 Research
 Open access
 Published:
ENCP: a new Energyefficient Nonlinear Coverage Control Protocol in mobile sensor networks
EURASIP Journal on Wireless Communications and Networking volumeÂ 2018, ArticleÂ number:Â 15 (2018)
Abstract
The node deployment in mobile sensor networks (MSNs) is mostly performed in a random method. However, a large number of redundant nodes may exist due to the randomness. As a result, severe data congestion may be caused and the quality of coverage (QoC) is undermined. In order to solve this QoC problem, we propose an Energyefficient Nonlinear Coverage Control Protocol (ENCP). This protocol utilizes the normal distribution to calculate the minimal number of sensors which is required to guarantee coverage over the monitoring area. We also balance the node energy consumption and achieve the collaborative scheduling among all the sensor nodes. Meanwhile, when a certain QoC is guaranteed, we present the calculation model for the normal distribution of the sensing ranges and the proportional relationship between different parameters in the QoC function. Finally, simulation results show that the ENCP could not only improve the network QoC and network coverage rate but also effectively control the energy exhaustion at the nodes. Therefore, the network lifetime can be effectively prolonged.
1 Introduction
Mobile sensor networks (MSNs) are composed of tens of thousand sensor nodes whose processing ability, communication bandwidth, and energy are quite limited. Usually, the highdensity node deployment strategy is employed to improve the network performance [1]. The node density can be as high as 200 nodes/m^{2}. However, a series of problems are brought about in terms of scalability, information redundancy, wireless channel interference, and energy wastes. Since the sensors are mostly batterypowered, it is often impractical to replace the batteries due to the limits of the application environment. However, the network is expected to work over a long period of time without further energy supply, which makes the energy management a key problem for the study of sensor networks.
The node scheduling enables the switching between different states of the nodes, utilizing the node redundancy and the heuristic algorithms [2, 3]. The aim of the node scheduling is to save the node energy and prolong the network lifetime with the desired QoC by shutting down the nodes in turn. Currently, most coverage control algorithms obtain the coverage information according to the location information of the nodes [4,5,6]. However, the acquisition of location information relies on external infrastructures such as the GPS and directional antennas, which greatly increases the hardware cost and energy consumption for the nodes. Meanwhile, locating inaccuracy cannot be avoided. It is hard for the locationbased coverage control algorithms to obtain the accurate coverage relationship between the nodes without precise location information [7,8,9]. Furthermore, shutting down parts of the nodes may lead to coverage dead zones and inaccuracy for the network monitoring. Hence, there is a growing interest on the study of coverage control algorithms with no location information required [10,11,12]. But these algorithms cannot achieve full coverage. Fortunately, the full coverage over the monitoring area is not necessarily needed for the sensor network for most applications [13, 14]. It is sufficient for the network to maintain a reasonable coverage rate. In other words, only partial coverage is required and the coverage rate is one of the indicators to evaluate the network QoC. Partial coverage control strategies could not only simplify the network protocol design but also improve the flexibility of the network configuration. The users could achieve a different tradeoff between the energy consumption and the QoC according to their own needs. After the deployment of the same kind of sensor nodes in the realistic environment, the actual sensing range would be higher or lower than the rated sensing range due to the influence of its own characteristics or the environment. As a result, the sensing range for the sensor node becomes different [15]. The massive numbers of sensor nodes deployed in the sensing field accomplish the data acquisition in a selforganized way. After certain processing, the acquired data is transmitted to the base station via multihops among the nodes. This process is depicted in Fig. 1.
The sensing characteristics for the same kind of sensors are investigated in the realistic environment. We also study the coverage problem for the randomly deployed sensor network where the sensing ranges for the nodes satisfy the normal distribution. The calculation model with no location information required is presented for the redundancy degree. Also elaborated is the calculation model for the minimal number of working nodes with a desired QoC. Based on QoC problem, we present a new Energyefficient Nonlinear Coverage Control Protocol (ENCP) in mobile sensor networks. Under the premise of a certain QoC, we can use the minimum sensor node to complete the effective coverage of the monitoring area, thus suppress to the network energy consumption and a longer network lifetime.
2 Related work
Dong et al., node scheduling scheme using spatial resolution of wireless sensor networks [16]. The sensors calculate the sponsored area by the neighbors according to the location information. Then, the coverage relationship can be derived. However, this algorithm fails to consider the case of overlapped sensing area, which may cause a large number of working nodes and extra energy waste. Xing et al. proposed target coverage scheme using linear programming [17]. The probing method is as follows. Every sleeping node would regularly check whether working nodes exist within its probing area. If no, this sleeping node will switch to the work state. Otherwise, it will remain sleeping. Obviously, some nodes may keep working consistently according to the PEAS protocol, which leads to an early node failure and unbalanced network energy consumption. Therefore, the QoC is affected. Wang et al. proposed saluting of scheduling mobile sensor and fixed sensors for target tracking algorithm. (MTTA) [18]. The node closest to the optimal location is chosen as the working node according to this protocol. Therefore, the QoC is guaranteed with the smallest number of working nodes. However, the calculation of the optimal location relies on rigorously accurate positioning technique and high computational complexity. Sun et al. proposed a linear programming optimization coverage scheme (LPOCS) [19] which divides all of the sensor nodes into many subsets. The connectivity and coverage for a specific target within every subset can then be guaranteed.
