- Research
- Open Access

# A novel coverage algorithm based on event-probability-driven mechanism in wireless sensor network

- Zeyu Sun
^{1, 2}, - Weiguo Wu
^{1}, - Huanzhao Wang
^{1}Email author, - Heng Chen
^{1}and - Xiaofei Xing
^{3}

**2014**:58

https://doi.org/10.1186/1687-1499-2014-58

© Sun et al.; licensee Springer. 2014

**Received:**7 November 2013**Accepted:**31 March 2014**Published:**14 April 2014

## Abstract

Coverage problem is an important research topic in the field of wireless sensor network (WSN). The coverage algorithm based on event probability driven mechanism (EPDM) is put forward in this paper. First of all, the network probability model is established and the subordinate relation between sensor nodes and the target nodes is presented. Secondly, a series of probability is computed and the related theorems and reasoning are also proven. Thirdly, effective coverage for the monitoring region is achieved through scheduling mechanism of nodes themselves, thus the purpose of increasing network lifetime can be realized. Finally, experimental results show that the proposed algorithm could achieve complete coverage for networks of different scale and increase the network lifetime. It possesses the good quality of effectiveness and stability.

## Keywords

- Wireless sensor network
- Event probability
- Coverage algorithm
- Sensor nodes

## 1 Introduction

Wireless sensor network (WSN) is a wireless distributed network system, composed of large amount of self-organized microsensor nodes which are integration of data collecting, processing and transmission units and power supply units, and performing the functions of information collecting, data processing, and transmission. What is more, WSN is mainly applied in the field of military defense, environment monitoring, medical care, intelligent home, agriculture, and transportation, etc. WSN compromises the information world and physical world and changes the interactive mode between the nature and human being [1–3]. At present, WSN has received the attention from all fields and brought immeasurable benefits to the society. Besides, it arouses the research warmness for WSN technology. WSN works in poor environment in which sensor nodes are usually deployed in the monitoring region through random spreading [4, 5]. Distribution of sensor nodes is very uneven. The energy of it is limited and cannot be recharged. Therefore, it needs considering first to prolong the network life by adopting effective energy-saving coverage method and energy-consuming balance mechanism in the research and designing of WSN [6–8]. In wireless sensor networks, the ultimate goal of coverage is to allocate each node's state efficiently, minimize the network's energy consumption in each cycle, and balance the share of each node's energy consumption in the network without reducing the existing level [9]. The coverage directly reflects the capability of network to monitor the physical world, and energy consumption determines the lifetime of the wireless sensor networks. Network coverage and energy consumption are closely related.

According to the mobility property of the node, the coverage problem that is an important topic in the wireless sensor network can be divided into two classes: static nodes and mobile nodes [10, 11]. Therefore, according to the constitution of nodes, WSN can be divided into two types: static and mobile. A hybrid WSN can be established by mixing the static and mobile nodes in the same WSN. The static sensor network refers to the network composed of only static nodes. Its cost is low. But the static nodes have many limitations and cannot meet the requirement of actual application. The mobile sensor network is composed of only mobile nodes and has good mobility. However, the mobile nodes usually undertake more tasks than static ones and are equipped with special mobility modules. Thus, the components of mobile nodes are much stronger than static ones. Big size and high cost make it less possible to apply in the real situation. The hybrid sensor network is constituted of both static and mobile nodes. Its advantages include low cost, good mobility, and the most frequent application.

The structure of hybrid sensor network is almost identical with WSN, but a certain amount of mobile sensor nodes with mobility property makes the cost slightly higher than traditional WSN. However, the number of mobile nodes can be set according to specific application, and the cost can be limited in the affordable range. Due to the merits of hybrid sensor network, the related researches are more than other researches. More often than not, hybrid sensor networks are studied in the research of WSN, such as coverage and connectivity, location, routing, data fusion, etc. All the problems in the networks can be solved in better ways in hybrid sensor networks by using the mobile nodes, such as coverage. If mobile nodes in mobile sensor network are relocated, the nodes can be distributed more evenly and the coverage hole can be filled. By this way, the quality of coverage in the network can be improved.

The rest of this paper is organized as follows. (1) After related literature is reviewed, the main idea of coverage algorithm is introduced. Based on event probability, the model of WSN is established. (2) The process is verified through function relationship of Poisson distribution, normal distribution, and the probability density for the edge nodes in the WSN. (3) The coverage rate under certain condition can be determined through the state transition of nodes and the associated attributes between sensor nodes and target nodes. Therefore, the overhead of node energy can be decreased and dynamic allocation can be achieved. (4) As to network energy, the targets in concern are always located in the sensing range of the working nodes by employing the dynamic allocation mechanism. The state transition of nodes can be finished through scheduling mechanism; thus the dynamic adjustment of nodes can be realized. The overall network energy can be kept in balance. (5) In the final part of this paper, the schematic diagram of coverage rate and network energy changing with time under different variable system through simulation is presented. The study process is summarized, and the future work is forecasted.

