• No results found

A Type of Virtual Force based Energy-hole Mitigation Strategy for Sensor Networks

N/A
N/A
Protected

Academic year: 2021

Share "A Type of Virtual Force based Energy-hole Mitigation Strategy for Sensor Networks"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

(1)

Journal. This paper has been peer-reviewed but does not include the final

publisher proof-corrections or journal pagination.

Citation for the published paper:

Sha, Chao; Ren, Chunhui; Malekian, Reza; Wu, Min; Huang, Haiping; Ye,

Ning. (2019). A Type of Virtual Force based Energy-hole Mitigation Strategy

for Sensor Networks. IEEE Sensors Journal, p. null

URL: https://doi.org/10.1109/JSEN.2019.2945595

Publisher: IEEE

This document has been downloaded from MUEP (https://muep.mah.se) /

DIVA (https://mau.diva-portal.org).

(2)

1

Abstract—In the era of Big Data and Mobile Internet, how to

2

ensure the terminal devices (e.g., sensor nodes) work steadily for 3

a long time is one of the key issues to improve the efficiency of 4

the whole network. However, a lot of facts have shown that the 5

unattended equipments are prone to failure due to energy 6

exhaustion, physical damage and other reasons. This may result 7

in the emergence of energy-hole, seriously affecting network 8

performance and shortening its lifetime. To reduce data 9

redundancy and avoid the generation of sensing blind areas, a 10

type of Virtual Force based Energy-hole Mitigation strategy 11

(VFEM) is proposed in this paper. Firstly, the virtual force 12

(gravitation and repulsion) between nodes is introduced that 13

makes nodes distribute as uniformly as possible. Secondly, in 14

order to alleviate the "energy-hole problem", the network is 15

divided into several annuluses with the same width. Then, 16

another type of virtual force, named "virtual gravity generated 17

by annulus", is proposed to further optimize the positions of 18

nodes in each annulus. Finally, with the help of the "data 19

forwarding area", the optimal paths for data uploading can be 20

selected out, which effectively balances energy consumption of 21

nodes. Experiment results show that, VFEM has a relatively 22

good performance on postponing the generation time of 23

energy-holes as well as prolonging the network lifetime 24

compared with other typical energy-hole mitigation methods. 25

26

Index Terms—Sensor Networks, Virtual Force, Energy-hole

27

Mitigation, Path Selection, Node Position Optimization 28

29

I. INTRODUCTION 30

owadays, a large number of intelligent terminals have

31

been widely deployed in our living environment. It

32

seems that the viewpoint, "every grain of sand is a computer",

33

proposed by Mark Weiser [1] is gradually becoming a reality.

34

However, the energy issue is still an important fetter in the

35

whole Internet of Things, especially in the development of

36

Wireless Sensor Networks (WSNs). Since the battery

37

powered nodes are constrained in energy resource, it is crucial

38

to prolong the network lifetime of sensor network [2]. On the

39

Manuscript received February XX, 2019; revised XX XX, 20XX; accepted XX XX, 20XX. Date of publication XX XX, 20XX; date of current version XX XX, 20XX. This work was supported in part by the National Natural Science Foundation of P.R. China (61872194, 61872196), Jiangsu Natural Science Foundation for Excellent Young Scholar (BK20160089), Six Talent Peaks Project of Jiangsu Province (JNHB-095), “ 333 ” Project of Jiangsu Province, Qing Lan Project of Jiangsu Province, Innovation Project for Postgraduate of Jiangsu Province (SJCX18_0295) and 1311 Talents Project of Nanjing University of Posts and Telecommunications.

C. Sha, C. H. Ren, M. Wu, H. P. Huang and N. Ye are with the School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China, 210003 (e-mail: shac@njupt.edu.cn)

R. Malekian is with the Department of Computer Science and Media Technology, Malmö University, Malmö, 20506, Sweden.

other hand, many important properties of the network such as

40

coverage, connectivity, data fidelity, and lifetime are also

41

affected by the way nodes are deployed [3-4]. In general,

42

nodes are deployed randomly or in a pre-planned manner in

43

an area called ROI (Region Of Interest). Whatever the

44

deployment method is adopted, once the network starts to run,

45

nodes may die due to hardware failures (including physical

46

damage), energy depletion, or even a small embedded

47

software bug, resulting in energy-holes [5]. The so-called

48

"energy-hole" is an area that can no longer be perceived by

49

any node (apparently, the nodes that could have monitored the

50

area are dead). In theory, the generation time and position of

51

energy-holes are often uncertain in a network with randomly

52

deployed nodes. If there are no energy replenishment, the

53

energy-holes will inevitably appear, and their scope will

54

continue to expand.

