1 / 60

Mobile Sensor Networks

Mobile Sensor Networks. Pei-Ling Chiu. Outline. Research Framework Paper: ”Movement-Assisted Sensor Deployment” Related Work Discussion. Movement-Assisted Sensor Deployment. Guiling Wang, Guohong Cao, and Tom La Porta Department of Computer Science & Engineering

frickm
Télécharger la présentation

Mobile Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Sensor Networks Pei-Ling Chiu

  2. Outline • Research Framework • Paper: ”Movement-Assisted Sensor Deployment” • Related Work • Discussion Pei-Ling Chiu

  3. Movement-Assisted Sensor Deployment Guiling Wang, Guohong Cao, and Tom La Porta Department of Computer Science & Engineering The Pennsylvania State University IEEE INFOCOM 2004

  4. Introduction • In this paper, the authors design and evaluate three distributed self-deployment protocols for sensor networks. • The problem statement is: given the target area, how to maximize the sensor coverage with less time, movement distance and message complexity. • The proposed distributed self-deployment protocols • 1. To discover the existence of coverage holes • 2. The proposed protocols calculate the target positions of these sensors. • They use Voronoi diagrams to discover the coverage holes and design three movement-assisted sensor deployment protocols. • Performance metrics: coverage, deployment time, moving distance, scalability to initial deployment and communication range, etc. Pei-Ling Chiu

  5. Voronoi Diagram • The Voronoi diagram of a collection of nodes partitions the space into polygons. • Every point in a given polygon is closer to the node in this polygon than to any other node. • Fig. 1 • Voronoi polygon of point O: Gp(O)=(p(O), Ep(O)) • p(O)is the set of Voronoi vertices of O. • Ep(O) is the set of Voronoi edges of O. • N(O) denotes the set of Voronoi neighbors of O. • The Voronoi edges of Oare the vertical bisectors of the line passing O and its Voronoi neighbors, e.g., V5V1is OA’s bisector. Pei-Ling Chiu

  6. Voronoi Diagram and Voronoi Polygon Neighbors N(O)={A, B, C, D, E} Vertices (O)={V1, V2, V3, V4, V5} Edges E(O)={V1V2, V2V3, V3V4, V4V5, V5V1} Point O→sensor node Pei-Ling Chiu

  7. Voronoi Diagram • These Voronoi polygons together cover the target field. • The points inside one polygon are closer to the sensor inside this polygon than the sensors positioned elsewhere. • Each sensor is responsible for the sensing task in its Voronoi polygon. • In this way, each sensor can examine the coverage hole locally. • To construct the Voronoi polygon, each sensor only needs to know the existence of its Voronoi neighbors, which reduces the communication complexity. Pei-Ling Chiu

  8. Movement-Assisted Sensor Deployment Protocols • The sensor deployment protocol runs iteratively until it terminates or reaches the specified maximum round. • In each round, sensors • To broadcast their locations • To construct their local Voronoi polygons based on the received neighbor information • The Voronoi polygons are examined to determine the existence of coverage holes. • If any coverage hole exists, sensors decide where to move to eliminate or reduce the size of the coverage hole; otherwise, they stay. Pei-Ling Chiu

  9. Three Movement-Assisted SensorDeployment Protocols • The VECtor-based Algorithm (VEC) • The virtual forces will push sensors from the densely covered area to the sparsely covered area. • The VORonoi-based Algorithm (VOR) • The Minimax Algorithm (Minimax) Pei-Ling Chiu

  10. The Deployment Protocol (5) VEC() / VOR() / Minimax() Pei-Ling Chiu

  11. The VECtor-based Algorithm • VEC is motivated by the attributes of electro-magnetic particles: when two electro-magnetic particles are too close to each other, an expelling force pushes them apart. • Assume d(si, sj)is the distance between sensor siand sensor sj. • daveis the average distance between two sensors when the sensors are evenly distributed in the target area. • dave can be calculated beforehand since the target area and the number of sensors to be deployed are known. • The virtual force exerted by sj on siis denoted asFij, with the direction from sj to si. Pei-Ling Chiu

