ON BROADCAST SCHEDULING AND DYNAMIC PHENOMENA DETECTION IN WIRELESS SENSOR NETWORKS

Size: px
Start display at page:

Download "ON BROADCAST SCHEDULING AND DYNAMIC PHENOMENA DETECTION IN WIRELESS SENSOR NETWORKS"

Transcription

1 ON BROADCAST SCHEDULING AND DYNAMIC PHENOMENA DETECTION IN WIRELESS SENSOR NETWORKS By RAVI TIWARI A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2010

2 c 2010 Ravi Tiwari 2

3 To my parents, Mrs Shashi Tiwari and Mr Vasudev Tiwari 3

4 ACKNOWLEDGMENTS It is an immense pleasure for me to thank all those who made this dissertation possible. First of all, I would like to profoundly thank my committee chair and advisor Dr. My T. Thai for her encouragement, supervision and support, from initial to the concluding stage of my doctoral research. Her precious advices and moral support helped me to sail through different low and high phases of the PhD life. For this, I will always be grateful to her for the rest of my life. Further, I would like to thank members of my supervisory committee, Dr. Randy Y. C. Chow, Dr. Shigang Chen, Dr. Tamer Kahveci, and Dr. Panos M. Pardalos for their invaluable guidance. Finally, I would like to express gratitude to my family and friends for their unconditional help and emotional support. 4

5 TABLE OF CONTENTS page ACKNOWLEDGMENTS LIST OF FIGURES ABSTRACT CHAPTER 1 INTRODUCTION Efficient Data Broadcasting and Aggregation Efficient In-Network Detection and Tracking of Dynamic Phenomena CENTRALIZED APPROXIMATION ALGORITHM FOR INTERFERENCE- AWARE BROADCAST SCHEDULING Introduction Network Model and Problem Definition Network Model Problem Definition Tiling and Coloring of 2-Dimensional Plane Using Regular Hexagons Tiling and Coloring of 3-Dimensional Space Broadcast Scheduling Algorithm (BSA) Algorithm Description O(1)-Approximation Ratio for Interference-Aware Broadcast Scheduling Problem in 2-Dimension O(1)-Approximation Ratio for Interference-Aware Broadcast Scheduling Problem in 3-Dimension Centralized Greedy Heuristic for broadcast scheduling Conclusion LOCALIZED APPROXIMATION ALGORITHM FOR INTERFERENCE- AWARE BROADCAST SCHEDULING Introduction Localized Algorithm for Broadcast Scheduling Localized Generation of Broadcasting Structure Broadcast Scheduling of Broadcast Message An Example Scenario Localized Broadcast Scheduling Algorithm in 3-Dimension Experimental Evaluation Effect of Number of Sensor Nodes on Broadcast Latency Effect of β on Broadcast Latency Effect of α on Broadcast Latency Conclusion

6 4 ALL-TO-ALL DATA BROADCASTING AND ALL-TO-ONE DATA AGGREGATION Introduction Localized All-To-All Data Broadcast Scheduling Algorithm Distributed All-To-One Data Aggregation Scheduling Algorithm Distributed All-To-All Broadcast Scheduling Algorithm Experimental Evaluation Results for Varying the Number of Sensor Nodes Results for Varying β Results for Varying α Conclusion DETECTION AND TRACKING OF PHENOMENA CLOUD: NEW LOCALIZED APPROACHES AND APPLICATIONS Introduction Phenomena Cloud: Challenges and Representation Major Challenges Representation Proposed Solution for Detection and Tracking Classification of Sensors Keeping Tabs on the Neighborhood Transition Rules Initial Selection of Potential Candidate Sensors Monitoring for Initial Occurrences Notification of Initial Occurrence Growth of Phenomenon Cloud Shrinking of Phenomenon Cloud Real-Time Monitoring by Applications Optimizing Energy Consumption and Resource Utilization The Integer Program Formulation Optimized Density Algorithm Clustering method Localized protocol A Practical Application of Phenomena Detection and Tracking Performance Evaluation Effectiveness of Detection Strategy Experimental setup Results and analysis Resource and Power Consumption Experimental setup Results and analysis Related Work Conclusion

7 6 LOCALIZED ENERGY EFFICIENT DETECTION AND TRACKING OF DYNAMIC PHENOMENA BOUNDARY Introduction System Model Detecting and Tracking of Dynamic Phenomena Boundary Localized Clustering and Data Aggregation Performance Evaluation Conclusion CONCLUSION REFERENCES BIOGRAPHICAL SKETCH

8 Figure LIST OF FIGURES page 2-1 Sufficient conditions for interference-awareness based on transmitters Sufficient conditions for interference-awareness based on receivers Comparison of different plane tiling polygon. Figures a, b, c and d respectively show a square, a rhombus, a triangle and a hexagon, having maximum distance within them equal to The new X h Y h coordinate system Closest points p 1 and p 2 in two hexagons Co-Color Hexagons of h(0, 0) for i = 2 and j = 3. The index of sub-lattice Rh in H i.e. det(ā, B) = i 2 + j 2 + ij = Comparison of number of colors used to color the hexagon tiling using our scheme and Scott et. al [1] Comparison of different spacing filling polyhedra. Figures a, b, c and d respectively show a truncated octahedron, a rhombic dodecahedron, a cube and a hexagonal prism, having maximum distance within them equal to The tiling of space using truncated octahedrons The X t Y t Z t Co-ordinate System Coloring pattern for d = 1, m = 3 and n = 3, Colors assigned to the truncated octahedrons are represented by numbers Elements of the Broadcasting Structure Hexagon coloring generated by Algorithm 7 for k = 4, colors assigned to the hexagons are represented by numbers An Example showing the functioning of a part of the broadcast structure An Epoch A broadcast structure Data broadcasting on top of a broadcast structure Effect of number of nodes on Average Latency Average BFS height Average optimality ratio

9 3-10 Effect of β on Average Latency Effect of α on Average Latency Comparison of various heuristics algorithms Effect of No. of Nodes on Average Experimental Approximation Ratio of All-to-All data broadcasting Algorithms Effect of No. of Nodes on Average Experimental Approximation Ratio of All-to-One data broadcasting Algorithms Effect of No. of Nodes on Average Experimental Approximation Ratio of One-to-All data broadcasting Algorithms Effect of β on Average Experimental Approximation Ratio of All-to-All data broadcasting Algorithms Effect of β on Average Experimental Approximation Ratio of All-to-One data broadcasting Algorithms Effect of β on Average Experimental Approximation Ratio of One-to-All data broadcasting Algorithms Effect of α on Average Experimental Approximation Ratio of All-to-All data broadcasting Algorithms Effect of α on Average Experimental Approximation Ratio of All-to-One data broadcasting Algorithms Effect of α on Average Experimental Approximation Ratio of One-to-All data broadcasting Algorithms Dissection of the Phenomena Cloud Classification of the Participating Sensors Detection and Tracking of a Phenomena Cloud Action Taken by a Sensor Node with respect to its Neighbors which are not idle Ratio of Total Active Sensors to Cloud Size in a Rectangular Sensor Grid Partition shape as square Partition shape as rhombus Partition shape as Equilateral Triangle Partition shape as Regular Hexagon The Hexagon Lattice

10 5-11 Clustering on the basis of hexagon lattice Gator Tech Smart House Smart Floor Tile with force sensors and Atlas Platform Node Ripple Effect of a Foot Step on the Smart Floor Walking motion as a Phenomena Effect of varying n with p T = 0.4 and m = Effect of varying p T with n = 3 and m = Effect of varying m with n = 3 and P T = Power Consumption Specifications for Atlas Epoch-wise comparison based on number of active nodes involved in detection and tracking process Epoch-wise comparison based on number of update messages send to the Centralized Query Processor (CQP) Epoch-wise comparison based on number of messages exchanged between one-hop neighbors to implement the algorithms Epoch-wise comparison based on the Energy Consumption Comparison based on overall 50 Epochs Comparison based on different grid size Epoch-wise comparison based on number of active nodes involved in detection and tracking process Epoch-wise comparison based on number of update messages send to the Centralized Query Processor (CQP) Epoch-wise comparison based on number of messages exchanged between one-hop neighbors to implement the algorithms Epoch-wise comparison based on the Energy Consumption Comparison based on overall 5 Epochs Snapshots of expanding phenomena cloud during Epochs t 10, t 15, t Active Sensors during Epoch t 10, for DistPDT Active Sensors during Epoch t 10, for FDA

11 5-34 Active Sensors during Epoch t 10, for ODA Active Sensors during Epoch t 15, for DistPDT Active Sensors during Epoch t 15, for FDA Active Sensors during Epoch t 15, for ODA Active Sensors during Epoch t 20, for DistPDT Active Sensors during Epoch t 20, for FDA Active Sensors during Epoch t 20, for ODA Percentage of holes generated wrt percentage of update messages lost Detection and Tracking with 5% update message lost for FDA Detection and Tracking with 5% update message lost for ODA Detection and Tracking with 10% update message lost for FDA Detection and Tracking with 10% update message lost for ODA Detection and Tracking with 15% update message lost for FDA Detection and Tracking with 15% update message lost for ODA Classification of Sensor Nodes in the WSN Types of Nodes in the WSN Types of messages in the WSN The Transition Rules State Transition Diagram for a Sensor node Expansion of the phenomena cloud Shrinking of the phenomena cloud X h Y h co-ordinate System for Hexagon tiling H Data aggregation based on clustering generated by the hexagonal tiling Power consumption specifications for a sensor node Comparison based on number of boundary nodes Comparison based on number of update messages Comparison based on energy consumption

12 6-14 Comparison based on messages exchanged Comparison based on number of update messages at different phenomena expansion speed Comparison based on energy consumption at different phenomena expansion speed Comparison based on messages exchanged at different phenomena expansion speed Snapshot of phenomena in WSN Estimated boundary with 0% message loss Estimated boundary with 15% message loss Estimated boundary with 30% message loss Estimated boundary with 45% message loss

13 Abstract of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy ON BROADCAST SCHEDULING AND DYNAMIC PHENOMENA DETECTION IN WIRELESS SENSOR NETWORKS Chair: My T. Thai Major: Computer Engineering By Ravi Tiwari August 2010 Majority of network applications designed on top of Wireless Sensor Networks (WSNs) involve detection and tracking of some physical phenomena. Additionally, they utilize some primitive services such as broadcasting and aggregation for disseminating and collecting information. Broadcasting is an operation to promulgate some information from a source node to all other nodes in the network. In contrast, aggregation is an operation to collect the sensed information from all nodes in the network at a specific sink node. Sensor nodes in WSNs communicate via radio transmissions. Due to Wireless Broadcast Advantage (WBA) of radio transmissions, performing efficient data broadcasting or data aggregation with minimum latency is nontrivial and proved to be NP-hard. Flooding is a straightforward approach which can be used. Unfortunately, it generates redundant transmissions, contentions and collisions, which aggravates the network throughput and results in a broadcast storm. Broadcast scheduling and aggregation scheduling are more intelligent and effective mechanisms to perform efficient broadcasting and aggregation respectively. These are based on scheduling the interfering transmissions, which avoids broadcast storm and improves network throughput. Existing researches on broadcast scheduling and aggregation scheduling provide centralized solutions, which cannot be implemented locally. Additionally, they consider very elementary network and interference models, in which, either all sensor nodes have 13

14 the same transmission range or their transmission ranges are equal to their interference ranges. These assumptions are not practical. Furthermore, they entirely ignore the existence of WSNs in 3D. Most of the existing research on phenomena detection and tracking using WSNs assume the phenomena are invariant in shape, size and motion. However, in real life there exist dynamic phenomena such as oil spills, mud flow, diffusion or leakage of gases, which are characterized by non-deterministic variations in shape, size and direction of motion. These dynamic phenomena are termed as phenomena cloud. Due to the absence of any well defined model for phenomena clouds, their detection and tracking through WSNs is extremely challenging. Since sensor nodes have limited energy and processing power, the efficient detection and tracking of phenomena cloud with an objective to maximize network life time is a challenging optimization problem. The focus of this dissertation is mainly on following two imperative optimization problems: 1. Efficient data broadcasting and aggregation. 2. Efficient detection and tracking of dynamic phenomena. The main contributions of this dissertation are: 1. A constant approximation algorithm for broadcast scheduling in WSNs, which has the state of the art approximation ratio. 2. The first constant localized approximation algorithm for broadcast scheduling in WSNs. 3. The first constant distributed approximation algorithm for all-to-one data aggregation. 4. The first constant distributed approximation algorithm for all-to-all broadcast scheduling. 5. A localized in-network algorithm for detection and tracking of phenomena cloud. 14

15 6. An energy efficient localized algorithm for detection and tracking of phenomena cloud boundary. 15

16 CHAPTER 1 INTRODUCTION A Wireless Sensor Network (WSN) is a collection of sensor nodes deployed to sense some phenomena, collect information and send it to the base station for further processing on multi-hop paths. WSNs have lots of applications in various fields where continuous monitoring is extremely critical and cannot be performed by humans due to issues like risk, reachability, accuracy and cost. Due to recent advancements in micro-electronics and wireless technologies, various types of cost effective sensor nodes are modeled and realized for different applications such as environment and habitat monitoring [2 8], health monitoring [9 11], critical military operations like surveillance and reconnaissance to keep track of enemy. Recently, the use of WSNs is studied for applications involving dynamic phenomena such as oil spills, mud flow, etc [12, 13]. Mostly all network applications designed on top of WSNs involve detection and tracking of some physical phenomena. Additionally, they utilize some primitive services like broadcasting and aggregation for disseminating and collecting information. Broadcasting is an operation to promulgate some information from a source node to all other nodes in the network. In contrast, aggregation is an operation to collect the sensed information from all nodes at a specific node. Sensor nodes in WSNs communicate via radio transmissions. The broadcast nature of radio transmissions, called Wireless Broadcast Advantage (WBA) [14], enables a transmitting sensor to broadcast a message to all receiving sensors within its transmission range in a single transmission. However, more than one sensor transmitting simultaneously may result in interference at receivers. Consequently, performing efficient data broadcasting or data aggregation with minimum latency is nontrivial in WSNs and proved to be NP-hard [15]. However, one straightforward approach to perform data broadcasting or aggregation is flooding [16, 17]. Unfortunately, it generates redundant transmissions, contentions and collisions in the network, which aggravates the network throughput and results in 16

17 a broadcast storm [18]. A more intelligent approach to perform efficient data broadcast or data aggregation is to schedule the interfering transmission. This avoids broadcast storm and considerably improves network throughput and latency. In the existing literature on WSNs, broadcast scheduling and aggregation scheduling are formulated as two important optimization problems with objective to minimize latency. Most of the existing research on phenomena detection and tracking using WSNs assume the phenomena is invariant in shape, size and motion [19 23]. However, in real life there exist dynamic phenomena such as oil spills, mud flow, diffusion or leakage of gases that are characterized by non-deterministic variations in shape, size and direction of motion. These dynamic phenomena are termed as phenomena cloud. Due to the absence of any well defined model for phenomena clouds, their detection and tracking through WSNs is extremely challenging. Since sensor nodes have limited energy and processing power, the efficient detection and tracking of phenomena cloud with an objective to maximize network life time is a challenging optimization problem. The inherently distributed nature of sensor nodes introduces many intriguing and challenging optimization problems which have enormous research potential. Efficiently solving these problems is pivotal for resourcefully designing critical applications for WSNs. The focus of this dissertation is mainly on following two imperative optimization problems in WSNs: 1. Efficient data broadcasting and aggregation. 2. Efficient detection and tracking of dynamic phenomena (phenomena cloud). In the rest of this chapter, we provide a detailed introduction and background for these two problems. 1.1 Efficient Data Broadcasting and Aggregation Data broadcasting and data aggregation are two most primitive operations in multi-hop WSNs. The purpose of data broadcasting is to convey a message from a source to all other nodes. Its latency directly governs the performance of various 17

18 delay constraint distributed protocols in WSNs such as route discovery, service discovery, broadcasting updates etc, which require data promulgation. In contrast, data aggregation is performed to efficiently collect the sensed information from all sensor nodes at a sink node or a base station for further processing or forwarding. A WSN can be closely modeled using a graph G = (V, E), where the vertices in set V represent network nodes and edges in set E represent the communication links. The data broadcast in wireless network has been studied using different kinds of graph models with an objective to minimize the broadcast latency. The theoretical lower bound on minimum latency is the radius R of the network with respect to the source node v s V. In [24], Chlamtac et. al. proved that the minimum latency broadcast schedule problem is NP-hard for general graphs. There are several additive [25],[26], and multiplicative [27], [28], [24],[29] approximation algorithms proposed for this problem in general graphs. In [30] Elkin et. al. proved that the minimum latency broadcast scheduling problem cannot have an Ω(logn) multiplicative approximation unless NP BPTIME(n O(loglogn) ). In [31], they also proved that it is impossible to have an opt(g) + log 2 (n) additive approximation algorithm unless NP BPTIME(n O(loglogn) ). However, for wireless networks, restrictive graph models such as Unit Disk Graphs (UDG) and Disk Graphs (DG) in 2D and Unit Ball Graphs (UBG) and Ball Graphs (BG) in 3D, are more suitable. The UDG and UBG models a wireless network whose nodes have the same transmission range, the DG and BG models the wireless networks where the nodes have different transmission ranges. In [15], Gandhi et. al. studied the broadcast scheduling problem in Disk Graph (DG) and proved that the minimum latency broadcast scheduling problem is NP-hard. In [32], Scott et. al. presented a solution for UDG, using the geometric property of UDG they prove a lower bound of 16R 15. Further, they extend the pipelined broadcasting algorithm in [33] for general graph to UDG and get a lower bound of R + O(log(R)). The pipelined broadcast algorithm in [33] is based on standard ranking algorithm [34] 18

19 for assigning ranks to the nodes of BFS tree. In [35], Chen et.al studied this problem in a more realistic model, they considered transmission range is smaller than interference range. They proposed an O(α 2 ) approximation ratio, where α is the ratio of interference range and transmission range, with α > 1. In [36] Reza et. al studied this problem, considering α > 1 proposed an O(α 2 ) approximation with a better analysis. Apart from the interference and transmission range they also considered the carrier sensing range. Using a 2-Disk model, Scott et. al. studied the broadcast scheduling problem 2 2 and proposed an approximation algorithm with ratio 6 ( r I 3 r T + 2) [1]. They considered α > 1 and each node has the same transmission range r T and their interference range r I = αr T. Unfortunately, almost all above mentioned works considered the same transmission range for all nodes. Only [15] considered a disk graph model, but they considered transmission range and interference range to be same, which is not a practical assumption, as interference range is always greater than the transmission range. Furthermore, all existing works studying broadcast scheduling in wireless networks model the network as a 2D planar graph in which the nodes exists in 2D plane. However, this is not appropriate in all cases, as most of the time the nodes acquire locations in 3D. Furthermore, all existing works in broadcast scheduling provide centralized solutions with some approximation guarantees. There is no localized approximation algorithm in the existing literature. In the existing literature, all-to-one aggregation scheduling is mostly studied in UDG with interference range equal to the transmission range. In [37], Chen et. al. proposed a ( 1)-approximation algorithm, where is the maximum node degree. Based on maximal independent set, Huang et. al. [38] proposed an algorithm with latency bound of 23R + 18, which was improved to 16R + 14 by Xu et. al. [39]. In [40], Wan et. al. considered that for any node, the interference range is greater than the transmission range and proposed an algorithm with latency β ρ+1 (15R + 4), where ρ is the ratio of 19

20 interference range to the transmission range and (β ρ+1 1) is the maximum degree of the conflict graph. In Chapter 2, we formulate data broadcasting in WSNs as Interference-aware broadcast scheduling (IABS) problem with an objective to minimize the broadcast latency. We model WSN in 2D as a disk graph and in 3D as a Ball Graph. We consider a more realistic network model where the nodes may have different transmission ranges, while their interference ranges are α times of their transmission ranges, where α > 1. We propose O(1)-centralized approximation algorithms for IABS problem in 2D and 3D WSNs respectively. These approximation algorithms have the state of the art approximation ratio for the network model we considered. Further, in Chapter 3, based on the network and interference model introduced in Chapter 2, we study localized data broadcasting and propose a localized approximation algorithm for data broadcast. Our algorithm has a constant approximation guarantee of 2 2(α+1)β This is the first localized approximation ratio for data broadcasting in WSNs. We also extended our localized algorithm for 3D WSNs. Furthermore, in Chapter 4, we study the all-to-all data broadcasting and all-to-one data aggregation and propose: 1. A O(1)-distributed approximation algorithm for all-to-one data aggregation. 2. A O(1)-distributed approximation algorithm for all-to-all data broadcast. 3. A Localized algorithm for all-to-all data broadcast. All-to-one data aggregation is a fundamental operation in WSNs, in which the data from all the nodes is aggregated in a sink node for further processing and forwarding. Our distributed algorithm for all-to-one data aggregation is the first in literature and has a constant approximation guarantee of 2 2(α+1)β Our distributed algorithm for all-to-all data broadcasting is also the first in literature and has a constant approximation 2. guarantee of 4 ( 2(α+1)β

21 1.2 Efficient In-Network Detection and Tracking of Dynamic Phenomena Contemporary wireless sensor network (WSN) research done in the area of detection and tracking has primarily concentrated on observing motion of objects whose shape and size are invariant [41 43]. However, many real-life events such as oil spills, gas clouds, or random walking motion of people, henceforth called Phenomena Clouds, are characterized by non-deterministic, dynamic temporal variations of cloud shape, size and direction of motion along multiple axes. These events cannot be modeled in well-defined terms. Thus, it is difficult to apply existing mechanisms in such situations. Furthermore, the utility of phenomena cloud detection and tracking is not restricted only to application domains involving gas clouds or oil spills. In fact, they can also be utilized in situations where the quality of data originating from individual sensors cannot be trusted in isolation. In such cases, the raw sensor data originating from the system is typically extremely noisy which makes it very difficult to distinguish actual events from random stimuli. Hence, a quorum of multiple sensors, which are located in close proximity to each other, is required to reduce the probability of false positives. Through our collective research and systems experience over the years in building Smart Spaces at University of Florida s Mobile and Pervasive Computing Laboratory, we have found a significant utility in applying the phenomena cloud concept for efficiently and accurately monitoring various events in the space, such as detection of barefoot walking, which is a critical application for diabetes patients. With a new application and broader concept of phenomena clouds, early studies on boundary detection and tracking of well-defined shapes are no longer sufficient [12, 13, 19, 44, 45]. Only one work recently studied on similar applications, called Nile-PDT (a stream-based mechanism) may be applicable [46]. However, this centralized approach does not take into account the cost of acquiring and transmitting sensor readings and typically requires participation from all sensors in the network. Unfortunately, sensor sampling costs and networking and processing overheads can have a critical effect 21

22 on the practical viability of the entire smart space. This raises a need for a distributed in-network detection mechanism, where the detection and tracking process is localized to the immediate neighborhood of a phenomenon at any given time and does not require all the sensor nodes to remain unnecessarily active. Along this direction, in Chapter 5, we introduce a mathematical model and in-network distributed mechanisms with the following specific contributions: 1. Analyzing the structure of phenomena clouds and proposing a set of parameters to comprehensively describe them without requiring complex models. 2. Presenting an energy-efficient, localized, in-network algorithm for real-time detection and tracking of phenomena clouds, which do not require customization of the network routing layers. The proposed algorithm works in an autonomous manner without requiring intervention from the centralized query processor residing in the base station and hence, is suitable for disconnected mode of operation, when continuous communication with the base station cannot be maintained. 3. Introducing a mathematical model based on Integer Program (IP) to further optimizing the energy consumption of the phenomena clouds detection and tracking. This model provides an excellent benchmark for evaluating the performance of the proposed algorithms. 4. Providing a novel localized algorithm which can further enhance the resource utilization based on a new technique, called hexagon tiling. This new algorithm locally allows sensor nodes to be in active or sleeping modes without compromising on the quality of detection and tracking. 5. Presenting a practical application which has been deployed in a real-world smart space and utilizes the phenomena detection and tracking mechanism described in this paper, to solve critical challenges faced during its deployment. 22

