , while F ei (t) → −∞ (i.e., repulsive force) as dik (t) → 0, and F ei (t) = 0 if dik (t) = Dm . In absence

of potential forces, exchange forces push

the normalized vector parallel to the segment linking node i with the nearest point inside the event region. • Friction forces are essential to make nodes stop around the equilibrium configuration

nodes to form at equilibrium a regular tri-

defined by potential and exchange forces,

angular tessellation of the area, each node

reduce the overall motion, and stabilize

(not on the border) being surrounded by

the system. Motion of node i is affected

six neighbors at distance Dm .

by two friction forces, a static Coulomb

• Potential forces F pi (t) are positional forces that attract/repel nodes toward/from the ˆ ie (t) event epicenter. By denoting with x the normalized vector parallel to the segment linking node i with the event epicenter e, the potential force acting on i at time t can be written as:    0 if ψi (t) = 0   F pi (t) = ˆ ie (t) Px if ψi (t) = 1     −Qˆ xie (t) if ψi (t) = −1

(5)

friction plus a viscous friction. The static Coulomb friction acts while i is still, opposing to the motion. The viscous friction acts while node i is moving, producing a force proportional to its instantaneous speed:    p e  ˆ − min k x (t), F (t) + F (t)  0 0 i i    d x (t) if dti = 0 F fi (t) =      −kv dxdti (t) otherwise

ˆ 0 (t) is the normalized vector parwhere x

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

9

allel to the resultant of exchange and po-

Recall that we want sensor-actuators to re-

tential forces, and k0 and kv are the static

locate around the event with a target density

and the viscous friction coefficient, respec-

(i.e., inter-nodal distance dTik (t)), while preserv-

tively [18].

ing network connectivity. This is achieved as follows. Each node i determines, based on the

4.2

The Algorithm

Next we describe how virtual forces act on nodes during deployment and relocation.

event intensity sensed by itself and by neighborˆ ie (t) directed ing nodes, the normalized vector x toward the event, and modulates the intensity of the exchange forces by dynamically adapt-

Behavior during self-deployment. Recall that, starting from a random topology, the monitoring configuration must be achieved. To this end, nodes use a common target inter-node distance, equal to Dm . Sensor-actuators are therefore moved by exchange forces, whose direction and intensity are determined by the current value and the monitoring value of the inter-

ing Gik (t) so as to reach, at the equilibrium, the target inter-nodal distance. More specifically, Gik (t) is computed exploiting a first order Proportional Integrative (PI) controller driven by the error between the current distance dik (t) and the target value dTik (t) [19]. Notice that our solution does not require global knowledge of the absolute position of the event.

nodal distance. Clearly, since no event is taking place, potential forces are null. Self-deployment terminates when all nodes have reached an equilibrium configuration in which the force F i (t) acting on each node i is null.

Behavior when an event ends. As soon as an event ends, the potential forces become zero and the nodes reset Gik (t) to the constant value G. Sensor-actuators are therefore moved by exchange forces only, as during self-deployment,

Behavior in the absence of an event. In absence of events the network maintains the equilibrium configuration reached during selfdeployment.

and the monitoring network configuration is restored. 4.3

Implementation Issues To implement our algorithm, we consider

Behavior in the presence of an event.

time to be discretized into fixed slot intervals.

When an event takes place, a potential force is

Within each interval, every node computes the

generated which triggers the nodes’ movement.

virtual forces acting on itself, thus determining

The monitoring configuration is therefore bro-

the direction and the speed of its movement dur-

ken and exchange forces arise again.

ing that time slot, independently of the other

10

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

nodes. Virtual forces with a too small inten-

5

Performance Evaluation

sity are neglected to avoid useless movements, while the node speed is clamped by the maxi-

In this section, first we analyze the performance of our algorithm during self-deployment;

mum value vmax .

we assume that no events occur during this phase, although our algorithm could handle To compute the exchange forces, each node

events even during the initial deployment.

must be aware of the relative positions, in terms

Then, we consider the event-based relocation,

of distance and direction, of the nodes located

and focus on the most critical case in which one

inside its communication range.

or more events take place outside the area oc-

This infor-

mation can be obtained by a sensor through

cupied by the sensors.

standard techniques, such as those based on the measurement of the RSSI and the direction of arrival (DoA) [20] of the signals received from the neighbors. Clearly, depending on the employed techniques, the estimates may be affected by significant errors; we will account for such inaccuracies while evaluating the performance of our scheme.