## 2 Related works

A lot of studies and verifications have been done on the coverage algorithm of WSN in recent years in China and abroad. A superimposed cycle was established by means of semi-Markov, and the network model was constantly updated. When the target was covered by several sensor nodes, the target should be ensured to be covered by at least one sensor node. Then, a suitable random network configuration should be found to promote coverage performance of the overall network [12]. The deployment of information coverage and random coverage was conducted by using the sensor density relation, and the upper bound value of probability was given to calculate that of information coverage and the events [13]. The stochastic scheduling algorithm was studied, including simulation of network coverage intensity, delay detection and probability of detection. Bounded detection delay, detection probability, and network coverage intensity with constraints of network life cycle QOS [14]. A distribution method was proposed to provide complete coverage performance with the help of random scheduling, including random partitions and coverage improvement. The Voronoi polygon method and the disk coverage calculation rule were used [15]. For the WSN with intensively-distributed nodes, a coverage control protocol named ‘node self-scheduling’ was proposed. Nodes in the network were firstly divided into many disjoint sets to ensure complete coverage of the target area; then these sets of nodes shifted their state between ‘active’ and ‘sleeping’ [16]. Berman improved Slijepcevic’s thought. He did not require disjoint of nodes sets, allowing each nodes set work for a certain time. Besides, the partial coverage was also considered. In this way, more node sets could be divided and the network lifetime could be prolonged [17]. Tian improved Slijepcevic with back-off mechanism, and the network lifetime could be effectively prolonged. Emergence of network coverage hole could be avoided. Redundant nodes could be reduced. The network could be fully covered, and a certain sensing reliability could be maintained. However, this rotation mechanism only applied to nodes of two-dimensional perceptual model. It was not suitable for nodes in the probability perceptual model. And there would be some additional costs for the network, such as the requirement of knowledge of node position and synchronization of the network time [18]. A coverage algorithm based on graph coloring strategy, which aimed at finding the maximum disjoint advantage set, could effectively prolong the lifetime of WSN, but it required that all the nodes in the set must not be disabled [19]. In the covering process, the requirements for target node coverage were different. Based on this, a network configuration protocol (CCP) was proposed, which minimized the number of working nodes, with the precondition of ensuring the network coverage rate. Two greedy algorithms, centralized and distributed, were also proposed respectively by combining CCP and SPAN in order to ensure network coverage and connectivity [20]. From the perspective of border coverage, a centralized and polynomial time detection algorithm was proposed. It adapted to the environment in which positioning and monitoring capability or fault tolerance was highly required [21]. As for target coverage, what we should resolve is that *m* targets of known position were given and *n* monitoring nodes were deployed. Due to the limited energy of every sensor node, it was a problem on how to deploy nodes in a reasonable range and how to maximize the network lifetime on the basis of target monitoring. Cardei and Du put forward a heuristic algorithm by using mixed integer programming [22]. Then, they discussed the coverage problem in the case of node sets intersection and adjustable sensing radius of node. When the targets' density was high, Cardei approximated the target coverage as region coverage and realized the connectivity coverage of the target through establishing a connected set of nodes with the help of sensing nodes in high density. Based on the studies of Cardei, Liu and other researchers further studied the target coverage problem. He constrained one node to cover only one target each time [23]. It could be ensured that target coverage problem could be resolved effectively in polynomial time. Wu et al. proposed a protocol which constructed distributed localization of connected dominating set and discussed methods of dominating set coverage with efficient energy. To balance the network energy consumption, a method of selection coverage nodes was presented through remaining energy level [24]. Through the above methods, only static nodes were used to cover the target continuously, but in some applications, it was not necessary to provide continuous coverage of target. It would be much more efficient to use some of mobile nodes than just use static nodes. A polynomial approximation algorithm was presented by constructing a minimum spanning tree [25]. It was also discussed how to reduce the number of nodes and how to determine the position of nodes to cover a given target in the secure and controllable network environment. In addition, the connectivity of network must be ensured [26].

## 3 Statement of the problem and the network model

- (1)
The communication range and sensing range of wireless sensor nodes are disc-shaped. The position of each node can be obtained through some positioning algorithm.

- (2)
The nodes in the WSN are morphologic and independent. Each node has the same sensing range but different communication range.

- (3)
All the nodes in WSN are randomly deployed in a square area. The border factor and the condition in which the border exists should also be considered.

- (4)
At first, each node has the same energy and they are in the same status in the network.

### 3.1 Basic definitions

**Definition 1** The fact that some area is covered by the node s_{i} means any point p in this area is within the coverage of s_{i}. That is: As_{i} = {p|d(p, (x, y)) ≤ r_{s}, i ∈ [1, n]}. d is the Euclidean distance between two points. r_{s} is the sensing radius of nodes. n is the number of nodes.

**Definition 2** The coverage rate of WSN in W deployed in target area *Ω*, is C_{i}(W, *Ω*) = ∫ _{Ω}s(x_{i})dx/S(Ω). S(Ω) is the area of the target region, when D(s_{i}, t_{k}) ≤ 1, S(Ω) = 1, otherwise, S(Ω) = 0.

**Definition 3** There exist node s_{i} and s_{j}. The target regions they covered are Ω_{i} and Ω_{j}, respectively. if Ω_{i} ∩ Ω_{j} ≠ then node s_{i} and s_{j} is regarded to be coverage related.

### 3.2 Network model

- (1)
What is the relation of the associated attributes between wireless sensor nodes and target nodes?

- (2)
For target nodes, how to denote the relationship of wireless sensor nodes and the target nodes?

- (3)
What is the relationship between the area of blind region and that of wireless sensor nodes?

- (4)
How to compute the coverage level, density functions, and the expectation value of the nodes in WSN?

- (5)
How to determine the coverage of target area with the least deployed nodes by using the probability expectation value? How to realize scheduling mechanism of sensor nodes?

The associated attributes between wireless sensor nodes and target nodes

Associated sensor nodes | Associated target nodes | Associated sensor nodes | Associated target nodes | Associated sensor nodes | Associated target nodes |
---|---|---|---|---|---|

S | 1 | S | 23 | S | 27 |

S | 1, 3, 4 | S | 12, 14, 22 | S | 43, 44, 45 |

S | 1, 2, 3 | S | 11, 14, 15, 21 | S | 42, 43 |

S | 8, 9 | S | 9, 16 | S | 39, 40, 41 |

S | 3, 4, 5, 8 | S | 33, 34 | S | 29, 30, 39, 40 |

S | 5, 6, 7 | S | 20, 33 | S | 30, 31, 32, 38 |

S | 8, 9, 10 | S | 21, 31 | S | 32, 35, 37, 38 |

S | 7, 10, 11, 17 | S | 22, 28, 29 | S | 35, 37 |

S | 13 | S | 25, 26, 28 | S | 35, 36, 38 |

S | 12, 13 | S | 26, 27 | S | 36, 39 |

S | 18, 19, 23 | S | 19 | S | 45, 46 |

From Table 1, we can see that each target node is covered by one or more sensors, and the coverage degree for each target node is not the same. When the target node is covered by multiple sensor nodes, it may be the main target node being concerned, but if it is covered by multiple sensor nodes (*K* ≧ 2), it may not be the one being concerned. Some sensor nodes can be put into a dormant state in order that the energy consumption of the sensor nodes can be reduced. This will be further explained in the subsequent chapters.