23 6. Validating our approaches using both real-world applications and simulations to analyze its performance and resource requirements as well as comparing it with that of stream-based approaches. Furthermore, in Chapter 6, we provide an energy efficient localized in network detection and tracking protocol for tracking the boundary of the phenomena cloud. This protocol is more relevant for scenarios such as oil spills, gas leakage, etc, where it is more sensible to detect and track only the phenomena boundary engulfing the affected area instead of tracking the entire phenomena. Simulation results are provided to show that the proposed protocol is more efficient than the existing works.finally, in Chapter 7, we provide a brief summary of this dissertation and conclude it. 23

24 CHAPTER 2 CENTRALIZED APPROXIMATION ALGORITHM FOR INTERFERENCE- AWARE BROADCAST SCHEDULING 2.1 Introduction Due to its imperative motivation in Wireless Sensor Networks (WSNs), broadcast scheduling problem has been extensively studied by many researchers [1, 15, 32, 35, 36]. Existing works consider network and interference models, which are not practical. Either they assume that all sensors have the same transmission range [32, 35, 36] or sensors may have different transmission ranges but their interference ranges are equal to their transmission ranges [15]. However, in practice, depending upon their energy level or functionality, sensor nodes may have different transmission ranges and their interference ranges are always greater than their transmission ranges. Furthermore, existing solutions consider WSNs are always deployed in 2D plane. In contrast, there are many cases when sensor nodes acquire locations in 3D space. For instance, fire sensors deployed at different levels on trees in forests [47], underwater sensors deployed at different depths in seas to collect vital information about aquatic life [48]. Considering deficiencies in the existing research, in this chapter, we study the broadcast scheduling problem for WSNs in 2D and 3D. We consider a more realistic network model, in which each sensor node v has a transmission range rv T [ rmin T, r ] max T (where r T max r T min = β > 1) and its interference range r I v = αr T v (where α > 1). This model has not been considered for broadcast scheduling problem in the existing literature. Since broadcast scheduling is NP-hard [15], we propose O(1)-centralized approximation algorithms for WSNs in 2D and 3D respectively. For this, we study two sub problems: 1) Tiling and coloring 2D plane using regular hexagons, and 2) Tiling and coloring 3D space using truncated octahedrons. Solutions to these two problems lead to O(1)-approximation ratios in 2D and 3D respectively. Our O(1)-centralized approximation algorithm is the first approximation algorithm for 3D WSNs and in 2D our algorithm has the best approximation ration for the model we considered. 24

25 In order to study the tiling and coloring of 2D plane using identical regular hexagons, we consider a hexagon tiling H of the 2D plane. We color all hexagons in H, such that the distance between any two hexagons h 1 and h 2 having the same color is at least d R +. This distance is measured between two closest points p 1 and p 2 on 2D plane, where p 1 is in h 1 and p 2 is in h 2. We provide an optimal solution to this problem for any arbitrary distance d R +. Furthermore, to study the tiling and coloring of 3D space using truncated octahedrons, we consider a tiling TOC of 3D space using identical truncated octahedrons. All truncated octahedrons in TOC are colored, such that the distance between any two truncated octahedrons to 1 and to 2 having the same color is at least d R +. Similar to 2D, this distance is measured between two closest points p 1 and p 2 in 3D space, where p 1 is in to 1 and p 2 is in to 2. We also propose an efficient centralized greedy heuristic algorithm for broadcast scheduling problem. Our heuristic algorithm considers all sensors that have received the broadcast message as potential transmitters. Further, to select among the interfering transmissions, it provides higher priority to the transmission which covers more uninformed nodes. In our simulations in Chapter 3, we perform a comparative analysis of performances of the heuristic algorithm under different priority metrics for greedily scheduling the interfering transmissions. The rest of the chapter is organized as follows: In Section 2.2, we describe the network and the interference model along with the formal definition of the interference-aware broadcast scheduling problem. We introduce the tiling and coloring of 2D plane using regular hexagons in Section 2.3. Section 2.4 describes the tiling and coloring of 3D space using identical truncated octahedrons. The O(1)-centralized approximation algorithms for broadcast scheduling in 2D and 3D WSNs, along with theoretical analysis are described in Section 2.5. In Section 2.6, we introduce an 25

26 efficient centralized heuristic for broadcast scheduling. Finally, Section 2.7 concludes the chapter. 2.2 Network Model and Problem Definition Network Model We assume that each sensor node v i has transmission range r T i [r T min, r T max] and interference range r I i = αr T i (α > 1), where r T min and r T max are the minimum and maximum transmission ranges in the WSN respectively and r T max r T min = β > 1. The 2D Network Model: In 2D, the WSN is represented by a directed disk graph G = (V, E), where V is a set of sensor nodes deployed on the 2D plane and E is the set of directed communication links. Each node v i V is associated with two open disks, the transmission disk D T i and the interference disk D I i centered at v i, with radius r T i and r I i respectively. If a node v j is located within D T i, there exists a directed link (v i, v j ) E. Additionally, if v i is also located within D T j then (v j, v i ) E and there exists a bi-directional link between v i and v j. The 3D Network Model: Similar to 2D, in 3D, the WSN is represented by a directed ball graph G = (V, E). A transmission ball B T i and an interference ball B I i are associated with every sensor node v i V centered at v i with radius r T i and r I i respectively. If a node v j is located within B T i, there exists a directed link (v i, v j ) E. Further, if v i is also located within B T j then (v j, v i ) E and there exists a bi-directional link between v i and v j. Based on the above network model, we define the interference model as follows: 1. If the Euclidean distance between a transmitter v t1 and a receiver v r1 i.e. d(v t1, v r1 ) < rt T 1, the energy level of the transmitted signal from v t1 is sufficient at v r1 to interpret the transmitted data. 2. If rt T 1 d(v t1, v r1 ) < rt I 1, the transmitted signal from v t1 cannot be correctly interpreted by v r1, still it can be perceived. However, if d(v t1, v r1 ) rt I 1, the transmitted signal from v t1 is beyond the perception of v r1. 26

27 Figure 2-1. Sufficient conditions for interference-awareness based on transmitters. Figure 2-2. Sufficient conditions for interference-awareness based on receivers. 3. Simultaneous transmissions v t1 v r1 and v t2 v r2 are interfering, if d(v t1, v r2 ) < rt I 1 or d(v t2, v r1 ) < rt I 2, else they are interference-aware and do not interfere each other. Based on the above interference model, we describe sufficient conditions for interference-aware transmissions in Lemma 1. Lemma 1. For simultaneous transmissions v t1 v r1 and v t2 v r2, sufficient conditions for ensuring interference-awareness are, either d(v t1, v t2 ) (α + 1)rmax T or d(v r1, v r2 ) (α + 1)rmax. T Proof. If transmitters v t1 and v t2 have transmission ranges equal to rmax, T their interference ranges will be αrmax. T Receivers v r1 and v r1 will be within rmax T distance from their respective transmitters. 27

28 If we have d(v t1, v t2 ) (α + 1)r T max as shown in Figure 2-1, according to triangular inequality d(v t1, v r2 ) αr T max and d(v t2, v r1 ) αr T max. This will ensure that transmissions v t1 v r1 and v t2 v r2 will be interference-aware. If we have d(v r1, v r2 ) (α + 1)r T max as shown in Figure 2-2, according to triangular inequality d(v t1, v r2 ) αr T max and d(v t2, v r1 ) αr T max. This will ensure that transmissions v t1 v r1 and v t2 v r2 will be interference-aware. Hence, to ensure simultaneous transmissions v t1 v r1 and v t2 v r2 do not interfere each other, it is sufficient to have d(v t1, v t2 ) (α + 1)r T max or d(v r1, v r2 ) (α + 1)r T max Problem Definition Interference-Aware Broadcast Scheduling (IABS) problem: Given a multi-hop WSN G = (V, E) and a sensor node v s V having a message m. The IABS problem is to generate an interference-aware broadcast schedule for broadcasting the message m from v s to all other sensor nodes. The interference-aware broadcast schedule must satisfy following conditions: The source node v s is scheduled to transmit during the first time slot t 1. A node u, if scheduled to transmit in time slot t j, must have received the message m in some earlier time slot t i, where i < j. Two nodes u and v are scheduled to transmit simultaneously, iff their transmissions are interference-aware. The number of time slots required by the interference-aware broadcast schedule to complete the broadcast, known as the broadcast latency, should be minimized. 2.3 Tiling and Coloring of 2-Dimensional Plane Using Regular Hexagons In this section, we study the tiling and coloring of 2D plane using regular hexagons, which is the kernel part of our solution for IABS problem in 2D WSNs. A regular tiling partitions the 2D plane into identical partitions. We need that the maximum distance within a unit partition should be 1 and its area should be as large as possible. Therefore, to decide its shape, we consider each of the four possible plane 28

29 Figure 2-3. Comparison of different plane tiling polygon. Figures a, b, c and d respectively show a square, a rhombus, a triangle and a hexagon, having maximum distance within them equal to 1. tiling regular polygons: 1) Square, 2) Rhombus, 3) Equilateral Triangle and 4) Regular Hexagon, as the unit partition shape and compare their areas, as shown in Figure 2-3. We observe that a regular hexagon of sides 1 2 has the maximum area. Consequently, we select it as the unit partition shape. Figure 2-4 shows the regular hexagon tiling of 2D plane. We formally define the regular hexagon tiling and coloring of 2D plane as Distance-d Hexagon coloring problem: Distance-d Hexagon Coloring problem: Given a regular hexagon tiling H of 2D plane and a distance d R +, find the minimum number of colors needed to color H, such that two hexagons h 1, h 2 H having the same color must have the Euclidean distance distance(h 1, h 2 ) d. The distance distance(h 1, h 2 ) is measured between two closest points p 1 and p 2, where, p 1 lies within h 1 and p 2 lies within h 2. 29

30 Figure 2-4. The new X h Y h coordinate system In order to study the Distance-d Hexagon Coloring problem, we consider a new X h Y h coordinate system based on hexagon centers in H. Axes of the X h Y h coordinate system are inclined at 60 o and its two unit vectors are î( 3, 0) and 2 ĵ( 3, 3 ), as shown 4 4 in Figure 2-4. Each hexagon h H in X h Y h coordinate system can be identified by coordinates of its center as h(i, j). The Euclidean distance between two hexagon centers h(i 1, j 1 ) and h(i 2, j 2 ) is given as 3 2 (i1 i 2 ) 2 + (i 1 i 2 )(j 1 j 2 ) + (j 1 j 2 ) 2. The Euclidean distance of a hexagon center h(i, j) from the origin h(0, 0) is given as 3 2 i 2 + ij + j 2. As the first step to provide the solution for Distance-d Hexagon coloring problem, we identify the closest hexagon h(i, j) to h(0, 0) in the first quadrant of X h Y h plane, such that two closest points, p 1 in h(0, 0) and p 2 in h(i, j) are at least at a distance d R +. We observe that closest points p 1 and p 2 can appear in three ways as shown in Figure 2-5: p 1 is the upper right corner of h(0, 0) and p 2 is the lower left corner of h(i, j), in Figure 2-5 (i = 3, j = 5). p 1 is the mid point of upper right side of h(0, 0) and p 2 is the mid point of lower left side of h(i, j), in Figure 2-5 (i = 0, j = 7). 30

31 Figure 2-5. Closest points p 1 and p 2 in two hexagons p 1 is the mid point of the right side of h(0, 0) and p 2 is the mid point of the left side of (i, j), in Figure 2-5 (i = 7, j = 0). Without loss of generality, we consider i j, therefore, we get rid of the third case. Also we exclude the case i = 0, j = 1. We compute (i, j) for the given d R + as follows: Identify two pairs (i 1, j 1 ) and (i 2, j 2 ) as follows: Compute (i 1 > 0, j 1 > 0) in first quadrant of X h Y h plane using the inequality d ((i 1 2a) 2 + (j 1 2a) 2 + (i 1 2a)(j 1 2a)), such that i j i 1 j 1 is minimum among all integral solutions of this inequality, where a is as shown in Figure 2-5 and is equal to 1 3. Compute (i 2 = 0, j 2 > 1) in first quadrant of X h Y h plane using the inequality d (j 2 1) 2, such that j 2 2 is minimum among all integral solutions of this inequality. Finally, if (i i 1 j 1 + j 2 1 ) < (i i 2 j 2 + j 2 2 ), we select i 1, j 1 as i, j else we select i 2, j 2 as i, j. We now introduce the co-color hexagon algorithm, illustrated in Algorithm 1. In Lemma 2, we prove that for any arbitrary distance d R +, Algorithm 1 optimally identifies co-color hexagons (i.e. hexagons having the same color) for any given hexagon h(i, j ) in H. The Algorithm 1, for the given d R +, first computes (i, j) using the above method and identifies the closest co-color hexagon h(i + i, j + j) of h(i, j ) in the first quadrant 31

32 of X h Y h plane and adds it to set S of co-color hexagons. It then sequentially rotates the X h Y h plane by 60 o for five times to find rest of closest co-color hexagons of h(i, j ) that are h(i + (i + j), j i), h(i + j, j (i + j)j), h(i i, j j), h(i (i + j), j + i), h(i j, j + (i + j)) and adds them to the set S. Due to the symmetric property of the rotation, distances between h(i, j ) and its closest co-color hexagons remain the same. Any hexagon which is identified for the first time is added to the set S and above steps are recursively repeated on it. The Figure 2-6 shows co-color hexagons of h(0, 0) identified by Algorithm 1 for distance d = 31, where i = 2, j = 3. Six closest co-color hexagons of h(0, 0) are 2 h(i, j), h((i + j), i), h(j, (i + j)j), h( i, j), h( (i + j), i), and h( j, (i + j)). We can see that centers of co-color hexagons of h(0, 0) form a triangular sub-lattice S and a rhombic sub-lattice Rh of the lattice structure generated by centers of hexagons in H. Unit vectors of sub-lattice Rh are Ā = iî + jĵ and B = jî (i + j)ĵ. The number of possible classes i.e. the index of sub-lattice Rh in H, which is the number of disjoint sub-lattices similar to Rh in H is given as det(ā, B) = i 2 + j 2 + ij [49]. Thus, there are {Rh 1, Rh 2... Rh (i 2 +j 2 +ij)} disjoint sub-lattices similar to Rh in H, union of which form H. If we assign each of them a unique color, all hexagons in H will be colored with i 2 + j 2 + ij colors and the closest distance between two co-color hexagons will be at least d R +. In Theorem 2.1, we prove that the hexagon coloring generated this way is the optimal solution for Distance-d hexagon coloring problem. Lemma 2. Algorithm 1 optimally identifies co-color hexagons for a given distance d R +. Proof. Lets consider the hexagon tiling of an area. We need to identify maximum number of co-color hexagons on this area, such that any two co-color hexagon are at least at a given distance d R +. For this, Algorithm 1, computes a pair (i, j) and produces a set S of co-color hexagons, whose centers form an equilateral triangular lattice of side length 3 2 (i 2 + j 2 + ij), as shown in Figure 2-6. The number of 32

33 Algorithm 1 Co-color hexagon algorithm (H, d, h(i, j ),c) Input: The hexagonal lattice H, distance d, hexagon h(i, j ) and a color number c assigned to h(i, j ). Output: A set S of co-color hexagons of h(i, j ) Compute i, j S ϕ; Queue h(i, j ); while (Queue is not empty) do h(a, b) Queue.Remove() S S h(a, b); Color(h(a, b)) c Insert each of the following hexagons in the Queue if they are not inserted in the queue: h(a + i, b + j) h(a + (i + j), b i) h(a + j, b (i + j)j) h(a i, b j) h(a (i + j), b + i) h(a j, b + (i + j)) end while return S; co-color hexagons in S is proportional to the number of equilateral triangles of sides 3 2 (i 2 + j 2 + ij) in the triangular lattice. Lets consider another method which provides a better solution than Algorithm 1. This method identifies a set of co-color hexagon centers forming a regular or irregular triangular tiling of the area in which at least one triangle is non-equilateral. However, it is simple to observe that for the same smallest side length, the area of an equilateral triangle is always smaller than the area of any non-equilateral triangle. Hence, the number of non-overlapping triangles in the tiling structure generated with the new method will be bounded by the number of equilateral triangle of sides 3 2 (i 2 + j 2 + ij) in the triangular lattice generated by Algorithm 1. This results in the new method identifying lesser number of co-color hexagons, in comparison to Algorithm 1. Hence, a contradiction. 33

34 Figure 2-6. Co-Color Hexagons of h(0, 0) for i = 2 and j = 3. The index of sub-lattice Rh in H i.e. det(ā, B) = i 2 + j 2 + ij = 19. Theorem 2.1. The coloring generated by the above method is an optimal solution to the Distance-d Hexagon Center Coloring problem. Proof. According to Lemma 2, Algorithm 1 optimally identifies co-color hexagons which forms a rhombic lattice Rh with unit vectors Ā = iî + jĵ and B = jî (i + j)ĵ. The number of sub-lattices similar to Rh in H is given as det(ā, B) = i 2 + j 2 + ij [49]. Therefore, the minimum number of colors needed to color H are i 2 + j 2 + ij. If we use i 2 + j 2 + ij 1 colors then at least two rhombic sub-lattices will be assigned same color. As the distance between the hexagons in different rhombic sub-lattices is not guaranteed to be at least d, it will not be the solution for Distance-d hexagon coloring problem. Therefore, the optimal number of colors needed will be i 2 + j 2 + ij, hence, the provided solution is optimal. 34

35 Theorem 2.2. The number of colors for Distance-d Hexagon coloring problem for an arbitrary d is bounded by 4 3 d d Proof. Consider the hexagon h(0, 0) and one of its closest co-color neighbors in the first quadrant of X h Y h coordinate system is h(i, j). Without loss of generality, we consider (j i), we exclude the case when i = 0, j = 1, thus we have two cases: 1) i = 0, j > 1 and 2) i > 0, j > 0. Case 1: We use j 2 colors to obtain the distance d (j 1) 3. Therefore, the 2 number of color is equal to 4 3 d d + 1 < 4 3 d d Case 2: As shown in the proof of Theorem 2.1, the number of colors used is i 2 + ij + j 2 and the guaranteed minimum distance between closest points of two co-color hexagons is as follows: d = 3 [(i 23 4 )2 + (i 23 )(j 23 ) + (j 23 ] )2 3 4 (i 2 + ij + j (i + j)) 3 It is easy to prove that i 2 + ij + j d d for i, j > 0. The equality happens iff i = j. Figure 2-7. Comparison of number of colors used to color the hexagon tiling using our scheme and Scott et. al [1]. 35

36 In [1], Scott et. al. proposed a 3k 2 -hexagon coloring scheme for Distance-d hexagon coloring problem. Figure 2-7, shows the comparison between their solution and the optimal solution generated by our proposed scheme. It can be seen that mostly our coloring scheme performs far better than Scott et. al. Only when i = j, the number of colors used by Scott et. al is equal to the number of colors used by our scheme. 2.4 Tiling and Coloring of 3-Dimensional Space In this section, we study the tiling and coloring of 3D space using truncated octahedrons, which forms the kernel part of our solution for IABS problem in 3D WSNs. A regular tiling of the 3D space results in partitioning of 3D space into identical cells. Based on our requirements, the diameter of a unit cell should be 1 and its volume should be as large as possible. Therefore, to identify the shape of the unit partition cell, we compare volumes of the four possible space tiling primary polyhedra [50]: 1) Truncated Octahedron, 2) Rhombic Dodecahedron, 3) Cube and 4) Hexagonal Prism, considering their diameters are equal to 1 as shown in Figure 2-8. We observe that the truncated octahedron of sides 1 10 has the maximum volume. Hence, we selected truncated octahedron as the partition shape. Figure 2-9 shows the tiling of 3D space using truncated octahedrons. Similar to 2D, we formally define the tiling and coloring of 3D space using truncated octahedrons as Distance-d truncated octahedron coloring problem: Distance-d truncated octahedron coloring problem: Given a tiling TOC of 3D space using truncated octahedrons of sides 1 10 and a distance d R +, find the minimum number of colors needed to color TOC, such that two truncated octahedrons to 1 and to 2 having the same color must have the distance distance(to 1, to 2 ) d. The distance distance(to 1, to 2 ) is the Euclidean distance between two closest points p 1 and p 2 in 3D space, such that p 1 lies within to 1 and p 2 lies within to 2. In order to study the Distance-d truncated octahedron coloring problem, we introduce a new X t Y t Z t coordinate system in 3D space, in which, X t, Y t, and 36

37 Figure 2-8. Comparison of different spacing filling polyhedra. Figures a, b, c and d respectively show a truncated octahedron, a rhombic dodecahedron, a cube and a hexagonal prism, having maximum distance within them equal to 1. Figure 2-9. The tiling of space using truncated octahedrons Z t axes are inclined as shown in Figure The angle between X t and Y t axes is θ 1 = cos 1 ( 1 3 ), whereas, angles between X t and Z t axes and Y t and Z t axes are equal to θ 2 = cos 1 ( 1 3 ). The angle between the Z t -axis and the X t Y t plane is θ 3 = 45 o. The side length of the truncated octahedron is 1 10, the distance between its two parallel 37

38 3 hexagonal faces is and the distance between its two parallel square faces is Therefore, distances along the X t, Y t and Z t axes are the multiple of, 3, and respectively. Centers of each truncated octahedron in the 3D space coincides with the integral coordinates in the X t Y t Z t coordinate system. Hence, every truncated octahedron can be identified by coordinates (i, j, k) of its center as to(i, j, k). 5 Figure The X t Y t Z t Co-ordinate System The m 2 n-coloring Algorithm: We now present the m 2 n-coloring algorithm, illustrated as Algorithm 2, for the Distance-d truncated octahedron coloring problem. The algorithm uses m 2 n colors, where m, n R + and guarantees for any two truncated octahedrons to 1, to 2 TOC, having same the color must have 2 distance(to 1, to 2 ) d = (m 1) = (n 1) 5, Figure 2-11 shows the basic 3 5 coloring pattern generated by the m 2 n-coloring algorithm for d = 1, where m = 3 and n = 3, hence, it uses 27 colors. For any arbitrary distance d R +, the basic coloring 5 pattern will have m = (d + 1) and n = d the number of colors used 3 2 are (d ) 2 d This basic coloring pattern is repeatedly used to color all the truncated octahedrons in 3D tiling. 38

39 Figure Coloring pattern for d = 1, m = 3 and n = 3, Colors assigned to the truncated octahedrons are represented by numbers. Algorithm 2 m 2 n-coloring Algorithm (TOC, d) 5 m = (d + 1) 3 n = d for all hexagon TOC(i, j, k) do if (i < 0) then i = ( m 1) + (i mod m ) else i = (i mod m ) end if if (j < 0) then j = ( m 1) + (j mod m ) else j = (j mod m ) end if if (k < 0) then k = ( n 1) + (k mod n ) else k = (k mod n ) end if Color TOC(i,j,k) k m 2 + j m + i + 1 end for 39

40 2.5 Broadcast Scheduling Algorithm (BSA) We now present our centralized Broadcast Scheduling Algorithm (BSA) for IABS problem. BSA is applicable to 2D as well as 3D WSNs. In this section, we first describe BSA followed by its theoretical analysis for O(1)-approximation ratios in 2D and 3D WSNs respectively Algorithm Description BSA takes the graph G = (V, E), representing the WSN and the source node v s V as inputs. It generates as output, the interference-aware broadcast schedule for broadcasting the message m from v s to all the other nodes. BSA, in case of 2D WSNs, considers a tiling of 2D plane with regular hexagon of sides r T min 2 and colors it using the method described in Section 2.3, assuming d = (α + 1)r T max. In case of 3D WSNs, it considers a tiling of 3D space with truncated octahedrons of sides r min T 10. Further, assuming d = (α + 1)rmax, T it colors the tiling using m 2 n- coloring algorithm described in Section 2.4. All nodes are assigned the color of their hexagons or truncated octahedrons in which they are located, in case of 2D or 3D WSNs respectively. Considering v s as root, BSA generates a BFS tree of G = (V, E) to partition it into a set of layers {L 1, L 2,..., L R } (where R is the height of the BFS tree). After this, BSA starts the broadcast by sequentiality transferring the broadcast message m between consecutive layers starting from layer L 1 = {s}. Consequently, all nodes in the network receive the broadcast message. During the first time slot t 1, the source node v s L 1 transmits the broadcast message to all nodes in layer L 2. After this, BSA runs R 2 iterations of the Interlayer Scheduling Algorithm (ISA). In each iteration, ISA generates an interference-aware schedule for transmissions between two consecutive layers. The ISA is illustrated in Algorithm 4. 40

