Distributed Energy-Efficient Scheduling Approach For k-coverage In Wireless Sensor Networks

Similar documents
Fault-tolerant Coverage in Dense Wireless Sensor Networks

ENERGY-EFFICIENT NODE SCHEDULING MODELS IN SENSOR NETWORKS WITH ADJUSTABLE RANGES

Extending lifetime of sensor surveillance systems in data fusion model

Coverage in Sensor Networks

Coverage Issue in Sensor Networks with Adjustable Ranges

Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks

TTS: A Two-Tiered Scheduling Algorithm for Effective Energy Conservation in Wireless Sensor Networks

Jie Wu and Mihaela Cardei

A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks

Composite Event Detection in Wireless Sensor Networks

ON THE OPTIMAL COVERAGE AREA FOR SOLVING ENERGY-EFFICIENT PROBLEM IN WIRELESS SENSOR NETWORK

An approach for solving target coverage problem in wireless sensor network

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Redundancy and Coverage Detection in Sensor Networks

LORD: A Localized, Reactive and Distributed Protocol for Node Scheduling in Wireless Sensor Networks

Q-Coverage Maximum Connected Set Cover (QC-MCSC) Heuristic for Connected Target Problem in Wireless Sensor Network

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Low-Latency Multi-Source Broadcast in Radio Networks

Probabilistic Coverage in Wireless Sensor Networks

A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network

BBS: Lian et An al. Energy Efficient Localized Routing Scheme. Scheme for Query Processing in Wireless Sensor Networks

Node Deployment Strategies and Coverage Prediction in 3D Wireless Sensor Network with Scheduling

Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

Active RFID System with Wireless Sensor Network for Power

An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks

Self-Protection for Wireless Sensor Networks

p-percent Coverage in Wireless Sensor Networks

Deployment Design of Wireless Sensor Network for Simple Multi-Point Surveillance of a Moving Target

Performance study of node placement in sensor networks

ON THE CONCEPT OF DISTRIBUTED DIGITAL SIGNAL PROCESSING IN WIRELESS SENSOR NETWORKS

Optimal Multicast Routing in Ad Hoc Networks

Energy-Efficient Area Coverage in Bistatic Radar Sensor Networks

A ROBUST SCHEME TO TRACK MOVING TARGETS IN SENSOR NETS USING AMORPHOUS CLUSTERING AND KALMAN FILTERING

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Localization (Position Estimation) Problem in WSN

Calculation on Coverage & connectivity of random deployed wireless sensor network factors using heterogeneous node

Bottleneck Zone Analysis in WSN Using Low Duty Cycle in Wireless Micro Sensor Network

Adaptive Sensor Selection Algorithms for Wireless Sensor Networks. Silvia Santini PhD defense October 12, 2009

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Energy Consumption Reduction of Clustering Communication Based on Number of Neighbors for Wireless Sensor Networks

Coverage Issues in Wireless Sensor Networks

Available online at ScienceDirect. Procedia Computer Science 65 (2015 ) 48 57

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Some problems of directional sensor networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

A Forwarding Station Integrated the Low Energy Adaptive Clustering Hierarchy in Ad-hoc Wireless Sensor Networks

Experimental Evaluation of the MSP430 Microcontroller Power Requirements

Location Discovery in Sensor Network

Variable Radii Connected Sensor Cover in Sensor Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

DISTRIBUTED DYNAMIC CHANNEL ALLOCATION ALGORITHM FOR CELLULAR MOBILE NETWORK

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

SPATIAL CORRELATION BASED SENSOR SELECTION SCHEMES FOR PROBABILISTIC AREA COVERAGE

MULTI-HOP wireless networks consist of nodes with a

Lifetime Optimization for Wireless Sensor Networks Using the Nonlinear Battery Current Effect

Reducing Aggregation Bias and Time in Gossiping-based Wireless Sensor Networks

Fault Tolerant Barrier Coverage for Wireless Sensor Networks

Transmission Delay in Large Scale Ad Hoc Cognitive Radio Networksi

A New Model of the Lifetime of Wireless Sensor Networks in Sea Water Communications

Increasing the Network life Time by Simulated Annealing Algorithm in WSN with Point

International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February ISSN

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Energy Efficient MAC Protocol with Localization scheme for Wireless Sensor Networks using Directional Antennas

The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks

Improved MDS-based Algorithm for Nodes Localization in Wireless Sensor Networks

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks

Self-Stabilizing Deterministic TDMA for Sensor Networks

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model

An Energy Efficient Multi-Target Tracking in Wireless Sensor Networks Based on Polygon Tracking Method

