Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

(IJCNS) International Journal of Computer and Network Security, 23

Vol. 2, No. 10, 2010

Accumulation Point Model: Towards Robust and


Reliable Deployment
Yong Lin, Zhengyi Le and Fillia Makedon
416 Yates Street, P.O. Box 19015, Arlington, TX 76019, USA
ylin, zyle, makedon@uta.edu

will be a serious malfunction.


Abstract: The reliability and fault tolerance problems are very
important for long strip barrier coverage sensor networks. The In this paper, we address the reliability and fault tolerance
Random Point Model and the Independent Belt Model are problems of barrier coverage by proposing an asymptotic
prevalent deployment models for barrier coverage. In this paper, regular deployment model, called Accumulation Point
we propose an economical, robust and reliable deployment Model (APM). Barrier coverage considers a long strip
model, called Accumulation Point Model (APM). Given the region, not a plane like area coverage. This makes the
same length of barrier and the same nodes activation rate, the deterministic deployment possible. Summarized from
number of sensors required by APM is only 1/[t(1 -θ)] times previous literature, there are two models to deploy sensors in
that of random point model. Our analysis indicates that the barrier coverage: Random Point Model (RPM) and
network failure probability of the APM is lower than the other Independent Belt Model (IBM). RPM is to deploy sensors
two models. In our network simulation, the network lifetime of randomly in FoI. While IBM is a regular deployment model,
APM is much higher than random point model. Compared with it separates the belts into two sets, the working belts set and
independent belt model, APM exhibits good failure tolerance.
the backup belts set. With the same length of barrier and the
This paper also presents a light weight accumulation point
protocol for building the network and scheduling the sleep cycle.
same node activation rate, our APM requires 1/[t(1-θ)]
This is a localized algorithm for k-barrier coverage. times the number of sensors compared with RPM, where θ is
the overlap factor denoting the overlap degree, t is used by
Keywords: sensor networks, barrier coverage, fault tolerance, activation rate k/t for k-barrier coverage. Our theoretical
sensor deployment. analysis proves the failure probabilities of RPM and IBM
are higher than APM. The simulation results indicate that
1. Introduction the network lifetime of APM is the best of the three
Barrier coverage sensor networks are deployed in a belt deployment models. If we use poor quality sensors, the
region to detect traversing targets. When barrier areas are network lifetime decreases a little in APM. RPM is also
very long, the deployment problem becomes more robust for poor quality sensors, but its absolute network
lifetime is only 1/4 times that of APM. IBM works well for
prominent. Sensor networks are usually composed of
good quality sensors, but it gets extremely bad when we use
thousands of relatively economical, energy constraint and
sensors that have a high failure rate. APM has a high
hence failure-prone sensors [9][10]. How to guarantee the performance to price ratio compared with other models.
reliability and robustness is an important issue of sensor The concepts of barrier belt and barrier graph are
network quality of service (QoS). Most of the applications introduced to make a precise description of barrier coverage.
require the sensor network to be reliable and robust. For In a barrier graph, the sensor nodes are divided into a
example, for a barrier sensor network deployed in a military barrier brother set and a barrier neighbor set. The barrier
field or a country border, it is highly expected that the belt graph of APM is a result of three types of eliminations of the
be strong enough and resist to failure. redundant nodes. This can be seen as an application of the
Current solutions for the reliability and fault tolerance relative neighborhood graph (RNG(G)) [4] on barrier
ability of sensor networks focus on increasing the node coverage. APM is made up of multiple accumulation points,
density [10]. This idea is originated from area coverage. In a k
denoted as At . Every accumulation point contains t
large plane, it is hard to deploy sensors precisely in a
regular geometric shape due to the deployment cost. So the sensors, k of them active. By this structure, we build strong
stochastic deployment is often used instead of deterministic k-barrier coverage [11].
deployment. Random point model is a kind of stochastic
deployment. It works on the following assumptions: (1) 2. Related Work
when the node density reaches a threshold, the coverage and The concept of barrier coverage first appeared in [7]. Kumar
connection can be guaranteed, and (2) if we increase the et al. formalized the concept of k-barrier coverage as a
node density further, the sensor network can be robust and barrier of sensors, such that it can guarantee that any
failure proof. Since barrier coverage considers a narrow penetration be detected by at least k distinct sensors [11].
strip region, it is different from area coverage. Wang et al. consider the relationship of coverage and
Node failure is a major concern in barrier coverage. In connection [14], if RC >2RS, where RC is the communication
area coverage, if a node fails, there might be a blind spot, radius and RS is the sensing radius, k-coverage means k-
but the entire system can still work. However, in barrier
connection. In APM, we demonstrate that in k
coverage, the field of interest (FoI) is a long strip area, if a At
sensor node fails, it is possible to disconnect the accumulation belt, the connection degree is at least 3k-1.
communication link and break the monitoring belt. This A series of research has been taken to schedule sleep and
24 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