The coverage association between wireless sensor nodes and target nodes

Associated target node | Associated sensor node | Associated target node | Associated sensor node | Associated target node | Associated sensor node |
---|---|---|---|---|---|

1 | S | 16 | S | 31 | S |

2 | S | 17 | S | 32 | S |

3 | S | 18 | S | 33 | S1 |

4 | S | 19 | S | 34 | S |

5 | S | 20 | S | 35 | S |

6 | S | 21 | S | 36 | S |

7 | S | 22 | S | 37 | S |

8 | S | 23 | S | 38 | S |

9 | S | 24 | S | 39 | S |

10 | S | 25 | S | 40 | S |

11 | S | 26 | S | 41 | S |

12 | S | 27 | S | 42 | S |

13 | S | 28 | S | 43 | S |

14 | S | 29 | S | 44 | S |

15 | S | 30 | S | 45 | S |

From Table 2, we can see that each target node is covered by one or more sensors and the coverage degree for each target node is not the same. When a target node is covered by multiple sensor nodes, multiple coverage is formed. For example, target node 8 is in the coverage range of S_{4}, S_{5}, S_{7} and the degree of the coverage is 3. If the coverage degree for a target node is higher than needed, there must exist many redundant nodes. This will consume much energy of the entire network, and the network lifetime will be decreased. With the increasing of sensor nodes, more than one target nodes are most likely to be in the multiple coverage area. Large sum of redundant nodes will be generated with the precondition that a certain coverage degree can be realized. In order to avoid the existence of many redundant nodes, all the sensor nodes should be put in different states and the transition of different states should be accomplished.

### 3.3 The formation and calculation of the curve locus

**Definition 4** Given the target set T = {t_{1}, t_{2}, t_{3} … t_{k}} and sensor node set V = {v_{1}, v_{2}, v_{3} … v_{n}} in a certain time slot, if any node t_{k} in target set T is covered by at least one node in node set V, then it is called full coverage of target set T.

**Definition 5** Let T be the set of m nodes distributed randomly in the target area. Let E be the edge set of the network graph, which represents set of positional relationship of e_{ij}: e_{i} = t_{j}. e_{ij} indicates the position of node *s*_{
i
} and target node t_{j}. When e_{i} = 1 if and only if the Euler distance between target node *t*_{
j
} and sensor node *s*_{
i
} is less than or equal with the sensing radius r_{i}, otherwise e_{i} *= 0*. W = {w_{1}, w_{2} ⋯ w_{n}} is the initial energy set of the sensor nodes. W conforms to W ~ N(u, σ^{2}) normal distribution. w_{i} represents the initial energy of sensor node s_{i}, *and* w_{i} is the maximum energy in the working process of nodes.

*X*-axis and

*Y*-axis is established. The shadow, part of the figure of sensor node 9 and 11, and sensor node 30 in the lower left corner of Figure 1 are shown in Figure 2.

*X*and

*Y*-axes are made through the center of node 9 and 11. The point of intersection is the original point. Let a and b be the center of the sensors 9 and 11, respectively. Connect a and b. Let c be the cut point, e be the intersection point of

*X*-axis and the walk trajectories of moving target nodes, and d be the intersection point of

*Y*-axis and the walk trajectories of moving target nodes. The coordinates of the point a are (

*x*

_{a}, 0), the coordinates of point b are (0,

*y*

_{b}). Because point c is the outer cutting point of sensor node 9 and 11, the coordinates of c are (0.5

*x*, 0.5

*y*). The coordinates of point e are (

*x*

_{a+r}, 0). The coordinates of point d is (0,

*y*

_{b+r}). The shadow area is the enclosure of mobile target nodes with

*X*-axis and

*Y*-axis minus the area of the bottom corner and the circle. As for the area of the bottom corner, curve equation can be presented by means of data fitting. Let b ∈ [0, 1], the curve equation is as follows:

The area of the shadow is as follows:

**Theorem 1** *Without loss of generality, if the empty hole exists and its curves* f*(x) and* g*(x) are continuously differentiable, then the absolute value of its empty area difference is not less than the sum of the area of the two fan-shaped out-cut regions.*

*Proof* As is shown in Figure 2, the *X*-axis and *Y*-axis coordinate is moved horizontally to o′, and a new coordinate X′-axis and Y′-axis is formed. The sensor node 9 and Y′ intersect at m and n, where the angle formed is β; similarly, the sensor node 11 and the axis X′ intersect at point g and f. Its angle formed is α. Because the empty hole exists S ≥ 0, ΔS = |S_{1} − S_{2} − S_{
fan
}| ≥ 0, according to formula (3) and (4), the following result can be conducted:

When ${\mathit{S}}_{\mathrm{fan}}=2\mathit{\pi}{\mathit{r}}^{2}-\frac{1}{2}{\mathit{r}}^{2}\left(\mathit{\alpha}+\mathit{\beta}\right)$ is put into formula (5), the result is as follows:

Because of the existence of the empty hole, there exists ΔS ≥ 0. Consequently, the ultimate result is conducted as follows:

From theorem 1, the conclusion can be drawn: if {0 ≤ α ≤ π} ∩ {0 ≤ β ≤ π}, the area of the empty hole needed to fill is at least 2πr^{2}. If angles α and β are in the range of [π, 2π], the area needed is at least πr^{2}.

**Theorem 2** *Without loss of generality, if the holes exist, i.e.,* x *≥ 0 and is continuously differentiable in the range of [0, a]. Besides, if the track equation of the hole satisfies*${\mathit{f}}_{\mathit{n}}\left(\mathit{x}\right)={\displaystyle {\int}_{0}^{\mathit{x}}{\mathit{f}}_{\mathit{n}-1}\left(\mathit{x}\right)}\mathit{dx}$*, then progression*$\sum _{\mathit{n}=0}^{\mathit{\infty}}{\mathit{f}}_{\mathit{n}}\left(\mathit{x}\right)$*must be absolute convergence in the range of [0, a]*.