5.1

Self-deployment

We first show a typical example of how the system behaves when we start from a random topology. We fix the sensing range Rs = 1. The monitoring distance Dm is assumed to be √ equal to 3, corresponding to the triangular tessellation maximizing the area fully covered by the network (i.e., all points within the net-

In addition, to cope with events, nodes must acquire the direction of the event epicenter with respect to their current position. Since we are dealing with physical phenomena, this information can be acquired either independently by each sensor locally estimating the direction along which the sensed signal si (t) exhibits the steepest variation, or through explicit signaling by the sink. The latter approach has the advantage to trigger the movement also of those sensors which, being too far away from the event epicenter, are not able to directly sense it.

work are sensed by at least one node). We consider N = 400 mobile sensor-actuators that are initially placed uniformly at random within a √ 2 3/2 (the expected size of disk of area NDm the area covered by the triangular tessellation), as shown in the left plot of Figure 1.

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

11

Figure 1: Initial and final locations of N = 400

must be larger than zero so as to stop the system

nodes: initial random placement in a disk ac-

movement. Indeed, some dissipative forces are

cording to the uniform distribution (left); mon-

required to gradually reduce the internal energy

itoring configuration after deployment (right).

of the system, allowing it to stabilize around an

The communication range Rc is set to 3

equilibrium point (if kv = 0 the system oscil-

(the system behavior is not really affected by

lates indefinitely around one or more equilib-

this parameter, provided that it is sufficiently

rium point, see [21]). We found that 0.1 is a

larger than Dm ). We run our algorithm with

suitable value for kv in all considered scenar-

G = 0.01, kv = 0.1, vmax = 0.01, k0 = 1e-5,

ios, thus we will no longer discuss the impact

and we assume no measurement errors. After

of this parameter.

490 time stepsAn animated picture of the tran-

small amount of static friction (i.e., k0 > 0)

sient behavior is available at [21], all nodes stop

is also necessary to bring the system to a com-

moving, and the system reaches the monitor-

plete stop within finite time. Note that, using a

ing configuration depicted in the right plot of

minimum force threshold that prevents a node

Figure 1.

from starting to move in response to arbitrarily

We observe that the final configuration is close to a triangular tessellation, although the

Finally, we found that a

small forces is a reasonable design choice to save energy.

structure is not perfect and presents some ir-

To assess the quality of our algorithm, we

regularities. However, the ‘holes’ that naturally

consider the following metrics: i) the network

appear as a consequence of a random initial de-

coverage achieved after the system reaches the

ployment (see left plot of Figure 1) are stopped,

monitoring configuration; ii) the time and en-

and the whole area is covered almost uniformly.

ergy required to reach the monitoring configu-

A few observations about the choice of pa-

ration (transient behavior). While evaluating

rameters. For a given value of vmax (that de-

these metrics, we discuss the effect of a few pa-

pends on the device technology), the duration

rameters and the impact of measurement errors.

of the transient essentially depends on the intensity of the forces exchanged by the nodes, which

5.2

Coverage

is proportional to G. In our example, we chose

Since the algorithm does not achieve a

a quite large value of G, so that nodes react

perfect triangular tessellation, it is important

rapidly to changes in their neighborhood and

to quantify how the equilibrium configurations

tend to move at the maximum possible speed of

reached by the algorithm differ from the ideal

vmax . We investigate the effect of G in more de-

triangular tessellation (which provides the opti-

tail in the following. The viscosity coefficient kv

mal coverage).