41 The ISA takes two consecutive layers L i and L j as inputs and generates an interference-aware transmission schedule from L i to L j. In order to do this, ISA first generates a maximal independent set MIS(L j ) of the sub-graph G[L j ] induced by nodes in L j, such that MIS(L j ) is the dominating set of G[L j ]. ISA generates the schedule in two phases. In the first phase, based on their colors, nodes in MIS(L j ) are schedule to receive the broadcast message m from their parents in L i. In the second phase, based on their colors, nodes in MIS(L j ) are scheduled to transmit, so that all nodes in L j \ MIS(L j ) receive the broadcast message m. Algorithm 3 BSA(G(V, E), s) In case of 2D (3D) WSNs, generate hexagon (truncated octahedron) tiling and color it. To all nodes in 2D (3D) WSN, assign the color of their respective hexagon (truncated octahedron) in which they are located. Run BFS rooted at v s to partition graph G = (V, E) into distinct layers {L 1, L 2,... L R }. In time slot 1, L 1 = {s} transmits to all nodes in L 2. Time 1; i 2 while i R 1 do Time Time + ILTS(L i, L i+1 ) i i + 1 end while O(1)-Approximation Ratio for Interference-Aware Broadcast Scheduling Problem in 2-Dimension Lemma 3. The transmission schedule produced by ISA for 2D WSNs is interferenceaware. Proof. When ISA is applied to a 2D WSN, each hexagon can have only one MIS(L j ) node and hexagons having the same color are at least at a distance d = (α + 1)r T max. As MIS(L j ) nodes of the same colors transmits or receive simultaneously, they satisfy sufficient conditions for interference-awareness described in Lemma 1, which results in interference-aware transmission schedule. 41

42 Algorithm 4 ISA(L i, L j ) Generate graph G(L j ) induced by the nodes in L j. MIS GenMIS(G(L j )) c Number of colors used to color hexagon (truncated octahedron) tiling in case of 2D (3D) WSNs. Time ϕ Initialize S 1, S 2,..., S c to ϕ for all u MIS do Select a node w N (u) L i S color(u) S color(u) {w} end for for i 1 to c do S i transmits end for Time Time + c. Initialize S 1, S 2,..., S c to ϕ for all u MIS do S color(u) S color(u) {u} end for for i 1 to c do S i transmits end for Time Time + c. return Time Lemma 4. MIS(L j ) nodes in ISA are colored using at most colors in 2D WSN. 4 (α + 3 1)2 β 2 + 8β(α+1) Proof. Every MIS(L j ) node acquires the color of the hexagon in which it is located. When sides of the hexagon are 1, according to Theorem 2.2 for any distance d R the 2 number of colors needed to color the hexagon tiling is bounded by 4 3 d d Thus, when sides of the hexagon are r min 2 the number of colors used are bounded by 4d 2 3r 2 min 8d 3r min + 4. Based on sufficient conditions for interference-awareness in Lemma 1, d is (α + 3 1)rmax. T 4 Hence, the number of colors needed will be: (α + 3 1)2 β 2 + 8β(α+1) Theorem 2.3. The BSA algorithm provides an approximation ratio 4 2 (α + 3 1)2 β 2 + 8β(α+1) + 4 for IABS problem in 2D WSNs

43 Proof. In the first phase, the ISA takes at most 4 (α + 3 1)2 β 2 + 8β(α+1) + 4 time slots to 3 3 schedule all nodes in MIS(L j ) to receive the broadcast message m form their parents 4 in L i without interference. It takes another (α + 3 1)2 β 2 + 8β(α+1) + 4 time slots, in the 3 3 second phase, to schedules all nodes in MIS(L j ) to transmit the broadcast message m to nodes in L j \ MIS(L j ). Hence, it takes total 4 2 (α + 3 1)2 β 2 + 8β(α+1) + 4 time slots to transfer the broadcast message m from 3 3 layer L i to layer L j. BSA runs R 2 iterations of ISA, hence, the total number of time slots or the broadcast latency of BSA is given as: (R 2)2 (α + 3 1)2 β 2 + 8β(α+1) The theoretical lower bound of the IABS problem is R. Hence, the approximation ratio is: )2 β 2 + 8β(α+1) Corollary 1. If ratios α and β are bounded, the approximation ratio of the BSA algorithm for IABS problem in 2D WSNs is O(1) O(1)-Approximation Ratio for Interference-Aware Broadcast Scheduling Problem in 3-Dimension Lemma 5. The transmission schedule produced by ISA in 3D WSNs is interferenceaware. Proof. This can be proved similar to Lemma 3. When ISA is applied in a 3D WSN, each truncated octahedron can have only one MIS(L j ) node and truncated octahedrons having the same color are at least at a distance d = (α + 1)r T max. As MIS(L j ) nodes of the same color, transmit or receive simultaneously, they satisfy sufficient conditions for interference-awareness described in Lemma 1, which results in interference-aware transmission schedule. Lemma 6. MIS(L j ) nodes in ISA are colored using at most 2 3 (α + 1)β (α + 1)β + 1 colors in 3D WSNs

44 Proof. Every MIS(L j ) node is assigned the color of the truncated octahedron in which it is located. Consequently, the maximum number of colors assigned to MIS(L j ) nodes are bounded by the number of colors needed to color the truncated octahedron tiling. As described in section 2.4, when truncated octahedrons tiling the 3D space have side length , for a distance d = (m 1) = (n 1) 4, the 5 5 m2 n-coloring algorithm uses m 2 n colors. Therefore, when truncated octahedrons of side length r min T 10 tile the 3D space, m 2 n colors can be used for d = (m 1)rmin T 5 = (n 1)r T 5 3 min. Base on Lemma 1, 4 d is (α + 1)rmax. T 3 Consequently, we have m = (α + 1)β + 1 and n = 4(α + 1)β Hence, the number of colors needed are bounded by 2 3 (α + 1)β (α + 1)β Theorem 2.4. The BSA algorithm provides an approximation ratio (α + 1)β (α + 1)β + 1 for IABS problem in 3D WSNs Proof. In the first phase, the ISA takes (α + 1)β (α + 1)β + 1 time 5 5 slots to schedule all nodes in MIS(L j ) to receive the broadcast message m from their parents in L i without interference. Similarly, in the second phase, it takes another 2 3 (α + 1)β (α + 1)β + 1 time slots to schedule all nodes in MIS(L 5 5 j ) to transmit the broadcast message m to nodes in L j \ MIS. 2 3 Hence, it take total 2 (α + 1)β (α + 1)β + 1 time slots to transfer the 5 5 broadcast message m from L i to L j. BSA runs R 2 iterations of ISA, so, the total number of time slots needed or the broadcast latency of BSA is given as: (R 2)2 (α + 1)β (α + 1)β Furthermore, the theoretical lower bound of the broadcast scheduling problem is R. 2 3 Hence, the approximation ratio is: 2 (α + 1)β (α + 1)β

45 Corollary 2. If ratios α and β are bounded, the approximation ratio of the BSA algorithm for IABS problem in 3D WSNs is O(1). 2.6 Centralized Greedy Heuristic for broadcast scheduling In this section, we introduce a centralized Greedy Heuristic Algorithm (GHA) for broadcast scheduling in WSNs. GHA does not follow a layer by layer approach used in Algorithm 2.5, in which all nodes in a BFS layer must be informed before the broadcast proceeds to subsequent layers. Instead, GHA considers the set of all informed nodes at any point in time as potential transmitters. consequently, GHA schedules simultaneous transmissions in multiple layers. Thus, it avails the advantage of spatial distribution of transmitters by scheduling more non-conflicting transmissions in each time slot. Furthermore, GHA uses a manual interference avoidance technique based on checking individual transmitters whether they are violating sufficient conditions for interference-awareness described in Lemma 1. This helps in increasing the number of simultaneous interference-aware transmissions in each time slot. In order to select one out of possible interfering transmissions, most of existing heuristics and approximation algorithms [15, 32, 35] use variety of criteria to give higher priority to particular transmissions in a set of interfering transmissions. Usually, higher priority is given to transmitters with more neighbors in the network, or transmitters with more children in the BFS tree. On the other hand, since the ultimate goal of the broadcast scheduling is to inform all nodes in the network, we tried to follow a greedy rule for locally optimizing the progress rate of the broadcast by informing as many nodes possible with each new transmission. This greedy rule gives priority to transmitters which have the highest number of uninformed neighbors at that point in time. The pseudo code for GHA, which employs this greedy optimization, is given in Algorithm Conclusion In this chapter, we study the broadcast scheduling in 2D and 3D WSNs. We consider that sensor nodes may have different transmission ranges and their 45

46 Algorithm 5 Greedy Heuristic Algorithm (GHA) (G = (V, E), r, α, β, s) 1: INFORMED = {s}, ACTIVE = {s}, TIME = 0 2: Priority Queue PQ : key(u PQ) = N(u) \ INFORMED 3: while INFORMED V do 4: PQ ACTIVE, S ϕ 5: while (PQ ϕ) do 6: u ExtractMin(PQ) 7: ACTIVE ACTIVE \ {u} 8: if (N(u) \ INFORMED ϕ) then 9: From PQ remove all nodes v whose transmissions would conflict with the scheduled transmission of u, as follows: 10: v PQ & w N(v) \ INFORMED, if (d(u, w)) αru T then PQ PQ \ {v} 11: x N(u) \ INFORMED & y PQ, if (d(y, x)) αry T then PQ PQ \ {y} 12: Schedule u as follows: 13: S S {u} 14: for (w N(u) \ INFORMED) do 15: INFORMED INFORMED {w} 16: ACTIVE ACTIVE {w} 17: end for 18: end if 19: end whiletime TIME : Schedule S in time slot TIME 21: end while interference ranges are α times of their transmission ranges (where α > 1). We devise efficient coloring methods for coloring a hexagonal tiling in 2D plane and a truncated octahedron tiling in 3D space, based on which we propose O(1)-approximation algorithms for IABS problem in 2D and 3D WSNs respectively. Our O(1)-approximation algorithm for 3D WSNs is the first in literature and our O(1)-approximation algorithm for 2D is the best in literature for the network and interference model we considered. Finally, we present an efficient greedy heuristic to study the effect of various priority metrics for greedily selecting a transmission among multiple interfering transmissions. 46

47 CHAPTER 3 CENTRALIZED APPROXIMATION ALGORITHM FOR INTERFERENCE- AWARE BROADCAST SCHEDULING 3.1 Introduction In this chapter, considering the network and interference model defined in Chapter 2, we study localized broadcast scheduling in WSNs. Existing works only provide centralized solutions [1, 15, 32, 35, 36, 38, 40, 51, 52]. In addition, most of them consider sensor nodes have the same transmission range and their interference range is equal to their transmission range. The major drawback of these centralized solutions is that they fail to adapt to topology changes in case of dynamic networks. This can be easily accommodated by localized algorithms with much lesser overheads. In this paper, we study the localized broadcast scheduling considering the protocol interference model [53] to model the interference environment. We consider each sensor node has a transmission range r T v [ r T min, r T max] (where r T max r T min times of its transmission ranges (where α > 1). = β > 1) and its interference range is α We propose a novel approach to locally partition and color the WSN into clusters. Our approach is based on tiling and coloring the 2D plane covered by WSN nodes using regular hexagons. This approach is used in our algorithms to generate interference-aware transmission schedules for transmitter nodes. In Section 3.2.1, we discuss this approach in detail. Based on this approach we proposed the first localized approximation algorithm which has a constant approximation guarantee of 2 2(α+1)β Furthermore, we extended our localized algorithm to work for 3D WSNs. In Section 3.2.4, we present this extension along with the theoretical analysis of the approximation ratio for localized broadcast scheduling in 3D WSNs. The rest of the chapter is organized as follows: In section 3.2, we present our localized approximation algorithm for broadcast scheduling. Section 3.3, provides the performance evaluation of the localized approximation algorithm described in Section 47

48 3.2 and the centralized approximation algorithm and the greedy heuristic described in Chapter 2. Finally, Section 3.4 concludes the chapter. 3.2 Localized Algorithm for Broadcast Scheduling In this section, we introduce a localized algorithm for broadcast scheduling in 2D WSNs and provide its extension for 3D WSNs. The algorithm first generates a broadcasting structure, on top of which message broadcasting can be performed whenever needed. As the broadcasting structure is not a tree rooted at some specific source node, it supports broadcast initiated by any node as the source node. We first discuss the localized construction of the broadcasting structure followed by description of the protocol for broadcasting a message. Algorithm 6 Localized Algorithm for generating a Broadcasting Structure Step 1: Every node v i V locally identifies the hexagon h in which it is located along with its color. Step 2: Node v i then broadcasts its id, color and hexagon co-ordinates to its one hop neighbors. Step 3: Based on the color and hexagon information from one-hop neighbors, v i generates HN(v i ), PP vi and a set of ordered pairs C vi. Step 4 Node v i, broadcasts its C vi to its neighbors in HN(v i ), based on similar information from its neighbors in HN(v i ), it generates a list L = { v j, C j v j HN(v i )}. Step 5: Node v i runs Algorithm 8 to identify the set of Supplier node in its hexagon. Step 6: If the node v i is a Supplier node, it sends a Provider Request message to all its neighbors in PP i. Step 7: A node u PP i on receiving a Provider Request message responds with a Provider Response message and becomes a Provider node for v. The edge connecting a Supplier node and a Provider node becomes a Provider edge. Step 8: The set of Supplier nodes, Provider nodes, and Provider edges together forms the broadcasting structure G = (V b, E b ) Localized Generation of Broadcasting Structure In this section, we describe the construction of the broadcasting structure, illustrated as Algorithm 6. We assume that the sub-graph generated by the bi-directional links in G = (V, E) is connected. Further, the 2D plane is partitioned into regular hexagons of sides r T min 2 forming a hexagon tiling which can be represented by the X h Y h co-ordinate system, described in Section

49 The broadcasting structure is a sub-graph G b = (V b, E b ), which spreads over all hexagons in which WSN nodes are located. It has two kinds of nodes; Supplier nodes and Provider nodes, which are connected through Provider edges (refer Figure 3-1). Figure 3-1. Elements of the Broadcasting Structure. All nodes v V identify their locations (x v, y v ) on 2D plane using some localization method [54, 55] or they may be equipped with GPS devices for this. They also know the location of the base station (x b, y b ) in 2D plane, which is located at (0, 0) in the X h Y h co-ordinate system. Each v V locally computes the integral coordinates of the hexagon h(i, j) in which it is located in X h Y h coordinate system as follows: i = {(x v x b ) (y v y b ) 3 tan 60 }/r T o min j = (y v y b ) sin 60 o /rmin T (3 1) (3 2) After identifying h(i, j), node v identifies the color of h(i, j) using Algorithm 7, which colors the hexagon tiling using k 2 = (α+1)β 3/ colors and guarantees that any two hexagons at closest distance d < (α + 1)rmax T have different colors. Figure 3-2 shows an example of hexagon coloring generated by Algorithm 7. Node v broadcast its id, hexagon coordinates h(i, j) and color to its one-hop neighbors and based on similar information it receives from its one-hop neighbors, it generates: 1. A set HN(v) N(v), which is a set of nodes located in the same hexagon in which v is located. 49

50 Figure 3-2. Hexagon coloring generated by Algorithm 7 for k = 4, colors assigned to the hexagons are represented by numbers. 2. A set PP v (N(v) \ HN(v)) (Possible Providers), which is a set of nodes in v s neighboring hexagons, its contains a single node from each neighboring hexagon. 3. A set C v of ordered pairs v i, c i, where v i PP v and c i is the hexagon color of v i. After generating these sets, node v broadcasts the set C v to its neighbors in HN(v). Based on C vi s it received from its neighbors v i HN(v), node v generates a set L = { v i, C i v i HN(v)}, where C i is the set of colors in the neighborhood of nodes v i HN(v), and runs Algorithm 8, to identify the set of Supplier nodes in its hexagon. Note that every node in HN(v) generates the same copy of L, so each of them identify the same set of Supplier nodes. The correctness of Algorithm 8 depends on whether the set of Supplier nodes generated for a hexagon have possible providers in all neighboring hexagons. This happens only if any two Suppliers nodes in a hexagon having respective possible providers of the same color belonging to the same hexagon. We prove this in Lemma 7. 50

51 When a node v is a Supplier node, it broadcasts a Provider Request message to all its neighbors in PP v. The nodes v j PP v respond with a Provider Response message and become Provider nodes for v and edges connecting them to v become Provider edges. The set of Supplier nodes, Provider nodes and Provider edges form the broadcast structure G b = (V b, E b ) for the WSN. Figure 3-3. An Example showing the functioning of a part of the broadcast structure. Figure 3-3 shows a portion of the broadcast structure with respect to a single hexagon whose color is 11. Black nodes depict Supplier nodes, gray nodes depict Provider nodes and white nodes are rest of nodes in the hexagon. The edges shown are Provider edges. The Supplier node v 1 is be responsible to receive and forward the broadcast message in its hexagon, if any one of its Provider in neighboring hexagons with colors {10, 14, 15, 20, 21, 24} who has already received the broadcast message. 51

52 Similarly, nodes v 2 and v 3 will be responsible to receive and forward from neighboring hexagons with colors {12, 13, 16, 17, 21, 22, 25} and {1, 2, 3, 6, 7, 8} respectively. Lemma 7. If any two Suppliers nodes s 1 and s 2 in a hexagon have their respective possible providers p 1 PP s1 and p 2 PP s2 of the same color, p 1, p 2 belong to the same hexagon. Proof. Let p 1 and p 2 belong to different hexagons h 1 and h2 respectively of the same color. Based on Algorithm 7, closest distance between h 1 and h2 must be at least (α + 1)rmax. T But if p 1 is the neighbor of s 1 and p 2 is the neighbor of s 2, then the maximum possible distance between h 1 and h 2 will be rmax, T which is a contradiction. Algorithm 7 Hexagon Coloring Algorithm (H, α, β) 1: k = (α+1)β 3/ : for All h(i, j) H do 3: if (i < 0) then 4: i = (k 1) + (i mod k) 5: else 6: i = (i mod k) 7: end if 8: if (j < 0) then 9: j = (k 1) + (j mod k) 10: else 11: j = (j mod k) 12: end if 13: Color(h(i, j)) = j k + i k : end for Broadcast Scheduling of Broadcast Message In this section, we describe the protocol for broadcasting a message m from the source node v s, to all other nodes. We assume that time is divided into sufficiently large discrete time slots called Epochs. All hexagons with color c i are assigned T th Epochs, such that c i T mod k 2, where k 2 is the number of colors use by Algorithm 7 to color the hexagon tiling. During 52

53 Algorithm 8 Supplier Identification Algorithm: Runs locally on all v V. INPUT: A set L = { v i, C i v i HN(v)}, where C i is the set of colors in the neighborhood of node v i HN(v). OUTPUT: Set of ordered pairs of Supplier nodes for v s hexagon and the respective neighboring colors they cover to receive broadcast message. C h v i HN(v) C i. Supplier = ϕ while C h ϕ do Select a node v i L covering maximum colors in C h (break the ties on the basis of smaller id). C i = Set of colors in C h that are covered by v i. Supplier = Supplier v i, C i C h = C h \ C i end while Return Supplier Figure 3-4. An Epoch some Epoch assigned to its hexagon, the source node v s V initiates the broadcast by transmitting the message m to all nodes in its hexagon. As shown in Figure 3-4, each Epoch is divided into two parts Epoch R and Epoch T. Epoch R is primarily used by a Supplier node in a hexagon for receiving the broadcast message from one of its Provider nodes. Further, it uses Epoch T for broadcasting the received message to all other nodes in its hexagon. Epoch R is further divided into two parts; Select time and Receive time. Select time for a hexagon is divided into smaller time slots called Trices, equal to the number of Supplier nodes in it. These Trices are allocated to Supplier nodes in increasing order of their ids. During its corresponding Trice, a Supplier node broadcasts a Request Message to all its Providers neighbors and if any of them have earlier received the broadcast message m, they respond with Response Messages. As Response Messages are 53

54 very short time messages, the probability for Response Messages from multiple Providers to collide is very low. On receiving a Response Message, the Supplier node broadcasts a Receiving Message. This message indicates the corresponding Provider to start transmitting and to all other Supplier nodes in the hexagon, it indicates to stop attempting in the current Epoch. During the Receive time the broadcast message is received by the Supplier node from its corresponding Provider. Since the size of the broadcast message is very large in comparison to control messages, the Select time is negligible in comparison to the Receive time. If the Supplier node does not receive a Response Message from any of its Providers, in subsequent Trices other Supplier nodes in the hexagon attempt to receive the broadcast message from their respective Providers. After receiving the broadcast message in Epoch R, during Epoch T, the Supplier node broadcasts the message m to all other nodes in the hexagon An Example Scenario Without loss of generality we consider that all the nodes in the WSN have the same transmission range r and the distance d = (α + 1)r = r 3. We consider the hexagon tiling of the 2D plane, with hexagons of sides r. Now following Algorithm 7, we have 2 k = 3 and the number of colors used to color the hexagon tiling will be k 2 = 9, these are {C 1, C 2... C 9 }. We can see in Figure 3-5 the hexagons at a distance less than d are having different colors. Figure 3-5 basically shows an example where a WSN is deployed on the 2D plane, the nodes are represented as points. The mapping of the WSN nodes on the hexagon tiling along with the formation of the broadcast structure shown in Figure 3-5. Figure 3-6 shows the broadcast schedule generated when a source node s in the hexagon h(0, 0) initiate the broadcast. Following is the epoch-wise description of the generate broadcast schedule: Epoch 1 : The source node s in h(0, 0) broadcasts the broadcast message to all the nodes in h(0, 0). 54

55 Figure 3-5. A broadcast structure Figure 3-6. Data broadcasting on top of a broadcast structure 55

56 Epoch 2 : During the Epoch R the Supplier node a 5 in h(1, 0) receives the broadcast message from the Provider node a 1 in h(0, 0). During Epoch T the Supplier node a 5 broadcasts the broadcast message to all the other nodes in h(1, 0). Epoch 3 : The Supplier nodes a 10 in h(2, 0) and a 13 in h( 1, 0) receives the broadcast message during the Epoch R from their respective Provider nodes a 7 and a 3. Further, during Epoch T, the Supplier nodes a 10 and a 13 broadcast the broadcast message to all the other nodes in h(2, 0) and h( 1, 0), respectively. Epoch 4 : During Epoch R a Supplier node a 15 in h(0, 1) receives the broadcast message from its Provider neighbor a 6 in h(1, 0). During Epoch T the Supplier node a 15 broadcasts the broadcast message to all the other nodes in h(0, 1). Epoch 5 : During Epoch R the Supplier nodes a 18 and a 16 in h(1, 2) and h(1, 2), respectively, receives the broadcast message from their respective Provider neighbors a 7 and 14 in h( 1, 0) and h(1, 0). During Epoch T the Supplier nodes a 18 and a 16 broadcasts the broadcast message to all the other nodes in h(1, 2) and h(1, 2), respectively. Epoch 6 : During Epoch R the Supplier nodes a 23 and a 21 in h( 1, 1) and h(2, 1), respectively, receives the broadcast message from their respective Provider neighbors a 4 and a 19 in h(0, 0) and h(1, 1). During Epoch T the Supplier nodes a 23 and a 21 broadcasts the broadcast message to all the other nodes in h( 1, 1) and h(2, 1), respectively. Epoch 7 : During Epoch R the Supplier nodes a 27, a 26 and a 25 in h(0, 1), (3, 1) and h(0, 2), respectively, receive the broadcast message from their respective Provider neighbors a 2, a 11 and a 15 in h(0, 0), (2, 0) and h(0, 1). During Epoch T the Supplier nodes a 27, a 26 and a 25 broadcast the broadcast message to all the other nodes in h(0, 1), (3, 1) and h(0, 2), respectively. Epoch 8 : During Epoch R the Supplier nodes a 30, a 28 and a 29 in h(1, 1), ( 2, 2) and h(1, 2), respectively, receive the broadcast message from their respective Provider 56

