Sensor deployment and target localization in distributed sensor networks
Summary (5 min read)
1. INTRODUCTION
- Distributed sensor networks (DSNs) are important for a number of strategic applications such as coordinated target detection, surveillance, and localization.
- The authors present the virtual force algorithm (VFA) as a sensor deployment strategy to enhance the coverage after an initial random placement of sensors.
- The VFA algorithm is based on disk packing theory [Locateli and Raber 2002] and the virtual force field concept from robotics [Howard et al. 2002].
- Based on the information received from the sensor and the knowledge of the sensor deployment within the cluster, the cluster head executes a probabilistic scoring-based localization algorithm to determine likely position of the target.
- The dimensions of the grid provide a measure of the sensor field.
3.1 Preliminaries
- For a cluster-based sensor network architecture, the authors make the following assumptions: —After the initial random deployment, all sensor nodes are able to communicate with the cluster head.
- —The cluster head is responsible for executing the VFA algorithm and managing the one-time movement of sensors to the desired locations ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- On the other hand, if a pair of sensors is too far apart from each (once again a predetermined threshold is used here), they exert positive forces on each other.
- This ensures that a globally uniform sensor placement is achieved.
- Figure 1 also illustrates the translation of a distance response from a sensor to the confidence level as a probability value about this sensor response.
3.2 Virtual Forces
- The authors now describe the virtual forces and virtual force calculation in the VFA algorithm.
- If more detailed information about the obstacles and preferential coverage areas is available, the parameters governing the magnitude and direction (i.e., attractive or repulsive) of these forces can be chosen ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- The threshold distance dth controls how close sensors get to each other.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- When sensor detection areas overlap, the closer the sensors are to each other, the higher is the coverage probability for grid points in the overlapped areas.
3.3 Energy Constraint on the VFA Algorithm
- In order to prolong the battery life, the distances between the initial and final position of the sensors are limited in the repositioning phase to conserve energy.
- The authors use dmax(si) to denote the maximum distance that sensor si can move in the repositioning phase.
- The cluster head uses the VFA algorithm to find appropriate sensor node locations based on the coverage requirements.
- No movements are performed during the execution of the VFA algorithm.
3.4 Procedural Description of the VFA Algorithm
- Figure 7 shows the data structure of the VFA algorithm, and Figure 8 shows the implementation details in pseudocode form.
- Due to the granularity of the grid and the fact that the actual coverage is evaluated by the number of grid points that have been adequately covered, the convergence of the VFA algorithm is controlled by a threshold value, denoted by c. Let us use c to denote the current grid coverage of the number iteration in the VFA algorithm.
- For the binary sensor detection model without the energy constraint, the upper bound value denoted as c̄ is kπr2; for the probabilistic sensor detection model or binary sensor detection model with the energy constraint, c is checked for saturation by defining c̄ as the average of the coverage ratios of the near 5 (or 10) iterations.
- Since these specific scenarios are extremely unlikely for random deployment, they are not considered in this paper.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
4. TARGET LOCALIZATION
- In order to conserve power and bandwidth, the message from the sensor to the cluster head is kept very small; in fact, the presence or absence of a target can be encoded in just one bit.
- Detailed information such as detection strength level, imagery, and time series data are stored in the local memory and provided to the cluster head upon subsequent queries.
- Based on the information received from the sensors within the cluster, the cluster head executes a probabilistic localization algorithm to determine candidate target locations, and it then queries the sensor(s) in the vicinity of the target.
4.1 Detection Probability Table
- After the VFA algorithm is used to determine the final sensor locations, the cluster head generates a detection probability table for each grid point.
- The binary string 110 denotes the possibility that s1 and s2 report a target but s3 does not report a target.
- For each such possibility d1d2d3 (d1, d2, d3 ∈ {0, 1}) for a grid point, the authors calculate the conditional probabilities that the cluster head receives d1d2d3 given that a target is present at that grid point.
- Note that the probability table generation is only a one-time cost.
4.2 Score-Based Ranking
- After the probability table is generated for all the grid points, localization is done by the cluster head if a target is detected by one or more sensors.
- When at time instant t, the cluster head receives positive event message from k(t) sensors, it uses the grid point probability table to determine which of these sensors are most suitable to be queried for more detailed information.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- The authors are using wxy(t) to filter out grid points that are not likely to be close to the actual target location.
4.3 Selection of Sensors to Query
- To select the sensor to query based on the event reports and the localization procedure, the authors first note that for time instant t, if kmax ≥ krep(t), then all reported sensors can be queried.