*Proof* Because x ≥ 0 and it is continuously differentiable in [0, a], |f_{0}(x)| is continuous in [0, a] and there is the maximum value of |f_{0}(x)| in the range of [0, a]. Let *M* be the maximum value, $\mathit{M}=\underset{0\le \mathit{x}\le \mathit{a}}{max}\left|{\mathit{f}}_{0}\left(\mathit{x}\right)\right|$. Because:

Because |f_{0}(x)| is continuous in [0, a], there exists the maximum value, *M* of |f_{0}(x)| in [0, a]. Consequently:

Because formula (9) is convergent when x ∈ [0, a], $\sum _{\mathit{n}=0}^{\mathit{\infty}}\left|{\mathit{f}}_{\mathit{n}}\left(\mathit{x}\right)\right|$ is convergent, i.e., $\sum _{\mathit{n}=0}^{\mathit{\infty}}{\mathit{f}}_{\mathit{n}}\left(\mathit{x}\right)$ is absolute convergent.

### 3.4 Coverage area and its expectation value

In the following sections, the relationship between the coverage area and its expectation value is analyzed through the example of sensor node 30 (node p) in the lower left corner.

A is shown in Figure 2; the square region l is divided into two parts: region I and region II. The nodes are randomly deployed in the monitoring region and constituted in a limited set S. The coverage area of each node is E(C). The coverage probability of each node is E(C)*/* Ω. If S is empty, the coverage rate of the deployed *n* nodes is P(S) = (1 – E(C)*/* Ω)^{n}. When set S is not empty, the value of coverage probability of network nodes is as follows:

When node number n → ∞, $\underset{\mathit{n}\to \mathit{\infty}}{lim}\mathit{E}\left(\mathit{P}\left(\mathit{S}\right)\right)=1$. This means that when the number of nodes is large enough, the monitoring region will be fully covered. Considering the boundary effect, the node coverage area and its expectation value is to be solved. Because the square region is divided into regions I and II, according to the definition of expectation value in probability theory, the expectation value of nodes coverage area in the network can be conducted as follows:

P(Ω_{
Ι
}) and P(Ω_{
ΙΙ
}) denote the probability of the node randomly deployed in region I and region II, respectively. $\mathit{E}\left({\mathit{C}}_{{\mathit{\Omega}}_{\mathit{{\rm I}}}}\right)$ and $\mathit{E}\left({\mathit{C}}_{{\mathit{\Omega}}_{\mathrm{{\rm I}{\rm I}}}}\right)$ represent the corresponding coverage expectation, respectively. Because the deployment of sensor nodes follows uniform distribution, thereby the following result is obtained:

Assuming node p is inside region *I*, its coverage range is completely contained, so the coverage expectation is as follows:

When node p is inside region II, the area is that of its sensing circle minus that of arch region *S*_{ACBD}. A and B is the intersection of the sensing circle of node p and the network border. Its angle θ is the central angle formed by node p, point A and point B, i.e., ∠ApB = θ. The central angle θ = 2 arccos y/r_{s}, then formula (14) is obtained:

**Theorem 3** *Supposing that the given sensor nodes with sensing radius* r_{s}*are uniformly distributed in the square region with side length of* l*, considering the boundary factors, the coverage expectation of each node is as follows*:

*Proof*Because the sensor nodes follow uniform distribution, from formula (11), the coverage expectation is as follows:$\mathit{E}\left(\mathit{C}\right)=\mathit{P}\left({\mathrm{\Omega}}_{\mathrm{{\rm I}}}\right)\mathit{E}\left({\mathit{C}}_{{\mathrm{\Omega}}_{\mathrm{{\rm I}}}}\right)+\mathit{P}\left({\mathrm{\Omega}}_{\mathrm{{\rm I}{\rm I}}}\right)\mathit{E}\left({\mathit{C}}_{{\mathrm{\Omega}}_{\mathrm{{\rm I}{\rm I}}}}\right)$. When formulas (12), (13), and (14) are put into formula (11), the result is as follows:

**Theorem 4** *Given a square region with side length l, sensing radius of node* r *and smaller parameter* ϵ*, in order to ensure that the expectation of network coverage is not less than ϵ, the number of nodes to be deployed is at least: ln(1 − ϵ)/ln(1 − E[C]/Ω)*.

*Proof* According to formula (1), P(S_{n}) = l − (l − E[C]/Ω)^{n} ≥ ϵ, then the result can be obtained: n ln(1 − E[C]/Ω) ≤ ln(1 − ϵ). Because ln(1 − E[C]/Ω) < 0, n ≥ ln(1 − ϵ)/ln(1 − E[C]/Ω).

**Deduction 1** For any value of stochastic variable X in the range [a, b], the mathematical expectation and variance of bounded stochastic variable always exists.

*Proof* Because the stochastic variable X can get any value in [a, b] and its expectation should also be in [a, b], p(x) as the density function of X, according to expectation formula, the following result can be obtained:

Similarly, it can be proved that: E(X) ≥ a, i.e. a ≤ E(X) ≤ b. According to definition of variance and formula (16), the following result can be obtained:

That is to say, its expectation and variance both exist for any bounded stochastic variable.

## 4 Sensing probability model and the node scheduling mechanism

Two ways are usually adopted for measuring sensor models: one is sensing model method, and the other is the probability model method. Currently, the latter is studied more than others. An important factor for sensor model is the size of coverage for the monitoring region. It is mainly reflected by coverage rate.

### 4.1 Probability model of node

From definition 5, coverage rate of the point *s*_{
i
} in the region is as follows:

When the target node is in the monitoring area and lies in the position (x_{t} − x)^{2} ≤ r^{2}, its probability of being covered is 1 and vice versa. When the target node is near the border of the sensing node or less than the maximum radius r_{max}, its coverage probability is e^{−λd}. d is the Euler distance between target node and sensor node. The major impact of the border on the coverage is that the number of nodes should be increased to cover it if the target node is near the border of the coverage area. Such coverage follows nearby covering principle, i.e., when the Euler distance of a sensor node and the target node is short, the node moved in a straight line through certain moving strategy to realize coverage. If the Euler distance between the target node concerned and the border node is less than or equal to the diameter of the sensor node, coverage can also be realized through moving sensor nodes. If the Euler distance between the target node concerned and the border node is larger than the diameter of the sensor node, the only way to cover the border target nodes is to schedule nodes near the target node.