  12. Virtual Force • The virtual force between two sensors siand sj will push them to move (dave - d(si, sj))/2away from each other. • In case one sensor covers its Voronoi polygon completely and should not move, the other sensor will be pushed dave -d(si, sj)away. • The field boundary also exert forces, denoted as Fb, to push sensors too close to the boundary inside. • Fbexerted on siwill push it to move dave/ 2 - db(si) • db(si)is the distance of sito the boundary. • dave/2is the distance from the boundary to the sensors closest to it when sensors are evenly distributed. • The final overall force on sensors is the vector summation of virtual forces from the boundary and all Voronoi neighbors. Pei-Ling Chiu

  13. Virtual Force • Local coverage • The coverage of the local Voronoi polygon • The intersection of the polygon and the sensing circle • Movement-adjustment scheme • Sensor checks whether the local coverage will be increased by its movement. • If the local coverage is increased at the new target location, the sensor will move; otherwise, it will stay. Pei-Ling Chiu

  14. The VECtor-based Algorithm Pei-Ling Chiu

  15. Snapshot of the Execution of VEC • 35 sensors in a 15m by 15m space • Sensing range = 6m Coverage: (a) 75.7%, (b) 92.2%, (c) 94.7% Pei-Ling Chiu

  16. The VORonoi-based Algorithm • VOR algorithm pulls sensors to their local maximum coverage holes. • In VOR, if a sensor detects the existence of coverage holes, it will move toward its farthest Voronoi vertex (denoted as Vfar). • Fig. 5 shows VOR works. • Point A is the farthest Voronoi vertex of si and d(A, si) is longer than the sensing range. Sensor simoves along line siAto Point B, where d(A,B)is equal to the sensing range. Pei-Ling Chiu

  17. Maximum Moving Distance • local view of Gp(si) is not correct • siis not aware of the existence of sjbecause of communication limitations. • if si moves toward point A and stops at a distance d(A,B) (sensing range), si has moved more than needed. • We limit the maximum moving distance to be at most half of the communication range to avoid the situation. Pei-Ling Chiu

  18. Oscillation Control • Moving oscillations may occur if new holes are generated due to sensor’s leaving. • To deal with this problem, we add oscillation control which does not allow sensors to move backward immediately. • Each time a sensor wants to move, it first checks whether its moving direction is opposite to that in the previous round. • If yes, it stops for one round. Pei-Ling Chiu

  19. The VORonoi-based Algorithm Pei-Ling Chiu

  20. Snapshot of the Execution of VOR • Coverage: (a) 75.7%, (b) 89.2%, (c) 95.6% Pei-Ling Chiu

  21. The Minimax Algorithm • Minimax does not move as far as VOR to avoid the situation that the vertex which was originally close becomes a new farthest vertex. • Minimax chooses the target location as the point inside the Voronoi polygon whose distance to the farthest Voronoi vertex (Vfar) is minimized. • We call this point the Minimax point, denoted as Om. • Minimax can reduce the variance of the distances to the Voronoi Vertices, resulting in a more regular shaped Voronoi polygon, which better utilizes sensor’s sensing circle. Pei-Ling Chiu

  22. The Minimax Algorithm • A circle centered at point O with radius r is denoted C(O, r). • The circumcircle of three points Vu, Vv, Vwis denoted as C(Vu, Vv, Vw). • Definition 1: Minimax circle Cm(Om, rm)is the circle centered at the Minimax point Om, with radius rm= d(Om, Vfar). • Lemma 1: Cm(Om, rm) must pass at least two Voronoi vertices. Pei-Ling Chiu