maximize the lifetime of sensor network. Most of them were intersected barrier belts.
for area coverage, such as [6] and [8]. Only two algorithms
3.4 Redundancy Elimination and Minimum Barrier
are proposed for barrier coverage [13]. It uses IBM and
Belts
RPM to address the sleep-wakeup problem for homogeneous
lifetime and heterogeneous lifetime. A barrier graph contains a set of sensors that are active for
Another important metric of sensor network in barrier barrier coverage. But what is more meaningful is a
coverage is the fault tolerance. Many papers propose the use minimum set of sensors to meet the QoS. The redundant
high sensor density to provide redundancy [1][5][10][15]. It sensors need to be eliminated or scheduled to sleep.
is generally believed that sensors are relatively economical
and unreliable devices, therefore high density is required to
provide a reasonable level of fault tolerance. This high
density assumption belongs to RPM for both area coverage
and barrier coverage. To change a coverage graph to a barrier graph, first we have
For barrier coverage, the centralized algorithms are to eliminate the round trip edges. We call this kind of
introduced in [11][13]. An L-zone localized algorithm is elimination to be Type I Elimination. There is a very special
provided in [2] for k-barrier coverage. Our APM uses a kind of redundant node - the single edge node. If a node (not
localized algorithm based on accumulation points, a subset including the virtual terminal nodes) has only one edge in a
of sensor nodes that locate closely together. coverage graph, then it has to be eliminated in a barrier
Weak barrier coverage and strong barrier coverage were graph. This is called Type II Elimination. The result of type
introduced in [11]. Weak barrier coverage assumes only I, II eliminations is a barrier belt. However, this barrier belt
when the intruder does not know the traverse path will it be is not the minimum barrier belt. So we need Type III
detected with high probability. The QoS improvements are Elimination, by which we eliminate the redundant nodes, so
discussed in [3][12]. In this paper, we assume the quality is that we can use the minimum number of nodes to meet QoS
important and all of the assumptions are based on strong requirement. We get two reasons for type III elimination:
barrier coverage. first, we can schedule the redundant nodes to sleep, so that if
an active node depletes, a redundant node can take its place;
3. Preliminary and Network Model second, the redundant nodes are also possible to be utilized
by other barrier belts.
3.3 Barrier Belt and Barrier Graph
Assume the coverage of sensor is a unit disk with sensing
radius R. A Coverage Graph G = (V,E) indicates that for
the active sensor set V , for ∀u, v V , if the distance duv
<2R, then there is an edge euv E. There are two virtual
nodes s, t V, corresponding to the left and right
boundaries. Barrier Space is the field of interest for barrier
coverage. It is a long strip physical region with arbitrary
shape and deployed by the barrier sensors.

Figure 1. Redundancy Elimination and Minimum Barrier


Graph

From above introduction, we can summarize the Let us take Fig. 1 as an example, to show more details about
properties of the barrier belt as three types of elimination. First we get a coverage graph
1) There is no loop in a barrier belt; from the coverage relationship of sensors. The edge set {eaf,
2) It is possible that there are crossing edges of two efb, ecd} ⊂ V . But as for a barrier graph, every node can
distinct barrier belts in a barrier graph; only has two edges to support the barrier. So in this barrier
3) Except for the virtual terminal nodes {s, t}, there is no graph, edges {eaf , efb, ecd} are eliminated. However, this is
shared node for two distinct barrier belts in a barrier graph. only one barrier graph. There are several other barrier
graphs for this example; this leaves as an exercise for
Theorem 1. A sensor network barrier space is k-barrier readers. For this barrier graph Gb = (Vb,Eb). Since {eab, ecd}
coverage iff ∃k barrier belts in the barrier graph. are edges of the coverage graph, e and f are redundant
Proof: If each crossing path is covered by k distinct sensors, nodes. After the elimination of e, f, we get the final
then it must be that these k distinct sensors belong to k not minimum barrier graph. If a node is eliminated from the
minimum barrier graph, and it is not utilized by other
(IJCNS) International Journal of Computer and Network Security, 25
Vol. 2, No. 10, 2010