Energyefficient sleep schedule with service coverage guarantee is firstly given by Zhang et al. in [20]. The mathematical relationships among the QoC, the number of working nodes, the size of the sensing area, and the sensing ranges of the sensor nodes are derived while no location information is required in this algorithm. Based on the mathematical relationship, three scheduling strategies are proposed, i.e., Efficient Coverage Algorithm Based on Node Scheduling Strategy (ECNSS) [21], Energyefficient Multitarget Coverage Control Protocol (EMCCP) [22], and Efficient Rendezvous algorithms for mobilityenabled (ERME) [23]. In these three scheduling schemes, the working nodes are chosen in completely a random method, which may result in the instability of the QoC. Furthermore, the limited delay mechanism is employed in the scheduling schemes to ensure that all the data can be collected within the monitoring area. Liu et al. [24] derived the mathematical relationships among the QoC, the size of the network monitoring area, the sensing range of the nodes, and the node density. Again, the location information is not needed for the QoC during the derivation. Also included are three methods to evaluate the coverage, i.e., partial coverage, node coverage, and monitoring ability. A further modification was made based on the protocol in [25], and the energy balance strategy was introduced. The working nodes are chosen according to the remained energy, and optimization is performed on the distribution of working nodes. Therefore, the network lifetime is further prolonged. An extension of the results in [26] was made in [27], and the influence of edge effects is considered. As a result, the analytical results are more accurate and many multiplefold coverage problems can be analyzed. Zeng et al. [28] studied the coverage problem for the sensor network where the node deployment satisfies the twodimension normal distribution. Wu et al. [29] proposed a probabilitybased calculation method for the node redundancy degree, according to which, the node could independently calculate its own redundancy degree. Furthermore, a node scheduling protocol, lightweight deploymentaware scheduling (LDAS) is proposed with no location information required. However, the sponsorship of the twohop neighbors for the sensing area of the nodes is neglected. As a result, many of the working nodes chosen by the LDAS algorithm are redundant. A joint scheduling algorithm is proposed by Chen et al. [30] which adds more working nodes to guarantee the network connectivity with the required QoC.
Cheng et al. derived the minimal number of working nodes and the corresponding node deployment location for the simultaneous guarantee of k coverage and network connectivity [31]. The QoC and connectivity quality are guaranteed with the minimal number of working nodes by deploying the mobile sensor nodes to the designated positions. Therefore, the network energy is saved. Lu et al. presented the sensor node deployment scheme which guarantees the full coverage over the monitoring area and the network 2 connection [32]. It was also proven that the proposed deployment is optimal regardless of the value of R_{ c }/R_{ s } (R_{ c } is the communication range and R_{ s } is the sensing range).
All the studies stated above are based on different assumptions [33,34,35,36,37]. The sensing range of the node varies according to its own characteristics and the influence of other external factors such as the environment. This paper focuses on the realistic sensing characteristics of randomly deployed MSNs and studies the coverage problem for the MSNs where the sensing range of the node satisfies the normal distribution and no location information is required.
3 Network model and problem description
3.1 Basic assumptions
Assuming: All the sensor nodes are randomly deployed within a twodimension area M. Furthermore, these MSNs exhibit the following characteristics

(1)
The node density is sufficiently high. When all the nodes are working nodes, the QoC can be guaranteed and a large number of redundant nodes will exist in the mobile sensor network.

(2)
Boolean sensing model is adopted by the nodes. In other words, if the sensing range of an arbitrary node i is R_{ i }, then, the sensor area of node i is circle with center i and radius R_{ i }. The sensing area is denoted as Î˜i (R_{ i }).

(3)
The sensing ranges for all the nodes in the network satisfy the normal distribution N (R_{0}, Î´^{2}) where R_{0} is the average of the sensing ranges, i.e., the rated sensing range, Î´ is the standard deviation, and R_{0} â‰¥ 3.3Î´ so that the sensing ranges concentrate in the interval [0, 2R_{0}].

(4)
The monitoring area is large enough so that the boundary effect can be neglected.

(5)
The communication range of the node is no smaller than 4R_{0}, i.e., the communication range is at least twice times the maximal sensor range.

(6)
No GPS or other locating techniques are required for each node to acquire the location information.

(7)
The sensor nodes are randomly deployed in the monitoring areas with high density, and the sensor nodes are independent from each other.
In large scale MSNs, the random deployment scheme is both practical and low in cost [38,39,40]. Therefore, the random deployment scheme is employed in this network model. Although all the nodes have been the same rated sensor range R_{0} in the binary sensing model, the actual sensing range would still be affected by the characteristics of the nodes and the environment. Therefore, we employ the normal assumption N (R_{0},Î´^{2}) on the distribution of the actual sensing range. Since the actual sensing range is no smaller than 0, we have the limitation R_{0} â‰¥ 3.3Î´ so that the probability that the actual sensing range lies in [âˆ’âˆž, 0] is smaller than 5 Ã— 10^{âˆ’5}. Due to the symmetry of the normal distribution, we can derive that the probability that the actual sensing range lies in [0, 4R_{0}] is larger than 99.99%, which approximately makes it a certain event.
3.2 Definitions and problem description
Definition 1 An arbitrary node i, its neighbor sensor set is defined as:
where S is the set of all the nodes deployed within the monitoring area M, d (i, j) is the Euclidean distance between sensor node i and sensor node j, R_{ i }, and R_{ j } are the sensing ranges of sensor node i and sensor node j, respectively.
Definition 2 For an arbitrary sensor node i, the sensor node redundancy degree has been defined as the ratio of overlapped monitoring area to its own monitoring area, i.e.,
where Ï† is the set of all the working sensor nodes, S_{ i } and S_{ j } are the monitoring area for sensor node i and sensor node j, respectively, \( \mathrm{area}\left(\left(\underset{j\in \left(S(i)\cap \varphi \right)}{\cup }{S}_j\right)\cap {S}_i\right) \) is the overlapped monitoring area, and S_{ i } is the monitoring area for node i.
Definition 3 QoC is defined as the ratio of the combination of the monitoring area, which all the working nodes are monitoring area M.
where Ï† is the set of all the working nodes, S_{ i } is the monitoring area for node i, area(M) is the size of the whole monitoring area, \( \mathrm{area}\left(\left(\underset{i\in \varphi }{\cup }{S}_i\right)\cap M\right) \) is the intersection between M and the monitoring area of all the working nodes. As a matter of fact, the quality of coverage is also equivalent to the network coverage probability.
Definition 4 The effective network lifetime has been defined as the total time which the required coverage quality can be guaranteed.
where Î”t_{ i } is a time slice which is close to 0, Î”t_{iâ€‰+â€‰1} is the subsequent slice after Î”t_{ i }, \( {\eta}_o^{\Delta {t}_j} \) is the quality of coverage obtained within Î”t_{ j }, and Î·_{ d } is the desired QoC.