**Definition 6** The mobile node i is at the point of x_{i}. Another mobile node j is at the point of x_{j}. The repulsive force of j to i is defined as:

Similarly, the attraction of j to i is defined as:

In the formula above, k is a proportionality constant coefficient, repulsive and attractive forces are as follows:

As to the limitedness of coverage area, the repulsive force of target area border from the mobile node can also be applied to other models. This time, the point x_{j} is the position of the vertical projection of mobile node i onto the boundary line of the nearest target area. Considering the random disturbance force between nodes, the resultant force at a node is as follows:

F_{
bor
} is the repulsive force of target area border from the mobile node. F_{
wan
} is the random disturbance force between nodes. ξ is the force control parameter. The equation of the mobile node i at the time of t can be defined as: ${\mathit{v}}^{\u2033}\left(\mathit{x}\right)=\left({\mathit{F}}_{\mathit{i}}-\mathit{\mu}{\mathit{x}}_{\mathit{i}}^{\prime}/\mathit{m}\right)$. μ is the proportional damping factor, m is the node's virtual mass.

As can be seen in Figure 3, the target node lies in between r and r_{max}, which also shows the only possibility of existence of the boundary target node (triangles are the target nodes). For more complex network models, the probability model is transformed into a normal distribution function. X follows normal distribution, represented as X ~ N(μ, σ^{2}). u is the expectation of normal distribution, and σ^{2} is the variance of the normal distribution. That is as follows:

**Deduction 2** Let stochastic variable X follow normal distribution N ~ (μ, σ^{2}). If p(a ≤ X ≤ b) ≥ 99% is required, solve the function relation of parameters.

*Proof* From known conditions,

We regard it as complete coverage if the probability is larger than 99%. The effective coverage for the monitoring region is realized.

Assuming a = 0, b = 100, μ = 50, after those parameters substituted into formula (23), the value of σ is obtained through calculations: σ = 19.41. That is, complete coverage is realized in the monitoring region [0, 100], σ = 19.41.

**Deduction 3**If

*n*sensor nodes was randomly deployed in the network region with area of Ω and the node sensing radius is r

_{s}, the probability of K nodes in the region with area of $\mathit{\pi}{\mathit{r}}_{\mathit{s}}^{2}$ is as follows:

*Proof* According to Poisson theorem, when the number of sensor nodes N tends to infinity, the probability P tends to be infinitively small. The secondary distribution of term B(n, p) Poisson distribution can be approximated as p(n, λ). Let λ = np. All the sensor nodes in the network coverage area are randomly deployed, so the number of nodes in the network coverage region with area of $\mathit{\pi}{\mathit{r}}_{\mathit{s}}^{2}$ can be considered to follow the secondary distribution of $\mathit{B}\left(\mathit{n},\mathit{\pi}{\mathit{r}}_{\mathit{s}}^{2}/\mathit{\Omega}\right)$. Because high-density deployment is usually adopted to deploy senor nodes in coverage region and the sensing radius of each sensor node is much smaller than the area of the network region Ω, when the number of nodes n in the coverage area increases gradually, $\mathit{n\pi}{\mathit{r}}_{\mathit{s}}^{2}/\mathit{\Omega}$ is gradually close to infinitive small. The binomial distribution can be approximated as the Poisson distribution $\mathit{p}\left(\mathit{n},\mathit{n\pi}{\mathit{r}}_{\mathit{s}}^{2}/\mathit{\Omega}\right)$. In other words, the probability of K the coverage rate of any point in the network coverage is P = λ^{k}e^{− λ}/k ! with K ∈ N.

**Definition 7** Undirected communication diagram G = (V*,* E) is used as the model of WSN. V is the set of sensor nodes and |V| = n. If and only if nodes p and q are within the communication range of each other, it is regarded that there exists an unidirectional edge (p, q) in E. The number of neighbor nodes of node p is called the degree of node p, represented as d(p) showing the number of nodes that node p could communicate with directly. The minimum node degree of communication diagram G is represented as d_{min}(G) = min_{∀ p ∈ V}{d(p)}.

**Definition 8** If there exists a path for any pair of nodes communication diagram G, then the network is called connected. Otherwise, it is not connected. For a connected network, all of its nodes can communicate with each other through one or more hops. On the contrary, there exist some isolated sub-networks in an unconnected network. Its nodes constitute sub-networks that can communicate in themselves. However, the inter-communication among those sub-networks is impossible.

According to definition 6 and definition 7, d*min*(G)* > 0* is a necessary condition instead of a sufficient condition that communication graph G is connected. So P(C_{n}) ≤ P(d_{
min
}(G) > *0*). In the application, the lower limit of P(C_{n}) is of greater significance in the case of unknown node density. If the network communication diagram is constructed from the empty graph with only isolated nodes, the number of communication links increases while the node communication radius is increased. When the node obtains the minimum node degree k, it has also become a k-connected graph. If any k*-1* nodes are removed from the network diagram and this graph is still connected, it is called k-connected graph. Therefore, for k = *1*, as long as its communication radius is large enough to make d*min*(G) > 0, the network has become a connected network, i.e., P(C_{n}) = P(d_{
min
}(G) > 0). Because the node distribution is independent, according to formula (1), for any node p and (P∈G), the limitation of the node connectivity rate is $\underset{\mathit{n}\to \mathit{\infty}}{lim}\left[1-{\left(1-\frac{{\mathit{S}}_{\mathit{p}}}{\mathit{\Omega}}\right)}^{\mathit{n}}\right]=1-{\mathit{e}}^{-\mathit{n}{\mathit{S}}_{\mathit{p}}/\mathit{\Omega}}$.

According to the literature, the minimum node degree of G is as follows:

S_{p} is the effective communication area. Without considering the effect of boundary factors, $\mathit{P}\left({\mathit{C}}_{\mathit{n}}\right)=\mathit{P}\left({\mathit{d}}_{\mathit{min}}\left(\mathit{G}\right)>0\right)={\left(1-{\mathit{e}}^{-\mathit{n\pi}{\mathit{r}}_{\mathit{t}}^{2}/{\mathit{l}}^{2}}\right)}^{\mathit{n}}$. In fact, when node p is in the region I, the value of S_{p} is equal to the area of communication circle of node p. When node p is inside the area II, the value of S_{p} is equal to the communication circle area $\mathit{\pi}{\mathit{r}}_{\mathit{t}}^{2}$ minus the area of arch S_{
ACBD
}, so:

Assuming node q lies on the border of square deployment region and S_{p} > S_{q,}${\mathit{S}}_{\mathit{q}}=\mathit{\pi}{\mathit{r}}_{\mathit{t}}^{2}/2$, so:

**Theorem 5** *Given a square region with side length* l*, the number of nodes in the region is* n *and the communication radius of each node is r*_{
t
}*. When the boundary effect is considered, the lower bound of the network connection probability is*$\mathit{P}\left({\mathit{C}}_{\mathit{n}}\right)>{\left[\left(1-{\mathit{e}}^{-\mathit{n\pi}{\mathit{r}}_{\mathit{t}}^{2}/{\mathit{l}}^{2}}\right)\left(1-{\mathit{e}}^{-\frac{1}{2}\mathit{n\pi}{\mathit{r}}_{\mathit{t}}^{2}/{\mathit{l}}^{2}}\right)\right]}^{{}^{4\mathit{n}{\mathit{r}}_{\mathit{t}}\left(\mathit{l}-{\mathit{r}}_{\mathit{t}}\right)/{\mathit{l}}^{2}}}$.

*Proof* Formulas (21), (22), (23) are put into P(C_{n}) = P(d_{
min
}(G) > 0); it can be solved. According to deduction 2, if l *= 100 m,* r_{t} *= 40 m,* and the boundary effect is considered, the network is fully connected when the probability of connecting the network is greater than 99% with 124 nodes deployed.

_{n}) is equal to the network coverage rate E(S

_{n}), more nodes need to be deployed to obtain the same value of network coverage rate with the network connectivity rate as shown in Table 3.

Number of nodes to be deployed of different network coverage and connectivity rate in different network sizes

l = 100 m | l = 100 m | l = 200 m | l = 200 m | l = 300 m | l = 300 m | |
---|---|---|---|---|---|---|

coverage | connect | coverage | connect | coverage | connect | |

10% | 2 | 5 | 4 | 43 | 6 | 124 |

20% | 4 | 6 | 14 | 50 | 22 | 132 |

30% | 6 | 8 | 24 | 56 | 38 | 144 |

40% | 8 | 10 | 34 | 61 | 54 | 152 |

50% | 10 | 13 | 44 | 68 | 70 | 166 |

60% | 12 | 17 | 54 | 75 | 86 | 184 |

70% | 14 | 20 | 64 | 82 | 102 | 205 |

80% | 16 | 25 | 74 | 91 | 118 | 242 |

90% | 22 | 30 | 84 | 106 | 134 | 294 |

100% | 42 | 43 | 124 | 151 | 167 | 350 |

### 4.2 Scheduling mechanism of nodes

### 4.3 The algorithm and its description

Due to the connectivity of high density sensor nodes and the coverage area of target nodes, the randomly given coverage area is reconstructed through limiting the maximum amount of distortion of randomly covered area in a certain range in order to maximize the life cycle of the network and solve the optimization problem better. At this point, the maximization of the network lifetime is transformed into the problem of target area coverage. In essence, the maximization of the given network lifetime is transformed into seeking the largest set of sensor nodes in the entire target area. Each sensor node is related to the specific coverage area required by nodes in the target region. Therefore, the optimization can be solved through coverage theory. After long-time study, many experts and scholars found that there are two main factors affecting the network lifetime: first, the energy consumption of each sensor node in the process of collecting data and, second, the topological geometry of deploying sensor nodes. Due to the transformation from the optimization of network lifetime into the coverage problem, it is particularly important for sensor nodes to cover specific areas, which is the key to solve the optimization problem. In this paper, we first propose to transform the information collection and data retrieval into energy restriction and coverage-related issues. Second, the given network lifetime maximization problem is determined as a NP-complete problem. Third, the scheduling mechanism of sensor nodes is transformed while the optimal coverage rate is solved through the greedy algorithm. The energy consumption is effectively decreased, and the network lifetime is prolonged. The energy consumption of sensor nodes in data retrieval in the whole network system is solved. Finally, the effectiveness and applicability of the algorithm is verified through experimental comparison.

**Step 1**: Set the position and coverage radius r of sensor nodes. The entire coverage region is divided into multiple disjoint sub-regions {F_{1}, F_{2 ⋯}F_{n}}. Sensor nodes in every sub-region F_{i} and all coverage regions are connected and guaranteed in the region, i.e., F_{l} = {S_{n1}, S_{n2} ⋯ S_{nl}}, F_{l} ⊂ M_{si}. Every related subset is marked as S_{i} = {F_{n1}, F_{n2} ⋯ F_{nl}} and $\underset{\mathit{i}=1,2\cdots \mathit{n}}{\cup}{\mathit{F}}_{\mathit{i}}=\mathit{A}$.

**Step 2**: As for the i (*i* = 1, 2…*n*) data retrieval, its output is a coverage set: C_{i}. A concerned sub-region ${\mathit{F}}_{\mathit{c}}=\underset{{\mathit{F}}_{\mathit{l}}}{argmin}{\displaystyle \sum _{{\mathit{S}}_{\mathit{ni}}\in {\mathit{F}}_{\mathit{l}}}\u230a{\mathit{E}}_{\mathit{r}}^{\mathit{i}}/{\mathit{E}}_{\mathit{c}}^{\mathit{i}}\u230b}$ is selected. ${\mathit{E}}_{\mathit{r}}^{\mathit{i}}$ is the remaining energy of the i sensor node in the current data collection and retrieval.

**Step 3**: In order to reduce the amount of overlapping coverage for sparse coverage sub-region caused by the redundant nodes, so an overlap value v_{i} = F_{c} for the ith sensor node is defined. It represents the number of sensor nodes and F_{c} ∈ S_{i}. v_{i} is the number of selected important sub-areas for the coverage of the ith sensor nodes, i.e., v_{i} = v_{min}. v_{min} is the minimum number of sensor nodes in the covered target area.

**Step 4**: All the sensor nodes in the current coverage area update the remaining energy by reducing the consumed energy in the previous data collection and retrieval from the remaining energy, written as ${\mathit{E}}_{\mathit{r}}^{\mathit{i}}={\mathit{E}}_{\mathit{r}}^{\mathit{i}}-{\mathit{E}}_{\mathit{c}}^{\mathit{i}}$. If the remaining energy of a sensor node is less than the required energy for one data collection and retrieval, the sensor node should be removed from the sensor set. Then go to step 2 and continue until coverage region A is not fully covered by sensor nodes available any longer. At this time, the network lifetime is maximized.