12

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X G = 0.001 - no errors G = 0.01 - no errors G = 0.001 - errors G = 0.01 - errors

ues of G (namely, 0.01 and 0.001), as well as the

triangular lattice random deployment network area

presence or not of measurement errors. Mea2

100

surement errors are modelled as follows: dis-

1.6 90

1.4

85

1.2

80

1

75

0.8

70

0.6

65

0.4 1.2

1.4

1.6

1.8 Dm

2

2.2

Network Area

Coverage Percentage

1.8 95

2.4

tance errors follow a uniform distribution with zero mean and maximum value equal to 5% of Dm [22], while angle measurements are independently introduced according to a uniform distribution in the range ±10◦ [20]. In presence of errors, the static friction coefficient k0 has to be

Figure 2: The fraction of area covered (left y axes) and the network size (right y axes) as functions of the monitoring distance Dm , for

chosen so that the worst possible error in the location of neighbors does not make a sensor resume moving.

different node deployments. In Figure 2 we show the percentage of the area covered by at least one node as a function of the monitoring distance Dm (the sensing range is fixed to 1), for several deployment strategies and N = 400. The thick solid line

Coverage Percentage Deficit

6

no errors errors

5 4 3 2 1

corresponds to the regular triangular tessella-

0 1

1.2

1.4

tion, for which the coverage percentage is 100% √ up to Dm = 3 = 1.732; after this point the coverage decreases for increasing values of Dm , and can be computed using elementary geometry. The lower dotted line with error bars corresponds to the coverage achieved if nodes are just randomly deployed over the area and do

1.6

1.8

2

2.2

2.4

Dm

Figure 3: Difference between the fraction of area covered through a perfect triangular tessellation and our algorithm. Results are plotted versus the monitoring distance Dm for G = 0.001, with and without errors.

not move from their initial location. The cov-

In Figure 3 we present the difference (in per-

erage percentage is computed using a Monte-

centage) between the fraction of area covered

Carlo technique and averaging the results over

by the triangular tessellation and our algorithm.

30 experiments (error bars refer to 95%-level

We set G = 0.001, and we consider the two cases

confidence intervals). In between the above two

with and without measurement errors. Again,

extreme cases there are results related to four

error bars refer to 95%-level confidence inter-

variants of our algorithm: we consider two val-

vals.

13

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

Looking at Figures 2 and 3, we observe that

5.2.1 Transient Behavior

the difference in performance of our solution with respect to a perfect triangular tessellation

To evaluate the performance of the algorithm

is very small, i.e., about 5% in the worst case as

during the transient phase, we consider both the

shown in Figure 3. Also, the algorithm performs

amount of time taken to reach the equilibrium,

slightly better (i.e., it is closer to the perfect

and the energy spent by nodes to move from

triangular tessellation) when errors are present

their initial location to their final position. The

and when G is small (see Figure 2). Note that

first metric is meaningful if one wants to mini-

the difference in performance with and without

mize the duration of the deployment phase; the

errors is not caused by the inaccuracy affect-

second metric is probably more relevant, since

ing the simulation results, as confirmed by the

sensors usually have severe energy limitations.

confidence interval reported in Figure 3. Intu-

By assuming that the energy required to move a

itively, the impact of errors can be explained

node is proportional to the traveled distance [8],

considering the equivalent effect played by tem-

we can focus on the total movement performed

perature in simulated annealing: local vibra-

by the nodes to reach the final configuration.

tions increase the probability of avoiding spuri-

We compare our distributed algorithm with

ous equilibrium points thus resulting in a more

an optimal centralized one, i.e., the algorithm

regular monitoring configuration. A small G

that instructs each sensor-actuator to move in

also reduces the responsiveness of the system

such a way that the aggregate movement per-

away from the equilibrium point, helping to ex-

formed by all nodes to reach the final topol-

plore more patiently the solution space. Note

ogy is minimized.