It is assuming that a large number of working sensor nodes are randomly deployed within the sensing area M, and the sensing ranges of all the sensor nodes must satisfy the normal distribution N (R_{0}, Î´^{2}). Furthermore, R_{0} â‰¥ 3.3Î´. All the redundant nodes are shut down on the condition that the desired QoC Î·_{ d } is satisfied, i.e., a minimal set of working nodes Ï† is found which can guarantee the satisfaction of \( \mathrm{area}\left(\left(\underset{i\in \varphi }{\cup }{S}_i\right)\cap M\right)/\mathrm{area}(M)\ge {\eta}_d \). A calculation model is constructed for the node redundancy degree. We also design the node scheduling strategy for the setÏ†, which can be employed to prolong the effective network lifetime.
4 Problem analysis and research methods
4.1 ENCP problem solution
Two questions have to be answered for the node scheduling strategy in the MSNs. The first one is how to determine whether a node is redundant [41,42,43]. The second one is the specific scheduling of the nodes. We mainly deal with the first question here while the second one is left for the next section. The calculation of node redundancy degree based on location information employs the geometry knowledge and offers the accurate coverage relationship between nodes [44,45,46]. However, when the location information is not available, it is hard for the nodes to derive the node redundancy degree. Still, we could still utilize the number of neighbor sensors of a node and calculate the expectation for the node redundancy degree based on the probability theory.
Theorem 1 The coverage probability that one sensor node within the sensing range is covered by one of the neighbor sensors nodes are:
Proof Assuming that the sensing range of node a is R_{ a }, and the sensing area is Î˜_{1}a (R_{ a }) while the sensing range of node b is R_{ b } and the sensing area is Î˜b (R_{ b }). If node b is a working neighbor sensor of node a, d (a, b) â‰¤ R_{ a }â€‰+â€‰R_{ b }, i.e., node b must lie within the circle Î˜_{2}a (R_{ a }â€‰+â€‰R_{ b }). This circle has center a and radius R_{ a }â€‰+â€‰R_{ b }. If an arbitrary node q within Î˜_{1}a (R_{ a }) is covered by the sensing area Î˜b (R_{ b }), node b must lie within the circle Î˜q (R_{ b }) which has center q and radius R_{ b }. The relationships among Î˜_{1}a (R_{ a }), Î˜_{2}a (R_{ a }â€‰+â€‰R_{ b }), and Î˜q (R_{ b }) are depicted in Fig. 2.
Since all the sensor nodes are randomly deployed within the monitoring area M, the probability is 1/area (M) that each node is deployed at a certain point in M. Therefore, the probability of P_{ bâ€‰âˆ’â€‰a } that one node within the sensing area of sensor node a is covered by a neighbor sensor node b is
Since the sensing ranges of all the sensor nodes must satisfy the normal distribution N (R_{0}, Î´^{2}) with R_{0} â‰¥ 3.3Î´, the twodimension random variable (R_{ a }, R_{ b }) satisfies the twodimension normal distribution N (R_{0}, Î´^{2}; R_{0}, Î´^{2}, 0). Therefore, the expectation of P_{ bâ€‰âˆ’â€‰a } can be derived as:
Set x_{ 1 }â€‰=â€‰R_{ a }â€‰âˆ’â€‰R_{ b }, x_{ 2 }â€‰=â€‰R_{ b }â€‰âˆ’â€‰R_{ a }, we have
where the integral regions N and Ro (R_{0}) is depicted in Fig. 3.
According to the derivation below,
where F(x) is the standard normal distribution function. Set a(x)â€‰=â€‰(F(x)â€‰âˆ’â€‰F(âˆ’â€‰x)^{2}â€‰âˆ’â€‰(1â€‰âˆ’â€‰e^{x2/2})). Since
a(x) is monotonically decreasing in [3.3, +â€‰âˆž). Since R_{0}/Î´ â‰¥â€‰3.3,
i.e., \( \frac{1}{2\uppi {\delta}^2}\underset{N}{\iint }{\left(\frac{R_0+{x}_2}{2{R}_0+{x}_1+{x}_2}\right)}^2\cdot {\mathrm{e}}^{\frac{x_1^2+{x}_2^2}{2{\delta}^2}}\mathrm{d}{x}_1\mathrm{d}{x}_2 \) is small enough to be neglected. Therefore, we have
Set \( f(r)={\int}_0^{2\uppi}{\left(\frac{R_0+r\cos \theta }{2{R}_0+r\sin \theta +r\cos \theta}\right)}^2\mathrm{d}\theta \) and the independent variable Ï• =â€‰(Ï€/2)â€‰âˆ’â€‰Î¸, so
Again, we set
So, it can be derived that
To solve the equation set (8), the right hand side integral of the second equation has to be derived.
where \( c=\sqrt{2}{R}_0/r \). We further set tâ€‰=â€‰tan(Ï†/2), so Ï†â€‰=â€‰2arctant, dÏ†â€‰=â€‰2/(1â€‰+â€‰t^{2})dt. Therefore,
Solving the equation set (13), we have \( f(r)={R}_0^2\uppi /\left(2{R}_0^2{r}^2\right) \). Substitute f(r) into (8),
In order to further simplify Eq. (14), set \( t={r}^2/2{\delta}^2,{c}_1={R}_0^2/{\delta}^2 \). So, \( E\left({P}_{ba}\right)=\frac{c_1}{4}{\int}_{\frac{c_1}{2}}^0\frac{{\mathrm{e}}^t}{t+{c}_1}\mathrm{d}t=\frac{c_1}{4{\mathrm{e}}^{c_1}}{\int}_{\frac{c_1}{2}}^{c_1}\frac{{\mathrm{e}}^t}{t}\mathrm{d}t \).