  23. The Minimax Algorithm • Definition 2: The circumcircle of two point Vuand Vw(C(Vu, Vw)) is defined as the circle whose center is the midpoint of Vuand Vwand whose radius is d(Vu, Vw)/2. • Lemma 2: If Cm(Om, rm) passes exactly two Voronoi vertices:Vuand Vw, then Cm(Om, rm) = C(Vu, Vw). In other words, if the Minimax circle passes only two Voronoi vertices, it must be centered at the midpoint of these two vertices. Pei-Ling Chiu

  24. The Minimax Algorithm • If the Minimax circle passes more than two Voronoi vertices, it is the circumcircle of these vertices. • To find the Minimax point, • to find all the circumcircles of any two and any three Voronoi vertices • Among those circles, the one with the minimum radius covering all the vertices is the Minimax circle. • The center of this circle is the Minimax point. • Theorem 1: Let Γ = {C(Vu, Vv) | C(Vu, Vv) covers all vertices in Vp, and Vu, Vv Vp} { C(Vu, Vv, Vw) | C(Vu, Vv, Vw) covers all vertices in Vp, and Vu, Vv, VwVp}, then Cm(Om, rm)  Γ andC(O, r)Γ, r rm. Pei-Ling Chiu

  25. The Minimax Algorithm Pei-Ling Chiu

  26. Snapshot of the Execution of Minimax • Coverage: (a) 75.7%, (b) 92.7%, (c) 96.5% Pei-Ling Chiu

  27. Termination • The local coverage increase of one sensor does not affect the local coverage of another sensor. Thus, sensors will stop naturally when the best coverage is obtained. • In some applications, the coverage requirement is not that high. • To terminate the deployment procedure earlier, we use a threshold , defined as the minimum increase in coverage below which a sensor will not move. • With a larger , the deployment will finish earlier. Pei-Ling Chiu

  28. Optimizations • In some cases, the initial deployment of sensors may form clusters, as shown in Fig. 10. • In this case, sensors located inside the clusters can not move for several rounds, since their Voronoi polygons are well covered initially. • This problem prolongs the deployment time. • To reduce the deployment time in this situation, we propose an optimization which detects whether too many sensors are clustered in a small area. • The algorithm “explodes” the cluster to scatter the sensors apart, if necessary. Pei-Ling Chiu

  29. Optimizations • Each sensor compares its current neighbor number to the neighbor number it will have if sensors are evenly distributed. • The explosion algorithm • The sensor chooses a random position within an area centered at itself which will contain the same number of sensors as its current neighbors in the even distribution. • only runs in the first round. • It scatters the clustered sensors and changes the deployment to be close to random. Pei-Ling Chiu

  30. Pei-Ling Chiu

  31. Performance Evaluation • Performance metrics • Deployment Quality • Sensor coverage • Time → the number of rounds • Deployment Cost • The sensors cost→the number of sensor • Energy consumption→moving distance Pei-Ling Chiu

  32. Parameters • Fields size: 50m50m, 150m 150m • Sensor density: 30,35, 40, 45 sensors/50mx50m • Initial deployments: • random distribution, normal distribution • Sensor communication range: 10m~28m, (20m) • Sensor sensing range: 10m • =0 Pei-Ling Chiu

  33. Coverage and Sensor Cost 85 sensors, 98% coverage Pei-Ling Chiu

  34. Coverage and Sensor Cost In the first round, VOR is better than Minimax. VEC is sensitive to the initial deployment. Pei-Ling Chiu

  35. Minimax, VOR: moving distance are larger under lower density VEC: the moving distance is similar under different sensor densities Moving Distance Pei-Ling Chiu

  36. Impact of Topology • Normal distribution • With as high as 80 sensors, the coverage cannot reach 80% even when  is 10. Pei-Ling Chiu