that, to obtain a coverage percentage closer to

duces to finding the minimum weighted match-

100%, one could just reduce the monitoring dis-

ing (mWM) of a bipartite N x N graph, where

tance Dm (e.g., use Dm = 1.4). However, a

N vertices correspond to the initial locations of

perfect coverage cannot be always guaranteed,

the nodes, and N vertices correspond to their

moreover this strategy has the important draw-

location in the final configuration. We draw an

back of reducing the size of the network area: in

edge between any vertex in the first set to any

Figure 2 the curve labeled ‘network area’ (right

vertex in the second set, with associated weight

y axes) actually serves as a reminder that the √ network area (normalized to 1 at Dm = 3) is

equal to the Euclidean distance between the cor-

proportional to the square of Dm , thus a trade-

putes which node goes where, i.e., the identity

off exists between coverage percentage and net-

of the location where each node has to go so as

work size.

to minimize the aggregate movement. Finally,

The optimal solution re-

responding locations. Then, the mWM com-

14

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

down the system dynamics using a small G:

till it reaches its final position.

by doing so, the total movement (and thus

Total Movement

each node moves at the maximum speed vmax

350

350

300

300

250

250

200

200

150

150

100

100

50 0

100

200 Time

also the achieved percentage of covered area is higher (see Figure 2).

50

algorithm - G = 0.01 MWM

0

the node energy expenditure) is reduced, and

0 300

400

5.3

algorithm - G = 0.001 MWM 0

400

800

1200

1600

2000

Time

Event-based Relocation

We now evaluate the performance of our algorithm in relocating the nodes when one or

Figure 4: Comparison of the proposed algorithm with the centralized, optimal one that minimizes the total movement performed by the nodes. We consider the example scenario with N =

more physical events are detected. We consider the event intensity to have a circular symmetry around the epicenter, although this is not a requirement for our algorithm, and we set the parameter P of the potential force to 0.01.

400 and initial topology as shown in the left plot

Recall that our goal is to make sensor-

of Figure 1. To obtain a fair comparison, the

actuators move toward an event, and possibly

final configuration for the mWM solution is as-

surround it, while achieving a target node den-

sumed to be the one achieved by our algorithm

sity (i.e., inter-nodal distance dTik (t)) and pre-

at the equilibrium (e.g., for G = 0.01, the one

serving network connectivity. In the following,

shown in the right plot of Figure 1). In Figure

we take the target density to be proportional to

4, we compare our algorithm with the central-

the local intensity of the event (2). More specif-

ized, optimal one for two different values of G,

ically, we assume that the desired density on the

namely 0.001 and 0.01. When G = 0.01, our

frontier of the event (i.e., where si (t) = Smax )

algorithm produces about twice the total move-

is W times larger than the monitoring density

ment and takes about twice the time to reach

ρm , and it decays as the event intensity. Thus,

the final configuration, with respect to the opti-

the target density computed by node i at time

mal solution. When G = 0.001, the total move-

t is:

ment produced by our algorithm is reduced (still 75% more of the total movement obtained with

ρTi (t) = ρm



si (t) 1 + (W − 1) Smax



(6)

mWM), but the duration of the transient is sig-

To compute the target inter-nodal distance

nificantly increased (note the different x scale).

dTik (t), each sensor-actuator i first collects the

We conclude that, when the deployment du-

event intensity sk (t) sensed by its neighbor k.

ration is not crucial, it is convenient to slow

Then, assuming a perfect triangular tessellation

15

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

(1) and using the target density defined in (6),

that all nodes are able to detect the event since

it derives dTik (t) as:

it starts, i.e., si (t) ≥ Smin ∀i, t.

dTik (t) =

1 √ 3



1 1 + ρTi (t) ρTk (t)



20

initial 40

We start by considering the case of a single

0

30

event, occurring after the network deployment,

-10

and evaluate the performance of our algorithm both at the equilibrium and during the transient phase. We assume that the event epicenter is located outside the initial area in which nodes are

Y

10

-20 -30 -40

final -50 -50

-40

-30

-20

-10

0

10

20

X

deployed (for a single event whose epicenter is located inside the initial area, even better re-

Figure 5: Initial and final configuration ob-

sults than those presented here are obtained).