According to the McLaurin expansion of e^{t}, i.e., \( {\mathrm{e}}^t=\sum \limits_{n=0}^{\infty}\frac{t^n}{n!} \), we have
Set \( {I}_1=\sum \limits_{n=1}^{\infty}\frac{t^n}{nn!} \), we have \( {tI}_1{I}_1=t+\sum \limits_{n=2}^{\infty}\frac{t^n}{n!}+\sum \limits_{n=2}^{\infty}\frac{t^n}{\left(n1\right) nn!} \). So, \( {I}_1=\frac{{\mathrm{e}}^t3}{t1}2+\sum \limits_{n=2}^{\infty}\frac{t^n{\left(t1\right)}^{1}}{\left(n1\right) nn!} \).
Substituting I_{1} into Eq. (15), we have
Set \( p\left({c}_1\right)=\frac{c_1}{4{e}^{c_1}}\cdot \left(\frac{3}{c_11}+\frac{2{e}^{c_1/2}6}{c_12}\right),q\left({c}_1\right)=\frac{c_1}{4{e}^{c_1}}\cdot \sum \limits_{n=1}^{\infty}\frac{c_1^{n+1}/\left({c}_11\right){\left({c}_1/2\right)}^{n+1}/\left({c}_1/21\right)}{n\left(n+1\right)\left(n+1\right)!} \), p(c_{1}) and q(c_{1}) are monotonically decreasing in [10, +âˆž).
Since c_{1} â‰¥ 10.892, we have 0â€‰<â€‰p(c1)â€‰<â€‰2.8 Ã— 10^{âˆ’3}, 0â€‰<â€‰q(c_{1})â€‰<â€‰3.7 Ã— 10^{âˆ’3}, and \( 0<\frac{c_1}{4{\mathrm{e}}^{c_1}}\cdot \ln 2<3.5\times {10}^{5} \), we have
According to the computation of MATLAB7.0, \( 0<\frac{c_1}{4{e}^{c_1}}\cdot \ln 2p\left({c}_1\right)+q\left({c}_1\right)<1.5\times {10}^{3} \), which is small enough to be neglected. Therefore, we finally simplify Eq. (17) as
The probability P that one node within the sensing area of a sensor node has been covered by one of the neighbor sensors is
Substitute Eq. (19) into Eq. (18) and the proof of Lemma1 is completed.
Theorem 2 A sensor node expectation of the node redundancy degree with n working neighbor sensor node is
Proof Assuming that the probability that one node within the sensing range of a sensor has been covered by one of the neighbor sensors node is P, the probability that this node is not covered is âˆ¨P where âˆ¨Pâ€‰=â€‰1 Ã—â€‰P. If a sensor has n neighbor sensors, the probability that one node within the sensing area of this sensor node has been not covered by an arbitrary one of the neighbor sensors is âˆ¨P_{ n }. Since the locations of all the nodes are mutually independent:
The probability that one node within the sensing range of this sensor node has been covered by at least one of the neighbor sensing nodes is P_{ n }:
Suppose a sensor has n working neighbor sensors, the overlapped sensing area between this sensor and its neighbors is S^{â€²}. Then, the expectation of S^{â€²} is
Here, area(S) is the sensing area of this sensor. So, the expectation for the redundancy degree of a node with n neighbor workers is
Substituting the conclusion in Theorem 1 into Eq. (23), we have \( E\left({\xi}_n\right)=1{\left(\frac{3{R}_0^24{\delta}^2}{4\left({R}_0^2{\delta}^2\right)}\right)}^n \).
Therefore, the proof of Theorem 2 is completed.
Table 1 illustrates the relationship between the expectation of redundancy degree, and the number of sensing neighbors when Theorem 2 is employed. Observe that the expectation of redundancy degree E(Î¾) is deeply affected by the number of its sensing neighbors while the value of R_{0}/Î´ shows a minor impact. When the number of working neighbor sensors is no smaller than 13, the expectation for the node redundancy degree can be higher than 95%. By applying Theorem 2, the sensor node could quickly calculate the expectation of own redundancy degree. Then, the sensor node decides whether it is a redundant node by comparing the redundancy degree and the expectation of QoC.
Theorem 3 If k nodes are randomly chosen as working nodes in the monitoring area M, the expectation of the QoC of M is
Proof Since all the sensing nodes are randomly deployed within the monitoring area M, the probability for a node to be deployed at a certain point in M is 1/area (M). If a node q in M is covered by a sensor a whose sensing range is R_{ a }, a must lie within the circle Î˜q (R_{ a }) which has center q and radius R_{ a }. Therefore, the probability for node q to be covered by sensor a is
Since the sensing ranges of all the sensors satisfy the normal distribution N (R_{0}, Î´^{2}) with R_{0} â‰¥ 3.3Î´, the probability for a node in M to be covered by a working node is:
Set xâ€‰=â€‰(R_{ a }â€‰âˆ’â€‰R_{0})/Î´, and we have:
Since all the nodes in M are independently and randomly deployed, the coverage probability that a sensor node has be covered by at least one of the k working nodes in M.
Suppose that M^{â€™} is the area within which all the sensor nodes has been covered by at least one of the k working sensor nodes, the expectation for the size of M^{â€™} is
This completes the proof.
4.2 Process of NECP implementation
The ENCP employs the distributive scheduling algorithm, i.e., each node compares the desired QoC Î·_{ d } with its own expectation of redundancy degree E (Î¾). If E (Î¾) â‰¥ Î·_{ d }, we have \( 1{\left(3{R}_0^24{\delta}^2/4\left({R}_0^2{\delta}^2\right)\right)}^n\ge {\eta}_d \) according to Theorem 2. That is to say, the QoC of the sensing area of this node satisfies the desired QoC, and this node can be shut down to save the network energy consumption. In other words, if the number of sensing neighbors n for a certain node satisfies
This node is then regarded as a redundant node which can be shut down to save energy.