### 4.4 Determination of the node probability

In the designated monitoring area, when any node receives data packets transmitted by the rest N*-1* nodes, it can be considered to finish data retrieval.

**Theorem 6**
*In the wireless sensor network constructed by N wireless sensor nodes of one monitoring area, when there is one and only one sensor node transmitting the data packet and the probability value of the node p*
_{
i
}
*is 1/N + 1 − i, the value of p*
_{
i _ max
}
*is the maximum one.*

*Proof*In the monitoring area, let all the sensor nodes be independent; there is one and only one sensor node working probability marked as λ. At the time t

_{0}moment, when all the sensor nodes N work simultaneously, coverage probability of one sensor node is as follows:

According to the definition of geometric distribution, the probability event in Equation 29 still complies with the geometric distribution of the required time.

Discussion: in the first case, according to the probability theory, the probability value is nonnegative and not larger than 1, i.e., λ ∈ [0, 1]. When λ = 1, the single sensor node can cover the monitoring area completely, which is contradictory with N + 1 − i nodes involved in working, so λ ≠ 1. In the second case, when λ = 0, the single sensor node is in the sleeping or dead state, which is also in contradiction with the meaning, so λ ∈ (0, 1).

_{i}gets the maximum value. Let: u = N − i + 1, i.e., λ = 1/u and get it in the formula (29). The following can be obtained:

## 5 Evaluation of performance

In order to study this subject better, the meaning of each parameter is listed one by one:

l, the side length of a square

Ω, the area for a square, i.e., Ω = l^{2}

n, the number of randomly deployed sensor nodes

r, the sensing radius of sensor nodes

E(C), the expectation of coverage area of sensor nodes, i.e., μ

σ^{2}, the variance of coverage area of sensor nodes

p(x), the coverage rate of randomly deployed sensor nodes

As can be seen in Figure 5, firstly, there are less nodes for complete coverage in the network with smaller area and more nodes in larger area. For example, when coverage is 100%, 43 nodes are needed in 100 * 100 area, 124 nodes in 200 * 200 area, 167 nodes in 300 * 300 area, and 243 nodes in 400 * 400 area. Secondly, the number of sensor nodes is not the same according to different requirements of networks for coverage rate. The number of nodes is increasing as the network grows, which shows a linear increasing relationship. In Figure 5, it requires more nodes to realize the full coverage for much larger networks and fewer nodes for smaller networks. When the coverage rate is between 90% and 100%, the increment rate of large network increases faster than that of the small-scale networks.

Figure 6 shows the network coverage rate under different parameters; its computation process is according to formula (20), when stochastic variable follows normal distribution N ~ (μ, σ^{2}), p(X ≤ b) = ϕ((b − μ)/σ) is used to get the result. Take μ = 10, σ = 15 as an example, when the coverage rate is 60%, p(X ≤ b) = ϕ((b − 10)/15) ≥ 60%, it can be deducted that ((b − 10)/15) = 0.255, and b = ⌈13.825⌉ = 14. μ = 10, σ = 15, when the coverage rate is 60%, the required number of nodes is 14. From Figure 6, we can also see that, in case of same network size, the larger the expectation, the more nodes will be required, i.e., the normal distribution model that the network shows. For any curve, the variation is a linear relationship that is because at first, the coverage rate increases at 5%, so the distributed function values changes slowly. Second, the difference of expectation in the example is 10, which means the two adjacent curves have the feature of equal spacing. Third, when the coverage rate exceeds 95%, the number of nodes increased significantly. That is due to the quick change of distributed function values between 95% and 99.9%. For example, if the expectation is 10 and variance is 15, 35 nodes are needed with coverage rate 95% while 55 is needed with coverage rate 99.9%.

Figure 7 reflects the variation curves between network connectivity rate and the number of nodes. For the two networks of 100 * 100 and 200 * 200, the number of nodes increases more slowly. The main reasons are. first, when the network is small and the connectivity rate is 100%, 48 nodes can complete the connectivity between nodes in the network model of 100 * 100 while 150 nodes are needed in the network model of 200 * 200. Second, for the two network models, the increasing trends of the node number are relatively stable. The node number increments is in linear relationship with time. For the two networks of 300 * 300 and 400 * 400, because their areas are larger, more nodes are needed compared with the previous two network models. At the beginning, the node number in the two network models is almost the same. However, with the expansion of the network model, the nodes are greatly increasing in 400 * 400 network model because in the communication process, the optimal communication rule is that the two circles of sensor nodes are circumscribed, which is, however, impossible to achieve. Therefore, as the network grows, much more nodes are largely required.

## 6 Conclusions

This paper researches the coverage algorithm in wireless sensor networks and presents EPDM algorithm with the theory of probability. First, EPDM establishes the relation model and association relation between sensor nodes and target nodes. Then, the calculation of a target node's trajectory is given based on its probability and expectation. Next, target nodes can be covered more effectively through scheduling mechanism of nodes. The simulation results show that EPDM is effective and scalable. In future research, EPDM will be extended to implement the multiple coverage in heterogeneous wireless sensor network. Furthermore, we will study how to do quadratic linear programming for nodes with random distribution and improve the calculating precision for the border coverage.

## Declarations

### Acknowledgements

The authors would like to thank the National ‘863’ High Technology Research and Development Plans for funding projects under Grant Nos. 2011A01A204 and 2012A A01A306, the National Natural Science Foundation of China under Grant Nos.61170245, Science of Technology Research of Foundation Project of Henan Province Education Department under Grant Nos. 2014B520099, Natural Science Foundation for Young Scientists of Shanxi Province under Grant Nos. 2013JQ8024, and Natural Science and Technology Research of Foundation Project of Henan Province Department of Science under Grant Nos. 142102210471.