57 neighbors a 9, a 17 and a 20 in h(1, 0), ( 2, 1) and h(1, 1). During Epoch T the Supplier nodes a 30, a 28 and a 29 broadcast the broadcast message to all the other nodes in h(1, 1), ( 2, 2) and h(1, 2), respectively. Epoch 9 : During Epoch R the Supplier node a 33, a 32, a 31 and a 34 in h( 1, 1), ( 1, 2), h(2, 2) and (2, 1), respectively, receive the broadcast message from their respective Provider neighbors a 40, a 24, a 22 and a 8 in h( 1, 0), ( 1, 1), h(2, 1) and h(1, 0). During Epoch T the Supplier nodes a 33, a 32, a 31 and a 34 broadcast the broadcast message to all the other nodes in h( 1, 1), ( 1, 2), h(2, 2) and (2, 1), respectively. Epoch 10 : During Epoch R the Supplier node a 39 in h(3, 0) receives the broadcast message from its Provider neighbor a 12 in h(2, 0). During Epoch T the Supplier nodes a 39 broadcasts the broadcast message to all the other nodes in h(3, 0). As in all the Epochs, while receiving and transmitting the broadcast message, all the Supplier nodes follow the sufficient conditions for interference-awareness introduced in Lemma 1, hence, there will be no interference during the broadcasting of the broadcast message. Lemma 8. There is no interference when: 1) any Supplier node receives broadcast message m from its Provider, 2) any Supplier node transmits the broadcast message m to other nodes in its hexagon. Proof. Case 1: Assume that a Supplier node v sup receiving broadcast message from its respective Provider v pro is interfered by a node v i. This would mean that v i and v pro must be transmitting at the same time during the Epoch R of an Epoch. Therefore, the receiver of v i, say v j (which should be a Supplier node) and v sup, must be in hexagons with the same color. This gives rise to two possibilities: 1) Both v j and v sup are in the same hexagon. In this case, only one of them can be scheduled to receive, hence a contradiction. 2) v j and v sup are in different hexagons of same color. But in this case the distance between v j and v s will be greater than or equal to (α + 1)rmax. T Therefore, according to Lemma 1, v i cannot interfere v s, hence a contradiction. 57

58 Case 2: Assume that the transmissions of two Supplier nodes, v sup1 and v sup2 are interfering (which occurs if they are transmitting at the same time during the Epoch T of an Epoch). This is possible only if v sup1 and v sup2 belong to the same color hexagons. This give rise to two possibilities: 1) Both v sup1 and v sup2 are in the same hexagon, in this case v sup1 and v sup2 cannot be scheduled to transmit at the same time, hence, this is a contradiction. 2) v sup1 and v sup2 are in different hexagons of same color. In this case the distance between v sup1 and v sup2 is at least (α + 1)r T max and according to Lemma 1 they cannot interfere each other. Theorem 3.1. The approximation ratio for localized broadcasting algorithm for the IABS problem in 2D WSN is 2 (α+1)β 2. 3/2 + 1 Proof. The theoretical lower bound of IABS problem is R, i.e. the radius of the network with respect to the source node. For comparing the latency of localized algorithm with the theoretical lower bound, we consider the BFS tree of the graph G = (V, E) rooted at v s, which divides the network into layers L 1, L 2,..., L R. According to our 2 localized algorithm, within (α+1)β 3/2 + 1 Epochs, all nodes in hexagons in which nodes in layer L 2 are located will receive the message m from the hexagon in which the source node v s L 1 is located. And within next (α+1)β 3/ Epochs, nodes in all hexagons in which nodes in L 3 are located will receive the broadcast message m from 2 hexagons in which nodes in L 2 are located, and so on. After (R 1) (α+1)β 3/2 + 1 Epochs nodes in hexagons in which nodes in L R are located will receive the message m. As each Epoch has two time slots Epoch R and Epoch T during which the broadcast message is transmitted, hence, the broadcast latency of the localized algorithm is 2(R 1) (α+1)β 2. 3/2 + 1 Thus, the approximation ratio is 2 (α+1)β 2. 3/ Localized Broadcast Scheduling Algorithm in 3-Dimension The localized broadcast scheduling algorithm can be applied to 3D WSNs, if we consider the 3D-space is partitioned into truncated octahedrons of sides r min T 10, forming a 58

59 truncated octahedron tiling of the 3D-space, represented by the X t Y t Z t coordinate system described in Section 2.4. The truncated octahedron tiling is colored based 2 3 on Algorithm 2 using (α + 1)β (α + 1)β + 1 colors, keeping distance 5 5 d = (α + 1)r T max. If coordinates of a sensor node v V and the base station in 3D space are (x v, y v, z v ) and (x b, y b, z b ) respectively, the coordinates of v i.e. (x t v, y t v, z t v ) and the truncated octahedron to(i, j, k) in which it is located in X t Y t Z t coordinate system can be computed as follows: zv t = (z v z b ) sin θ 3 /rmin T 2 (3 3) 5 y t v = {(y v y b ) (z v z b ) cos (θ 1 /2)/ tan θ 3 }/r T min 3 5 (3 4) xv t = [(x v x b ) {(z v z b ) sin (θ 1 /2)/ tan θ 3 } y v t / tan θ 1 ]/rmin T 5 (3 5) The angles θ 1 and θ 3 are as defined in Section 2.4. The coordinates of to(i, j, k) are given as: i = x t v + 1/2, j = y t v + 1/2,, k = z t v + 1/2 Node v can use Algorithm 2 to locally identify the color of to(i, j, k). Once all nodes v V know their respective truncated octahedrons and colors, the localized broadcast scheduling algorithm for 2D WSNs can be used for performing interference-aware broadcasting in 3D WSNs. Theorem 3.2. The approximation ratio for localized broadcasting algorithm for the IABS 2 3 problem in 3D WSN is 2 (α + 1)β (α + 1)β

60 2 3 Proof. As (α + 1)β (α + 1)β + 1 colors are required by Algorithm 2 to 5 5 color the truncated octahedron tiling. Based on this, the theorem can be proved similar to Theorem Experimental Evaluation In this section, through simulations, we present the experimental evaluation of localize approximation algorithm for one-to-all broadcast scheduling proposed in this chapter and centralized approximation algorithm and greedy heuristic for broadcast scheduling proposed in Chapter 2. We randomly generated 11, 000 network instances with different setups and ran our algorithms to evaluate their performance in terms of the broadcast latency. We study the behavior of our proposed algorithms based on three important parameters: 1) Number of sensor nodes in the network, 2) Ratio β, and 3) Ratio α. We implemented the approximation algorithm (ApproxAlgo) introduced in Section 2.5, the localized algorithm (LocalizedAlgo) introduced in Section 3.2, and the centralized greedy heuristic (GHA) introduced in Section 2.6. Although, these three algorithms work for 2D as well as 3D WSNs, but we simulated them only on 2D WSNs Effect of Number of Sensor Nodes on Broadcast Latency In the first set of experiments, we consider a square area of sides 500m and randomly deployed N nodes on it, where N varies from 10 to 500, r T min = 100m, and α = β = 2.0. Figure 3-7 shows plots of broadcast latencies produced by ApproxAlgo, LocalizedAlgo and GHA with respect to number of sensor nodes in WSN. The latency value for any number of nodes is averaged after running each algorithm on a set of 100 network instances. As it was expected the latency for the greedy heuristic is the smallest. There are two main reasons for this: firstly, GHA does not follow the layer by layer broadcasting approach. Secondly, for any time slot GHA follows the manual identification, selection and elimination of simultaneous transmissions among different 60

61 Figure 3-7. Effect of number of nodes on Average Latency Figure 3-8. Average BFS height Figure 3-9. Average optimality ratio 61

62 sets of interfering transmissions. For this, GHA considers exact transmission and interfering ranges of interfering sensor nodes. In case of Approximation Algorithm a layer by layer approach is used based on the BFS tree of the network. And in a time slot the identification and scheduling of interfering transmissions is done based on coloring of the hexagon tiling of 2D plane, which considers the the transmission range and the interference ranges as rmax T and αrmax T respectively. This possibly results in considering extra transmissions as interfering transmission, which might not be actually interfering. Further, in Figure 3-7 we see that the performance of the Localized Algorithm is not good for sparser networks, but as the network density increases the algorithm stabilized and after the point when number of sensor node become 80 the algorithm has latency close to 80. Though the Localized Algorithm does not use a layer by layer approach still its latency is a little higher, this is because, nodes need to wait for the time slots assigned to their hexagons in order to receive or transmit the broadcast message. In fact, we expected all three algorithms to respectively converge to fixed values after certain number of nodes. Intuitively, the expected latency is determined by the height of the BFS tree. Since the area of our network is fixed, after a certain number of nodes the height of the BFS tree cannot grow any further on increasing the number of nodes. Since a single transmission from a transmitter can inform all nodes in its neighborhood. Therefore, an increase in number of nodes without increasing the BFS height does not add much to the broadcast latency. Figure 3-8 shows the average height of the BFS trees in our sample networks for any given number of nodes. It can be observed in Figure 3-8, the BFS height of the network increases till the number of nodes reaches 40, after that it starts to decrease. This is because of the lower connectivity in sparser networks results in some longer paths, and when the network becomes denser the connectivity enhances and the path lengths becomes shorter. After the number of sensor nodes are around 375 the BFS height the remains close to 5. 62

63 Figure Effect of β on Average Latency Figure 3-9 shows optimality ratios of the broadcast for all three algorithms. The optimality ratio is the ratio of latency and the BFS height of the network (which serves as the trivial lower bound for broadcasting). The optimality ratio for GHA ranged from to , for Approximation Algorithm it ranged between to , which is very small in comparison to the upper bound discussed in Theorem 2.3. This shows that our approximation algorithm empirically shows a far better performance in comparison to its theoretical bound. The optimality ratio for our Localized Algorithm ranges between to , which is much better than the theoretical upper bound provided in Theorem 3.2. Main advantages of our localized algorithm are, firstly, it has a O(1) message complexity and secondly, it does not need any centralized control, therefore, it has much lower overheads and more efficiently adapts to network topology changes. Further, in its current state it can also handle multi-message multi-source broadcasting Effect of β on Broadcast Latency Figure 3-10 shows the effect of increasing β on latencies of all three algorithms. We deploy 300 sensor nodes on a square area of side 500m. We vary β from 1.0 to 3.0 with an increment of 0.1 to closely monitor its effect. For every value of β, we generate 100 network instances and averaged latencies produced by each algorithm. 63

64 The plot for Localized Algorithm, in Figure 3-10, shows that when the value of β varies from 1.0 to 1.8, the latency increases rapidly from 54 to 80. This is mainly because, increasing β increases the number of colors used to color the hexagon tiling. Hence, the number of time slots a node has to wait to get a chance to transmit or receive the broadcast message also increases. This increases the broadcast latency. At the same time, increasing β increases the size of the neighborhood of a sensor node and so with a single transmission a node can cover more uninformed node in its neighborhood. This balances out the adverse effect of increase in hexagon colors on the latency and hence, with further increase in β there is no increase in the broadcast latency. Interestingly, we see that with increase in β the latency of the Approximation Algorithm decreases, this is because when β increases the size of the neighborhoods of sensor nodes also increase, which results in decreasing of the radius of the network. And as our approximation algorithm follows a layer by layer approach, hence, its latency directly depends upon the height of the BFS tree, i.e. the radius of the graph. It can be noticed that increasing β also increases the number of interfering transmissions, but as we know that in case of Approximation Algorithm, in a given time slot transmissions take place only within two consecutive BFS layer but not in the entire network. Therefore, the effect of increasing β on broadcast latency is not significant. Increasing β does not have much effect on the latency of GHA, this may be because GHA does not follow the layer by layer approach, hence, it is not affected by the radius of the network. Although, increasing β increases the size of the neighborhood of a node but it also increases the number of interfering transmission, which nullifies the good effect Effect of α on Broadcast Latency Figure 3-11 shows the effect of varying α on latencies of all three algorithms. We deploy 300 sensor nodes on a square area of side 500m. The parameter α varies from 64

65 Figure Effect of α on Average Latency 1.0 to 3.0 with an increment of 0.1 to closely monitor its effect. For every value of α we generate 100 network instances and average respective latencies produced by our algorithms. Figure 3-11 shows that α has an effect similar to β on Localized Algorithm. This can be explained as the number of colors needed to color the hexagon tiling is directly proportional to α, so α has a direct impact on the latency of Localized Algorithm. Further, in Figure 3-11 we see that there are not much variations in the latency of Approximation Algorithm on changing α. This is because α does not have any effect on the BFS height of the network, it only increases the interference range of a node. As we know that in case of Approximation Algorithm, in a given time slot the transmissions are considered within two consecutive BFS layers but not in the entire network, therefore, the effect of α on broadcast latency is not noticeable. In case of GHA, we see a gradual increase in latency with respect to α. This is the direct effect of increase in interfering transmissions with increase in α. Figure 3-12 compares the performance of various heuristic algorithms, based on different criteria used for scheduling various interfering transmissions. For each criterion, the average optimality ratio over all the 11, 000 sample graphs is listed. It is interesting to see that many of chosen optimization criteria actually degrade the performance of the algorithm. This is because the criteria which are based on the topology of the 65

66 Figure Comparison of various heuristics algorithms network, are likely to provide higher priority to physically adjacent nodes in the network to transmit. This can aggravate the the spreading of broadcast message in the network. Figure 3-12 shows that it is better to prioritize nodes which are farther from the source rather than nodes which are closer to the source. This is in line with the observation that farther nodes are more effective in rapidly spreading the broadcast message in the network. 3.4 Conclusion In this chapter, we studied localized broadcast scheduling in the interference environment modeled by protocol interference model. We studied minimum latency broadcast scheduling and proposed the first localized approximation algorithms. Our localized algorithm has an approximation guarantee of 2(α+1)β

67 CHAPTER 4 ALL-TO-ALL DATA BROADCASTING AND ALL-TO-ONE DATA AGGREGATION 4.1 Introduction In this chapter, we study all-to-all data broadcasting and all-to-one data aggregation in WSNs. We consider a WSN modeled as a disk graph G = (V, E), where each sensor node v i V generates a message m i, we study following two problems: 1) Minimum latency all-to-one aggregation scheduling and 2) Minimum latency all-to-all broadcast scheduling. In minimum latency all-to-one aggregation scheduling problem, it is required to aggregate at node v s all messages m i generated at node v i V \ v s respectively. The earliest time at which the all messages reaches v s is known as all-to-one aggregation latency and it should be minimized. In minimum latency all-to-all broadcast scheduling, it is required to broadcast all messages m i generated at nodes v i V respectively to all the nodes in the network. The earliest time at which all messages reach all nodes in the network, known as all-to-all broadcast latency, should be minimized. The schedules generated for each of the above problems must satisfy the following constraints: 1. A schedule must specify for each node v, when it can transmit or receive a message m. 2. A node v can be scheduled to transmit a message m at time t j iff it had earlier successfully received the message m at time t i. 3. Two nodes u and v can be scheduled to transmit simultaneously iff their transmissions are interfere-aware. The main contributions of this chapter are: 1. We present a localized algorithms for all-to-all broadcast scheduling in WSNs. 67

68 2. We present a distributed algorithms for all-to-one data aggregation scheduling and all-to-all data broadcast scheduling. Our distributed algorithm for all-to-one data aggregation scheduling is the first in literature and has a constant approximation guarantee of 2 2(α+1)β We also present a distributed algorithm for all-to-all broadcast scheduling, which is 2. the first in literature and has a constant approximation guarantee of 4 ( 2(α+1)β The rest of the chapter is organized as follows: In section 4.2, we describe a localized algorithm for all-to-all data broadcast. Section 4.3 describes a distributed approximation algorithm for all-to-one data aggregation along with the theoretical analysis. In Section 4.4, we describe a distributed approximation algorithm for all-to-all data broadcasting along with the theoretical analysis of its approximation ratio. We provide the performance analysis of these algorithms in Section 4.5. Finally, Section 4.6 concludes the chapter. 4.2 Localized All-To-All Data Broadcast Scheduling Algorithm Similar to one-to-all broadcast, we assume that time is divided into discrete Epochs and any hexagon with color c i is assigned the T th Epoch, such that C i T mod k 2, where k 2 is the number of colors used to color the hexagon tiling. Each Epoch is divided into two parts Epoch R and Epoch T. Epoch R is primarily used by a Supplier node to receive a message from a Provider in its neighborhood. Epoch T is basically used for two purposes. Firstly, it is used by nodes in a hexagon to broadcast their own messages within their hexagon. Secondly, it can be used by some Supplier node to broadcast in its hexagon, a message which it received from one of its Provider. The preference for transmission is given to broadcast messages generated by the nodes within the hexagon. Each node maintains a Message List, which is a set of bits, such that it has a bit for each node in the network. When a node receives a message generated by some node with id i, it sets the bit at the i th location in its Message List. We now discuss how the time duration in an Epoch is used by the nodes in a hexagon. Epoch R is further divided into Select time and Receive time. Select time is divided into 68

69 smaller time slots caller Trices, equal to the number of designated Provider nodes for the hexagon. During the Select time, the Supplier nodes are allocated the Trices on the basis of their designated Provider nodes in the increasing order of the ids of the Provider nodes. During their allocated Trice, a Supplier nodes negotiates with its respective Providers for that Trice to receive a new message. In order to negotiate with its Provider, a Supplier node during its allocated Trice sends a Request Message. Along with the Request Message, it sends its Message List. Based on the received Message List, the Provider node checks for any new message it can provide. If it has any, it sends the id of that message in the Response Message to the corresponding Supplier node. On receiving the Response Message, the Supplier node updates its Message List and broadcasts it in the Receiving Message. The purpose of the Receiving Message is three fold. Firstly, it acknowledges the respective Provider to send the message. Secondly, it broadcast its updated Message List to all the nodes in the hexagon. Thirdly, it notifies the other Supplier nodes not to attempt to receive from their Providers in the current Epoch. After this negotiation, the Provider transmits the message to the Supplier during the Receive time of the Epoch R. During Epoch T any node in the hexagon willing to broadcast its own message will broadcast. If there is no such node in the hexagon, then any Supplier node will broadcast a message which it has received from its Provider in a different hexagon. Lemma 9. Eventually every node receives message generated by all the other nodes. Proof. As we assume that the graph generated by the bi-directional links in the WSN is connected, therefore, there is at least a single path between any two nodes. Let s assume that the message generated by a node v i is not received by node v j at k-hop distance on path (v i, v i+1,..., v i+(k 1), v j ). Now, the way the protocol works, the message m i generated by v i will be broadcasted in its hexagon during an Epoch assigned to its hexagon. If node v i+1 is in the same hexagon it will receive m i in the same Epoch, else it will receive m i in some later Epoch. Similarly, the message m i will be transferred from v i+1 to v i+2. As the 69

70 path (v i, v i+1,..., v i+(k 1), v j ) connects v i to v j, it is certain that v j will receive the message within finite number of Epochs, which is a contradiction. 4.3 Distributed All-To-One Data Aggregation Scheduling Algorithm All-to-one data aggregation is an important operation in WSN. Periodically it is required that the sensed information from all the sensor nodes be aggregated at the sink node v s for further processing and forwarding. In this section, we introduce a distributed protocol to generate an interference-aware schedule for data aggregation from all the nodes v (V \ v s ) at the sink node v s. We assume that, using the distributed BFS algorithm [56] or the distance vector algorithm, every node knows its closest distance in terms of hop counts to v s and its one hop neighbor on the closest path to v s, such a neighbor is termed as the Collector. Let the radius of the graph G = (V, E) with respect to v s is R and nodes in V are divided into subsets S 1, S 2,..., S R, such that S i is the subset of nodes which are i hops away from the v s. We observe that all nodes in S i will have their Collector nodes in S i 1. We assume the 2D plane covered by the WSN nodes is partitioned into regular hexagons with diameter r T min and is colored using Algorithm 7, considering distance d = (α + 1)rmax. T All the nodes in a hexagon elects a Transmitter node among themselves, which has minimum hop distance to the sink (ties are broken on the basis of smaller id). The time is divided into Epochs and any hexagon with color c i is assigned the T th Epochs, such that c i T mod k 2. An Epoch is divided into two parts Epoch R and Epoch T. In all to one data aggregation protocol, the Epoch R is used by a node in a hexagon to transmit a message to its respective Transmitter node and during Epoch R the Transmitter node forwards that message to its Collector node. Hence, in a single Epoch, a message from a node in a hexagon is forwarded at least one hop closer to the sink without any interference. Each node v V maintains a Forward queue which is initialized by inserting the message generated by v. The Forward queue expands when: 1) v acts as a Collector in 70

71 some set S i and receives messages from some Transmitter node in set S i+1, or 2) when v acts a Transmitter node and collects messages from other nodes in its hexagon. The Forward queue shrinks: 1) when v forwards messages to its respective Transmitter node or 2) when v acts as a Transmitter node and forwards message to its Collector. During the Epoch R of the allocated Epochs, nodes in all hexagons attempt to transfer one message from their Forward queue to the Forward queue of their Transmitter node using Round-Robin scheduling based on increasing order of their ids. The Transmitter node then during the Epoch T forwards a message from its Forward queue to its Collector, which is one hop closer to v s. In this manner the data messages are aggregated from all nodes to the sink node v s on multi-hop paths without interference. Lemma 10. Two Transmitter nodes in two different hexagons with the same color cannot have the same Collector. Proof. Assume that two Transmitter nodes v t1 and v t2 in two different hexagons of same color have same Collector node v c. For this v c has to be in transmission range of v t1 and v t2. According to the triangular inequality, the Euclidean distance d(v t1, v t2 ) between v t1 and v t2 will be less than or equal to d(v t1, v c ) + d(v t2, v c ) 2rmax, T this is a contradiction, as the d(v t1, v t2 ) (α + 1)rmax, T where α > 1. Lemma 11. The data aggregation from all the nodes to the sink is interference free. Proof. The Transmitter node in different hexagons are scheduled to receive and forward messages based on hexagon coloring. As a result of which they satisfy the sufficient conditions for interference-awareness. Therefore, inter-hexagon interference cannot exist. Further, only a single node can transmit to its Transmitter node during the Epoch R of the Epoch allocated to its hexagon. Hence, there cannot be intra-hexagon interfere. Consequently, there is no interference while aggregating data from all the nodes to the sink node v s. Lemma 12. Messages from all nodes are eventually aggregated at the sink v s. 71

72 Proof. For any node v belonging to the set S i, during the Epoch allocated to its hexagon its message m v is forwarded to a node in S i 1, from where it is further forwarded to a node in S i 2 in some later Epoch and so on till the message reaches the sink. This applies to all the nodes in the network. Hence, the messages from all nodes in the network are aggregated at the sink node v s. Lemma 13. The latency of data aggregation from all the nodes to the sink is bounded by 2 V 1 (α+1)β 2. 3/2 + 1 Proof. Due to the property of hexagon coloring, the Transmitter nodes located in different hexagons of the same color in consecutive sets S i and S i+1 satisfy the sufficient conditions for interference-awareness mentioned in Lemma 1. Thus, they can be scheduled to receive or transmit during the same Epoch. Hence, during (α+1)β 3/ Epochs all the sets S 1, S 2,..., S R can be scheduled based on the color of the hexagon their nodes belongs to. The number of Epochs required by the nodes in S R to forward their messages to nodes in S R 1 is bounded by S R (α+1)β 2. 3/2 + 1 During these Epochs all the sets S1, S 2,..., S R 1 2 must have individually forwarded at most S R (α+1)β 3/2 + 1 messages to one set closer to the sink node v s. Now in at most next S R 1 (α+1)β 3/ Epochs, the set SR 1 will be able to completely forward all its remaining messages along with the messages it received from S R. And by this time S 1, S 2,..., S R 2 must have individually forwarded at most (α+1)β 2 ( S R 1 + S R ) 3/2 + 1 messages to one set closer to the sink node vs. 2 Eventually after at most S R (α+1)β 3/ S R 1 (α+1)β 3/ S2 (α+1)β 3/2 + 1 Epochs, the sink node vs will receive the messages of all the nodes in different set. And as each Epoch has two time slots, hence, the latency is bounded by: S R (α+1)β 3/ SR 1 (α+1)β 3/ S 2 (α+1)β 3/