barrier belts, then it is a Backup Node in the belt. A backup


node keeps sleeping until one of the working nodes depletes
its energy or fails. A backup node is also called a sponsor
node. A Backup Belt is a redundant barrier belt in the
barrier region. It keeps sleep until one of the working belts
depletes or fails. If the minimum number of active sensors
that is required by a certain QoS is denoted as nk, the total
Figure 2. Overlap Factor and Minimum Pass-through
number of sensors deployed in the field of interest denoted
Distance
as nt, then the Activation Rate ρa = nk/nt. If a k-barrier
coverage degrades the QoS: leaving a barrier hole, or
breaking the communication link, such that the whole 4. Categories of Barrier Deployment
system is no more k-barrier monitored. Suppose we cannot
find a backup node to take the place of a failed node, nor Deterministic deployment is hard for area coverage due to a
can we find a backup belt to work instead of the failed large plane area. So, stochastic deployment is often used in
barrier belt, then we consider the k-Barrier Coverage Fails. area coverage. While the barrier coverage concerns a long
strip region, we need to reconsider the deterministic and
3.3.1 Overlap Factor and Minimum Pass-through stochastic deployment in barrier space. In this chapter, we
Distance summarize two existing deployment models of barrier
For ∀ edge ebc ∈ Vb in Gb, the overlap factor θ reflects a coverage, and we propose a new model - the accumulation
overlap degree of the sensing area for node b and c. If we point model. Let us discuss these models in more detail.
link b, c by line bc (see Fig. 2). The intersection points for
bc with the circle of the sensing disk of b, c are A,B. Then 4.1 Random Point Model
the overlap factor θ is Random Point Model (RPM) for barrier coverage is a sensor
network whose nodes distributed along a belt region
randomly, according to uniform distribution or Poisson
The θ cannot be 1, or else it conforms to type III distribution, such that the sensors can be deployed equally at
elimination. In barrier coverage, an important metric for any location of the belt region. In RPM, nodes are often
detection quality for an unauthorized traverse is the denoted by the node density λ. The model is based on the
Minimum Pass-through Path, and its distance is the assumption that the deployment of sensors in deterministic
Minimum Pass-through Distance. In the minimum pass- geometric shape in a large area is not practical due to the
through path, a moving target has the least possibility to be large amount of deployment cost. So we can deploy sensors
detected by sensors. So, the minimum pass-through distance in FoI randomly. Given enough amount of sensors, and if
is an important QoS metric for a whole barrier. we do not care how many times we deploy the sensors, then
λ is expected to be the same in each point of FoI. When λ
Lemma 1. The minimum pass-through path for barrier reaches a certain threshold value, both coverage and
coverage is the intersection line of the sensing disks of connection can be guaranteed. In RPM, we need to find out
neighbor nodes. the minimum set of sensors to support the whole system,
Proof: From Fig. 2, we know the intersection line of the and put the other sensors sleep. When the coverage and
sensing disks for b, c is CD. Suppose E is a point outside connection cannot meet, some of the sleeping sensors will
both intersection regions of the sensing disks, and EN is wake up to join the minimum serving set.
vertical Theorem 3. For a k-barrier coverage system built in
random point model with an activation rate ρa = k/t, denote
The area of CAF is A CAF = (2Rsin α)(2Rcos α)/2 =R2 sin
(π − 2α). The same, A EAF = R2 sin (π − 2β). Since α > β, as Rtk . There are nr sensors deployed in the barrier space
we get A CAF < A EAF . Also, A CAF =R ・ dCM, and A CAF with width 2R, where R is the sensing radius of a sensor.
= R ・ dEN, so we have dEN > dCM. Then it is easy to know Then total barrier length lr ≤ 2Rnr/t2.
that dCD = 2dCM is the minimum path to pass-through the Proof: In RPM, if the density is high enough, then
circle. sensors are deployed in the barrier space according to
Theorem 2. For a barrier coverage system with an overlap uniform distribution. Each sensor will be deployed in a
factor θ for any neighbor sensors, the minimum pass- square domain with edge
through
In the barrier space, to support the k-barrier coverage with
activation rate ρa = k/t, we need to have