- When this happens, the authors calculate the score concentration by averaging ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- The grid point with the highest score (or the score concentration) is the most likely current target location.
- The selected sensors provide enough information in the subsequent stage to facilitate target identification.
- The results show that Sq(t) matches S̄q(t) in many cases.
4.4 Evaluation of Energy Savings
- The authors next evaluate the energy saved by the proposed probabilistic localization approach.
- The parameters T1, T2, and T3 denote the lengths of time involved in the transmission and reception, which are directly proportional to the sizes of data for yes/no messages, control messages to query sensors, and the detailed sensor data transmitted to the cluster head.
- Also, E is monotonically nondecreasing with time.
- Figure 12 shows the energy saved for the target trace in Figure 10.
4.5 Procedural Description for Target Localization
- Figure 13 shows the pseudocode of the procedure to generate the probability table for each grid point.
- For an n by m grid with k sensors, the computational complexity involved in generating the probability table is O(nm2k) since the maximum number of sensors that can detect a grid point is k for the worst case.
- Therefore, the computational complexity of the probabilistic localization algorithm is max{O, O(nm2k)} = O(nm2k).
- Even though the worst-case complexity of the localization procedure is exponential ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- In k, in practice, the localization procedure can execute in less time since the number of sensors that can effectively detect a target at a given grid point is quite small.
5. SIMULATION RESULTS
- The authors first present simulation results obtained using the VFA algorithm.
- The simulation results for the probabilistic localization algorithm are then presented using the sensor locations from the VFA algorithm as inputs.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- TargetTrace starts from tstart and ends at tend, with time unit as 1.
- The deployment requirements include the maximum improvement of coverage over random deployment, the coverage for preferential areas, and the avoidance of obstacles.
5.1 Case Study 1: Binary Sensor Detection Model
- Figures 15–18 present simulation results based on the binary sensor detection model.
- Figure 16 shows the final sensor positions determined by the VFA algorithm.
- For the binary sensor detection model, an upper bound on the coverage is given by the ratio of the sum of the circle areas (corresponding to sensors) to the total area of the sensor field.
- For their example, this upper bound evaluates to 0.628 and it is achieved after 28 iterations of the VFA algorithm.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
5.2 Case Study 2: Probabilistic Sensor Detection Model
- Figures 19–21 present simulation results for the probabilistic sensor model.
- Figure 20 shows the final sensor positions determined by the VFA algorithm.
- Shows the improvement of coverage during the execution of the VFA algorithm.
- For the probabilistic sensor detection model, even though there are a large number of grid points that are covered, the overall number of grid points with coverage probability greater than the required level is fewer.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
5.3 Case Study 3: Sensor Field with a Preferential Area and an Obstacle
- Preferential areas should be covered first, therefore they are modeled as attractive force sources in the VFA algorithm.
- Figure 25 shows the virtual movement traces of all sensors during the execution of the VFA algorithm.
- For case study 2, the VFA algorithm took only 3 min to complete 50 iterations.
- ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- CPU time is important because sensor redeployment should not take excessive time.
5.4 Case Study 4: Probability-Based Target Localization
- The authors evaluate the localization algorithm using the results produced by the VFA algorithm in the sensor deployment stage.
- The authors assume that a maximum of two sensors can be selected for querying by the cluster head.
- There are total of 82 such moves in the simulated target movement trace.
- The parameter E(t) shows the energy saved by ACM Transactions on Embedded Computing Systems, Vol. 3, No. 1, February 2004.
- The localization algorithm for the detection event at time instant t. Figure 29 shows the estimated target location based on the grid point with the highest score.
5.5 Discussion
- From the simulation results, the authors see that the VFA algorithm improves the sensor field coverage considerably compared to random sensor placement.
- The results of the proposed energy-conserving target localization method also show that considerable energy is saved in localizing a target.
- The authors found that the algorithm converged more rapidly for their case studies if wR wA.
- The sensor placement strategy is centralized at the cluster level since every cluster head makes redeployment decisions for the nodes in its cluster.
- The VFA algorithm however is also applicable for alternative location indicators, distance measures, and models of preferential areas and obstacles.
6. CONCLUSION
- The authors have proposed the virtual force algorithm (VFA) as a practical approach for sensor deployment.
- The authors have also shown that the proposed probabilistic localization algorithm can significantly reduce the energy consumption for target detection and location.
- The VFA algorithm can be made more efficient if it is provided with the theoretical bounds on the number of sensors needed to achieve a given coverage threshold.
- Finally, the authors will examine continuous coordination systems instead of discrete coordination systems in this work.