The initial power is equal for all the nodes. A management node is randomly chosen in an arbitrary alliance. Centered by this management node, the routing protocol is transmitted in a singlehop or multiplehop method. Assuming that the management node is deployed in advance with unlimited power, it could communicate directly with all the member nodes. However, the member nodes need to perform singlehop or multiplehop routing to reach the management node. This is an optimization problem which minimizes the cost from the source to the destination. Since the energy consumption models, i.e., the calculation model for the communication energy, the calculation model for the data processing energy and the calculation model for the environment sensing energy, are definite, upon receiving one message, the management node could trace the energy change of all the nodes processing this message according to energy models, the message length and the data quantity. For each round of cycles, the nodes in the alliance are divided into three states according to the protocol, i.e., work, election, and sleep. Sensing nodes only take charge of monitoring the environment and collecting data. Relay nodes are in charge of relaying data while sensing relay nodes possess both of these two functions. When inactive nodes are switched to the sleep state, the management node determines the state of each node according to the node energy, topology, and network task. When the routing is established, the management node broadcasts the node state and routing information to all the nodes. Due to message loss and data processing delay, there may be errors in the energy calculation model for the management node. Therefore, the member nodes are required to transmit the energy update message on the present energy to the management nodes. Then, the optimal routing is calculated and broadcasted to the members in the alliance by the management node.
The ENCP divides the network running time into several rounds, each of which consists of the coverage control period and the steady state period. During the coverage control period, the functioning modules of all the redundant nodes are shut down to save energy. During the steady state period, the remaining working nodes perform the regular monitoring and communication. Each node has six running states, i.e., election state, Start_working state, Start_sleeping state, back_off state, election, work, and sleep. The transition diagram between the six states is depicted in Fig. 4. When the node density is high, almost all the nodes satisfy Eq. (31) and they will try to switch to the sleep state. However, when the neighbor nodes switch to the sleep state simultaneously, coverage dead zones will exist, and thus, the QoC is undermined. To avoid this case, the ENCP employs the back_off scheme and the scheme which directly reduces the node density. At the election state, the density of potential working nodes is firstly reduced, i.e., k nodes are directly elected as candidate working nodes while the others are switched to the sleep state. Then, the redundant node scheduling is performed among the k candidate nodes. Each candidate elects itself to the start_work state with probability P while the other failed candidates switch to the start_sleep state.
4.3 Set value of k
At the beginning, since all the nodes have the same initial energy and the management node is chosen randomly, the energy are consumed by all the nodes to some extent after one or several working rounds. According to the proposed algorithm, the node with more remained energy is chosen as the management node for the next round. Meanwhile, the rank of all the nodes is updated in the link. During the establishment of the alliance, each node randomly chooses a real number between 0 and 1. If this number is smaller than a certain threshold, this node is chosen as the management node. Then, the identification of this management node is broadcasted to all the nodes. Each node determines its own alliance according to the amplitude of the receiving signal and broadcasts its membership to all of the alliance members. During the data transmission period, all the member nodes transmit data to the management nodes in Time Division Multiple Access (TDMA) slots while the management nodes integrate the receiving data and broadcast them to the base station. After several working rounds, the network is restarted. Then, the next round of election for the management nodes is performed and the new alliances are established.
At the beginning of each round, in order to reduce the density of working sensor node, k nodes are firstly chosen as candidates. Therefore, k nodes should not be too dense or too sparse. k value should be at least larger than the minimal number of working sensor nodes which could guarantee the expectation of QoC.
Since \( \sqrt{2\uppi}\cdot {R}_0\delta \cdot {\mathrm{e}}^{{R}_0^2/\left(2{\delta}^2\right)}/\uppi \left({R}_0^2+{\delta}^2\right)\le 0.1\times {10}^{3} \), the term \( \sqrt{2\uppi}\cdot {R}_0\delta \cdot {\mathrm{e}}^{{R}_0^2/\left(2{\delta}^2\right)} \) has been neglected in practice in Theorem 3 to simplify the calculation, i.e.,
According to Eq. (32), we can derive the expectation of the minimal working sensor nodes to guarantee the expectation of QoC,
In ENCP, we choose Kâ€‰=â€‰âŒˆ2E(k)âŒ‰ so that globally, it can be guaranteed that there are enough nodes to satisfy the desired QoC. Then, by the local node scheduling of the ENCP, redundant nodes are switched to the sleep node to achieve the uniform coverage within the monitoring range. To balance the node energy consumption in the network, the K candidate nodes are chosen in the same way the cluster heads are chosen in [24].
5 ENCP evaluation systems
In order to verify the validity and performance for the ENCP, we perform simulations based on the OPNET Modeler platform. The monitoring area for the simulation is 200â€‰Ã—â€‰200 m^{2} and the sensing ranges of the nodes satisfy the normal distribution N (10,Î´^{2}), where 10 â‰¥ 3.3Î´. The node energy consumption model is the same as the physical model in [25], i.e., the energy consumption ratio for the transmitting state. The transmission rate for the node is 56 kb/s. The time for each round is 200 s while the durations for T_{1}, T_{2}, and T_{3} are 5 s. The probability P for each candidate node to elect itself into the start_work state is 10%. The initial energy for each node is sufficient to last 190â€“210 rounds of consistent receiving state.
An ideal coverage control algorithm should utilize the minimal number of working nodes to satisfy the desired QoC, which could save the network energy consumption as much as possible. The relationship between the required QoC and the obtained QoC is depicted in Fig. 5 for different number of deployed nodes when Î´â€‰=â€‰3. It can be observed that regardless of the number of deployed nodes, the ENCP could always guarantee the required QoC. Since the number of sensing neighbors is definitely an integer, the obtained QoC is a little higher than the required QoC. However, the difference between the required and the obtained QoC quickly reduces to 0 as the required QoC increases. Furthermore, it is also impractical to obtain the exact required QoC when the location information is not available.
The relationship between the number of working nodes and the number of deployed nodes is depicted in Fig. 6 when Î´ =â€‰3. It can be observed from Fig. 6 that the number of working nodes is only related with the desired QoC, instead of the number of deployed nodes. Furthermore, the number of working nodes is almost equal to the result calculated according to Eq. (33). This observation verifies the excellent scalability of the ENCP. Although the LDAS [28] shows similar scalability, much more working nodes are needed for the LDAS to guarantee the same QoC. The reason behind this will be explained in Section 4.1. We can also observe from Fig. 6 that more working nodes are required for a higher required QoC.