So we get lr ≤ 2Rnr/t2.
If the length lr = l is given, then we know that the number
of sensors required to support k-barrier coverage under RPM
is
26 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

Definition 4. Neighbor Point If Ga1, Ga2 are two


accumulation points of a sensor network barrier graph Gb =
(Vb,Eb), for ∀u Ga1, ∃v Ga2 such that euv Gb, then
we say Ga2 is a neighbor point of Ga1.
For a pair of neighbor points Ga1, Ga2, for ∀ node a
Ga1, node b Ga2, a is the Neighbor Node of b and vice
versa. For ∀a, c Ga1, c is the Brother Node of a and vice
versa. For each node, the barrier neighbors are separated
into barrier left neighbors and barrier right neighbors
according to local address information.
Accumulation Point Model (APM) for barrier coverage is
a sensor network whose nodes distributed along a belt
region according to a set of accumulation points {Ga1, Ga2,
Figure 3. Barrier Coverage Sensor Network Deployment ..., Gan}. For any node b not in {s, t}, b Gai, i [1, n]. For
Models a long strip region, actually it is easier to deploy sensors in a
series of accumulation points rather than to deploy them
randomly.
Lemma 2. For any accumulation point Ga = (Va,Ea) in a
barrier graph Gb = (Vb, Eb), if node A, B Ga, A and B
cannot be within a same barrier belt.
Proof: Use type III elimination if A, B are in the same
belt.
Figure 4. Barrier Graph and Coverage Graph
Lemma 3. For a long strip barrier coverage system that has
If a k-barrier coverage system is build under random an arbitrary shape, if it is based on accumulation point
point model, there are nr sensors deployed in the barrier model, for any accumulation point Ga, it has and only has
space with width 2R, where R is the sensing radius of a two neighbors.
sensor. Denote the activation rate as ρa = k/t, then the
overlap factor θr for the neighbor nodes is Proof: Use type I, II elimination for more neighbors.
Theorem 4. If a barrier coverage system is based on accu-

From Equ. (3), we get θr ≥ 1 − 1/t. When t > 2, θr > 1/2, we


know it will result in a type III elimination to schedule a
neighbor node to sleep. A barrier belt has two virtual terminal nodes, so the number
4.2 Independent Belt Model of vertices equals to the number of accumulation points plus
2, the number of edges equals to the number of
Independent Belt Model (IBM) for barrier coverage is a accumulation points plus 1.
sensor network whose nodes distributed along a belt region
according to several independent barrier belts: some are 4.3.2 Accumulation Degree and Accumulation
active belts, in which all of the nodes are working, and Deduction
others are backup belts, in which all of the nodes are Definition 5. Accumulation Degree An accumulation
sleeping. The assumption for IBM is that for the barrier degree is a metric that indicates how well the nodes are
coverage system, we can deploy sensors belt by belt, and
make these belts work independently. Here we assume the accumulated. We denote it as Akt , 0 ≤ k ≤ t. Here t is the
system has already been optimized by three types of total number of nodes in an accumulation point, and k is the
elimination. Each active belt uses the minimum number of number of active nodes required to meet the quality of
sensors. service.
4.3 Accumulation Point Model Specifically, A00 =ø, i.e. there is no sensor at all. A0t
4.3.1 Description of Model indicates that this accumulation point is a backup point. If
Definition 3. Accumulation Point An accumulation point is we use A0t to describe a barrier belt, then it will be a backup
a subgraph Ga = (Va, Ea) of a sensor network barrier graph belt.
Gb = (Vb,Eb), such that for ∀u Va, ∃v ∈ Vb such that
the distance duv < R iff v Va and the edge e uv ∉ E a .
(IJCNS) International Journal of Computer and Network Security, 27
Vol. 2, No. 10, 2010