73 = 2( S 1 + S S R ) (α+1)β 3/ = 2 V 1 (α+1)β 3/2 + 1 time slots. 2 Theorem 4.1. Distributed all-to-one data aggregation scheduling algorithm has an approximation guarantee of 2 (α+1)β 2. 3/2 + 1 Proof. The trivial theoretical lower bound for all-to-one data aggregation is V 1. And, according to Lemma 13, the latency of all to one data aggregation of the distributed protocol is 2 V 1 (α+1)β 2, 3/2 + 1 hence, the approximation ratio is 2 (α+1)β 2. 3/ Distributed All-To-All Broadcast Scheduling Algorithm The distributed protocol for all-to-all broadcast scheduling works in two phases. In the first phase, the date messages from all the nodes are aggregated at the sink node v s. In the second phase, v s distributes all the messages it received in the first phase to all the nodes in WSN. For the first phase the distributed scheduling protocol for all-to-one data aggregation can be used. After all the messages are collected in the first phase, in the second phase the scheduling of distribution of the data messages received from all nodes at the sink nodes v s is performed as follows: When the sink node v s S 1 receives all the V 1 messages, the Forward queues of all the Transmitter nodes are empty in all the hexagons and are ready to receive messages from their respective collectors to broadcast them to nodes in their hexagon during the allocated Epochs. Now the sink node in S 1 starts broadcasting one message in every Epoch allocated to its hexagon. is received by all nodes in S 2. As a result of this in every k 2 Epochs one message The Transmitter nodes in S 3 after k 2 Epochs will start scheduling themselves to receive a new broadcast message from their Collector in S 2 during the Epoch R and broadcast it to all the nodes in their hexagon during the Epoch T of the allocated Epoch. Similarly, the Transmitter nodes in S 3 receive and broadcast the messages from their Collectors in S 2 and so on. This pipelining is followed till all the nodes in the network receive all the V 1 messages. 73

74 Lemma 14. The distributed all-to-all broadcast is interference free. Proof. The proof is similar to Lemma 11. Lemma 15. The latency to disseminate the aggregated data from sink v s to all the other nodes is V (α+1)β 3/ R (α+1)β 3/ Proof. In 2k 2 = 2 (α+1)β 3/2 + 1 time slots at least one message is received by all nodes 2 in S 2 from the sink node in S 1. So, in at most 2 V (α+1)β 3/2 + 1 time slots, all the V messages will be received by all the nodes in S 2 from the sink node in S 1. During this time at least V 1 messages must be received by all nodes in S 3 from the nodes in S 2, similarly nodes in S 4 must have received V 2 messages from the nodes in S 3 and so 2 on. Finally the last message will take at most 2(R 1) (α+1)β 3/2 + 1 time slots to reach to all the nodes in S R. Hence, the total latency for disseminating the data of all the nodes 2 from sink to all the nodes is 2 V (α+1)β 3/ R (α+1)β 2. 3/2 + 1 Lemma 16. [51] The lower bound of all to all broadcast is V + R 1. Theorem 4.2. The approximation ratio of the distributed protocol for all to all broadcast is 4 (α+1)β 2. 3/2 + 1 Proof. From Lemma 13 and 15, we have the latency of all-to-all broadcast scheduling 2 is 4 V (α+1)β 3/ R (α+1)β 2, 3/2 + 1 and compared to the lower bound, we have the approximation ratio 4 (α+1)β 2. 3/ Experimental Evaluation In this section, we present the experimental evaluation of our proposed algorithms through simulations. We ran our algorithms on randomly generated network topologies and evaluated them in terms of experimental approximation ratio (which is the ratio of the experimental latency to the theoretical lower bound). We studied the behavior of our 74

75 Figure 4-1. Effect of No. of Nodes on Average Experimental Approximation Ratio of All-to-All data broadcasting Algorithms. algorithms based on three important parameters: 1) number of sensor nodes in the WSN, 2) β and 3) α Results for Varying the Number of Sensor Nodes In this set of experiments, we placed the sensor nodes in a square area of sides 500m. We considered α = 2, rmin T = 100m and r max T = 200m (i.e. β = 2). We varied the number of sensor nodes V from 10 to 500, with an increment of 10. For every value of V we ran all algorithms on 100 randomly generated network topologies and averaged their results. Figure 4-1 shows the effect of number of sensor nodes in the WSN on all-to-all data broadcasting. We observe that the performance of the localized all-to-all broadcast algorithm is always better than the distributed one. The main reason for this is that in case of distributed all-to-all broadcast algorithm all the messages are first aggregated at the sink node v s. And then from there they are further disseminated to all other sensor nodes. This may result in bottlenecks on the paths from various sensor nodes to v s, causing higher latency. We observe that as the number of nodes in WSN increases, the curves for both the algorithm tends to become constant. This can be explained as, after increasing number of nodes to a certain extent, the diameter of the WSN starts decreasing and becomes almost constant after certain number of nodes. This results in almost same number of hops a message needs to travel the distance between the most distant node. 75

76 Figure 4-2. Effect of No. of Nodes on Average Experimental Approximation Ratio of All-to-One data broadcasting Algorithms. Figure 4-3. Effect of No. of Nodes on Average Experimental Approximation Ratio of One-to-All data broadcasting Algorithms. Thus, the latency increases only because of the increase in number of nodes and not because of increase in the diameter of graph. Therefore, the experimental approximation ratio is maintained. Figure 4-2 shows the effect of number of nodes for all-to-one data aggregation algorithm. The plot is similar to that of all-to-all data broadcast and can be explained in the same manner. The experimental approximation ratio becomes almost constant, after certain number of nodes because of non-varying network diameter. Figure 4-3 shows the effect of number of nodes for one-to-all data broadcasting. The plot is similar to the all-to-all and all-to-one. This is because, apparently the latency of 76

77 Figure 4-4. Effect of β on Average Experimental Approximation Ratio of All-to-All data broadcasting Algorithms. the broadcast is driven by the radius of the graph. Which tends to become constant after certain number of nodes in the network Results for Varying β In this set of experiments we placed 300 nodes in a square area of sides 500m. We fixed α = 2 and r T min = 100m. We varied β from 1.0 to 3.0 with an increment of 0.1 to closely monitor its effect. For each value of β we ran all algorithms on 100 randomly generated network topologies and averaged their results. Figure 4-4 shows the plots of localized all-to-all data broadcasting and distributed all-to-all data broadcasting on varying β. We observe there is a little rise in the experimental approximation ratios for both the plots when β changes from 1 to 1.2 after which the experimental approximation ratios tends to be constant. This can be explained by the fact that when β increases, the number of colors used to color the WSN also increases. With this the number of time slots a node need to wait to transmit the message also increases. This directly affects the latency, resulting in increase in the experimental approximation ratio. But, when β is further increased the size of the neighborhood of a node also increases and its transmission informs more number of nodes. Apart from this the diameter of the network also decreases with increase in β. Hence, further increasing β does not effects the experimental approximation ratio. 77

78 Figure 4-5. Effect of β on Average Experimental Approximation Ratio of All-to-One data broadcasting Algorithms. Figure 4-6. Effect of β on Average Experimental Approximation Ratio of One-to-All data broadcasting Algorithms. In Figure 4-5 and Figure 4-6, the plots for distributed all-to-one data aggregation and one-to-all data broadcasting on varying β are given. We observe that the experimental approximation ration in both the plots minutely fluctuate around a certain point and does not show much increase. This can again be explained by the fact that increasing β decreases the radius of the graph, as nodes possibly have larger neighborhood when β is large. at our algorithm shows a much better performance, in comparison to their proposed theoretical approximation guarantees. 78

79 Figure 4-7. Effect of α on Average Experimental Approximation Ratio of All-to-All data broadcasting Algorithms Results for Varying α In this set of experiments, we placed 300 nodes in a square area of sides 500m. We considered, rmin T = 100, r max T = 200 (i.e. β = 2) and varied α from 1.0 to 3.0 with increment of 0.1 to closely monitor its effect. For each value of α we ran all algorithms on 100 randomly generated network topologies and averaged their results. Figure 4-7 shows the plots of localized all-to-all data broadcast and distributed all-to-all data broadcast. We observe that both the plots do not show much variation on increasing α. This can be explained by the fact that increasing α does not affects the diameter of the graph, which remains constant for same number of nodes. Hence, the experimental approximation ratio remains the same. Figure 4-8 and 4-9 shows the plots of all-to-one data aggregation and one-to-all data broadcasting on varying α. The plots are similar to the plots of localized and distributed all-to-all broadcast and can be explained in the similar manner. In our experimental evaluation, we observed that the factors such as number of nodes in the network and β, that directly affects the diameter of the network, have reasonable impact on the latency of data broadcasting and aggregation in WSNs. Further, we observed that our algorithm shows a much better performance in comparison to their proposed theoretical bounds. 79

80 Figure 4-8. Effect of α on Average Experimental Approximation Ratio of All-to-One data broadcasting Algorithms. Figure 4-9. Effect of α on Average Experimental Approximation Ratio of One-to-All data broadcasting Algorithms. 4.6 Conclusion In this chapter, we studied localized broadcast scheduling in an interference environment modeled by protocol interference model. We studied two problems: 1) Minimum latency all-to-one aggregation scheduling and 2) Minimum latency all-to-all broadcast scheduling. For minimum latency all-to-all broadcast scheduling, we proposed the first localized algorithm and the first distributed approximation with approximation 2. guarantee of 4 ( 2(α+1)β Further, for minimum latency all-to-one aggregation scheduling we proposed the first distributed algorithm with an approximation guarantee of 2(α+1)β

81 CHAPTER 5 DETECTION AND TRACKING OF PHENOMENA CLOUD: NEW LOCALIZED APPROACHES AND APPLICATIONS 5.1 Introduction Contemporary wireless sensor network research done in the area of detection and tracking has primarily concentrated on observing motion of objects whose shape and size are invariant [41 43]. However, many real-life events such as oil spills, gas clouds, random walking motion of people, or movement of a group of people, henceforth called Phenomena Clouds, are characterized by non-deterministic, dynamic temporal variations of cloud shape, size and direction of motion along multiple axes. These events cannot be modeled in well-defined terms. Thus, it is difficult to apply existing mechanisms in such situation due to the fact that current cloud-based tracking techniques are oriented towards monitoring the motion of well-defined objects along a single axis at a particular time. They are not equipped for monitoring the shape, size and motion of phenomena clouds whose behavior cannot be readily modeled using classical theory. Moreover, the utility of phenomena cloud detection and tracking is not restricted only to application domains involving gas clouds or oil spills. In fact, they can also be utilized in situations where the quality of data originating from individual sensors cannot be trusted in isolation. In such cases, the raw sensor data originating from the system is typically extremely noisy which makes it very difficult to distinguish actual events from random stimuli. Hence, a quorum of multiple sensors which are located in close proximity to each other is required to reduce the probability of false positives. Through our collective research and systems experience over the years in a completely different deployment domain (Smart Spaces, also known as Ambient Intelligence), we have discovered a great utility in applying the phenomena cloud concept for efficiently and accurately monitoring various events in the space, such as detection of barefoot walking, which is an important application for diabetes patients. 81

82 With a new application and a broader concept of phenomena clouds, early studies on boundary detection and tracking of well-defined shapes are no longer sufficient [12, 13, 19, 44, 45]. Only one work recently studied on similar applications, called Nile-PDT (a stream-based mechanism) may be applicable [46]. However, this centralized approach does not take into account the cost of acquiring and transmitting sensor readings and typically requires participation from all sensors in the network. Unfortunately, sensor sampling costs and networking and processing overheads can have a critical effect on the practical viability of the entire smart space This raises a need for a distributed in-network detection mechanism, where the detection and tracking process is localized to the immediate neighborhood of a phenomenon at any given time and does not require all the sensor nodes to remain unnecessarily active. Along this direction, we introduce a mathematical model and in-network distributed mechanisms with the following specific contributions: 1. Analyzing the structure of phenomena clouds and proposing a set of parameters to comprehensively describe them without requiring complex models. 2. Presenting an energy-efficient and distributed algorithm, called Full Density Algorithm (FDA) for real-time detection and tracking of phenomena clouds, which do not require customization of the network routing layers. The proposed algorithm works in an autonomous manner without requiring intervention from the centralized query processor residing in the base station and hence, is suitable for disconnected mode of operation, when continuous communication with the base station cannot be maintained. Plus, the proposed algorithm can be used in a new application domain, i.e, detection a walking motion. 3. Introducing a mathematical model based on Integer Program (IP) to further optimize the energy consumption during the phenomena cloud detection and tracking process. This model provides an excellent benchmark for evaluating the performance of the proposed algorithms. 82

83 4. Providing a novel localized algorithm, called Optimized Density Algorithm (ODA) which can further enhance the resource utilization based on a new technique, called hexagon tiling. This new algorithm locally allows sensor nodes to be in active or sleeping modes without compromising on the quality of detection and tracking. 5. Presenting a practical application which has been deployed in a real-world smart space and utilizes the phenomena detection and tracking mechanism described in this paper, to solve critical challenges faced during its deployment. 6. Validating our approaches using both real-world applications and simulations to analyze their performances as compared to stream-based approaches [46]. The remainder of this paper is structured as follows. Section 5.2 describes the phenomena clouds, their characteristics along with the critical challenges and analyzes their structures using the set of proposed parameters. Our first in-network detection and tracking algorithm, including its fault tolerance mechanism, is proposed in Section 5.3. In Section 5.4, we optimize the power consumption and resource utilization, on which we formulate an integer program for detection and tracking of a phenomena cloud and propose a localized protocol based on the hexagon tiling technique. Section 5.5 presents an interesting practical real-world application of our phenomena detection and tracking algorithm in the smart space. Section 5.6 provides evaluation and analysis of the performance of our approaches through real-life experiments and simulations. Section 5.7 provides the overview of the existing literature. Finally, Section?? concludes the paper with some future work. 5.2 Phenomena Cloud: Challenges and Representation A phenomenon cloud can be defined as a manifestation of a number of simultaneous events reaching critical mass and spanning a contiguous space. As such a phenomenon expands, shrinks, or translates randomly in a non-deterministic fashion over the time, its shape, size and direction of movement either cannot be anticipated accurately or have models which are usually too complex for real-time computing 83

84 by sensor networks, which largely consist of low-end nodes with limited processing capabilities. Examples of phenomena clouds include gas clouds, floods, oil spills, wild forest fires or even movement of tourists in a museum Major Challenges The major challenges that are faced during detection and tracking of phenomena clouds are as follows: 1. Initial detection of phenomenon. Initial occurrences of the phenomenon might be scattered throughout the space. Detection therefore must be attempted at multiple locations. 2. Avoiding false positives. The probability of a single sensor outputting accurate readings at a specific point in time is very low. It is quite possible for a sensor to temporarily malfunction or be subject to environmental conditions which might cause it to output values which incorrectly indicate the occurrence of a phenomenon. Thus detection must require inputs from multiple sensors located closely to each other. 3. Tracking a phenomenon in real-time. A phenomenon can suddenly grow or shrink in size and also move in multiple directions simultaneously. Therefore, tracking it in real-time can become a massively complex task. To enable cost-effective real-time tracking, the rate of status updates from the sensor network to the user needs to be kept at a minimum to reduce network cost and processing overhead. 4. Operating under harsh conditions resulting in disconnected operation: Hostile phenomena like fires can lead to disruption of communications between the sensor network and the base station. Therefore, the detection and tracking process should be able to operate in an autonomous manner without requiring remote supervision Representation In this section, we propose a set of parameters to formally describe the structure of phenomena clouds. We represent a phenomenon cloud as a 5-tuple, P = a, b, p T, m, n. The lower and upper bounds of the range of sensor values which 84

85 Figure 5-1. Dissection of the Phenomena Cloud constitute a phenomenon are denoted by a and b respectively. For example, a hydrogen gas cloud can have a = 20% volume and b = 100% volume. p T is the threshold probability, m is the observation count and n is the minimum quorum. A sensor s reading is said satisfying the Probability Condition, iff it is lying in the range [a, b] with probability greater than p T during the last m observations (that is, in a sliding window of size m). A sensor is said to participate in a phenomenon cloud (or satisfy the Phenomenon Condition) P = a, b, p T, m, n, iff it and at least n neighbor sensors satisfy the Probability Condition. This criterion ensures that a sensor must have a sufficient number of neighbors in agreement with it before it can claim the existence of a phenomenon cloud, thereby reducing the occurrence of false positives. We define Phenomenon Set to be the set of sensors satisfying the Phenomenon Condition. We consider a phenomenon cloud is composed of multiple regions as shown in Figure 5-1. The innermost region, called the Core region of the cloud is where the phenomenon is most strongly observed. Clearly, the sensors lying in the core region satisfy the Phenomenon Condition and hence, are members of the Phenomenon Set. The Middle region is the outer border of the phenomena cloud where the Probability Condition is satisfied but the Phenomenon Condition is not yet satisfied. The Outer region denotes the fringes where uncertainty regarding the occurrence of the phenomenon is highest, hence, the outer fringe is the region where the phenomena is sparse and is not detected. Section describes the roles assigned to the sensors 85

86 based on which region they fall in at a particular time and how they are utilized to perform localized in-network detection and tracking. 5.3 Proposed Solution for Detection and Tracking In this section, we present our proposed approach for the phenomenon cloud detection and tracking, called Full Density Algorithm (FDA). We begin with classifying sensors into different categories as discussed above according to their roles in the detection and tracking process. We then describe various responsibilities of any sensor node with respect to categories of its neighbors and list a set of rules which govern the transition of sensors from one category to another which form the main part of our detection and tracking strategy. The rest of this section covers the different stages of detection and tracking process in chronological order. It also describes mechanisms for handling node failures and how applications can utilize the real-time tracking data produced by the sensor network. Figure 5-3 pictorially depicts an example for detection and tracking process of a single phenomenon cloud. Figure 5-2. Classification of the Participating Sensors Classification of Sensors Figure 6-2 shows the phenomenon cloud depicted in Figure 5-1 superimposed over a group of sensors. Sensors are classified according to the region where they are located, which determines their role in detection and tracking of phenomena cloud. The different categories are as follows: 86

87 1. Candidate Sensor: A sensor which satisfies the Probability Condition is called a candidate sensor. It has the responsibility of actively sensing and notifying its neighbors about its state. It also receives notifications from its neighbors in order to identify whether it satisfies the Phenomena Condition to become a part of the Phenomenon Set. A sensor becomes a candidate sensor when it transitions from the potential candidate stage during the expansion of the phenomena, or when it transitions from the tracking stage during the shrinking of the phenomena. 2. Potential Candidate Sensor: A sensor which is actively sensing the phenomenon but does not satisfy the Probability Condition is called a potential candidate sensor. These sensors keep monitoring their reading to enable a neighbor candidate sensors to check the validity of their observations. A sensor becomes a potential candidate if either 1) it has been selected by the centralized query processor as part of the initial detection phase (described in Section 5.3.4), or 2) one of its neighbors becomes a candidate sensor during the expansion of the phenomena, or 3) when a candidate sensor transitions from candidate stage to potential candidate stage during the shrinking of the phenomena. The responsibility of the potential candidate is to notify its neighboring candidate sensors whenever its reading satisfies the Probability Condition. Potential candidate sensors form the fringes of detection and make up the outer region of the phenomenon cloud. Essentially, the set of potential candidate sensors forms a phenomenon front which grows and shrinks dynamically. 3. Tracking Sensor: A sensor which has already detected a phenomenon event and is now actively engaged in the tracking process is called a tracking sensor. A candidate sensor becomes a tracking sensor after it satisfies the Phenomenon Condition (defined in Section 5.2.2). Tracking sensors covers the core region of the phenomena cloud. The Phenomenon Set is the collection of all tracking sensors, hence, each cloud consists of subsets of tracking sensors from the Phenomenon Set. 87

88 4. Idle Sensor: All sensors which do not belong to any of the above three categories are called idle sensors. These sensors are not engaged in phenomenon detection or tracking and do not perform any monitoring whatsoever. Typically, most sensors in the space will fall in this category since only selected clusters of sensors will be actively engaged in the detection and tracking of phenomena clouds at any given time. This ensures that the detection and tracking process is executed in a localized manner with minimal expenditure of energy. Figure 5-3. Detection and Tracking of a Phenomena Cloud Remarks. We have modified the definitions of candidate and potential candidate sensors as compared to our initial definitions in the preliminary work [57]. More specifically, in [57], we defined that a candidate sensor is not required to satisfy the Probability Condition and a potential candidate sensor cannot have a tracking sensor, but only candidate sensor as its neighbors. Consequently, even if a candidate sensor does not satisfy the Probability Condition, it unnecessarily invokes all its idle 88

89 Figure 5-4. Action Taken by a Sensor Node with respect to its Neighbors which are not idle neighbors as potential candidates, thereby causing excessive resource usage. In contrast, in this paper, a candidate sensor must satisfy the Probability Condition and a potential candidate sensor can has at least either one tracking or candidate sensor in its neighborhood. Therefore, only those idle sensors are invoked as potential candidates which have phenomena occurring in their vicinity. This slightly modification have an impact on the performance in terms of energy and resource consumptions which we show later in section Keeping Tabs on the Neighborhood Each sensor node keeps track of the category of its neighbors. This is done in a peer-to-peer fashion, where a sensor transitioning from one category to another notifies its neighbors via a 1-hop broadcast without involving the centralized query processor. We used ZigBee communication protocol in our system, which natively supports 1-hop broadcasting. The category of a sensor and its neighbors determines their mutual responsibilities towards each other. For example, a candidate sensor node A has 89

90 two neighbors B and C where B is a potential candidate and C is a tracking sensor. In this case, B will alert A whenever its readings satisfy the Probability Condition. And whenever A s reading is no longer satisfied the Probability Condition, A will only alert C but not B. Therefore, a single sensor node plays different roles with respect to different categories of its neighbors. Figure 5-4 lists the actions a sensor node required to perform with respect to the categories of its neighbors. The cells marked Not Applicable imply that such combinations are not possible according to transition rules given in next subsection Transition Rules We now ready to present a set of rules that govern the transition of a sensor from one category to another. These rules are executed in-network and control the entire detection and tracking process. 1. R1: Candidate Tracking: If a sensor satisfies the Phenomenon Condition then it transitions into the tracking category. Once a sensor is in the tracking category, it becomes a member of the Phenomenon Set. 2. R2: Potential Candidate Candidate: A potential candidate sensor will transition to a candidate sensor if it satisfies the Probability Condition. This rule corresponds to the fact that whenever a phenomenon cloud moves or expands, a new set of sensors senses the phenomena and satisfies the Probability Condition, resulting in the movement or expansion of the phenomenon front. 3. R3: Idle Potential Candidate: An idle sensor transitions into a potential candidate if any of its neighbors becomes a candidate sensor. 4. R4: Tracking Candidate: A tracking sensor will transition down to the candidate category if it is unable to satisfy the Phenomenon Condition. In such a case, the sensor will cease to be a member of the Phenomenon Set. 5. R5: Candidate Potential Candidate: A candidate sensor will transition to a potential candidate sensor if it does not satisfy the Probability Condition anymore. 90

91 6. R6: Potential Candidate Idle: A potential candidate transitions into an idle sensor if all of its neighbors are either potential candidates or idle, that is, none of its neighbors is in the candidate category or tracking category Initial Selection of Potential Candidate Sensors The main goal of this stage is to detect initial occurrences of phenomena clouds. A phenomenon cloud can manifest itself in multiple locations simultaneously, hence, monitoring one particular location is not adequate. However, in the interest of conserving network resources and power for the entire sensor grid, we cannot require each and every node to monitor its readings. A compromise between the two approaches can be followed where specific sensors are directly chosen to be potential candidates by the centralized query processor. The criterion for such a selection can be based on the location of nodes or past history of their readings. For example, if we are planning to detect gas leaks in a pipeline, it might be useful to choose the sensors located at the valves and joints to be the initial set of potential candidate sensors since the probability of a leak getting started at those locations is higher. We used this criterion in the Smart Floor application described in Section 5.5, where sensors located near doorways are selected as initial potential candidates so that whenever a person enters the room, the system is immediately able to pick up their presence and commence the detection and tracking process to monitor their movement. Another criterion can be the off-line use of an available mathematical model of the phenomenon cloud to determine locations where the probability of occurrence is the highest. In case such a criterion is hard to formulate, alternatively the system can randomly select sensors as initial potential candidates such that they are uniformly distributed over the sensor space. These sensors and their respective neighborhoods can be viewed as autonomous clusters of early warning systems for detecting the sudden manifestation of possibly multiple phenomena clouds. Since sensor deployment patterns tend to be highly application and phenomenon-specific, we do not go into details of their deployment. For purposes of 91