Energy-efficient Broadcast Scheduling with Minimum Latency for Low-Duty-Cycle Wireless Sensor Networks

Synchronization and Beaconing in IEEE s Mesh Networks

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

Zigzag Coverage Scheme Algorithm & Analysis for Wireless Sensor Networks

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

A Sensor Network Protocol for Automatic Meter Reading in an Apartment Building

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Revisiting Neighbor Discovery with Interferences Consideration

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

Adaptation of MAC Layer for QoS in WSN

Maximizing Number of Satisfiable Routing Requests in Static Ad Hoc Networks

Deployment-Based Lifetime Optimization Model for Homogeneous Wireless Sensor Network under Retransmission

On Energy-Efficient Trap Coverage in Wireless Sensor Networks

Distributed Clustering Method for. Energy-Efficient Data Gathering in

Fast Placement Optimization of Power Supply Pads

Optimal Resource Allocation in Multihop Relay-enhanced WiMAX Networks

Delay-Tolerant Data Gathering in Energy Harvesting Sensor Networks With a Mobile Sink

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks

Transcription:

Distributed Energy-Efficient Scheduling Approach For k-coverage In Wireless Sensor Networks Chinh T. Vu Shan Gao Wiwek P. Deshmukh Yingshu Li Department of Computer Science Georgia State University, Atlanta, Georgia 30303 {chinhvtr@cs, sgao3@student, wdeshmukh1@student, yli@cs}.gsu.edu I. ABSTRACT In sensor networks, it is desired to conserve energy so that the network lifetime can be maximized. An efficient approach to prolong the network lifetime is to identify a schedule for all the sensors, indicating which subset of the sensors can be active during the current time slot. Furthermore, to ensure the quality of surveillance, some applications require k-coverage of the monitored area. In this paper, we first define the Sensor Energy-efficient Scheduling for k-coverage (SESK) problem. We further resolve it by proposing a scheduling approach named Distributed Energy-efficient Scheduling for k-coverage DESK such that the energy consumption among all the sensors is balanced while still assuring the k-coverage requirement. This approach is completely distributed as well as localized, which is more practical than centralized ones in wireless sensor networks. II. INTRODUCTION The recent development in micro-electro-mechanical system (MEMS) technology, wireless communication, and digital electronics has allowed the production of low-price, multifunction, and tiny sensors [19], thus a redundant number of sensors can be densely deployed to monitor an area to prolong the network lifetime and enhance the surveillance quality. In addition to the numerous limitations such as restrictions in energy, computational capability, memory, bandwidth, and communication, a tiny sensor node tends to fail (because of energy depletion and interference with environment) [19] and is very vulnerable to the environment (e.g., easy to be physically damaged). Thus to ensure the proper operation of the network, even when some sensor nodes fail, many applications require the high fault-tolerance of the network. Besides, different applications necessitate different coverage levels. For example, if sensor nodes are deployed in a house, where sensors can be well taken care of and the environment is friendly, to monitor temperature, fault tolerance requirement may not be important. On the other hand, having a high fault tolerance is always a major requisite if sensor nodes operate in hostile regions such as battlefields or chemically polluted areas. In other applications such as detecting forest fires, the fault tolerance may be low in rainy seasons (to save sensors 1 This work is supported in part by the NSF CAREER Award under Grant No. CCF-0545667 and the GSU RIG grant. energy, thus increase network longevity), but may need to be high in the dry seasons. Therefore, having the parameter k of k-coverage as a user-defined parameter is sometimes a mandatory requirement in designing a network. Moreover, the value of k may be changed while the network is in operation. Additionally, due to limited energy, short-ranged communication and large number of deployed sensors, using a slow centralized algorithm to schedule sensors for such networks may be impractical. A decentralized algorithm should be the preferred approach for scalable networks with several thousands of sensors or more. Our contributions in this paper are: (i) We define the SESK problem and confirm that it is NP-complete. (ii) To find an approximate solution to this problem, we introduce a completely localized and distributed heuristic named DESK that discovers and schedules the non-disjoint subsets of sensors which can guarantee the k-coverage over the working area where k can be changed by users. (iii) We as well take energy into consideration. (iv) We mathematically model the time a sensor needs to wait before deciding its status using parameters α, β which can dynamically tune the algorithm corresponding to user s requirement on energy s priority. That is, if the energy consumption is a very critical issue, the user can assign α a very high value. In contrast, if energy is not the major concern, the value of α may be small. The remainder of this paper is organized as follows. Section III presents some related work on the coverage problem. In section IV, the problem statement and the related definitions are provided. The network model, assumptions and the algorithm is described in details in section V. Section VI provides the theoretical analysis and proof. The simulation results are shown in section VII. Finally, section VIII gives the conclusion. III. RELATED WORK Both the coverage and the network lifetime problems under several sensor constraints (e.g., energy, high uncertainty, failure rate) and network bandwidth limitation have recently been extensively investigated. Various criteria can be used to classify the proposed algorithms into several categories. According to [20], the coverage problems for sensor networks can be categorized into three broad types - area coverage [1], [2], [4] [7], [11], [12] (in which, the major objective is to monitor an area), target coverage [9] [11], [13], [14], [16]