Observation 1. For a barrier coverage system in a barrier have r = min(Rθ, R(1 − 2θ)/2). Let Rθ ≥ R(1 − 2θ)/2,we
know the permitted deploy region is a circle with radius r,
space, if it is constructed by n Akt accumulation points, then
then we can get Equ. (6).
the activation rate ρa = k/t.
Definition 6. Accumulation Deduction An accumulation 5. Comparison of the Barrier models
deduction is a decomposition and combination of an
accumulation degree, to make a conversion of a high 5.1 Connection Degree
accumulation degree to lower accumulation degrees and The connection degree for a sensor node A is the number of
vice versa, denoted as active nodes within the communication distance of A. Here,
the node we are referring is a normal node, not including
Let us look at an example: A35 = A23 + A12 = 3 A11 + 2 A10 . the virtual terminal nodes. We assume the communication
distance Rc ≥2R.
Here we know for a 3-barrier coverage system, we can use
3 Observation 2. For barrier coverage in k A11 + ( t − k ) A10
A5 APM in one barrier space. If we put them into two
independent belt model, the connection degree is at least 2.
barrier spaces, we can use A23 and A12 APM. We can also
Observation 3. For barrier coverage in Akt accumulation
use the IBM 3 A11 + 2 A10 . Here we have 3 A11 working belts, point model, the connection degree is at least 3k − 1.
and 2 A10 backup belts. As for each internal node A, it has two sets of neighbors,
each set has k active nodes. Also A has k – 1 brothers.
4.3.3 Analysis of Barrier Length
The barrier length of IBM and APM follows the same Observation 4. For barrier coverage in Rtk random point
schema. model, the connection degree is at least πk2/2.

Theorem 5. For a barrier coverage deployed in Akt Each node lies in a square (Equ. (2)). There are at least t
nodes in each cross path, k of them active. The nodes with
accumulation point model, the total number of nodes na =
least connection degree are the border nodes. We have
t・n, the overlap factor θ, then the barrier coverage length
(2R)2/2 (2R)2 = n/k2. So, we get n = πk2/2.
la = 2R(1−θ)n.
5.2 Network Lifetime
If the length is given, la = l, then the number of nodes na
required is If we do not concern the different roles of sensors, we can
assume all sensors’ lifetime is independent and follow the
same distribution. Considering a sensor’s lifetime is mainly
determined by battery, we can use the normal distribution to
From Equ. (3), it is easy to know that under the same
interpret the lifetime of a sensor node, with random variable
activation rate ρa = k/t, the same barrier length, the cost of
X to indicate a sensor node’s lifetime, the mean lifetime as
the RPM compared with the APM is
μ and variance σ, X ∼ N(μ, σ2).
The cumulative distribution function (cdf) is as follows:

4.3.4 Permitted Deployment Area


We assume there is no node waste. The sleep state of a
node also need to consume a little energy, so when a
working node depletes, a backup node can only work for a
time interval of (1− )μ. So the lifetime of Akt follows a
normal distribution of
Figure 5. Permitted Deploy Region for Accumulation Point
Model
Theorem 6. For a barrier coverage deployed in Akt
Accumulation point model with overlap factor θ, a
This can be rewritten as
permitted deploy region is a cycle with radius r,

Proof: First, it is easy to know if θ ≥ 1/2, then from type


III elimination there will be a node be eliminated, so it must Denote random variable Y as an accumulation point’s
be θ < 1/2. From Fig. 5, AB = 2Rθ. We know the minimal lifetime, then
distance between each pair of points in the neighboring
dotted
circles is dCD, from geometry dCD = 2R(1 − θ) − 2r ≥ R. And
the maximal distance is dEF = 2R(1 − θ) + 2r ≤ 2R. So, we Next let’s compute the lifetime of a whole belt of Akt .
28 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

Assume there are n accumulation points in the belt. Denote probability of a node’s lifetime defined in Equ. (7). Then
random variable Z as the lifetime of the belt. Then Fap,z(z)
={ the probability that Z ≤ z} = P(Z ≤ z). Denote py as the
probability of an accumulation point’s lifetime. Then

Assume there are n accumulation points in a belt, and


Theorem 7. The lifetime for a barrier in accumulation point denote a random variable Z as living time for a belt. Then
model is t (μ − Zασ)/k, 0 ≤ α ≤ 1. Zα is the z-value in Fap,z(z) = { the probability that Z ≤ z} = P(Z ≤ z). Denote py
standard normal cumulative probability table. to be the probability of an accumulation point’s living time
defined in Equ. (13). Then
Proof: Let us analyze the lower bound and upper bound
for the lifetime. Let P(Z ≥ z) = 1 − Fzp(z) = 1 − .

5.3.3 Random Point Model

A belt with an active rate ρa =k/t is denoted as Rtk .