Did you find this useful? Give us your feedback
Citations
508 citations
Cites background or methods from "Sensor deployment and target locali..."
...Based on the probabilistic sensing model, the notion of probabilistic coverage [74] of a point P(xi , yi ) by a sensor si is defined as follows:...
[...]
...This binary disc sensing model can be extended to a more realistic one, called the probabilistic sensing model [74], as illustrated in Fig....
[...]
...Similar to the potential field-based approach, a sensor deployment technique based on virtual forces is proposed in [74] and [73] to increase the area coverage after an initial random deployment....
[...]
...Since a point might be covered by multiple sensors at the same time, each contributing a certain value of coverage, the concept of total coverage of a point is also defined as follows [74]....
[...]
507 citations
Cites background or methods from "Sensor deployment and target locali..."
...2002; Dhillon and Chakrabarty 2003; Zou and Chakrabarty 2004b; Zhang et al. 2006; Stolkin et al. 2007; Stolkin and Florescu 2009]....
[...]
...Another truncated attenuated disk model [Zou and Chakrabarty 2004a] is de.ned as ....
[...]
...Many variants of the simple GREEDY-SET-COVER algorithm have been proposed to solve various node placement problems [Dhillon et al. 2002; Dhillon and Chakrabarty 2003; Zou and Chakrabarty 2004b; Wang and Zhong 2006; Xu and Sahni 2007; Fang and Wang 2008; Wang 2008]....
[...]
323 citations
Additional excerpts
...Virtual force [70] Deploy nodes ✓ ✓ ✓...
[...]
311 citations
295 citations
References
17,102 citations
4,123 citations
1,837 citations
1,785 citations
1,547 citations
"Sensor deployment and target locali..." refers background in this paper
...Finally, there exists a close resemblance between the sensor placement problem and the art gallery problem (AGP) addressed by the art gallery theorem [O’Rourke 1987]....
[...]
Related Papers (5)
Frequently Asked Questions (12)
Q2. What have the authors stated for future works in "Sensor deployment and target localization in distributed sensor networks" ?
Their future work will be focused on overcoming the current limitations of the VFA algorithm. Since the current target localization algorithm considers only one target in the sensor field, it is necessary to extend the proposed approach to facilitate scenarios for multiple objects localization. Extensions to nonmobile sensor nodes and situations of sensor node failures will also be considered in future work. The VFA algorithm can be made more efficient if it is provided with the theoretical bounds on the number of sensors needed to achieve a given coverage threshold.
Q3. How is the message from the sensor to the cluster head kept small?
In order to conserve power and bandwidth, the message from the sensor to the cluster head is kept very small; in fact, the presence or absence of a target can be encoded in just one bit.
Q4. Why is the sensor detection model modeled probabilistically?
because of the inherent uncertainty associated with sensor readings, sensor detection must be modeled probabilistically [Dhillon et al. 2002].
Q5. What is the energy constraint for the binary sensor detection model?
For the binary sensor detection model without the energy constraint, the upper bound value denoted as c̄ is kπr2; for the probabilistic sensor detection model or binary sensor detection model with the energy constraint, c(loops) is checked for saturation by defining c̄ as the average of the coverage ratios of the near 5 (or 10) iterations.
Q6. What is the underlying assumption for a cluster-based sensor network architecture?
For a cluster-based sensor network architecture, the authors make the following assumptions:—After the initial random deployment, all sensor nodes are able to communicate with the cluster head.
Q7. What is the effect of cluster-based distributed sensor networks?
The effectiveness of cluster-based distributed sensor networks depends to a large extent on the coverage provided by the sensor deployment.
Q8. What is the point where the target starts to move?
The target starts to move at t = tstart from the grid point marked as “Start” and finishes at t = tend at the grid point marked as “End.”
Q9. What is the probability table for the detection of a target?
After the VFA algorithm is used to determine the final sensor locations, the cluster head generates a detection probability table for each grid point.
Q10. What is the probability that the grid point is covered?
Since the term (1 − cx, y (si))(1 − cx, y (sj )) expresses the probability that neither si nor sj covers grid point at (x, y), the probability that the grid point (x, y) is covered is given by Equation (5).
Q11. What is the upper bound for the coverage of the binary sensor detection model?
For the binary sensor detection model, an upper bound on the coverage is given by the ratio of the sum of the circle areas (corresponding to sensors) to the total area of the sensor field.
Q12. What is the probability that the grid points are covered?
Note that in both cases, the coverage is effective only if the total area kπr2 that can be covered with the k sensors exceeds the area of the grid.