(where the main objective is to cover a set of targets), and breach coverage [14], [16] (the goal here is to minimize the number of uncovered targets). Nevertheless, the method to convert area coverage problems into target coverage problems is suggested in [11]. Various different scheduling schemes have been proposed in the literature. To enhance network lifetime, most of the work done to date divides the set of sensors into a number of subsets such that every subset can solely accomplish the coverage task; each of them then being successively activated. In [11] [13] the sensors are organized into disjoint subsets, i.e., subsets that share nothing in common. On the other hand, dividing into the non-disjoint sets (where a sensor can belong to several different subsets) is considered in [9], [10], [16]. It can be observed that non-disjoint sensor cover sets can provide better lifetime compared to disjoint sensor cover sets. The coverage approach can be centralized, distributed or localized [20]. With the centralized approach, the algorithm runs at a special station (usually a base station) where the energy, communication and computation constraints can be ignored. Centralized approaches [10], [11], [14], [16] always require the global information of the whole network, run slowly and have low-adaptability to the changes of the network. Conversely, with localized and distributed ones [1], [2], [4] [8], the decisive process is locally and simultaneously carried out at each sensor node which needs only local information, thus being more adaptable to the dynamic and scalable nature of the network. That is the reason why the localized and distributed algorithms are preferred over centralized ones in wireless sensor networks. In applications whose accuracy and continuity of the sensing data is a big consideration, k-coverage may be a prerequisite. k-coverage means that each point or target in the area of interest is within the sensing range of at least k active sensors. With k-coverage, the network still properly operate even when any k 1 sensors fail at the same time. To the best of our knowledge, not much work has been done dealing with k- coverage problem. In [1], the k-coverage problem is simplified to the k perimeter coverage of each sensor in the network for both uniform and non-uniform sensing range sensors. Nonetheless, the paper only shows how to check the coverage level of the network without figuring out any working schedule for each sensor. Our approach utilizes this transformation to guarantee the k-coverage of the whole area. Wang et al. [2] converts from verifying the coverage levels of the area to determining the coverage level of all the intersection points. The condition for the network, where every sensor is active with probability p, to ensure the k-coverage for every point of the area is addressed in [3]. The proposal considers grid deployment, uniform distribution, and Poisson distribution. In this paper, a localized and distributed greedy algorithm generating non-disjoint cover sets which provide the k- coverage for the whole network is proposed. The work most relevant to our approach is [1], [2], [6], [10]. In [6], the authors proposed a localized algorithm working in rounds. Each sensor checks its sensing area to see if its perimeter is already covered by its active neighbors. If not, it remains active. Otherwise, it waits for a random back-off time and decides to be active or go to sleep depending on its neighbors status at that time. With the same manner of working in rounds, [10] gives the schedule for each sensor with adjustable sensing range to solve the target coverage problem. However, both [6] and [10] can only provide 1-coverage for the network. Our approach differs from them in that we offer bigger and more dynamic coverage levels. In [2], Wang et al. introduced the Coverage Configuration Protocol (CCP), a distributed algorithm, that can provide k-coverage for the network with k being arbitrary. Based on the transformation from determining region coverage into determining the coverage level of all the intersection points, the k-coverage eligible rule is suggested for each sensor to testify the eligibility to withdraw or keep being active. Nonetheless, CCP does not take energy into account. In contrast, energy is an important concern in our approach and the value of k can be altered while the network is working. In [1], Huang and Tseng presented other rules, named k UC and k N C for uniform and non-uniform sensing range sensor networks, respectively, to verify the coverage levels of the network. Although they mentioned that those rules can be combined with [4] to schedule sensors, no further details are stated. Just as CCP, [4] does not take care of energy. Furthermore, some inadequacies of off-duty eligibility rule of the proposed algorithm in [4] are pointed out in [6]. IV. THE SESK PROBLEM In this section, we formally define the Sensor Energyefficient Scheduling for k-coverage (SESK) problem. Definition 1: A location in an area A is said to be covered by sensor s i if it is within s i s sensing range. A location in A is said to be k-covered if it is within at least k sensors sensing range. In this paper, k is called the coverage level or coverage degree. The SESK problem is defined as follows: Definition 2: Sensor Energy-efficient Scheduling for k- coverage (SESK): Given a two-dimensional area A and a set of N sensors S = {s 1, s 2,..., s N }, derive an active/sleep schedule for each sensor such that: 1) The whole area A is k-covered. 2) The energy consumption among all the sensors is balanced. 3) The network life time is maximized. Our objective is to find the maximum number of nondisjoint sets of sensors such that each set cover can assure the k-coverage for the whole region. In [11], the SET K- COVER problem, whose goal is to discover K disjoint set covers satisfying that each set cover can 1-cover the whole area, is proved to be NP-complete. Since disjoint set is a special case of non-disjoint set and 1-cover is also a special case of k-cover, SET K-COVER is definitely a special case of SESK. Thus, SESK is as well an NP-complete problem. One of our optimization goals is to maximize network lifetime which is defined as following:

Definition 3: Network lifetime: The network lifetime is the duration during which the whole monitored region is k- covered. To mathematically formulate the SESK problem, the following notations need to be stated: m: The number of discovered non-disjoint set covers. k: The desired coverage level specified by users. C j (j = 1..m): The j th set cover. cov j (j = 1..m): The coverage level that set cover C j can provide for the whole monitored area. E i (i = 1..N): The initial energy of sensor i. e j,i (i = 1..N, j = 1..m): The amount of energy that sensor i consumes when the set cover C j is active. e j,i = 0 if set cover C j does not contain sensor i. : The residual energy of sensor i at the time the network dies. The SESK problem can be mathematically formulated as follows: Objective: Max m (1) e die i Subject to: Min N (e die i 1 i 1,i 2=1 e die i 2 ) 2 (2) m C j S (3) j=1 cov j k for all j = 1..m (4) m e j,i E i for all i = 1..N (5) j=1 Formulation explanations and remarks: 1) Eq. 1 claims that our objective is to find as many subsets as possible. Since DESK works in rounds, to maximize the number of subsets is to maximize the lifetime of the network. 2) Eq. 2 is an effort to balance the energy consumption among all the sensors. 3) Eq. 3 guarantees that all the set covers are the subsets of the set of all sensors. 4) Eq. 4 assures that the whole region is continuously k- covered. 5) Eq. 5 ensures that sensors cannot overspend their initially supplied energy. 6) No relation between set covers is specified since they are non-disjoint. Furthermore, they are possibly identical. A. Main idea V. THE DESK ALGORITHM DESK operates in rounds. By that, the network is capable of automatically adjusting coverage level until the number of live sensors is not enough to k-cover the whole surveillance area. Also by working in rounds, some sensors may frequently have a chance to deactivate. Thus, their battery can take the advantage of the relaxation effect mentioned in [22]. This helps a sensor to live longer than its pre-defined longevity. Firstly, we introduce the k-perimeter-coverage which is stated in [1] as following: Definition 4: A sensor is said to be k-perimeter-covered if all the points on its perimeter are covered by at least k sensors other than itself. Our work is based on the result from [1] which is formally stated in the following theorem: Theorem 1: Suppose that no two sensors are located in the same location. The whole network area A is k-covered iff each sensor in the network is k-perimeter-covered. This theorem indicates the rule to validate the coverage levels of each sub-region of the monitored area. Based on that, our algorithm schedules the sensors to be active/sleep with the consideration of each sensor s residual energy and its contribution to the coverage level of the whole network. B. Assumptions We assume that all the sensors have a clock with a uniform starting time t 0, so that their activities can be synchronized. This is realistic since some work have investigated the global synchronization and both centralize and localized solutions have been proposed [17], [18]. The second assumption is that the initial network deployment guarantees that every point in the monitored area can be at least k-covered. The condition to satisfy this assumption has been addressed in [3]. In our paper, the sensing area of a sensor is modelled as a circle centered at the sensor with radius as the sensing range. We further assume that the communication range of a sensor is at least twice the sensing range, i.e., r c 2r s. Thus, the k-coverage can guarantee k-connectivity [2], [8]. Finally, we assume that no two sensors are located at the same position. We have no restriction on a sensor s initial energy and the sensing range. C. Algorithm parameters For the sake of explanation later on, the notations, a sensor s status and message types are introduced as follows. Sensor s attributes: w i : Timer/time duration that decides the time sensor s i to become active/sleep. w i refers to both the timer itself and the time duration. R i : Timer for sleep sensor s i to wake up at the next round. n i : The current number of dependent neighbors, i.e., the number of neighbors requesting sensor s i to become active. N i : The number of neighbors of sensor s i. r i : Sensor s i s sensing range. E i : Sensor s i s initial energy. e i : Sensor s i s current residual energy. e threshold (Threshold energy): The minimum amount of energy that a sensor needs to be active in a whole round. Exchanged messages: mactivate: A sensor informs others that it becomes active.