5.3 Network Failure Compared with APM, which has n nodes in a belt, from
Equ. (5), RPM has nr = t(1−θ)n nodes in a belt. So we can
5.3.1 Independent Belt Model
use the living time of 2 Akt // 22 APM barrier belts as an
There are t belts, k of them are active belts, and t −k of them
approximation for the living time of RPM. We use a random
are backup belts, denoted as k A11 + ( t − k ) A10 . To ease the
variable Z to denote the living time of 2 Akt // 22 . Then Frp,z(z)
analysis, in this evaluation method, we assume backup belts
are the same with working belts, i.e. they are active, = {the probability that Z ≤ z} = P(Z ≤ z). Denote pz as the
although they do not really work; if one of them fails, we put probability of Akt // 22 belt’s living time. There are t(1 − θ)n
it into the statistic. The output of this evaluation is a failure
probability and network living time. We do not use the nodes in a barrier belt. Then
network living time as a real network lifetime, but the
failure probability we calculated here is a good
approximation of the real failure probability. Denote a
random variable Y as living time of a belt in IBM, and Fib(y)
= {the probability that Y ≤y} = P(Y ≤y). Denote px to be the
probability of living time for a node. Then

6. Building the Accumulation Point k-Barrier


Coverage
As for the whole barrier system of IBM, there are k active If a barrier space is deployed with sensors in APM, we can
belt, and t−k backup belt. We denote random variable Z as implement the building and scheduling algorithms locally
the living time of the whole barrier system. Denote Fib,z(z) = using an accumulation point protocol.
{the failure probability for Z ≤ z} = P(Z ≤ z). and py to be
the probability of living time for a belt, defined in Equ. (11). 6.1 Building Process
Then

Figure 6. After message “respond barrier edge”, the nodes


5.3.2 Accumulation Point Model B,C become new heads
To compute the failure probability, we need to know the Assume the localization of each node is known, using GPS
or other localization algorithms. After the sensors are
living time of an accumulation point Akt . We use a random deployed in the barrier space, each sensor denoted as A,
initializes a neighbor finding process. A broadcasts an “I am
variable Y to denote the living time of Akt . Then Fap,y(y) =
here” message, including its location, sensor id, current
{the probability that Y ≤y}=P(Y ≤y). We denote px to be the status (ready, work or sleep). From the definition of
(IJCNS) International Journal of Computer and Network Security, 29
Vol. 2, No. 10, 2010

accumulation point, we know that the neighbors and else {after a period pw, A cannot receive k messages
brothers of A can receive the broadcasting message. After a back}
node B received A’s “I am here” message, B can compute A invokes the barrier building process;
the distance dAB, end if
if dAB < R then In the above algorithm, we use a wake-up query scheme
A is B’s brother; instead of an activate scheme. The activate scheme is
else {dAB < 2R} unpractical considering the current technique [8]; if a sensor
A is B’s neighbor; went to sleep, we cannot wake it up unless the sensor wake
else up itself by a short period. In the wake up scheme, it is
discard this message; possible that during the sleep period of a node, there is a
end if brother node depleted. And so it is possible to exist an
After this process, each sensor will construct a list of interval that the belt degrades to (k − 1)-barrier coverage.
Let’s denote the period from a node begin to report
brothers. Therefore, a sensor can learn the value of t in Akt
depleting to the time it totally depletes as pd. If we set the
by itself. After the node find out the value of t, it will fixed sleep period ps = 2pd, and the random sleep delay dr
broadcast a message “my accumulation point”, including the [0, 2pd], then even in the worst case, that is, t degrades to
list of its brothers. Usually, a neighbor node can receive the k+1, only one brother node left as a backup node, the
“my accumulation point” message 2t times from its maximum possible degraded monitoring interval max(ps +
neighbors. It simply separates the neighbors to be the left dr − 2pd) = 2pd.
neighbors and right neighbors. This finishes our neighbor If we decrease ps, the maximum possible degraded
finding process. monitoring interval max(ps + dr − 2pd) can be decreased. For
When the system begins the building process, a node can k > 1, the wake-up time is not a problem for APM, since
be chosen randomly to be the Seed. The seed is informed the node switch in each accumulation point is done locally, even
value of k in Akt . The seed selects k −1 brothers from its if one belt degrades a little time due to node switch, the
other belts are still working. While in IBM, unless we
brother list to be the Heads of the barrier belts. After a node
assume nodes can be activated, or we use the wake-up
A is appointed to be the head, it backoffs a random time,
scheme and set dr to be very small, which will lose the
then broadcasts a “request barrier edge” message, if it can
benefit of saving energy when sleeping, the barrier domino
get the responses from left and right neighbors in a waiting
phenomenon will be explicit during belt switch. RPM does
time, we get to the next step, or else A will backoff another
not need belt switch either, so its wake up scheme is the
time.
same as that of APM.
For the first free left neighbor B that is waiting for
command, if it heard A’s “request barrier edge” message,
and the first free right neighbor to be C. The B,C will send
A a “respond barrier edge” message. A finds out that B,C
are the first left and right neighbors to respond, it will reply
an “accept” message to B,C respectively. Then B,C become
A’s barrier neighbors. After this process, B,C become the
new barrier heads (see Fig. 6), and each of them will repeat
the above steps. But this time, B,C only need to receive one
“respond barrier edge” message before it hands off the role
of barrier head. After a node finds that there are k brothers
become the barrier heads, and it is still free, then it will be
scheduled to sleep.
6.2 Sleep Schedule Figure 7. Network Lifetime for Barrier Coverage
There is no need for an accumulation belt to use belt Deployment Models
switch. Even if multiple barrier spaces are considered, e.g.
( A23 , A24 , A12 ). First, for this system, we can use A59 to