92 discussion for the rest of this paper, we assume that sensor nodes are deployed in such a manner that each sensor has a sufficient number of neighbors to potentially avoid false positives Monitoring for Initial Occurrences The query processor pushes the phenomenon cloud parameters on to each of the selected initial potential candidate sensor nodes in the network. At the beginning of every epoch, each potential candidate node monitors its readings and sends a 1-hop broadcast message if it satisfies the Probability Condition and transitions into a candidate sensor node. In order to enable sensor nodes to send or receive alert broadcasts to and from multiple neighbors simultaneously during the same epoch, a slotted approach is used to ensure collision avoidance similar to what is described in [58]. Each epoch is sub-divided into multiple sub-epochs and each node only broadcasts alerts during its assigned sub-epoch. The candidate sensor node aggregates alerts received via broadcasts from its neighbors and determines if it satisfies the Phenomenon Condition. A candidate sensor satisfies the Phenomenon Condition if its readings satisfy the Probability Condition and it also receives broadcast alerts from at least n neighbors which also satisfy the Probability Condition in the same epoch Notification of Initial Occurrence If an initial potential candidate node has satisfied the Probability Condition, it transitions to a candidate sensor node. Furthermore, when a candidate sensor node satisfies the Phenomenon Condition, it notifies the query processor residing in the base station that it has detected presence of a phenomenon cloud. The query processor adds the candidate node to the Phenomenon-Set and the candidate sensor transitions to a tracking sensor node using rule R1 given in Section

93 5.3.7 Growth of Phenomenon Cloud When a potential candidate sensor satisfies the Probability Condition, it gets transitioned into a candidate sensor using rule R 2. It notifies all its neighbors about this transition by broadcasting an alert message. Each of the neighbor sensor on receiving the alert message transitions into a potential candidate if originally they were idle sensors using rule R 3. In this manner, the detection mechanism gets distributed and propagated in-network, without involvement of the centralized query processor, as the phenomenon cloud grows with time. Each sensor node keeps track of its neighborhood via the broadcast alerts that it receives and determines the actions to be undertaken with respect to a specific neighbor based on which category each neighbor falls in, as described in Figure 5-4. Figure 5-5. Ratio of Total Active Sensors to Cloud Size in a Rectangular Sensor Grid The plot in Figure 5-5 depicts an example to show the effect a growing phenomenon cloud has on the number of active sensors (tracking, candidates and potential candidate sensors) involved in its detection and tracking. We observe that in our distributed in-network approach, the number of active sensors required at any given time is only slightly more than the number of sensors actually needed to participate in detection and tracking the phenomenon cloud and the ratio of active sensors versus phenomena cloud size decreases with increase in cloud size. This is due to the fact that the 93

94 detection and tracking process is executed in-network in a localized manner to ensure maximum efficiency. Only those sensor nodes which are in the immediate vicinity of a phenomenon cloud or are lying within the cloud are actively involved in the detection and tracking process. The propagation of this process in the network is governed solely by the behavior of the phenomenon cloud and handled by the sensor nodes in a distributed but co-operative manner using the rules specified in Section 5.3.3, without needing any assistance from the centralized query processor Shrinking of Phenomenon Cloud The phenomenon cloud is said to be shrinking when the sensors falling in the tracking region identifies that they no longer satisfy the Phenomena Condition. According to Figure 5-4, after a sensor transitions into tracking, its neighbors will only send alerts if their readings fail to satisfy the Probability Condition. A tracking sensor is no longer participating in the tracking of the phenomenon cloud if it determines that less than n of its neighbors currently satisfy the Probability Condition. In such a case, the tracking sensor node notifies the query processor which removes the tracking sensor from the Phenomenon Set, thereby signifying that the phenomenon cloud has shrunk. The tracking sensor node then transitions into a candidate sensor using rule R 4. When the phenomena cloud further shrinks and the candidate sensor does not even satisfy the Probability Condition, it transforms into a potential candidate sensor using transition rule R 5 if it has at least one candidate or tracking sensor node in its neighborhood. And all of the potential candidate neighbors of this sensor node transitions into idle sensors using transition rule R 6 if they do not have any other candidate or tracking node in their neighborhood. We make a note that if all the phenomena clouds disappear completely then after all the transitions are applied as per rules given in Section 5.3.3, the sensor space will revert back to the set up described in Section 5.3.4, where only the initial set of potential candidate sensors will remain active. 94

95 5.3.9 Real-Time Monitoring by Applications The centralized query processor continuously maintains the Phenomenon Set at any given time. The query processor is able to track phenomenon clouds in real-time, with minimum processing and networking overhead of receiving updates from the sensor nodes. The Phenomenon Set is only updated whenever a sensor transitions to or from the tracking category. Hence, the query processor only requires minimal updates to continuously track phenomena clouds. We evaluate the network and processing costs for this update scheme in Section Since the location of each sensor node is known beforehand, an application such as a GUI-based phenomenon cloud visualization tool can easily reconstruct a view of the various phenomenon clouds in real-time using information from the Phenomenon Set in conjunction with sensor location information. By looking at which sensors enter or leave the Phenomenon Set, the motion of multiple phenomenon clouds can also be tracked over time and more sophisticated analysis and prediction performed at a centralized level. This is extremely useful for applications such as [59] which can determine safe passages for rescue workers through multiple occurrences of phenomenon clouds such as gas leaks and wild fires. In addition, the cardinality of the Phenomenon Set together with sensor location can give applications some information about the size of various phenomena clouds. The size of a phenomenon cloud can have different impacts depending on the application context. For example, if an application is concerned with detection of phosphate dust clouds, a Phenomenon Set of low cardinality may not have much significance. However, if an application is tasked with the detection of hydrogen cyanide (HCN) leakage, then the detection of even a small cloud indicates serious consequences. 5.4 Optimizing Energy Consumption and Resource Utilization We now turn our attention to optimizing the energy consumption and resource utilization of our proposed mechanism. In order to minimize the number of active 95

96 sensors required for detection and tracking, first we propose a mathematical model based on Integer Program (IP) which uses a minimum number of active sensors (candidate, potential candidate, and tracking sensors) for detection and tracking. This model can be used as an excellent benchmark to evaluate our proposed mechanism. Next, we propose a localized algorithm, called Optimized Density Algorithm to further reduce the resource utilization based on our novel technique, called Hexagon tiling The Integer Program Formulation The IP is divided into two parts. In the first part, all the sensor nodes are categorized into Potential Candidates, Candidates, Tracking, and Idle sensors. In the second part, an optimization is performed to minimize the number of active tracking sensor nodes. Let V denote a set of all sensor nodes where V = N and N(i) denote a set of neighbors of sensor node i. For each i V, we associate three variables defined as follows: x p i = x c i = x t i = 1 if sensor i is a potential candidate 0 otherwise 1 if sensor i is a candidate 0 otherwise 1 if sensor i is a tracking 0 otherwise (5 1) (5 2) (5 3) node i: We now formulate the first IP of which solutions determine the status of each sensor min N i=1 (x p i + xi c + xi t) 96

97 subject to (xj c j N(i) (x c i x p i + x c i + x t i 1 i V (5 4) + x t i ) (P i P T ) > 0 i V (5 5) + xj t ) N(i) (x p i + xi c + xi t ) 0 i V (5 6) (xj c j N(i) + x t j ) N(i) x t i < n i V (5 7) x p i, x c i, x t i {0, 1} i V (5 8) The above IP identifies the potential candidate, candidate and tracking sensors in the WSN based on the Probability and Phenomena conditions. Constraint 5 4 ensures that a node is either a potential candidate, or a candidate, or a tracking sensor, or none of them. (In this case, that sensor node should be idle.) In constraint 5 5, P i and P T are the probability of sensing the phenomena for a sensor node i and the threshold probability for sensing the phenomena, respectively. This constraint ensures that if a node satisfies the probability condition, then it must be either a tracking sensor or a candidate sensor. Constraint 5 6 ensures that if there is a candidate or a tracking sensor in the neighborhood of any node i, then it must not be an idle sensor. Finally, constraint 5 7 ensures that a node must satisfy the phenomena condition to become a tracking sensor. Obtaining the solution of the above IP will classify sensors into their corresponding status. Let us define a core tracking node as a tracking node iff all of its neighbors are also tracking nodes. Let T denote a set of such core tracking sensor nodes. For each core tracking node i T, define a variable x i as follows: x i = 1 if i T is an active node 0 otherwise (5 9) 97

98 We now introduce the second IP as follows: min T i=1 x i subject to x i n + x j n 0 i T (5 10) j N(i) x i n j N(i) x j 0 i T (5 11) x i {0, 1} i T (5 12) The second IP minimizes the number of active core tracking nodes in order to optimize the power consumption for detecting and tracking the phenomena cloud. Constraint 5 10 and 5 11 ensure that a core tracking node can go to the sleep mode if it satisfies the minimum quorum condition along with all of its neighbors Optimized Density Algorithm In light of the above IP, we now present a localized protocol, called Optimized Density Algorithm (ODA) to further enhance the resource utilization of our proposed FDA discussed in Section 5.3. As shown in the IP, we propose to identify a set of core tracking nodes, and then switch these nodes back and forth between the sleep and active modes following some certain rules. Remember that a core tracking node can go to the sleep mode if it satisfies the minimum quorum condition along with all of its neighbors. Before describing our protocol, we first discuss some preliminaries which lead to the formation of the protocol. The main idea of locally deciding a sleep/active mode of a core tracking node is based on an efficient clustering of the sensor nodes in the network. We partition the network into clusters in such a way that the nodes in adjacent clusters are neighbors of each other. Thus we first propose an idea to locally perform in network clustering with message complexity O(1). Our idea is based on a geographically but locally 98

99 partitioning the plane into regular identical partitions, such that all nodes located within the same partition forms a cluster. The size of each partition will be defined by the transmission range r of a sensor node, and we consider all the sensor nodes have the same transmission range. Once the clustering is performed, the nodes within a partition elects the cluster heads. At any point in time, the cluster heads will remain active and the rest of core tracking nodes will sleep as long as each cluster head has at least n active neighbors. Let us consider how to perform such partition based on the tiling technique. What is the optimal shape of the regular unit partition so that we can partition the plane into the minimum number of clusters such that all nodes in adjacent clusters are neighbors of each other? Such a partition will minimize the total number of active core tracking nodes. There are four possible plane tiling polygons: 1) square, 2) rhombus, 3) equilateral triangle, and 4) regular hexagon. As we need the nodes in two adjacent partitions must be neighbors of each other, consequently, the maximum distance between two points located in two adjacent partitions must be r. Figure 5-6,5-7,5-8 and 5-9, shows the four possible partitioning using different plane tiling polygons. It is easy to see that tiling a plane using the regular hexagons covers the maximum area, thus lesser number of clusters for a given area. Therefore, we use regular hexagon as a partition shape for our tiling technique and next present how to locally perform this tiling Clustering method We partition the 2D plane covered by the WSN into regular hexagons of side length r 13 to form a hexagonal tiling as show in Figure All the sensors located within the same hexagon form a cluster. Notice that their exists a coordinate system in which the axis are inclined at 60 o, such that all the hexagon centers lie on the integral coordinates of this new coordinate system. 99

100 Figure 5-6. Partition shape as square. Figure 5-7. Partition shape as rhombus. Figure 5-8. Partition shape as Equilateral Triangle. Figure 5-9. Partition shape as Regular Hexagon. We assume that all the sensors are equipped with a location identification device such as a GPS or used some localization methods [54, 55, 60]. Further, we assume that all the sensors are aware of the Euclidean location of the base station. This can be done by one broadcast from the base station. We now show that if a node v knows its coordinates (x v, y v ) and the coordinates of the base station (x b, y b ) in the Cartesian system, then without having the global view of the hexagon tiling, it can locally compute its coordinates (xv h, yv h ) in the new coordinate system. Furthermore, node v can identify the integral coordinates of the hexagon in which it is located. Figure The Hexagon Lattice 100

101 Let (0, 0) be the coordinate of the base station in the new coordinate system. Node v can compute its new coordinates (x h v, y h v ) as follows: xv h = {(x v x b ) (y v y b ) tan 60 }/ r 3 o 2 13 yv h = (y v y b ) sin 60 o / r (5 13) (5 14) The coordinates of the hexagon h(i, j) in which node v is located is given as: xv h = {(x v x b ) (y v y b ) tan 60 }/ r 3 o 2 13 yv h = (y v y b ) sin 60 o / r (5 15) (5 16) All the sensor nodes after computing the coordinates of their respective hexagons exchange this information with their neighbors and identify all the other nodes in their cluster. All the nodes having the same h(i, j) will belongs to the same cluster. Note that this communication is only 1-hop as the hexagon has the length (hexagon diameter) of 2 r 13 and the clustering partition can be done only one time during the deployment and set-up of a WSN Localized protocol We are now ready to introduce our localized protocol for optimizing energy consumption and resource utilization of the detection and tracking process described in Section 5.3. Notice that the partition allows all nodes in one hexagon and that of six adjacent hexagons be neighbors of each other. As shown in Figure 5-11, nodes in cluster C 1 will have all nodes in clusters C 2, C 3, C 4, C 5, C 6, C 7 in their neighborhood. Now as the phenomena cloud will expand and the core tracking region will enlarge, there will be a large number of core tracking nodes in the network. The core tracking nodes will run the following protocol in on-line manner to schedule themselves into active and sleep mode: 101

102 Figure Clustering on the basis of hexagon lattice 1. All the core tracking nodes in a cluster select a cluster head, this can be selected on the basis of maximum energy left or on any other arbitrary factor [61]. 2. Each elected cluster head performs a one hop broadcast to inform its presence. Consequently, all nodes in the neighbor clusters are informed about the presence of this cluster head. 3. At this step, each node in a cluster can have at most seven cluster heads in its neighborhood. Now all the core tracking nodes send back to the cluster heads the extra required number of cluster heads they need to satisfy the minimum quorum condition. 4. If any of the core tracking nodes in a cluster does not satisfy the minimum quorum condition, then the last cluster head in the cluster again invokes the cluster head election protocol within the cluster to generate an extra cluster head. This is repeated until all the nodes in a cluster satisfy the minimum quorum condition. 5. Finally, all the cluster heads in a cluster are scheduled to be active, whereas all the other core tracking nodes in the cluster are scheduled to sleep in order to conserve the energy. 6. If any active cluster head fails or goes down because of getting depleted of energy, then a new cluster head is elected to replace it. 102

103 Figure Gator Tech Smart House Figure Smart Floor Tile with force sensors and Atlas Platform Node 5.5 A Practical Application of Phenomena Detection and Tracking We felt that it would be interesting to describe a new real-world application of phenomena detection and tracking which is radically different from the gas cloud and oil slick simulations that are usually presented. The application that we describe involves the Smart Floor [62] in the Gator Tech Smart House (Figure 5-12) [63]. In addition, we use this application to evaluate the performance of our approaches as described later in section 6.5. The Smart Floor deployed in 2005, consists of a grid of piezoelectric force sensors deployed under the raised floor tiles of the house. Each tile has a single sensor connected to an Atlas Platform [64] ZigBee node placed below its center (Figure 5-13), which allows a step anywhere on the tile to be detected. The Smart Floor covers 103

104 the entire residential area of the 2500 sq. ft. house and allows it to monitor its residents movement and location without encumbering them with tags or other tracking devices. While designing the Smart Floor application, a naive expectation was that when a person steps on a tile, only the sensor underneath that tile outputs a reading of significant magnitude. Unfortunately, based on our experience over the years, we found that this was clearly not the case. Due to various reasons including seemingly random vibrations, individual sensors sometimes output large readings even when nobody is stepping on them. This results in a very noisy sensory environment where one cannot distinguish between a genuine step and random spikes by relying on individual sensors alone. Figure Ripple Effect of a Foot Step on the Smart Floor Figure Walking motion as a Phenomena 104

105 We also observed that when a person steps on a tile not only does this result in that tile s sensor registering a strong reading but some of its neighboring tiles also output significantly large readings. Hence, the stepping action of a foot on a floor tile causes a ripple effect in the immediate neighborhood of the tile. Figure 5-14 shows an actual screen shot of this phenomenon occurring in the Smart Floor where red dots indicate tiles registering readings of higher magnitude and green indicates tiles with lower yet significant magnitude. We used this observation to describe walking as a phenomenon by defining a step in terms of a phenomenon cloud (as shown in Figure 5-15), in order to reduce the number of false positives and provide accurate location information about the home s resident. Moreover, since our approach to phenomenon detection and tracking does not rely on mathematical modeling to track the direction of movement of a phenomenon, hence, this makes it extremely suitable for observing phenomena such as walking where it is extremely difficult to accurately model the path that a person will follow at any given time. A step can be described as a phenomenon cloud S = a, b, p T, m, n, where a and b denote the lower and upper bounds of a force sensor reading indicating that a foot has stepped on a tile or in its immediate vicinity. This value depends on the particular sensor being used. For example, based on empirical study, we found that for the Interlink force sensors used in the Smart Floor (having an output range of [0, 1023], a = 150 and b = 600 for an individual weighing between 110 to 240 pounds. The optimal values of the other parameters were determined via experimentation and are described in the following section. More details about utilizing phenomenon detection and tracking to monitor resident location and observe walking characteristics such as gait velocity and stride length in the Gator Tech Smart House can be found in [65]. 5.6 Performance Evaluation In this section, we evaluate various aspects of the distributed phenomenon detection and tracking approaches described in this paper. The first set of experiments 105

106 evaluates the effectiveness of our detection strategy in a real world sensor deployment and analyzes the effect of varying phenomena parameters described in Section The second set of experiments uses simulation to evaluate the resource usage and power consumption of our approaches compared with the stream-based method. We relied on simulation in this case because we wanted to measure resource usage and power consumption in large sensor networks of varying sizes. And it was not practically feasible for us to physically deploy sensors in such large numbers for the purpose of experimentation Effectiveness of Detection Strategy In this first set of experiments, we study the effectiveness of our phenomenon detection and tracking mechanism in a real-world sensor deployment inside the Gator Tech Smart House Experimental setup We chose to evaluate effectiveness by performing experiments using the Smart Floor (previously described in Section 5.5) where human footsteps are represented as phenomena clouds and phenomenon detection and tracking is used to monitor the location of a resident in the house. We observed the effect of phenomenon definition parameters (p T, m and n, defined in Section 5.2.2) on the detection efficiency of our technique. We varied the values of each of these parameters and studied their effect by logging the number of false positives, false negatives/misses and correct detections of a human step. In order to aid our evaluation, we restricted movement to a 100 sq. ft. area in the living room of the smart house and had test subjects walk along a clearly marked path on the floor. This allowed us to log the actual steps that a person was taking and collect statistics on correct detections and detection errors Results and analysis The experimental results are presented as 3 graphs shown in Figures 5-16, 5-17 and Figure 5-16 shows the effect of varying parameter n which determines 106

107 Figure Effect of varying n with p T = 0.4 and m = 150 the minimum quorum of neighboring sensors required to conclusively determine the occurrence of a phenomenon. Since the Smart Floor is deployed as a rectangular grid of sensors, the value of n varies from 0 to 8. We observe that for n = 0 (which corresponds to the naive case) the number of false positives is extremely high since the system is entirely relying on outputs from single sensors to determine the occurrence of a footstep event. Therefore, even though there are no misses/false negatives and all the actual footsteps are detected, their occurrence is lost in the noise of having an extremely large number of false alerts. As we increase the value of n, the number of false positives comes down sharply since now multiple neighboring sensors need to agree on the occurrence of a phenomenon. We also notice that as n increases, the number of misses also increase, thereby reducing the number of correct detections. This is due to the fact that walking is essentially a transient event where a footstep has to be detected by a specific sensor within a very small time window. Hence, even though we postulated that the action of stepping on a tile causes a ripple effect amongst neighboring tiles, it is not necessary that the number of neighbors experiencing this effect will always meet the minimum quorum requirement (n) within the time window. For large values of n, the number of misses is very high and consequently, the number of correct detections becomes very low, since the quorum requirements become too stringent and cannot 107

108 be satisfied in most or all cases. We found that for the Gator Tech Smart House Smart Floor, setting n equal to 2 or 3 ensures a reasonably good level of performance, where the number of false positives is comparatively low as compared to the number of correct detections and approximately 77% of all footsteps are successfully detected. Figure Effect of varying p T with n = 3 and m = 150 Figure 5-17 shows the effect of varying the threshold probability p T. We observe that as threshold probability increases, the number of false positives decreases since it filters out random spikes. Random spikes typically result in only a few readings of significant magnitude within a fixed size sliding window, hence, there is a sharp drop in the number of false positives even when we only increase p T from 0.1 to 0.2. However making the probability requirement more stringent also results in an increase in the number of false negatives/misses. This is due to the fact that since we are using a sliding window of fixed size, as the number of readings in the window that are required to lie within the phenomena-defined bounds [a, b] in order to satisfy the Probability Condition (defined in Section 5.2) increases, the chance of the Probability Condition getting satisfied decreases. For the Smart Floor we found that setting p T = 0.4 results in a reasonably good detection rate with a low number of false positives and misses. Figure 5-18 shows the effect of varying the sliding window size m. We observe that if the sliding window size is too low, this results in a large number of false positives 108

109 Figure Effect of varying m with n = 3 and P T = 0.4 despite having a high probability threshold. This is due to the fact that in case of sensors which have a high sampling rate even random spikes can result in a fairly large contiguous set of significant readings. Since the system essentially uses the threshold frequency (p T m) to evaluate whether a sensor satisfies the Probability Condition, for small window sizes the corresponding threshold frequency is also low even if threshold probability p T is kept high. Hence, there is a high probability that random spikes get mistaken for actual footsteps. Increasing the sliding window size on the other hand, raises the threshold frequency which as we can observe results in a moderate increase in the number of misses. We found that for the Smart Floor, setting the sliding window size m = 150 results in reasonably good detection performance without taxing memory resources of individual sensor nodes Resource and Power Consumption In this section, we study the effectiveness and efficiency of our proposed approaches in terms of energy consumption and resource utilization. We simulated the phenomena cloud by spawning its multiple occurrences at different locations followed by their random movement and expansion over a rectangular grid of sensors. We applied different approaches for detecting and tracking the phenomena cloud and performed a comparative analysis. We simulated the following algorithms: 109

110 1. StreamPDT [46]: A centralized stream-based algorithm where phenomena detection and tracking is performed by a Centralized Query Processor (CQP). We simulated Nile-PDT [46], a well-known detection system developed at Purdue University, which utilized StreamPDT strategy. 2. DistPDT: A distributed phenomena detection and tracking algorithm which we proposed in our preliminary work [57]. 3. Full Density Algorithm (FDA): The phenomena detection and tracking mechanism described in Section 5.3, in which we have modified the definitions of candidate and potential candidate sensors (from DistPDT) to reduce the number of unnecessary active sensors. 4. Optimized Density Algorithm (ODA): The phenomena detection and tracking mechanism described in Section after applying the localized protocol to optimize the resource utilization. We also ran the IP formulation introduced in Section on small sized networks to verify how far our solution is from the optimal solution. Figure Power Consumption Specifications for Atlas Experimental setup We performed simulations in the following four different setups: 1. In the first set of simulations, we simulated the random movement and expansion of phenomena cloud for 50 epochs on a rectangular sensor grid of size deployed over an area of 1200m 1200m. 110