The relationship between the required QoC and the obtained QoC for different values of Î´ is depicted in Fig. 7. It can be observe from Fig. 7 that the obtained QoC matches well with the required QoC regardless of the value of Î´. This observation proves that this protocol can be well applied to any MSNs where the sensing ranges satisfy the normal distribution N (R_{0}, Î´^{2}) with R_{0} â‰¥ 3.3Î´.
To further verify the enhancement of the equalization for the network power, we compare the ENCP with the algorithms in [18, 19]. The simulations are performed based on three different sensing fields, and the coverage probability is fixed to 99.9%. The simulation results for different parameters are depicted in Figs. 8, 9, 10, and 11.
Figures 8, 9, 10, and 11 depict the relationship between the network lifetime and the target nodes within different sensing fields. The algorithms we focus on are the Multiple Target Tracking Algorithm (MTTA) [18] and linear programming optimization coverage scheme (LPOCS) [19]. It can be observed from Fig. 8 that at the initial stages of the program, the network lifetime of the three algorithms increases with the number of nodes. However, due to the limit of the value range of this algorithm and the inactive state of the redundant nodes, the network lifetime of the ENCP is lower than the other algorithms when the equalization is finally achieved for the network energy. During the coverage process for the target node, less network energy is required for the ENCP, which can be explained as above. In Fig. 10, parts of the redundant nodes are transitioned to the state of work due to the increase of the area of the sensing fields. As a result, the network lifetime is prolonged. When Î´ = 3, the network lifetime of the ENCP is longer than that of the LPOCS algorithm. When Î´ =â€‰4, the network lifetime of the ENCP is longer than those for both of the other two algorithms. The network lifetime during the coverage for the target node is depicted in Fig. 11. It can be observed that the network lifetime of three algorithms decreases with the increase of target nodes. Finally, the energy tends to be equalized. However, the ENCP exhibits a lower decrease speed during the decline process. This is due to the fact that when a part of the sensing field is densely deployed with the sensor nodes, i.e., the coverage expectation is higher for this region, some redundant nodes are awakened via the scheduling mechanism of the sensor nodes. These awakened nodes are transitioned to the state of work to enhance the coverage intensity and further prolong the network lifetime.
6 Conclusions
Focusing on the sensing characteristics of randomly deployed MSNs, we analyzed the coverage redundancy problem for the MSNs where the sensing ranges satisfy the normal distribution. We also presented the calculation model for the node redundancy degree for which no location information is needed and the calculation model for the minimal number of working nodes to guarantee the network QoC. According to the analytical result, we proposed the ENCP which shut down all the redundant nodes satisfying the redundancy condition. Based on the ENCP, it enables the collaborative scheduling of distributed sensor nodes and balances the energy consumptions of each sensor nodes. The purpose of energy conservation of the networks is achieved since the ENCP maintains the least number of sensor nodes, as working nodes to provide the desired QoC. Simulation results show that the ENCP could not only accurately guarantee the desired QoC, but also efficiently reduce the network energy consumption to prolong the effective network lifetime.
References
N Mittal, U Singh, BS Sohi, A stable energy efficient clustering protocol of wireless sensor networks. Wirel. Netw 23(6), 1809â€“1821 (2017). https://doi.org/10.1007/s1127601612556
V Kumar, SB Dhok, R Tripathi, S Tiwari, Cluster size optimization with Tunable Elfes sensing model for single and multihop wireless sensor networks. Int. J. Electron. 104(2), 312â€“327 (2017). https://doi.org/10.1080/00207217.2016.1216177
Z Zhao, J Willson, L Zaixin, W Weili, Z Xuding, D Dingzhu, Approximating maximum lifetime kcoverage through minimizing weighted kcover in homogeneous wireless sensor networks. IEEE/ACM Trans. Networking 24(6), 3620â€“3633 (2016). https://doi.org/10.1109/TNET.2016.2531688
J Habibi, H Mahboubi, AG Aghdam, Distributed coverage control of mobile sensor networks subject to measurement error. IEEE Trans. Autom. 61(11), 3330â€“3343 (2016). https://doi.org/10.1109/TAC.2016.2521370
L Saewoom, K Kiseon, Key renewal scheme with sensor authentication under clustered wireless sensor networks. Electron. Lett. 51(4), 368â€“369 (2015). https://doi.org/10.1049/el.2014.3327
AK Idrees, K Deschinkel, M Salomon, C Raphael, Perimeterbased coverage optimization to improve lifetime in wireless sensor networks. Eng. Optim. 48(11), 1951â€“1972 (2016). https://doi.org/10.1080/0305215X.2016.1145015
N Xiong, V Athanasios, L Yang, L Song, Y Pan, K Rajgopal, Y Li, Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems. IEEE J. Sel. Areas Commun. 27(4), 495â€“509 (2009). https://doi.org/10.1109/SAC.2009.090512
F Senel, Coverageaware connectivityconstrained unattended sensor deployment in underwater acoustic sensor networks. Wirel. Commun. Mob. Comput. 16(14), 2052â€“2064 (2016). https://doi.org/10.1002/WCM.2667
K Huang, Z Qi, C Zhou, N Xiong, An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans. Syst. Man Cybernetics: Syst. 47(10), 2704â€“2713 (2017) Doi:10.1109 /TSMC.2017.2698457
G Mario, B Holger, S Slawomir, Nomographi functions: efficient computation in clustered Gaussian sensor networks. IEEE Trans. Wirel. Commun. 14(4), 2093â€“2105 (2015). https://doi.org/10.1109/TWC.2014.2380317