mask2sleep: A sensor suggests a neighbor to go to sleep due to its uselessness. mgosleep: A sensor finds itself useless, i.e., all of its neighbors ask it to deactivate and it is already k-covered. Sensor s status: ACTIVE, SLEEP and LISTENING. Others: L: List of non-sleep neighbors. : Maximum number of neighbors that a sensor may have. Communication complexity: Estimated by the number of sent messages. Round 1 Round 2... Round i... Decision phase W Fig. 1. Network lifetime dround Sensing phase Network time line Round R On what follows, we discuss necessary parameters and factors used in the proposed algorithm. DESK works in a rounding fashion with the round length of dround, meaning that each sensor runs this algorithm every dround unit of time. At the beginning of each round is a decision phase with the duration of W. The value of W and dround should be chosen such as W dround. See Fig. 1. All the sensors have to decide its status in the decision phase. At this phase, each sensor needs to temporarily turn on to decide its status. Every sensor s i decides its status (active/sleep) after waiting for w i time. The value of w i may be changed anytime due to the active/sleep decision of any of its neighbors. Besides, the value of w i depends on s i s residual energy e i and its contribution c i on coverage level of the network. Sensor s contribution c i can be defined in terms of some parameters, such as the perimeter coverage p i which is the summation of perimeter coverage (in radian) that s i covers its neighbors perimeters. However, in this paper we define c i as the number of the neighbors n i who need s i to be active. The waiting time for sensor s i can be formulated as follows: w i = { η W + z if e n α i e threshold i l(ei,ri)β W otherwise Where: α, β, η are constants, z is a random number between [0, d], where d is a time slot, to avoid the case where two sensors having the same w i to be active at the same time. l(e i, r i ) is the function computing the lifetime of sensor s i in terms of its current energy e i and its sensing range r i. This function may be linear, quadratic or anything else. The function l(e i, r i ) will be discussed in detail in Section VII. (6) e threshold and η are network-dependent parameters. η is chosen to make sure w i W and e threshold guarantees that a sensor can live for a whole round: e threshold satisfies: l(e threshold, r i ) = W (7) D. Algorithm Description η = dround β (8) The pseudo-code for DESK is illustrated as follows: Algorithm 1 : DESK(s i ) 1: /* Preparation */ 2: Update current residual energy e i 3: Collect information and construct the N i -element list L of its one-hop neighbors 4: Compute the waiting time w i and start the decision phase timer t 5: status=listening 6: Pre-check redundant neighbors, sends mask2sleep message to them and move them out of list L if found any. 7: n i = number of elements of list L 8: while t W do 9: /* receive a message from neighbor s j */ 10: Receive(s j, MessageID) 11: if MessageID==mACTIVATE then 12: Update coverage level 13: Check if any sensor in list L is useless to s i s coverage. If yes, send mask2sleep message to that sensor 14: else if MessageID==mASK2SLEEP then 15: n i = n i 1 16: if n i > 0 and status==listening then 17: Update w i 18: end if 19: else if MessageID==mGOSLEEP then 20: Remove s j out of list L 21: end if 22: /* decide status */ 23: if (t w i and status==listening) or n i ==0 then 24: if n i == 0 then 25: Set the timer R i for s i waking up at next round 26: One-hop broadcast mgosleep message 27: status=sleep 28: Turn itself off /*Go to sleep, stop running DESK*/ 29: else 30: status=active 31: Set itself to be Active /*Turn on*/ 32: One-hop broadcast mactivate message 33: end if 34: end if 35: end while In the pseudo-code, the term useless neighbor or redundant neighbor is used to refer to the one that does not contribute in the perimeter coverage of the considered