111 2. In the second set of simulations, we varied the size of the sensor grid from to and simulated the random movement and expansion of phenomena cloud for 25 epochs in order to show the scalability of our proposed algorithms. 3. In the third set of simulations, we simulated the random movement and expansion of phenomena cloud for 5 epochs on a small rectangular sensor grid of size to compare the performance of our algorithms with the optimal solution generated by the Integer Program introduced in Section Finally, the fourth set of simulations is to verify the functioning and performance of each of above mentioned algorithms pictorially through snapshots taken during their executions. We simulated the random expansion of phenomena cloud for 20 epochs on a medium sized rectangular grid of sensors deployed over an area of 500m 500m. We also discuss the packet lost tolerance of our proposed algorithms in this set of simulations. We connected each sensor to an Atlas ZigBee node, whose hardware is based on Atmel Zlink RCB design. At the beginning of each simulation, we randomly spawned phenomena cloud in different areas on the sensor grid. During each epoch, the variation of phenomena cloud motion and size were simulated by randomly changing shape, size and direction of motion of its boundary. Hence, the simulation can be viewed as a random walk of phenomenon cloud over a sensor grid. Our simulations introduce a high degree of uncertainty regarding phenomenon cloud movement and test the performance of detection and tracking algorithms to the fullest extent. During each epoch, we logged four statistics which are 1) the number of active sensors involved, 2) the number of network messages exchanged between sensors for the in-network implementation of proposed algorithms, 3) the number of updates sent to the Centralized Query Processor (CQP), and 4) energy consumption. We calculated the energy consumption of nodes as a function of processing costs (including sampling sensors) and network costs (incurred 111

112 Figure Epoch-wise comparison based on number of active nodes involved in detection and tracking process. Figure Epoch-wise comparison based on number of update messages send to the Centralized Query Processor (CQP) Figure Epoch-wise comparison based on number of messages exchanged between one-hop neighbors to implement the algorithms. Figure Epoch-wise comparison based on the Energy Consumption. in receiving and transmitting data over the radio), which are based on the Atlas ZigBee node hardware specifications listed in Figure Results and analysis Simulation results for the first set of experiments are presented in Figures which compare performances of StreamPDT, DistPDT, FDA and ODA. Of which, Figures 5-20, 5-21, 5-22, and 5-23 provide epoch-wise comparison, whereas Figure 5-24 provides comparison based on an overall 50 epochs. 112

113 Figure Comparison based on overall 50 Epochs Figure 5-20 evaluates the performances of the four algorithms in terms of the number of active nodes involved in the detection and tracking process. As can be seen, ODA shows the best performance and StreamPDT has the worst performance. Poor performance of StreamPDT is due to the fact that it uses centralized processing, in oppose to the in-network processing used by our proposed algorithms. Consequently, StreamPDT requires all sensor nodes to remain active at all the time. In contrast, DistPDT only needs a set of potential candidate, candidate and tracking nodes to remain active, which results in comparatively a better performance. FDA performs slightly better than DistPDT as it stringently activates the candidates and potential candidates, resulting in more efficient resource usage. ODA shows the best performance, as it further optimizes the resource usage of FDA by reducing coverage redundancies in the core tracking region. More specifically, FDA needs 75% less active nodes in comparison to StreamPDT and 6% less active nodes in comparison to DistPDT over the period of 50 epochs, as shown in Figure Likewise, Figure 5-24 also reveals that ODA needs 84% less active nodes in comparison to StreamPDT and 40% less active nodes in comparison to DistPDT over the period of 50 epochs. ODA shows a performance enhancement of 36% over FDA due to the optimization step. Figure 5-21 shows the epoch-wise comparison of the four algorithms based on the number of update messages send to the CQP. As the number of update messages 113

114 directly depends upon the number of active tracking nodes in the core region, the number of update messages is equal for both DistPDT and FDA. Due to the localized optimization protocol, ODA generates the minimum number of update messages without degrading the performance of detection and tracking. As in case of StreamPDT, all sensors need to report to the CQP through update messages; hence, it generates the maximum number of update messages. In details, as can be seen in Figure 5-24, ODA generates 86% and 39% lesser network traffic in terms of update messages comparing to StreamPDT and DistPDT (FDA) respectively. Figure 5-22 illustrates the epoch-wise comparison based on the number of protocol messages collectively exchanged by all the active nodes with their one-hop neighbors. StreamPDT is a straightforward algorithm in which all sensor nodes perform one-hop broadcast of their sensed information. Consequently, the number of protocol messages exchanged in an epoch is equal to the number of nodes in the network. However, for the other three algorithms, only active sensor nodes broadcast the exchanged message based on their respective categories. ODA performs the best and generates minimum number of exchanged messages, whereas FDA comparatively performs better than DistPDT. Figure 5-24 shows that FDA generates 77% and 6.41% lesser exchanged messages in comparison to StreamPDT and DistPDT repsectively. Furthermore, it shows that ODA generates 86% and 42.5% lesser exchanged messages in comparison to StreamPDT and DistPDT respectively. ODA improves FDA by generating 38.54% less exchanged messages and it has a huge significant improvement over StreamPDT. The epoch-wise comparison of the four algorithms based on the energy consumption is shown in Figure As expected, StreamPDT requires all sensor nodes to always actively sense, thus it consumes energy the most. ODA performs the best, whereas FDA is better than DistPDT. Figure 5-24 shows that FDA consumes 74.52% lesser energy in comparison to StreamPDT and 5.86% in comparison to DistPDT. Similarly, ODA consumes 83.15% lesser energy in comparison to StreamPDT 114

115 and 37.76% in comparison to DistPDT. ODA improves the energy consumption of FDA by 34%, reflecting that applying the optimization step makes a significant help. In summary, for the first set of experiments, ODA performs the best and StreamPDT performs the worst in all terms: the number of active nodes, the number of exchange messages, the number of update messages, and energy consumption. Also notice that the graph for StreamPDT is a constant line when the phenomena clouds are enlarging because all sensor nodes in the grid remain active at all time regardless of the cloud s size. For the other three algorithms, when the phenomena expand, the graphs are increasing, but not linearly. Figure Comparison based on different grid size. In the second set of simulations, we varied the grid size as shown in Figure It can be observed that DistPDT, FDA, and ODA do not show much variation in all four comparison parameters with respect to increase in the grid size. This is derived from the fact that for these algorithms, the detection and tracking process is localized to the immediate neighborhood of phenomena cloud at any given time and does not require all sensor nodes to remain unnecessarily active. In contrast, StreamPDT requires all nodes in the network to remain active and send update messages about their detecting status to the CQP. Therefore, as the grid size increases, the more active nodes and the larger network traffic. Consequently, the performance of StreamPDT degrades. The simulation results show that DistPDT, FDA, and ODA are scalable to the size of grids 115

116 Figure Epoch-wise comparison based on number of active nodes involved in detection and tracking process. Figure Epoch-wise comparison based on number of update messages send to the Centralized Query Processor (CQP) Figure Epoch-wise comparison based on number of messages exchanged between one-hop neighbors to implement the algorithms. Figure Epoch-wise comparison based on the Energy Consumption. and ODA performs the best in terms of all the comparison parameters. The performance of StreamPDT is the worst and not scalable. Figures present simulation results for the third set of experiments, of which we compare the solutions of the four algorithms with the optimal solution generated by the IP described in Section Note that since solving IP is actually NP-hard, we only simulated this set of experiments on the small size grid of during 5 epochs of random movement and expansion of phenomena clouds. Figures 116

117 Figure Comparison based on overall 5 Epochs Figure Snapshots of expanding phenomena cloud during Epochs t 10, t 15, t 20. Figure Active Sensors during Epoch t 10, for DistPDT provide an epoch-wise comparison whereas Figure 5-30 summarizes the results overall the 5 epochs. As can be seen, StreamPDT uses 62.5% more active nodes in comparison to the IP solution. DistPDT improves the result by using 35.74% more active sensors compared to the IP solution. FDA further improves the solution by using only 17.62% more active nodes compared to the IP solution. And as expected, ODA shows the best performance and only uses 13.82% more active nodes in comparison to the optimal solution. In terms of the number of update messages sent to the CQP, StreamPDT shows the worst performance by generating 88.2% more update messages than the IP solution. DistPDT shows considerable improvement by generating 40% more update messages 117

118 Figure Active Sensors during Epoch t 10, for FDA. Figure Active Sensors during Epoch t 10, for ODA. Figure Active Sensors during Epoch t 15, for DistPDT. Figure Active Sensors during Epoch t 15, for FDA. Figure Active Sensors during Epoch t 15, for ODA. Figure Active Sensors during Epoch t 20, for DistPDT. than the IP solution. As the set of tracking nodes is the same for DistPDT and FDA, the number of update messages therefore must be the same. ODA shows a slightly improvement and generates 33.33% more update messages than the IP solution. The protocol messages exchanged between the one-hop neighbors in StreamPDT is 85.8% 118

119 Figure Active Sensors during Epoch t 20, for FDA. Figure Active Sensors during Epoch t 20, for ODA. more than the IP solution. DistPDT and FDA respectively generates 63.59% and 36.04% more protocol messages compared to the IP solution. ODA generates 29.70% more protocol messages than the IP solution. Note that ODA uses only 13.82% more active nodes than that of the IP, however, the implementaion of the optimization step adds an extra message overhead, thus it does not save much of exchanged messages as expected. The energy consumption is mainly contributed by actively sensing sensors. Again, as the StreamPDT needs updates from all sensors, it has the worst performance in terms of energy consumption. It consumes 62.32% more energy than the IP solution over the period of 5 epochs. DistPDT, FDA, and ODA consumes 36%, 18.05%, and 15.09% more energy than the IP solution, repectively. In order to have a better view of how the proposed algorithms function during the movement of the phenomena cloud, we performed the fourth set of simulations to pictorially illustrate the functioning and performance of DistPDT, FDA, and ODA. Figure 6-1 shows snapshots of the expanding phenomena cloud at epochs t 10, t 15, and t 20. Figures 5-32, 5-33, and 5-34 are the respective snapshots showing the active nodes for DistPDT, FDA, and ODA during epoch t 10. Likewise, the result of epoch t 15 is shown in Figures 5-35, 5-36, and 5-37 and that of epoch t 20 is presented in Figures 5-38, 5-39, and As can be seen, when the phenomenon expands, the number of active nodes 119

120 expand smoothly as well to fully cover and track the phenomenon s movement. Also, at the border of the phenomenon, the DistPDT has a thicker green line than that of FDA, showing that DistPDT requires more candidate nodes due to our previous relaxed definition. In addition, at the inner area of the phenomenon, while all tracking nodes are active for DistPDT and FDA, ODA has some inactive tracking nodes. This is due to the optimization step to cover the entire area and satisfy the quorum but still minimize the energy consumption. During the overall 20 epochs, FDA involved 10.84% lesser active nodes compared to DistPDT. ODA further improves the performance by using 36.54% less active nodes compared to DistPDT. Figure Percentage of holes generated wrt percentage of update messages lost To evaluate the degree of fault tolerance of our proposed algorithms, we further ran the simulations allowing the loss of update message in the network and summarize the results in Figure In addition, Figures pictorially show the holes generated for FDA and ODA while detecting phenomena cloud, when percentages of update messages lost are 5%, 10% and 15% respectively during the epoch t 20. A hole is represented as a red ball and is generated when the detection status of a tracking sensor cannot be determined at the CQP based on the update messages received. We observed that our algorithms showed a reasonable performance when the network is vulnerable of message losses. Figure 5-41 shows the percentage of holes generated by FDA and ODA with respect to the percentage of update messages lost. As can be seen, the holes generates by FDA is very negligible, even only 0.275% at the rate of 15% of update message lost. As expected, ODA generates more holes. This is clearly 120

121 a trade-off between the energy consumption and fault tolerance. In order to reduce the energy consumption and message complexity, ODA leaves enough active core tracking sensors to sastified the required quorum whereas all tracking sensor nodes in FDA are active. We can slighly modify ODA to be more fault tolerance by allowing more core tracking sensors to be active. More specifically, at step (4) in section , instead of repeating until the minimum quorum n is satisfied, we can repeat the process until all active nodes in a cluster satisfy αn quorum condition where α 1. The bigger α is, the more active nodes are, the lesser holes generated. Let us further look into the snapshots (Figure ) to see the location of these holes. The holes were mostly created in the inner part of the core tracking region. This is partially because we only allow some core tracking nodes (which locate in the inner region) to be inactive. When update messages of some active core tracking nodes get lost, it results in lack of information about these active core tracking nodes and the sleeping core tracking nodes which they were covering. As only a few holes are generated at the boundary of the core tracking region, consequently, the region where the phenomena cloud is currently located can easily be identified at the CQP even if 15% of update messages are lost, as shown in Figure Related Work In an early stage of the phenomena detection and tracking using WSNs, the phenomenon is static and confined to a set of points or within a certain area, often known as the coverage problem (see [23, 66] and references therein). Towards nowadays, as the phenomena are dynamic, have irregular shapes, and invariant movements, there has been recently an on going research on detection and tracking of phenomena cloud [12, 13, 19, 42, 44 46, 67, 68]. The most closely related work is Nile-PDT [46], which is a Phenomena Detection and Tracking (PDT) framework running on top of centralized Nile data stream management system, developed by Indiana Center for Database Systems (ICDS) at 121

122 Purdue University. Nile-PDT is designed for detecting and tracking phenomenon clouds such as gas clouds, oil spills and chemical waste spillage. Nile-PDT uses two custom database operators, namely, SN-Scan and SN-Join to perform phenomenon detection and tracking. The SN-Scan operator scans all the sensors in the network and chooses candidate sensors which have a high probability of detecting the phenomenon. The SN-Join operator then evaluates each of these candidate sensors and checks if they join with other candidates a certain number of times and hence detect a phenomenon event. Nile-PDT uses feedback control to continuously tune the SN-Scan and SN-Join parameters to maximize efficiency of the detection process. The main drawback of the Nile-PDT approach is that it takes a streaming database view of the process. It does not consider any mechanisms for controlling the flow of data at the source sensors themselves or address power consumption and network bandwidth issues inside the sensor network. Furthermore, it requires all sensors to pump readings to the SN-Scan operator to allow it to choose phenomenon candidates, which can lead to potentially massive scalability issues. In this paper, we have compared our algorithms to this work, referred at StreamPDT. Omotayo et al. [67] describe a data harvesting framework for tracing phenomena. They propose algorithms for maintaining a data farm on the nodes by maximizing the utilization of their on-board non-volatile storage, for enabling backtracking to determine the cause of a phenomenon. McErlean et. al. [42] propose a distributed event detection and tracking algorithm for moving objects using WSNs. However, this system assumes the prior availability of optimal ad-hoc routing mechanisms and is primarily designed for detecting individual discrete objects with well-defined shape and size, as opposed to phenomenon clouds whose shape and size typically cannot be defined in exact terms. There are also some work studying the boundary of the phenomena clouds instead of detecting and tracking the entire area [12, 19 22, 68 71]. As these studies are not in the scope of this paper (we detect and track the entire area), we only briefly mention 122

123 them here. Chintalapudi and Govindan in [68] described algorithms for detecting sensors lying closest to the edges of a phenomenon cloud. However, their approach not only requires assumptions regarding the shape of the edges (such as whether it is a line or an ellipse), but can also lead to a high number of false positives, since the extreme fringes of a phenomenon are more susceptible to sensor errors and rapid fluctuations. From their description, it appears that their edge sensors correspond to the Outer region of the phenomenon cloud (defined in Section 5.3.1). Our mechanisms, on the other hand, avoid false positives by only reporting those sensors which lie in the Core region namely, tracking sensors. Moreover, our approach does not make any simplifying assumptions regarding the shape of the cloud edges. In [19 21], the authors proposed a distributed method to statistically estimate the boundary of the phenomena, but they consider only static phenomena. In [69 71], algorithms considering mobile sensor nodes are proposed to approximate the boundary of a phenomena cloud. In [45], Cheng et. al. proposed a method for continuously monitoring the boundary of the phenomena cloud, but they require all the sensors in WSNs actively sense all the time and they only concentrated on reducing the communication overhead. In [12], a dynamic cluster structure for object detection and tracking which requires all sensor nodes to be active is proposed. Their proposed cluster formation has high communication overhead, thus it is difficult to handle fast changes of phenomena cloud state. In [13], Kim et. al. proposed another algorithm for tracking the phenomena boundary but it requires all the sensor nodes to be active periodically. 5.8 Conclusion In this paper, we propose several distributed algorithms to detect and track several types of phenomena clouds, regardless of their shapes and movement direction. The phenomena clouds can have variant shapes, size and direction of motion along multiple axes. We first propose a distributed algorithm for in-situ detection and tracking 123

124 of phenomena clouds in the sensor space. We next provide a mathematical model to optimize the energy consumption, on which we further propose a localized algorithm to minimize the resource utilization. Our proposed approaches not only ensure low processing and networking overhead at the centralized query processor but also minimize the number of sensors which are actively involved in the detection and tracking processes at any given time. We validate our approach using both real-life smart home applications as well as simulation experiments, which analyze the effectiveness and efficiency of our proposed algorithms. We also show that our algorithms result in significant reduction in resource usage and power consumption as compared to the contemporary stream-based approaches. As part of our future work, we are looking for a model-assisted detection and tracking, where distribution of detection tasks will be streamlined based on predictions regarding the direction of movement of the phenomena cloud. We are also searching for real-life data sets from different application domains for further validating and fine tuning our approaches. 124

125 Figure Detection and Tracking with 5% update message lost for FDA. Figure Detection and Tracking with 5% update message lost for ODA. Figure Detection and Tracking with 10% update message lost for FDA. Figure Detection and Tracking with 10% update message lost for ODA. Figure Detection and Tracking with 15% update message lost for FDA. Figure Detection and Tracking with 15% update message lost for ODA. 125

126 CHAPTER 6 LOCALIZED ENERGY EFFICIENT DETECTION AND TRACKING OF DYNAMIC PHENOMENA BOUNDARY 6.1 Introduction Most of the existing research in phenomena detection and tracking using Wireless Sensor Networks (WSNs) assumes the phenomena is invariant in shape, size and motion [19 23]. However, in real life there exist dynamic phenomena such as oil spills, mud flow, diffusion or leakage of gases that are characterized by non-deterministic variations in shape, size and direction of motion. Due to the absence of any well defined model to represent dynamic phenomena, their detection and tracking through WSNs is very challenging. Since sensor nodes have limited energy and processing power, the detection and tracking of dynamic phenomena becomes even more challenging. In applications involving dynamic phenomena such as oil spills, gas leakage, etc, it is desirable to identify and track the area affected by the phenomena. Therefore, it is more sensible to detect and track only the phenomena boundary engulfing the affected area instead of tracking the entire phenomena. Existing works on detection and tracking o f phenomena boundary mostly consider static phenomena [19 23] only few study dynamic phenomena [12, 13]. Due to the nature of their solutions, the works for static phenomena boundary cannot be extended to dynamic phenomena. Recently, Kim et. al[13] have proposed a protocol named TOCOB, which has the best performance in the literature. TOCOB needs all the sensor nodes to periodically sense phenomena and compare their current detection status with the previous one. If the detection status of a sensor node is changed, it is called a Changed Value Node(CVN). A CVN broadcasts a CompareOneZero(COZ) message to its neighbors. A node receiving at least one COZ message of different status than its own is called a Boundary Node (BN). Further, some Representative Nodes (RNs) are selected among the BNs which report the detection status of a single CVN in their neighborhood to the CQP. There are 126

127 some drawbacks of TOCOB. Firstly, it needs all the sensor nodes to participate in the detection and tracking process, which is not energy efficient. Secondly, it provides very sparse boundary information to the CQP, which limits the quality of phenomena boundary estimation. Thirdly, the method for identifying the RNs is not efficient and could suppress a large amount of boundary information from sending to the CQP, further degrading the detection and tracking of phenomena boundary. In this chapter, we propose an energy efficient localized protocol for detection and tracking of dynamic phenomena boundary of any irregular shape. In our proposed protocol, the detection and tracking process is localized to the nodes in the immediate neighborhood of the phenomena boundary. This results in only necessary nodes actively participating in sensing the phenomena boundary, while rest of the nodes remain inactive until they are required. In order to reduce the traffic generated by update messages, we propose an efficient, robust localized clustering algorithm based on hexagon tiling of the 2D plane covered by the WSN. The proposed clustering algorithm does not require re-clustering when the phenomena boundary dynamically varies. Furthermore, we propose a data aggregation technique to aggregate the boundary information at the cluster heads. Our data aggregation technique considerably reduces the size of update messages sent to the centralized query processor without compromising on the amount of information to be reported. The simulation results show that our protocol performs remarkably better than TOCOB [13] in terms of energy consumption and resource usage. The rest of the chapter is organized as follows: In Section 6.2, we present the network model along with some preliminary definitions. We provide detailed description of the detection and tracking protocol for dynamic phenomena boundary in Section 6.3. The localized clustering method and data aggregation scheme is described in Section 6.4. In Section 6.5, we evaluate the proposed protocol through extensive simulations. Finally, Section 6.6 concludes the paper. 127

128 6.2 System Model Network Model: A set of in-situ sensor nodes V deployed on a 2D plane along with a set of communication links E form the WSN. Each sensor node v V is equipped with a radio transceiver with communication range r. The set of nodes within the communication range of v forms its neighborhood N(v). Furthermore, there exists a Centralized Query Processor (CQP), where the sensed information from the WSN is collected for further processing. A sensor node is active if its sensing functionality is on, otherwise it is inactive. An active sensor node is referred as detect-positive if it detects the phenomenon is existing, whereas if it detects the phenomena is not existing it is referred as detect-negative. Dynamic Phenomena: A dynamic phenomena represents the occurrence of any event that shows dynamic variations in shape, size and direction of motion. The most suitable examples of dynamic phenomena are oil spills, mud flow, diffusion or leakage of gases, etc. Phenomena Boundary: The phenomena boundary is defined as a curve that inscribes the area affected by the phenomena. It delineates the area under consideration into the region where the phenomena exists and the region where the phenomena has not yet reached. Based on the phenomena boundary, we present the classification of the sensor nodes described in Figures 6-1 & Detecting and Tracking of Dynamic Phenomena Boundary In this section, we present our protocol for detection and tracking the dynamic phenomena boundary. Figure 6-5 shows the state transition diagram for a sensor node. The states represent possible sensor classes and the edges represent conditions for the respective transitions. Figure 6-3 shows various types of messages that sensor nodes may generate and exchange to implement the detection and tracking protocol. Figure 6-4 shows the set of transition rules governing the transition of a sensor node from one state 128

129 Figure 6-1. Classification of Sensor Nodes in the WSN Figure 6-2. Types of Nodes in the WSN to another. These rules are executed locally to control the entire detection and tracking process without the intervention of the CQP. The rest of this section covers different stages of detection and tracking process in chronological order. A. Initial selection of sensor nodes: The main purpose of this stage is to detect the initial occurrence of the phenomena. The phenomena can occur at multiple locations, 129

130 Figure 6-3. Types of messages in the WSN Figure 6-4. The Transition Rules hence, it is not sufficient to monitor one specific location. However, monitoring the entire area without the occurrence of phenomena would be extravagant. Therefore, we can apply a trade-off between the two approaches by selecting the sensors deployed at vulnerable locations as OB nodes and keep them active. We can select these vulnerable locations on the basis of the type of location or the past history. For instance, to detect 130

131 Figure 6-5. State Transition Diagram for a Sensor node Figure 6-6. Expansion of the phenomena cloud gas leakage in the pipeline, it might be useful to choose the sensors located at valves and joints as OB nodes and keep them active. B. Monitoring of initial occurrence of phenomena: We assume that time is divided into discrete time slots called Epochs. At the beginning of every Epoch, the initially active OB nodes will collect their readings to check if they are detect-positive. If any of them 131

132 are detect-positive, they will broadcast an INVK message to their immediate inactive O neighbors and transition into B nodes, based on rule R 2. After receiving the INVK, the inactive O neighbors will transition into OB nodes and become active, based on rule R 1. If an active node in an Epoch is detect-positive, it broadcasts a +ive PHST message to its neighbors, otherwise, it broadcasts a -ive PHST message. C. Growth of phenomena: When the phenomena grows some of the OB nodes become detect-positive. These OB nodes broadcast INVK messages to their inactive O neighbors and transition into B nodes, based on rule R 1. The inactive O nodes on receiving the INVK messages, transition into OB nodes, based on rule R 2. Further, during the growth of phenomena, some B nodes, on receiving +ive PHST messages, may notice that all their neighbors are detect-positive. Additionally, if they have at least one B node in their neighborhood, they transition into IB nodes, based on rule R 3, else they transition into I nodes, based on rule R 4 and become inactive. Eventually, the phenomena is always covered by the set of currently active nodes and the information about the location of the phenomena boundary can be collected from the set of B nodes. D. Shrinking of phenomena: When the phenomena shrinks, some of the current B nodes become detect-negative. If any of these B nodes have at least one detect-positive B node in their neighborhood, they transition into OB nodes, based on rule R 7. Otherwise, they transition into O nodes and become inactive, based on rule R 8. Further, during the shrinking phase, if an IB node on receiving a -ive PHST notices that it has an OB node in its neighborhood, it transitions into a B node, based on rule R 6 and broadcasts an IVNK message to invoke its inactive I neighbors. These I nodes, on receiving the INVK messages, activate and transition into IB nodes, based on rule R 5. This way the information about the location of the phenomena boundary is always contained in the current set of B nodes. E. Aggregation and Reporting Update messages to CQP: When there is any variation in the phenomena boundary, it should be reported to the CQP through 132