implement it. If we have to use ( A23 , A24 , A12 ), since in each


accumulation point, we have already set up backup nodes,
we still do not need belt switch. Instead, we need node
switch to change the role of nodes in an accumulation point.
The following is a sleep scheduling algorithm:
A redundant node A sleeps for ps plus a random delay dr;
A wakes up and broadcasts a ”query status” message;
Any working brothers of A response a ”status
information”; if one message indicates that the node is
depleting then A
Figure 8. Network Energy Residue Rate for Barrier
invokes the node switch process;
Coverage Deployment Models
30 (IJCNS) International Journal of Computer and Network Security,
Vol. 2, No. 10, 2010

7. Simulation Results the low quality sensors. This indicates APM is a very robust
and reliable structure. Even if the quality of the sensors are
To evaluate our analysis, we build a simulation platform not good and vulnerable to all kinds of failures, we can still
based on C++. We set the sensing radius R = 10m, maintain a good network service if we deploy sensors
communication radius Rc = 30m. Sensors are deployed in a according to APM.
belt region of 3000m, and for RPM and APM, the width of
the belt is 20m. As for IBM, the width is not fixed in order
8. Conclusions
to make sure different belt independent. The k is fixed to 3,
and t is a variable. The overlap factor θ = 0.1. The sensors’ Compared with existing models of barrier coverage -
mean lifetime μ = 400, the variance of lifetime σ = 20. We Random Point Model and Independent Belt Model, the
deploy different number of sensors, so that the node Accumulation Point Model is an economical, robust and
densities are different. Here the network energy residue rate reliable structure: its cost is the least, and the failure
ρr is a metric to measure how much energy remained when resistance is the best. The Accumulation Point Model is a
the barrier fails, long lived deployment model for sensor networks. Although
originated from barrier coverage, it is possible to use
Accumulation Point Model for area coverage. If we deploy
the accumulation points instead of single sensors, the fault
Fig. 7 indicates RPM needs more sensors to maintain a tolerance and network lifetime will definitely increase. This
certain network lifetime. When the number of sensors is will be more helpful than simply increase the node density.
lower than 1800, the network lifetime of RPM is zero. This
is because RPM needs a high node density to work. After the Acknowledgments
density reaches a threshold, RPM’s lifetime increase fast,
but it is still lower than IBM, while IBM’s network lifetime
This work is supported in part by the National Science
is lower than APM. In this experiment, we optimize the
Foundation under award number CT-ISG 0716261.
backup nodes and backup belts to sleep in order to save
energy and maximize the network lifetime. That is why the
network lifetime can be 3000 days for APM, nearly 9 years. References
[1] P. Balister, B. Bollobas, A. Sarkar, and S. Kumar.
Reliable density estimates for coverage and connectivity
in thin strips of finite length. In Proceedings of the 13th
annual ACM international conference on Mobile
computing and networking (MobiCom), pages 75–86,
NY, USA, 2007.
[2] Ai Chen, Santosh Kumar, and Ten H. Lai. Designing
localized algorithms for barrier coverage. In Proceedings
of the 13th annual ACM international conference on
Mobile computing and networking (MobiCom), pages
63–74, New York, NY, USA, 2007. ACM.
[3] Ai Chen, Ten H. Lai, and Dong Xuan. Measuring and
Figure 9. The Effect of Sensor Quality on Network Lifetime guaranteeing quality of barrier-coverage in wireless
sensor networks. In Proceedings of MobiHoc, pages 421–
The network energy residue rate in Fig. 8 is an indicator 430, NY, USA, 2008.
for the performance to price ratio. Low network residue rate [4] X. Cheng, X. Huang, and Xiang yang Li. Applications
indicates a High Performance to Price Ratio. APM’s residue of computational geometry in wireless networks, 2003.
ratio is the least, which means its waste is the least of all [5] Qunfeng Dong. Maximizing system lifetime in wireless
models. RPM has a higher residue rate than 50%. This sensor networks. In Proceedings of the 4th international
means when the network cannot meet the quality symposium on Information processing in sensor
requirement, only less than half of the whole energy networks (IPSN), page 3, Piscataway, NJ, USA, 2005.
consumed. The graph also indicates that when more sensors IEEE Press.
are deployed, the residue rate decreases as a tendency. [6] D.W.Gage. Command control for many-robot systems.
In the next experiment, we need to find out the network In AUVS-92, the Nineteenth Annual AUVS Technical
failure resistance ability of different deployment models. We Symposium, pages 28–34. Unmanned Systems
fix the number of sensors to be 3000, and change the sensor Magazine, 1992.
lifetime variance σ from 15 to 130 days, in order to indicate [7] J.A. Fuemmeler and V.V. Veeravalli. Smart sleeping
we use sensors with poor quality. All the other parameters policies for energy efficient tracking in sensor networks.
are the same as the first experiment. We find out that IBM’s In IEEE Transactions on Signal Processing, pages 2091–
lifetime deteriorates fast from 1800 to 0, even though the 2101, Washington, DC, USA, 2008. IEEE Computer
number of sensors remains the same (Fig. 9). As for RPM, Society.
although its lifetime is not long, only 390 at the beginning, [8] Rajagopal Iyengar, Koushik Kar, and Suman Banerjee.
it does not decrease so sharply as that of IBM. APM’ Lowcoordination topologies for redundancy in sensor
lifetime is the longest. It only decreases a little when using networks. In Proceedings of the 6th ACM international
(IJCNS) International Journal of Computer and Network Security, 31
Vol. 2, No. 10, 2010