  37. VEC-O: VEC+optimization, VOR-O: VOR+optimization, Minimax-O: Minimax +optimization Optimization: explode algorithm Minimax can not increase the coverage as quickly as in the random case. High-degree clustering  =1 n=40 Minimax surpasses VEC after the tenth round when σ = 1, and after the seventh round whenσ = 5. This again demonstrates that Minimax has advantage in coverage. Pei-Ling Chiu

  38. Impact of Communication Range • When the communication range is lower than 12m, the performance is reduced • When the communication range is too low, most sensors do not know all their Voronoi neighbors, and the constructed Voronoi diagram is not very accurate. Pei-Ling Chiu

  39. Discussion • Optimal Movement vs. Communication • Sensors move only once • the centralized algorithms • Simulated movement • The three distributed algorithms only incur an approximately additional 20% movement overhead, compared to these algorithms. • Although the centralized approach may minimize the sensor movement, a central server architecture may not be feasible in some applications. • Simulated movement • Poor performance under network partitions Pei-Ling Chiu

  40. Discussion • As the sensing range decreases with regard to the communication range, our protocols will perform very well because they can accurately construct the Voronoi diagrams. • The protocols are not sensitive to the scale of the network and target field • The performance of the algorithms depend on the density of sensors. Pei-Ling Chiu

  41. Outline • Research Framework • Paper: ”Movement-Assisted Sensor Deployment” • Related Work • Discussion Pei-Ling Chiu

  42. Constrained Coverage for Mobile Sensor Networks Sameera Poduri and Gaurav S. Sukhatme In IEEE International Conference on Robotics and Automation, May 2004 Department of Computer Science University of Southern California, Los Angeles, California, USA

  43. Introduction • In this paper the authors consider constrained coverage for a mobile sensor network. • The constraint is node degree - the number of neighbors of each node in the network. • More precisely, the authors require each node to have a minimum degree K, where K is parameter of the deployment algorithm. • Motivation: • Reliability: Sometimes a high degree is required for the sake of redundancy. • Connectivity: Global network connectivity is strongly dependent on node degree. Pei-Ling Chiu

  44. Introduction • A global map of the environment is either unavailable or of little use because the environment is not static. • They also assume that no global positioning system (GPS) is available. • Approach: • Based on virtual potential fields • Force laws: • Repulsive force: to maximum coverage • Attractive force: to impose the constraint of K-degree Pei-Ling Chiu

  45. Problem Formulation • Problem:Given N mobile nodes with isotropic radial sensors of range Rs and isotropic radio communication of range Rc, how should they deploy themselves so that the resulting configuration maximizes the net sensor coverage of the network with the constraint that each node has at least K neighbors? • Neighbors: if the Euclidean distance between two nodes is less than or equal to the communication range Rc. • Assumptions: • 1) The nodes are capable of omni-directional motion, • 2) Each node can sense the exact relative range and bearing of its neighbors, • 3) It follows a binary detection model. Pei-Ling Chiu

  46. Problem Formulation • The deployment algorithm: • Distributed and scalable • Not require a prior map or localization of nodes • Performance metrics: • 1) the normalized per-node coverage. Coverage =(Net Area Covered by the Network) / NRs2 • 2) the percentage of nodes in the network that have at least K neighbors. • 3) the average degree of the network. Pei-Ling Chiu

  47. The Deployment Algorithm Pei-Ling Chiu

  48. Symmetrically Tiled Network • The coverage of these Symmetrically Tiled networks is an upper bound on the coverage achievable by networks given the constraint of K-degree. Pei-Ling Chiu

  49. Experiments Pei-Ling Chiu

  50. Event-Based Motion Control 1. Zack Butler and Daniela Rus, “Controlling Mobile Sensors for Monitoring Events with Coverage Constraints”,ICRA '04. 2004 IEEE International Conference on , Volume: 2 , April 26-May 1, 2004. 2. Zack Butler and Daniela Rus,“Event-Based Motion Control for Mobile-Sensor Networks,” IEEE Pervasive Computing, October-December 2003.

More Related