## Authors’ Affiliations

## References

- Schuragers C, Tsiatsis V, Ganeriwal S, Srivastava M: Optimizing sensor networks in the energy-latency-density design space.
*IEEE Trans. Mobile Comput.*2002, 1(1):70-80. 10.1109/TMC.2002.1011060View ArticleGoogle Scholar - Hou T, Shi Y, Sherali HD: Rate allocation and network lifetime problems for WSN.
*IEEE/ACM Trans. Networking*2008, 16(2):321-334.View ArticleGoogle Scholar - He S, Chen J, Sun Y: Coverage and connectivity in duty-cycled WSNs for event monitoring.
*IEEE Trans. Parallel Distr Syst*2012, 23(3):75-482.Google Scholar - Derr K, Manic M: WSN configuration-part II: adaptive coverage for decentralized algorithms.
*IEEE Trans. Industrial Informatics*2012, 9(3):1728-1738.View ArticleGoogle Scholar - Li W, Zhang W: Coverage analysis and active scheme of WSNs.
*Inst. Eng. Technol.*2012, 2(2):86-91.Google Scholar - Lin K, Rodrigues JJPC, Hongwei G, Xiong N, Liang X: Energy efficiency QoS assurance routing in WSN.
*IEEE Syst. J.*2011, 5(4):495-505.View ArticleGoogle Scholar - Zhu R, Qin Y, Lai C-F: Adaptive packet scheduling scheme to support real-time traffic in WLAN mesh networks.
*KSII Trans. Internet Inf. Syst.*2011, 5(9):1492-1512.Google Scholar - Cheng S-T, Shih J-S, Chang T-Y, Horng G-T, Chou C-T: MLPA-conservation mechanism in WSN environments.
*EURASIP J. Wirel. Commun. Netw.*2012, 1: 1-13. 10.5923/j.jwnc.20110101.01View ArticleGoogle Scholar - Karkvandi HR, Recht E, Yadid O: Pecht, Effective lifetime-aware routing in WSNs.
*IEEE Sensors J.*2011, 11(12):3359-3367.View ArticleGoogle Scholar - Zairi S, Zouari B, Niel E, Dumitrescu E: Nodes self-scheduling approach for maximizing WSN lifetime based on remaining energy.
*The Institution of. Eng. Technol.*2012, 2(1):52-62.Google Scholar - Zhu R: Intelligent rate control for supporting real-time traffic in WLAN mesh networks.
*J. Netw. Comput. Appl.*2011, 34(5):1449-1458. 10.1016/j.jnca.2010.08.014View ArticleGoogle Scholar - Hsin C-f, Liu M: Randomly duty-cycled WSNs: dynamics of coverage.
*IEEE Trans. Wireless Commun.*2006, 5(11):3182-3892.View ArticleGoogle Scholar - Wang B, Chaning K, Wang W: Information coverage in randomly deployed WSN.
*IEEE Trans. Wireless. Communications*2007, 6(8):2994-3004.View ArticleGoogle Scholar - Xiao Y, Chen H, Wu K, Sun B, Zhang Y, Sun X, Liu C: Coverage and detection of a randomized scheduling algorithm in WSNs.
*IEEE Trans. Comput.*2010, 59(4):507-521.MathSciNetView ArticleGoogle Scholar - Lin J-W, Chen Y-T: Improving the coverage of randomized scheduling in WSN.
*IEEE Trans. Wireless Commun.*2008, 7(2):4807-4812.View ArticleGoogle Scholar - Slijepcevic S, Potkonjak M: Power Efficient Organization of WSN. In
*Proceedings of IEEE International Conference on Communications*. Helsinki Finland; 2001:472-476.Google Scholar - Berman P, Calinescu G, Shah C, Zelikovsky A: Power efficient monitoring management in sensor networks. In
*Proceeding of IEEE Wireless Communication and Networking Conference*. Atlanta, USA; 2004:2329-2334.Google Scholar - Tian D, Georganas ND: A node scheduling scheme for energy conservation in large WSNs.
*Wirel. Commun. Mob. Comput.*2003, 3(2):271-290. 10.1002/wcm.116View ArticleGoogle Scholar - Abrams Z, Goel A, Plotkin S: Set K-cover algorithms for energy efficient monitoring in WSN. In
*Proceeding of the 3th International Symposium on Information Processing in Sensor Networks*. Berkeley, California, USA; 2004:424-432.Google Scholar - Zhang H, Jennifer CH: Maintaining sensing coverage and connectivity in large sensor network.
*Ad Hoc Sensor Wireless Netw.*2005, 1(2):89-124.Google Scholar - Huang CF, Tseng YC: The Coverage problem in a WSN. In
*Proceeding of the 2nd ACM International Workshop on WSNs and Applications*. San Diego, California, USA; 2003:115-121.Google Scholar - Cardei M, Du DZ: Improving WSN lifetime through power aware organization.
*Wirel. Netw*2005, 11(3):333-340. 10.1007/s11276-005-6615-6View ArticleGoogle Scholar - Liu H, Wan P, Yi CW, Jia X, Makki SAM, Pissinou N: Maximal lifetime scheduling in sensor surveillance networks. In
*Proceedings of the 24th Conference on Computer Communications*. Miami, USA; 2005:2482-2491.Google Scholar - Wu J, Dai F, Gao M, Stojmenovic I: On Calculating power-aware connected dominating sets for efficient routing in Ad Hoc Wireless network.
*J. Commun. Netw.*2002, 4(1):1-12.Google Scholar - Kar K, Banerjee S: Node placement for connected coverage in sensor networks. In
*Proceedings of the Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks*. Sophia-Antipolis, France; 2003.Google Scholar - Xing X, Wang G, Wu J, Li J: Square region-based coverage and connectivity probability model in WSNs. In
*Mobile Ad-Hoc and Sensor Networks (MSN), 2010 sixth International Conference*. Hang Zhou, China; 2010:79-84.View ArticleGoogle Scholar - Li Y, Vu C, Ai C, Chen G, Zhao Y: Transforming complete coverage algorithms to partial coverage algorithms for WSNs.
*IEEE Trans. Parallel Distrib. Syst.*2011, 22(4):695-703.View ArticleGoogle Scholar - Shu W, Wang J: An optimized multi-hop routing algorithm based on clonal selection strategy for energy-efficient management in wireless sensor networks.
*Sensors and Transducers*2013, 22(6):8-14.Google Scholar - Fang W, Liu F, Yang F, Shu L, Nishio S: Energy-efficient cooperative communication for data transmission in WSN.
*IEEE Trans. Consum. Electron.*2010, 56(3):2185-2192.View ArticleGoogle Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.