tained by the algorithm in case of event epi-

The case of an event area that enlarges over

center at [−30, 30], W = 2, β = 2 and De = 6.

time and the case of multiple events overlap-

Looking at Figure 5, we observe that the re-

ping in time are considered at the end of the

location takes place successfully, and nodes sur-

section.

round the event getting denser as the distance from the epicenter decreases. To verify that the

5.3.1 At the Equilibrium

target density is indeed achieved, we compute

Figure 5 shows the topology obtained

the theoretical number of nodes, NT (d), that

through self-deployment and the final topology

are expected to fall within distance d from the

achieved by our relocation algorithm, for the

epicenter. NT (d) can be obtained by integrat-

same parameters of the scenario in Figure 1

ing the target density defined above, over a ring

(N = 400 nodes). The event occurs at position

with inner radius De and outer radius d. Figure

[−30, −30], and is characterized by α(t) = 1

6 shows the good match between the number

and β = 2 (see the event model in (2)). The

of nodes counted on a single experiment within

parameter W in the target density is set to 2,

disks of increasing radius d, and the correspond-

while Smax is such that the minimum distance

ing theoretical value NT (d), for different combi-

De from the epicenter at which the nodes can

nations of W and β. We observe that poten-

be located is equal to 6. Note that, assuming an

tial forces tend to greatly compress the nodes

event with circular symmetry, the event frontier

in proximity of the event; it follows that the lo-

turns out to be a circle of radius De , centered

cal adaptation of the parameter Gik (t) in the

at the epicenter. Furthermore, here we assume

expression of the exchange forces (4) is indeed

16

J. Comput. Sci. & Technol., Month 200X, Vol.21, No.X

necessary to obtain the desired density.

350 300 Number of Sensors

node, and use this point as the event epicenter

β = 1 - W = 3 - algorithm β = 1 - W = 3 - target β = 2 - W = 2 - algorithm β = 2 - W = 2 - target W = 1 - algorithm W = 1 - target

400

imum distance from the current position of the

for the sensor. Again, the event is characterized by α(t) = 1 and β = 2, while the tar-

250

get density W is set to 2. As can be observed,

200

relocation occurs successfully also in this case:

150 100

sensors completely surround the event, meeting

50

the desired node density. Note that the sen-

0 0

5

10

15

20

Distance from Epicenter

Figure 6: Number of nodes within distance d from the epicenter (in the final configuration),

sors maintain the safe distance De = 6 from the nearest point along the segment on which the event takes place.

for different values of W and β. Comparison between algorithm performance and theoretical target values. 20 15

5.3.2 Transient Behavior 10

Y

5 0 -5

The performance of our relocation algorithm

-10

during the transient phase is compared against

-15

the results provided by the optimal, central-

-20 -20

-15

-10

-5

0

5

10

15

20

ized mWM solution (as in Section 5.3.2). We

X

consider the same scenario as for Figure 5. To Figure 7: Final locations of N = 400 nodes

get a fair comparison, the initial and final net-

when the event taking place in the area is not

work configurations are assumed to be the same

characterized by rotational symmetry.

for both our algorithm and the mWM solution.

Figure 7 shows the final topology of the sen-

Also, by setting De = 6, the mWM trajecto-

sor network when the event is not characterized

ries are constrained to pass at a distance not

by rotational symmetry. In particular, we con-

smaller than 6 from the event epicenter; this

sider an event which occurs along a segment,

implies that the optimal trajectory to reach a

from point (-6,0) to point (6,0). In this case,

position behind the event consists of two seg-

at each time step we consider, for each sensor,

ments connected by a piece of arc belonging to

the point along the segment which has the min-

the circular event frontier of radius 6.

17

M. Garetto et al.: Sensor Deployment and Relocation: A Unified Scheme

the shortest path toward a final position located

Number of Sensors

400 algorithm mWM 350

d < 18

behind the event.

300 250

So far we have assumed that all nodes can

d < 12

detect the event since it begins. However, our

200 150

d

Suggest Documents