sensor. That is, the portion of the perimeter of the considered sensor overlapping with that neighbor is already k-covered. It s worth noting that although DESK works in rounds, no interruption in executing sensing task exists. As being stated in Section VII, a sensor can still sense data while being in LISTENING mode. Thus, by entering the LISTENING mode at the beginning of each round, sensors still perform the sensing job while participating in the decision phase. This guarantees the continuous and smooth operation of the whole network. VI. THEORETICAL ANALYSIS To theoretically evaluate DESK, we need to give the following definition first: Definition 5: sub-region [1]: A sub-region in area A is a set of points which are covered by the same set of sensors. Lemma 2: When a sensor is useless to the coverage of all of its neighbors, its sensing region is already k-covered. Proof: Consider a sensor s i. Without loss of generality, assume that sensor s i has enough live neighbors to k-cover its perimeter. These neighbors partition the region inside s i s sensing region into some sub-regions. Each sub-region is bounded by the perimeter of one or more s i s neighbors. Since all these neighbors ask s i to sleep, the perimeter segment, which is inside s i s sensing region, of each of these neighbors is already k-covered. As shown in [1], each sub-region is at least k-covered. The correctness of DESK can be validated through the following theorem. Theorem 3: The algorithm ensures that the whole monitored area is k-covered. Proof: Without loss of generality, assume that each sensor has enough live neighbors to k-cover its perimeter. A sensor can go to sleep only when all of its neighbors ask it to do so. Hence, a sensor can allow a neighbor to go to sleep only when the perimeter segment covered by that neighbor is already k-covered. Thus, at the end of the decision phase, a sensor allows its neighbor(s) to turn off only when its whole perimeter is already k-covered. Furthermore, lemma 2 has as well shown that sleep sensors are k-covered. Finally, all the sensors are k-covered. According to Theorem 1, the whole monitored area is guaranteed to be k-covered. Theorem 4: The time complexity of DESK is O(min( W d, ) ) and the communication complexity of DESK is O(n ). Proof: Let us investigate the time complexity for the worst case. The length of the decision phase is W, and the time slot is d. If at each time slot, a sensor receives mact IV AT E messages from one or more neighbor(s), it may receive a maximum of W d mact IV AT E messages. However, a sensor has no more than neighbors; hence, a sensor can receive at most min( W d, ) mact IV AT E messages. Besides, it needs O( ) time to run the k-nc algorithm to check its perimeter coverage [1]. Moreover, all the sensors simultaneously run DESK. Thus the time complexity is O(min( W d, ) ). Since each sensor has at most neighbors and throughout the decision phase, a sensor sends at most one mask2sleep message per neighbor and only one message to broadcast its status (active/sleep), so each sensor sends at most O( ) messages in the decision phase. This means that the message complexity is O(n ). VII. SIMULATION In this section, we evaluate the efficiency of DESK through conducting some simulations measuring the number of sensors per subset, number of messages sent by each sensor per round and the network lifetime with different number of sensors and different values of k. We also compare the network lifetimes of the networks with different initial energy of sensors. We now construct a simple energy model as the guideline to measure energy consumption. The distributed algorithm requires the consideration of various kinds of energy consumption including message transmission/reception, data sensing and computational energy. To the best of our knowledge, no work has been done to mathematically construct an energy model that take all the energy consumptions into account. A detailed survey on numerous kinds of energy consumption in wireless sensor networks is given in [15]. Based on their work, we develop a simple energy model for measuring DESK s performance. Normally, a sensor node has three major units that consume energy: the micro-controller unit (MCU) which is capable of computation, communication subsystem which is responsible for transmitting/receiving messages and the sensing unit that collects data [15]. In our model, each subsystem can be turned on or off depending on the current status of the sensor which is summarized in Table I: TABLE I ENERGY CONSUMPTION Sensor mode MCU Radio Sensor P ower (mw ) Listening On On On 20.05 + f(r i ) Active On Off On 9.72 + f(r i ) Sleep Off Off Off 0.02 Energy needed to send a 2-bit-content message: 0.515 In Table I, the function f(r i ) is the spent energy related to the sensing range r i of sensor s i. We consider two kinds of function f: Linear function: f(r i ) = 1 κ r s (9) Quadratic function: f(r i ) = 1 κ r2 s (10) where κ is an energy co-efficient. For the sake of simplicity, we omit the energy needed to receive a message, to turn on the radio, to start up the sensor node, etc. We also do not consider the need of collecting