133 Figure 6-7. Shrinking of the phenomena cloud update messages. In the following section we describe an efficient clustering and data aggregation mechanism for effectively reducing the traffic generated by the update messages destined to CQP without compromising the amount of information to be reported. Since we assume the CQP is aware of the location of each sensor node, a GUI-based phenomena boundary visualization application can be developed. This application will take the on-line information about the current set of boundary nodes and will estimate and display the map of the area affected by the phenomena. Further, the map will dynamically evolve based on the variations in the set of boundary nodes B. F. Handling failures: The failure of sensor nodes in WSNs is unavoidable. This may affect the detection and tracking process as some O nodes may not activate due to the failure of some OB nodes during the growth of the phenomena. In addition, it is also possible that during the shrinking phase some IB nodes may fail and would not invoke the I nodes to cover the shrinking of the phenomena. In such cases, if in some Epoch, an O node or an I node does not receive a -ive PHST or +ive PHST from their respective OB or IB neighbors, then they must assume some failure has occurred and become active by transition into OB and IB nodes respectively. This will ascertain that the failure does 133

134 not affect the detection and tracking process and phenomena boundary will always be covered by the current set of active nodes. Figure 6-8. X h Y h co-ordinate System for Hexagon tiling H 6.4 Localized Clustering and Data Aggregation In this section, we first describe a localized method for geographically clustering the WSN. We then discuss a data aggregation method to aggregate the phenomena boundary information at the cluster heads to form update messages. A. Localized network clustering: We locally generate a geographical clustering of the WSN. The generated clusters are disjoint and respectively located within non-overlapping regular hexagons of sides r 2 forming a hexagon tiling of the area covered by the WSN, as shown in Figure 6-8. On the basis of the hexagon centers, a new X h Y h coordinate system can be generated with axis inclined at 60 o. This new coordinate system has two unit vectors i ( 3r, 0) and j ( 3 r, 3 r). A sensor node needs to find the hexagon in which it is located to identify its 4 4 cluster. The location of each node v V i.e (x v, y v ) on 2D is identified using some ad hoc positioning method [54, 55] or sensor nodes may be equipped with GPS functionality. Each node is aware of the CQP s location (x b, y b ) on the 2D plane. The CQP s location on 2 134

135 X h Y h co-ordinate system is (0, 0). Based on this, a node v V identifies its coordinates (x h v, y h v ) and the integral coordinates h(i, j) of its hexagon in X h Y h co-ordinate system as follows: xv h = {x v y v 3 tan 60 }/r o 2 yv h = y v sin 60 o / r 3 2 The coordinates of the hexagon h(i, j) in which node v is located is given as: i = {x v y v 3 tan 60 }/r o j = y v sin 60 o / r (6 1) (6 2) (6 3) (6 4) During the inception of the WSN, each sensor node v V identifies its location (x v, y v ) and hexagon h(i, j) and exchanges this information with its neighbors. The nodes located within the same hexagon form a cluster. On the basis of factors such as the maximum energy contained, a cluster head can be elected (smallest id is used to break the ties). Based on the node ids, the cluster head forms a sorted list of nodes in the cluster along with their respective locations. The cluster head then sends a message containing this list along with the hexagon coordinates of the cluster to the CQP. The CQP forms a hash-map indexed on the basis of hexagon co-ordinates and stores in it the sorted list of nodes in the hexagon. B. Data Aggregation and Reporting: The cluster head generates a bit-array called Report array. The Report array contains a bit for each node in the hexagon, arranged in sorted order of their ids. If a cluster head has B nodes in its hexagon, as shown in Figure 6-9, it receives BINFO messages from them and generates the Report array, setting the bits corresponding to the B nodes in the hexagon. It then sends this Report array to the CQP along with its hexagon coordinates in a PINFO message. The 135

136 CQP on receiving the PINFO message, based on the hexagon coordinates accesses the hash-map. It then identifies the boundary nodes in the hexagon using the Report array and stores this information in the hash-map. The information about the boundary nodes, stored in the hash-map can easily be used as an input to the GUI-based phenomena boundary visualization application to generate and display the map of the area affected by the phenomena. Figure 6-9. Data aggregation based on clustering generated by the hexagonal tiling Figure Power consumption specifications for a sensor node 6.5 Performance Evaluation In this section, we evaluate the effectiveness and efficiency of our proposed protocol in terms of resource utilization and energy consumption through simulations. We considered a WSN having 2000 sensor nodes deployed on a square area of sides 600m. Nodes 136

137 Figure Comparison based on number of boundary nodes. Figure Comparison based on number of update messages. Figure Comparison based on energy consumption. Figure Comparison based on messages exchanged. in the WSN communicate based on Zigbee protocol (IEEE ). Each node has a single radio interface with transmission range 10m. The power consumption specifications for the sensor nodes are provided in Figure We compared our proposed protocol with the TOCOB protocol proposed by Kim et. al [13]. The comparison was based on three important factors: 1) Boundary nodes and update messages send to the CQP, 2) Energy consumption and 3) Protocol messages exchanged by the nodes to implement the protocol. Simulations were performed in two different setups. In the first setup, we perform an Epoch-wise comparison of two protocols. We simulated the dynamic phenomena by spawning its three occurrences at locations (200, 200), (400, 200) and (400, 300), 137

138 Figure Comparison based on number of update messages at different phenomena expansion speed. Figure Comparison based on energy consumption at different phenomena expansion speed. Figure Comparison based on messages exchanged at different phenomena expansion speed. followed by their random motion and expansion over the square area. For each factor, we ran 100 iterations and averaged the results. Each iteration ran for 60 Epochs. In the second setup, we perform the comparison of two protocols based on expansion speed of the phenomena. We simulated the phenomena by spawning its occurrence at location (300, 300) followed by its expansion at various speeds. For each of the three factors, we ran 100 iterations and averaged the results. Each iteration ran for 30 Epochs. 138

139 Figure Snapshot of phenomena in WSN. Figure Estimated boundary with 0% message loss. Figure Estimated boundary with 15% message loss. Figure Estimated boundary with 30% message loss. Figure Estimated boundary with 45% message loss. A. Boundary Nodes and update messages: Figure 6-11 & 6-12 show the comparison of two protocols based on number of boundary nodes and update messages respectively. The two figures together reflect the efficiency of our proposed localized clustering and data aggregation protocol in reducing the number of update messages destined to CQP without leaving behind the information generated by any boundary node. Our protocol generates 22% lesser boundary nodes and 65% lesser update messages in 139

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

WIRELESS Sensor Networks (WSNs) are sets of sensor

WIRELESS Sensor Networks (WSNs) are sets of sensor IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 1, NO., FEBRUARY 01 On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling Ravi Tiwari, Thang N. Dinh, Student Member,

More information

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2243-2255 Research India Publications http://www.ripublication.com Node Deployment Strategies and Coverage

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks

BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks International Journal of Distributed Sensor Networks, : 3 54, 006 Copyright Taylor & Francis Group, LLC ISSN: 1550-139 print/1550-1477 online DOI: 10.1080/1550130500330711 BBS: An Energy Efficient Localized

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

Interference-Aware Broadcast Scheduling in Wireless Networks

Interference-Aware Broadcast Scheduling in Wireless Networks Interference-Aware Broadcast Scheduling in Wireless Networks Gruia Calinescu 1,, Sutep Tongngam 2 Department of Computer Science, Illinois Institute of Technology, 10 W. 31st St., Chicago, IL 60616, U.S.A.

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1

Topology Control. Chapter 3. Ad Hoc and Sensor Networks. Roger Wattenhofer 3/1 Topology Control Chapter 3 Ad Hoc and Sensor Networks Roger Wattenhofer 3/1 Inventory Tracking (Cargo Tracking) Current tracking systems require lineof-sight to satellite. Count and locate containers Search

More information

CONVERGECAST, namely the collection of data from

CONVERGECAST, namely the collection of data from 1 Fast Data Collection in Tree-Based Wireless Sensor Networks Özlem Durmaz Incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi (USC CENG Technical Report No.: ) Abstract We investigate

More information

Probabilistic Coverage in Wireless Sensor Networks

Probabilistic Coverage in Wireless Sensor Networks Probabilistic Coverage in Wireless Sensor Networks Mohamed Hefeeda and Hossein Ahmadi School of Computing Science Simon Fraser University Surrey, Canada {mhefeeda, hahmadi}@cs.sfu.ca Technical Report:

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Approximation Algorithms for Interference Aware Broadcast in Wireless Networks

Approximation Algorithms for Interference Aware Broadcast in Wireless Networks Approximation Algorithms for Interference Aware Broadcast in Wireless Networks Dianbo Zhao University of Wollongong Email: dz985@uowmail.edu.au Kwan-Wu Chin Univiversity of Wollongong Email: kwanwu@uow.edu.au

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks

Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Interference-Aware Joint Routing and TDMA Link Scheduling for Static Wireless Networks Yu Wang Weizhao Wang Xiang-Yang Li Wen-Zhan Song Abstract We study efficient interference-aware joint routing and

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS

A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS A GRASP HEURISTIC FOR THE COOPERATIVE COMMUNICATION PROBLEM IN AD HOC NETWORKS C. COMMANDER, C.A.S. OLIVEIRA, P.M. PARDALOS, AND M.G.C. RESENDE ABSTRACT. Ad hoc networks are composed of a set of wireless

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

Approximation algorithm for data broadcasting in duty cycled multi-hop wireless networks

Approximation algorithm for data broadcasting in duty cycled multi-hop wireless networks University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2013 Approximation algorithm for data broadcasting

More information

p-percent Coverage in Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks p-percent Coverage in Wireless Sensor Networks Yiwei Wu, Chunyu Ai, Shan Gao and Yingshu Li Department of Computer Science Georgia State University October 28, 2008 1 Introduction 2 p-percent Coverage

More information

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks

A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks MIC2005: The Sixth Metaheuristics International Conference??-1 A GRASP heuristic for the Cooperative Communication Problem in Ad Hoc Networks Clayton Commander Carlos A.S. Oliveira Panos M. Pardalos Mauricio

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 181 A NOVEL RANGE FREE LOCALIZATION METHOD FOR MOBILE SENSOR NETWORKS Anju Thomas 1, Remya Ramachandran 2 1

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

Nonuniform multi level crossing for signal reconstruction

Nonuniform multi level crossing for signal reconstruction 6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven

More information

MULTI-HOP wireless networks consist of nodes with a

MULTI-HOP wireless networks consist of nodes with a IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Minimum Latency Broadcast Scheduling in Duty-Cycled Multi-Hop Wireless Networks Xianlong Jiao, Student Member, IEEE, Wei Lou, Member, IEEE, Junchao

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

The Complexity of Connectivity in Wireless Networks

The Complexity of Connectivity in Wireless Networks The Complexity of Connectivity in Wireless Networks Thomas Moscibroda Computer Engineering and Networks Laboratory ETH Zurich, Switzerland moscitho@tik.ee.ethz.ch Roger Wattenhofer Computer Engineering

More information

Data Aggregation Scheduling in Wireless Networks

Data Aggregation Scheduling in Wireless Networks Georgia State University ScholarWorks @ Georgia State University Computer Science Dissertations Department of Computer Science 8-11-2015 Data Aggregation Scheduling in Wireless Networks Mingyuan Yan Follow

More information

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee

Design of an energy efficient Medium Access Control protocol for wireless sensor networks. Thesis Committee Design of an energy efficient Medium Access Control protocol for wireless sensor networks Thesis Committee Masters Thesis Defense Kiran Tatapudi Dr. Chansu Yu, Dr. Wenbing Zhao, Dr. Yongjian Fu Organization

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua

Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Coverage in sensor networks Sensors are often randomly scattered in the field

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

Composite Event Detection in Wireless Sensor Networks

Composite Event Detection in Wireless Sensor Networks Composite Event Detection in Wireless Sensor Networks Chinh T. Vu, Raheem A. Beyah and Yingshu Li Department of Computer Science, Georgia State University Atlanta, Georgia 30303 {chinhvtr, rbeyah, yli}@cs.gsu.edu

More information

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks

Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Hierarchical Agglomerative Aggregation Scheduling in Directional Wireless Sensor Networks Min Kyung An Department of Computer Science Sam Houston State University Huntsville, Texas 77341, USA Email: an@shsu.edu

More information

EAVESDROPPING AND JAMMING COMMUNICATION NETWORKS

EAVESDROPPING AND JAMMING COMMUNICATION NETWORKS EAVESDROPPING AND JAMMING COMMUNICATION NETWORKS CLAYTON W. COMMANDER, PANOS M. PARDALOS, VALERIY RYABCHENKO, OLEG SHYLO, STAN URYASEV, AND GRIGORIY ZRAZHEVSKY ABSTRACT. Eavesdropping and jamming communication

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Minimum-Latency Beaconing Schedule in Duty-Cycled Multihop Wireless Networks Lixin Wang, Peng-Jun Wan, and Kyle Young Department of Mathematics, Sciences and Technology, Paine College, Augusta, GA 30901,

More information

Wireless Networks Do Not Disturb My Circles

Wireless Networks Do Not Disturb My Circles Wireless Networks Do Not Disturb My Circles Roger Wattenhofer ETH Zurich Distributed Computing www.disco.ethz.ch Wireless Networks Geometry Zwei Seelen wohnen, ach! in meiner Brust OSDI Multimedia SenSys

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters

A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters A Message Scheduling Scheme for All-to-all Personalized Communication on Ethernet Switched Clusters Ahmad Faraj Xin Yuan Pitch Patarasuk Department of Computer Science, Florida State University Tallahassee,

More information

A Novel Approach Against Reactive Jamming Attacks

A Novel Approach Against Reactive Jamming Attacks Ad Hoc & Sensor Wireless Networks, Vol. 0, pp. 1 25 Reprints available directly from the publisher Photocopying permitted by license only 2010 Old City Publishing, Inc. Published by license under the OCP

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Efficient Channel Allocation for Wireless Local-Area Networks

Efficient Channel Allocation for Wireless Local-Area Networks 1 Efficient Channel Allocation for Wireless Local-Area Networks Arunesh Mishra, Suman Banerjee, William Arbaugh Abstract We define techniques to improve the usage of wireless spectrum in the context of

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information

An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks

An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks Article An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks Prasan Kumar Sahoo 1, Ming-Jer Chiang 2 and Shih-Lin Wu 1,3, * 1 Department of Computer Science and Information

More information

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.

More information

Analysis of Power Assignment in Radio Networks with Two Power Levels

Analysis of Power Assignment in Radio Networks with Two Power Levels Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Problem of the Month: Between the Lines

Problem of the Month: Between the Lines Problem of the Month: Between the Lines Overview: In the Problem of the Month Between the Lines, students use polygons to solve problems involving area. The mathematical topics that underlie this POM are

More information

Adaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009

Adaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009 Adaptive Sensor Selection Algorithms for Wireless Sensor Networks Silvia Santini PhD defense October 12, 2009 Wireless Sensor Networks (WSNs) WSN: compound of sensor nodes Sensor nodes Computation Wireless

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks

Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks 2010 International Conference on Distributed Computing Systems Duty-Cycle-Aware Minimum Latency Broadcast Scheduling in Multi-hop Wireless Networks Xianlong Jiao,WeiLou, Junchao Ma, Jiannong Cao, Xiaodong

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor Network under Retransmission

Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor Network under Retransmission Sensors 2014, 14, 23697-23723; doi:10.3390/s141223697 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor

More information

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan

Surveillance strategies for autonomous mobile robots. Nicola Basilico Department of Computer Science University of Milan Surveillance strategies for autonomous mobile robots Nicola Basilico Department of Computer Science University of Milan Intelligence, surveillance, and reconnaissance (ISR) with autonomous UAVs ISR defines

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Scheduling. Radek Mařík. April 28, 2015 FEE CTU, K Radek Mařík Scheduling April 28, / 48

Scheduling. Radek Mařík. April 28, 2015 FEE CTU, K Radek Mařík Scheduling April 28, / 48 Scheduling Radek Mařík FEE CTU, K13132 April 28, 2015 Radek Mařík (marikr@fel.cvut.cz) Scheduling April 28, 2015 1 / 48 Outline 1 Introduction to Scheduling Methodology Overview 2 Classification of Scheduling

More information

Performance Analysis of DV-Hop Localization Using Voronoi Approach

Performance Analysis of DV-Hop Localization Using Voronoi Approach Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks

Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, 1 Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks Sisi Liu, Student Member, IEEE, Loukas Lazos, Member, IEEE, and

More information

From Shared Memory to Message Passing

From Shared Memory to Message Passing From Shared Memory to Message Passing Stefan Schmid T-Labs / TU Berlin Some parts of the lecture, parts of the Skript and exercises will be based on the lectures of Prof. Roger Wattenhofer at ETH Zurich

More information

The Wireless Network Jamming Problem Subject to Protocol Interference

The Wireless Network Jamming Problem Subject to Protocol Interference The Wireless Network Jamming Problem Subject to Protocol Interference Author information blinded December 22, 2014 Abstract We study the following problem in wireless network security: Which jamming device

More information

ETI2511-WIRELESS COMMUNICATION II HANDOUT I 1.0 PRINCIPLES OF CELLULAR COMMUNICATION

ETI2511-WIRELESS COMMUNICATION II HANDOUT I 1.0 PRINCIPLES OF CELLULAR COMMUNICATION ETI2511-WIRELESS COMMUNICATION II HANDOUT I 1.0 PRINCIPLES OF CELLULAR COMMUNICATION 1.0 Introduction The substitution of a single high power Base Transmitter Stations (BTS) by several low BTSs to support

More information

Semi-Autonomous Parking for Enhanced Safety and Efficiency

Semi-Autonomous Parking for Enhanced Safety and Efficiency Technical Report 105 Semi-Autonomous Parking for Enhanced Safety and Efficiency Sriram Vishwanath WNCG June 2017 Data-Supported Transportation Operations & Planning Center (D-STOP) A Tier 1 USDOT University

More information

Q-Coverage Maximum Connected Set Cover (QC-MCSC) Heuristic for Connected Target Problem in Wireless Sensor Network

Q-Coverage Maximum Connected Set Cover (QC-MCSC) Heuristic for Connected Target Problem in Wireless Sensor Network Global Journal of Computer Science and Technology: E Network, Web & Security Volume 15 Issue 6 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Supervisory Control for Cost-Effective Redistribution of Robotic Swarms

Supervisory Control for Cost-Effective Redistribution of Robotic Swarms Supervisory Control for Cost-Effective Redistribution of Robotic Swarms Ruikun Luo Department of Mechaincal Engineering College of Engineering Carnegie Mellon University Pittsburgh, Pennsylvania 11 Email:

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection

Capacity of Dual-Radio Multi-Channel Wireless Sensor Networks for Continuous Data Collection This paper was presented as part of the main technical program at IEEE INFOCOM 2011 Capacity of Dual-Radio Multi-Channel ireless Sensor Networks for Continuous Data Collection Shouling Ji Department of

More information

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors

Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Article Target Coverage in Wireless Sensor Networks with Probabilistic Sensors Anxing Shan 1, Xianghua Xu 1, * and Zongmao Cheng 2 1 School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018,

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks 1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,

More information

Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks

Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks Heterogenous Quorum-based Wakeup Scheduling for Duty-Cycled Wireless Sensor Networks Shouwen Lai Dissertation submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial

More information

Self-Stabilizing Deterministic TDMA for Sensor Networks

Self-Stabilizing Deterministic TDMA for Sensor Networks Self-Stabilizing Deterministic TDMA for Sensor Networks Mahesh Arumugam Sandeep S. Kulkarni Software Engineering and Network Systems Laboratory Department of Computer Science and Engineering Michigan State

More information

On Event Signal Reconstruction in Wireless Sensor Networks

On Event Signal Reconstruction in Wireless Sensor Networks On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle

More information

THE field of personal wireless communications is expanding

THE field of personal wireless communications is expanding IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 6, DECEMBER 1997 907 Distributed Channel Allocation for PCN with Variable Rate Traffic Partha P. Bhattacharya, Leonidas Georgiadis, Senior Member, IEEE,

More information

Sensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer

Sensor Networks. Distributed Algorithms. Reloaded or Revolutions? Roger Wattenhofer Roger Wattenhofer Distributed Algorithms Sensor Networks Reloaded or Revolutions? Today, we look much cuter! And we re usually carefully deployed Radio Power Processor Memory Sensors 2 Distributed (Network)

More information

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks Youn-Hee Han, Chan-Myung Kim Laboratory of Intelligent Networks Advanced Technology Research Center Korea University of

More information

IED Detailed Outline. Unit 1 Design Process Time Days: 16 days. An engineering design process involves a characteristic set of practices and steps.

IED Detailed Outline. Unit 1 Design Process Time Days: 16 days. An engineering design process involves a characteristic set of practices and steps. IED Detailed Outline Unit 1 Design Process Time Days: 16 days Understandings An engineering design process involves a characteristic set of practices and steps. Research derived from a variety of sources

More information

A Distributed Protocol For Adaptive Link Scheduling in Ad-hoc Networks 1

A Distributed Protocol For Adaptive Link Scheduling in Ad-hoc Networks 1 Distributed Protocol For daptive Link Scheduling in d-hoc Networks 1 Rui Liu, Errol L. Lloyd Department of Computer and Information Sciences University of Delaware Newark, DE 19716 bstract -- fully distributed

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Georgia Tech HSMC 2010

Georgia Tech HSMC 2010 Georgia Tech HSMC 2010 Junior Varsity Multiple Choice February 27 th, 2010 1. A box contains nine balls, labeled 1, 2,,..., 9. Suppose four balls are drawn simultaneously. What is the probability that

More information

Coverage in Sensor Networks

Coverage in Sensor Networks Coverage in Sensor Networks Xiang Luo ECSE 6962 Coverage problems Definition: the measurement of quality of service (surveillance) that can be provided by a particular sensor network Coverage problems

More information

ABSTRACT ALGORITHMS IN WIRELESS NETWORKS WITH ANTENNA ARRAYS

ABSTRACT ALGORITHMS IN WIRELESS NETWORKS WITH ANTENNA ARRAYS ABSTRACT Title of Dissertation: CROSS-LAYER RESOURCE ALLOCATION ALGORITHMS IN WIRELESS NETWORKS WITH ANTENNA ARRAYS Tianmin Ren, Doctor of Philosophy, 2005 Dissertation directed by: Professor Leandros

More information

Optimizing the Performance of MANET with an Enhanced Antenna Positioning System

Optimizing the Performance of MANET with an Enhanced Antenna Positioning System 50 Optimizing the Performance of MANET with an Enhanced Antenna Positioning System Jackline Alphonse and Mohamed Naufal M.Saad Electrical and Electronics Department, Universiti Teknologi PETRONAS, Bandar

More information

Redundancy and Coverage Detection in Sensor Networks

Redundancy and Coverage Detection in Sensor Networks Redundancy and Coverage Detection in Sensor Networks BOGDAN CĂRBUNAR, ANANTH GRAMA, and JAN VITEK Purdue University and OCTAVIAN CĂRBUNAR IFIN-NIPNE We study the problem of detecting and eliminating redundancy

More information

Towards a Unified View of Localization in Wireless Sensor Networks

Towards a Unified View of Localization in Wireless Sensor Networks Towards a Unified View of Localization in Wireless Sensor Networks Suprakash Datta Joint work with Stuart Maclean, Masoomeh Rudafshani, Chris Klinowski and Shaker Khaleque York University, Toronto, Canada

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information