symposium on Mobile ad hoc networking and computing


(MobiHoc), pages 332–342, NY, USA, 2005.
[9] S. Kumar, T.H. Lai, and A. Arora. Barrier coverage with
wireless sensors. Wirel. Netw., 13(6):817–834, 2007.
[10] Benyuan Liu, Olivier Dousse, Jie Wang, and Anwar
Saipulla. Strong barrier coverage of wireless sensor
networks. In MobiHoc ’08: Proceedings of the 9th ACM
international symposium on Mobile ad hoc networking
and computing, pages 411–420, New York, NY, USA,
2008. ACM.
[11] M. E. Posner S. Kumar, T. H. Lai and P. Sinha.
Optimal sleep wakeup algorithms for barriers of wireless
sensors. In Fourth International Conference on
Broadband Communications, Networks, and Systems,
Raleigh, NC, 2007.
[12] Xiaorui Wang, Guoliang Xing, Yuanfang Zhang,
Chenyang Lu, Robert Pless, and Christopher Gill.
Integrated coverage and connectivity configuration in
wireless sensor networks. In Proceedings of SenSys,
pages 28–39, NY, USA, 2003.
[13] Jerry Zhao and Ramesh Govindan. Understanding
packet delivery performance in dense wireless sensor
networks. In Proceedings of SenSys, pages 1–13, NY,
USA, 2003.

Author’s Profile

Yong (Yates) Lin is a Ph.D.


candidate in University of Texas at
Arlington. He received his M.S.
degree in Computer Science at
University of Science and Technology
of China in 2003. His research
interests include sensor network,
pervasive computing, robotics,
artificial intelligence, machine
learning.

Zhengyi Le received my Ph.D.


majored in Computer Science at
Dartmouth College. She received my
B.S. degree in Computer Science at
Nanjing University, China. Her
research interests include computer
security & privacy, recommendation
systems, collaboration systems, P2P
and sensor networks.

Fillia Makedon received a doctorate


in computer science from
Northwestern University in 1982.
She joined the faculty of the
University of Texas at Arlington in
2006. Between 1991 and 2006 she
has been a professor of Computer
Science and Chair of the Master
Program at Dartmouth College, in
the Department of Computer Science.

You might also like