M Rout, R Roy, Selfdeployment of randomly scattered mobile sensors to achieve barrier coverage. IEEE Sensor J. 16(18), 6819â€“6820 (2016). https://doi.org/10.1109/JSEN.2016.2590572
M Ozger, E Fadel, OB Akan, Eventtosink spectrumaware clustering in mobile cognitive radio sensor networks. IEEE Trans. Mobile Comput. 15(9), 2221â€“2233 (2016). https://doi.org/10.1109/YMC.2015.2493526
D Saha, N Das, Selforganized area coverage in wireless sensor networks by limited node mobility. Innov. Syst. Softw. Eng. 12(3), 227â€“238 (2016). https://doi.org/10.1007/s1133401602777
Z Sun, Y Zhang, Y Nie, W Wei, J Lloret, H Song, CASMOC: a novel complex alliance strategy with multiobjective optimization of coverage in wireless sensor networks. Wirel. Netw 23(4), 1201â€“1222 (2017). https://doi.org/10.1007/s1127601612133
HH Cho, TK Shih, HC Chao, A robust coverage scheme for UWSNs using the spline function. IEEE Sensor J. 16(11), 3995â€“4002 (2016). https://doi.org/10.1109/JSEN.2015.2429914
N Dong, X Ren, W Wang, M Liu, Node scheduling scheme using spatial resolution of wireless sensor networks. J. Comput. Inf. Syst. 11(10), 3701â€“3708 (2015). https://doi.org/10.12733/jcis14262
X Xing, G Wang, j Li, Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming. Wirel. Commun. Mob. Comput. 14(14), 1397â€“1408 (2014). https://doi.org/10.1002/wcm.2269
T Wang, Z Peng, J Liang, W Sheng, MD Zakirul Alam Bhuiyan, Y Cai, J Cao, Follow targets for mobile tracking in wireless sensor networks. ACM Trans. Sens. Networks 12(4), 31.1â€“31.24 (2016). https://doi.org/10.1145/2968450
Z Sun, Y Shu, X Xing, W Wei, H Song, W Li, LPOCS: a novel linear programming optimization coverage scheme in wireless sensor networks. Ad Hoc & Sens. Wireless Networks 33(14), 173â€“197 (2016)
Z Bo, E Tong, J Hao, W Niu, G Li, Energy efficient sleep schedule with service coverage guarantee in wireless sensor networks. J. Netw. Syst. Manag. 24(4), 834â€“858 (2016). https://doi.org/10.1007/s1092201593619
ZSW Wu, H Wang, H Chen, Xiaofei, A novel coverage algorithm based on eventprobabilitydriven mechanism in wireless sensor network. EURASIP J. Wireless Commun. Networking 58, 1â€“16 (2014) Doi: 10. 1186/16871499201458
Z Sun, R Tao, L Li, X Xing, A new energyefficient multitarget coverage control protocol using eventdrivenmechanism in wireless sensor networks. Internet J. Online Eng. 13(2), 53â€“67 (2017). https://doi.org/10.3991/ijoe.v13i02.6465
G Xing, M Li, T Wang, W Jia, J Huang, Efficient rendezvous algorithms for mobilityenabled wireless sensor networks. IEEE Trans. Mob. Comput. 11(1), 47â€“60 (2012). https://doi.org/10.1109/TMC.2011.66
K Lin, X Tianlang, J Song, Y Qian, Y Sun, Node scheduling for alldirectional intrusion detection in SDRbased 3D WSNs. IEEE Sens. J. 16(20), 7332â€“7341 (2016). https://doi.org/10.1109/JSEN.2016.2558043
JP Mohanty, C Mandal, C Reade, A Das, Construction of minimum connected dominating set in wireless sensor networks suing pseudo dominating set. Ad Hoc Netwroks 42(2), 61â€“73 (2016). https://doi.org/10.1016/j.adhoc.2016.02.003
HS Aghdasi, M Abbaspour, Energy efficient area coverage by evolutionary camera node scheduling algorithm in visual sensor networks. Soft. Comput. 20(3), 1191â€“1202 (2016). https://doi.org/10.1007/s0050001415824
S Jamali, M Hatami, Coverage aware scheduling in wireless sensor networks: an optimal placement approach. Wirel. Pers. Commun. 85(3), 1689â€“1699 (2015). https://doi.org/10.1007/s1127701528628
D Zeng, P Li, S Guo, T Miyazaki, H Jiankun, Y Xiang, Energy minimization in multitask softwaredefined sensor networks. IEEE Trans. Comput. 64(11), 3128â€“3139 (2015). https://doi.org/10.1109/TC.2015.2389802
W Kui, Y Gao, F Li, Y Xiao, Lightweight deploymentaware scheduling for wireless sensor networks. Mobile Networks Appl. 10(6), 837â€“852 (2005). https://doi.org/10.1007/s1103600544428
Cp Chen, S Mukhopadhyay, Cl Chuang, TS Lin, MS Liao, YC Wang, JA Jiang, A hybrid memetic framework for coverage optimization in wireless sensor networks. IEEE Trans. Cybernetics 45(10), 2309â€“2322 (2015). https://doi.org/10.1109/TCYB.2014.2371139
CF Cheng, CW Huang, An energybalanced and timely selfrelocation algorithm for gridbased mobile WSNs. IEEE Sensors J. 15(8), 4184â€“4193 (2015). https://doi.org/10.1109/JSEN.2015.2413367
Q Gao, W Ma, W Luo, A combinatorial key predistribution scheme for twolayer hierarchical wireless sensor networks. Wirel. Pers. Commun. 96(2), 2179â€“2204 (2017). https://doi.org/10.1007/s1127701742922
G Mali, S Misra, TRAST: trustbased distributed topology management for wireless multimedia sensor networks. IEEE Trans. Comput. 65(6), 1978â€“1991 (2016). https://doi.org/10.1109/TC.2015.2456026
H Wang, F Meng, Z Li, Energy efficient coverage conserving protocol for wireless sensor networks. J. Software (China) 21(12), 3124â€“3137 (2010). https://doi.org/10.3724/SP.J.1001.2010.03693
X Jing, H Hanwen, H Yang, A Man Ho, S Li, N Xiong, I Muhammad, V Vasilakos Athanasios, A quantitative risk assessment model involving frequency and threat degree under lineofbusiness services for infrastructure of emerging sensor networks. Sensor 17(3), 642 (2017). https://doi.org/10.3390/s17030642
S Aamir, L Malrey, L Changhoon, N Xiong, K Suntae, L Youngkeun, K Kangmin, W Seonmi, J Gisung, The protocol design and new approach for SCADA security enhancement during sensors broadcasting system. Multimedia Tools Appl. 75(22), 14641â€“14668 (2016). https://doi.org/10.1007/s1104201530502
Y Yoon, YH Kim, An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks. IEEE Trans. cybernetics 43(5), 1473â€“1483 (2013). https://doi.org/10.1109/TCYB.2013.2250955