sensing data. Thus, when a sensor becomes active, it can turn its radio off to save battery. Since DESK uses only three different types of messages, two bits are sufficient for the payload of exchanged messages. The value of energy spent to send a message shown in Table I is obtained by using the equation to calculate the energy cost for transmitting messages shown in [15]. The power consumptions when the sensors are in Listening, Active and Sleep mode displayed in Table I are acquired from the statistical data of MEDUSA-II node - a sensor node developed at the University of California, Los Angeles [15]. In our model, the remaining lifetime of a sensor is the time that a sensor can live in the active mode. That is, if a sensor works with sensing range of r i at a point of time, when the residual energy is e i, then the lifetime can be calculated as: e i l(e i, r i ) = (11) 9.72 + f(r i ) All the parameters used for the simulation are provided in Table II. The sensors are randomly deployed in a fixed region. The initial energy of each sensor is randomly assigned and it is within a range whose lower bound is 200J. The sensing range of each sensor is as well randomly chosen between 400m to 500m. As shown in Table II, the length of a round is much larger than that of the decision phase. TABLE II SIMULATION PARAMETERS Area size 800m 800m Decision phase 2 seconds Sensing range 400m 500m Slot time 0.5 ms Minimum power 200J Round time 20 minutes α, β 1 κ 8, 000 Number of sensors per subset 140 120 100 80 60 40 k=1 k=2 k=4 k=8 20 50 100 150 200 Number of sensor nodes Fig. 2. Number of active sensors per subset In Fig. 2, 3 and 4, the upper bound of a sensor s initial energy is 300J, and the energy consumption in terms of sensing range is quadric which is shown in Eq. 10 and the number of the sensors ranges from 50 to 200. Fig. 2 shows how many sensors are active during each round. As DESK considers balancing the energy consumption Number of messages sent per sensor each round 140 120 100 80 60 40 k=1 k=2 k=4 k=8 20 50 100 150 200 Number of sensor nodes Fig. 3. Network lifetime (hours) 3000 2800 2600 2400 2200 2000 Number of messages sent per sensor each round k=1 k=2 k=4 k=8 50 100 150 200 Number of sensor nodes Fig. 4. Network lifetime among all the sensors, it is valid that the number of sensors per subset increases as the number of all the deployed sensors increases. Due to its effort to use as many sensors as possible, the number of unallocated sensors, i.e., sensors which have never become active, are almost equal to 0, which indicates that DESK efficiently makes almost all the sensors in a network to participate in the k-coverage sensing task. Fig. 3 presents the number of messages that a sensor sends during each round. It can be seen that more messages are sent when the number of all the deployed sensors increases. It is not surprising since a sensor may have more neighbors. Theoretically, with the same topology, the higher the value of k the lower the number of messages needed to be exchanged. However, it can be observed that the number of messages that each sensor sends per round are almost the same for k = 1, 2, 4, and 8. This phenomenon is originated from the random deployment method of our simulation. Furthermore, when investigating the simulation data, we find out that most part of perimeter of each sensor is k -covered, where k > k. Thus the number of sleep sensors each round and the number of exchanged messages are not so much different for the different values of k. DESK will perform better if a controlled deployment method is employed, which can balance the coverage levels of the borders of the monitored area and

its central part. In Fig. 4, the network lifetime is illustrated. As shown in Fig. 4, the network lifetime decreases when the value of k increases. This is easy to understand since the bigger the value of k, the larger the number of active sensors a round, hence the smaller the network lifetime. It also can be seen that with each value of k, the lifetime slightly fluctuates. Again, this fact is due to the random nature of our method to conduct the simulation. We do not put any control on network deployment and we as well randomly assign the sensor properties (e.g., initial energy, position, sensing range) from a wide range. Network lifetime (hours) 2 1.8 1.6 1.4 1.2 1 0.8 0.6 0.4 x 10 4 0.2 1 1.5 2 2.5 Power ratio Fig. 5. Network lifetime with different power range linear k=1 linear k=2 linear k=4 linear k=8 quadratic k=1 quadratic k=2 quadratic k=4 quadratic k=8 Fig. 5 compares the network lifetime for the two kinds of energy consumption function f, which are linear and quadratic as illustrated in Eq. 9 and 10, respectively, when the power ratio (the ratio of the upper bound over the lower bound of the initial power for each sensor) ranges from 1 to 2.5. As illustrated in Fig. 5, the network lifetime significantly increases as the power ratio increases. This phenomenon is quite logical since some sensors are given more energy when the range for the initial power of each sensor is widen. Comparing with linear energy consumption model, a sensor consumes more energy when the energy consumption model is quadratic. Therefore, for quadratic energy consumption model, the network lifetime is shorter. VIII. CONCLUSION In this paper, we investigate the k-coverage problem in wireless sensor networks which is formulated as the SESK problem. We further propose a completely distributed and localized algorithm named DESK to solve the SESK problem. We as well provide analysis to show the correctness and efficiency of DESK. Simulation results are also illustrated to evaluate the performance of DESK. REFERENCES [1] C. Huang and Y. Tseng, The coverage Problem in a Wireless Sensor Network, Mobile Networks and Applications 10, 519528, 2005. [2] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, C. Gill, Integrated coverage and connectivity configuration in wireless sensor networks, SenSys 03, November 57, 2003, Los Angeles, California, USA. [3] S. Kumar, T.H. Lai and J. Balogh, On k-coverage in a Mostly Sleeping Sensor Network, in Proc of the 10 th international Conference on Mobile computing and networking, Philadelphia, PA, USA, Pages 144-158, 2004 [4] D. Tian, N.D. Georganas, A Coverage-Preserving Node Scheduling Scheme for Large Wireless Sensor Networt. In Proc. of 1 st ACM Workshop on Wireless Sensor Networks and Applications, Atlanta, Geogia, USA, 2002. [5] H. Gupta, S. Das, Q. Gu, Connected Sensor Cover: Self- Organization of Sensor Networks for Efficient Query Execution, MobiHoc 03, June 1-3.2003, Annapolis, Maryland, USA. [6] J. Jiang, W. Dou, A Coverage-Preserving Density Control Algorithm for Wireless Sensor, In Proc. of ADHOC-NOW 2004, Vancouver, Canada, July 22-24, 2004. [7] Z. Zhou, S. Das, H. Gupta, Connected k-coverage Problem in Sensor Networks, Proceedings of the 13th International Conference on Computer Communications and Networks (ICCCN), 2004. [8] H. Zhang and J. C. Hou, Maintaining Sensing Coverage and Connectivity in Large Sensor Networks, Technical Report UIUC, UIUCDCS-R- 2003-2351 (2003). [9] M. Cardei, M. Thai, Y. Li and W. Wu, Energy-Efficient Target Coverage in Wireless Sensor Networks, IEEE INFOCOM 2005, Mar. 2005, Miami, USA. [10] M. Cardei, J. Wu, N. Lu, M.O. Pervaiz, Maximum Network Lifetime with Adjustable Range, IEEE Intl. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob 05), Aug. 2005. [11] S. Slijepcevic, M. Potkonjak, Power efficient organization of wireless sensor networks, IEEE International Conference on Communications ICC, 2001 [12] Z. Abrams, A. Goel, S. Plotkin, Set k-cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks, Proc. of Third International Symposium on Information, 2004 [13] M. Cardei, D.-Z. Du, Improving Wireless Sensor Network Lifetime through Power Aware Organization, ACM Wireless Networks, Vol. 11, No. 3, pp. 333-340, May 2005. [14] M.X. Cheng, L. Ruan, and W. Wu, Achieving Minimum Coverage Breach under Bandwidth Constraints in Wireless Sensor Networks, Proceedings of the 24th conference of the IEEE Communications Society (INFOCOM), 2005. [15] V. Raghunathan, C. Schurgers, S. Park, and M. B. Srivastava, Energyaware wireless microsensor networks, IEEE Signal Processing Magazine, March 2002. [16] My T. Thai, Y. Li, F. Wang, D.Z. Du, Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks [17] J. Elson, K. Romer, Wireless Sensor Networks: A New Regime for Time Synchronization. ACM Mobile Computing and Communication Review (MC2R), Vol.6 No.4, pp.59-61. October, 2002. 3. [18] Q. Li, D. Rus, Global Clock Synchronization in Sensor Networks. In Proc. Of IEEE Infocom 2004, Hong Kong, China, March, 2004. [19] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, 38:393-422, 2002. [20] M. Cardei and J. Wu, Energy-Efficient Coverage Problems in Wireless Ad Hoc Sensor Networks, Journal of Computer Communications on Sensor Networks, 2004 [21] K. Kar and S. Banerjee, Node Placement for Connected Coverage in Sensor Networks, Proc. of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (2003).

[22] C.F. Chiasserini, R.R. Rao, Pulsed battery discharge in communication devices, Proc of the 5th annual ACM/IEEE on Mobile computing and networking, Seattle, Washington, United States, pp.88-95, 1999.