J Zhang, X Li, S Zhou, X Ye, A novel sleep scheduling scheme in green wireless sensor networks. J. Supercomuting 71(3), 1067â€“1094 (2015). https://doi.org/10.1007/s112270141354z
S Wang, H Yi, L Wu, F Zhou, NN Xiong, Mining probabilistic representative gathering patterns for mobile sensor data. J. Internet Technol. 18(2), 321â€“332 (2017). https://doi.org/10.6138/JIT.2017.18.2.20161125
JW Lee, BS Choi, Jj Lee, Energyefficient coverage of wireless sensor networks using ant colony optimization with three types of pheromones. IEEE Trans. Ind. informatics 7(3), 419â€“427 (2011). https://doi.org/10.1109/TII.2011.2158836
H Mohamadi, AS Ismail, S Salleh, Solving target coverage problem using cover sets in wireless sensor networks based on learning automata. Wirel. Pers. Commun. 75(1), 447â€“463 (2014). https://doi.org/10.1007/s112770131371X
H Cheng, S Zhihuang, N Xiong, X Yang, Energyefficient node scheduling algorithm for wireless sensor networks using Markov random field model. Inf. Sci. 329(2), 461â€“477 (2016). https://doi.org/10.1016/j.ins.2015.09.039
P Chen, W Hu, Sleepwake up scheduling with probabilistic coverage model in sensor networks. International Journal of Parallel, Emergent and Distributed Syst. 29(1), 1â€“16 (2014). https://doi.org/10.1080/17445760.2013.766733
B Bae, J Park, S Lee, A free market economy model for resource management in wireless sensor networks. Wireless Sens. Networks 7(6), 76â€“82 (2015). https://doi.org/10.4236/wsn.2015.76007
L Zaixin, WW Li, M Pan, Maximum lifetime scheduling for target coverage and data collection in wireless sensor networks. IEEE Trans. Vehicular Technol. 64(2), 714â€“727 (2015). https://doi.org/10.1109/TVT.2014.2322356
N Xiong, RW Liu, M Liang, W Di, Z Liu, W Huisi, Effective alternating direction optimization methods for sparsityconstrained blind image deblurring. Sensors 17(1), 174 (2017). https://doi.org/10.3390/s17010174
Acknowledgements
This work was supported by the National Natural Science Foundation of China under grant no. 61628210, Henan Province Education Department Cultivation Young Key Teachers in University of under grant no. 2016GGJS158, Henan Province Education Department Natural Science Foundation under grant no. 17A520044, Luoyang Institute of Science and Technology Highlevel Research Start Foundation under grant no. 2017BZ07, Natural Science and Technology Research of Henan Province Department of Science Foundation under grant no. 162102210113, Guangdong Natural Science Foundation of China under grant no. 2016A030313540, Guangzhou Education Bureau Science Foundation under grant no. 1201430560, Science and Technology Planning Project of Guangzhou under grant no. 201707010284, and Shaanxi Education Bureau Science Foundation under grant no. 2016SF428. Finally, great thank to the anonymous reviewers for their valuable suggestions to improve the quality of the paper.
Funding
This work was sponsored by the National Natural Science Foundation of China under grant no. 61628210, Henan Province Education Department Cultivation Young Key Teachers in University of under grant no. 2016GGJS158, Henan Province Education Department Natural Science Foundation under grant no. 17A520044, Luoyang Institute of Science and Technology Highlevel Research Start Foundation under grant no. 2017BZ07, Natural Science and Technology Research of Henan Province Department of Science Foundation under grant no. 162102210113, Guangdong Natural Science Foundation of China under grant no. 2016A030313540, Guangzhou Education Bureau Science Foundation under grant no. 1201430560, Science and Technology Planning Project of Guangzhou under grant no. 201707010284, and Shaanxi Education Bureau Science Foundation under grant no. 2016SF428.
Author information
Authors and Affiliations
Contributions
ZYS and XFX contributed to the conception and algorithm design of the study. ZYS and GZZ contributed to the acquisition of the simulation. All authors contributed to the analysis of the simulation data and approved the final manuscript.
Corresponding author
Ethics declarations
Authorsâ€™ information
Zeyu Sun received a M.S. and Ph.D degree from Lanzhou University and Xiâ€™an Jiaotong University, in 2010 and 2017. He is an assistant professor in the School of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, Henan, China. He is a member of China Computer Federation. His research interests lie in wireless sensor networks, parallel computing, mobile computing, and Internet of things (email: lylgszy@163.com).
Guozeng Zhao received a M.S. degree from Taiyuan University of Technology in 2010. He is a lecturer in School of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, China. His research interests include wireless sensor networks and cloud computing (email:ly_zgz@163.com).
Xiaofei Xing received BS degree in computer science and technology from Henan University of Science and Technology in 2003, and an MS and Ph.D. degrees in Central South University, China, in 2008 and 2012, respectively. He has been a Research Fellow at University of Tsukuba, Japan, and he had been also a postdoctorate researcher in Applied Mathematics. He is an assistant professor in the School of Computer Science and Educational Software, Guangzhou University, Guangzhou, China. His research interests include wireless sensor networks, mobile computing, and network performance analysis (email:xxfcsu@163.com).
Competing interests
The authors declare that they have no competing interests.
Publisherâ€™s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Sun, Z., Zhao, G. & Xing, X. ENCP: a new Energyefficient Nonlinear Coverage Control Protocol in mobile sensor networks. J Wireless Com Network 2018, 15 (2018). https://doi.org/10.1186/s1363801810237
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801810237