55

On the other hand, as energy consumption is exponentially

56

increased with the communication distance according to the

57

energy consumption model, multi-hop communication is

58

beneficial to data gathering for energy conservation. However,

59

such a network structure is not without problems. Since the

60

nodes close to the Sink need to forward data from other nodes

61

in the same cluster, they exhaust their energy quickly, leading

62

to an energy-hole around the Sink [6]. In this case, the

63

network will be gradually divided into more and more areas

64

that can not communicate with each other, resulting in rapid

65

failure of the entire system. Wu et al. [7] also proposed that

66

the lifetime of a uniformly deployed sensor network is mainly

67

limited by the availability of nodes around the Sink.

68

No more data can be delivered to the Sink after an

69

energy-hole appears [8-9]. In addition, nodes near these

70

energy-holes are required to bear the data load of those death

71

nodes so that the energy consumption level of them increases

72

more rapidly [10-12]. More importantly, all these phenomena

73

happen earlier than we expected. As a result, when the

74

energy-holes appear, the residual energy of most of the alive

75

nodes is relatively high. How to make full use of these nodes

76

and do everything possible to postpone the generation time of

77

energy-hole as well as to mitigate the adverse effects of it is

78

worth studying. Perillo et al. [13] first analyzed in what

79

condition the energy-holes appears. Olariu et al. [14] then

80

proved that the energy-hole inevitably appear in sensor

81

network. Many researchers regard that most of the

82

energy-holes locate around the Sink [15-16]. So, they have

83

put forward some energy-efficient routing protocols to try to

84

balance work load between nodes. Moreover, energy

85

consumption balance is also a key metrics impacting on the

86

performance of sensor network [17]. One of the most efficient

87

methods to achieve energy balance is to optimize the

88

deployment and configuration of the network. In addition, the

89

n

A Type of Virtual Force based Energy-hole

Mitigation Strategy for Sensor Networks

Chao Sha, Chunhui Ren, Reza Malekian, Senior member, IEEE, Min Wu, Haiping Huang, Member, IEEE, Ning Ye

(3)

sleep scheduling and the alternate working strategies for

1

nodes are also effective ways to postpone the generation time

2

of energy-holes and prolong the network lifetime. However, if

3

the distribution of nodes is non-uniform, the implementation

4

effect of the above strategies will be greatly reduced.

5

Therefore, "energy-hole mitigation" is in fact a multi-stage

6

collaborative optimization process.

7

II. RELATEDWORKS 8

With the advent of the era of super-large-scale ubiquitous

9

interaction, how to maximize system lifetime and balance

10

network energy consumption without human intervention has

11

become the most urgent problem in WSN. In order to alleviate

12

the energy-hole problem, scholars have carried out many

13

targeted researches from the following aspects.

14

A. Non-uniform Node Distribution on Mitigating the

15

Energy-hole Problem

16

In WSNs, the energy consumption on transmission is

17

nearly proportional to the fourth power of the hop distance,

18

when it is large. For this reason, Jia et al. proposed an optimal

19

deployment scheme for the relay nodes to solve the problem

20

of excessive energy consumption on long-distance data

21

uploading in large-scale networks [18]. Near the center of the

22

network, the node whose distance from the Sink meets certain

23

criteria was regarded as a relay. When the residual energy of

24

the edge node was lower than the threshold, it chose the most

25

suitable relay node to forward its data. Obviously, the

26

selection strategy of relay nodes directly effects the

27

generation time of energy-holes.

28

In [19], Nguyen et al. accurately calculated out the position

29

and area of the energy-hole. Then, the outer polygon of this

30

energy-hole was constructed, and the active nodes around this

31

polygon all received the message about this energy-hole. As a

32

result, data packets can be transmitted along the periphery of

33

this energy-hole, which minimizes the packet loss rate and

34

maintains the throughput of the network. However, this

35

method increases the data transmission delay.

36

A type of three-layer based network consisting of a static

37

Sink, some static sensor nodes and several proxy nodes was

38

proposed in [20]. In order to achieve energy balance, the

39

initial energy of these two types of nodes was set to different

40

values. With the help of the mobile proxy nodes deployed

41

randomly near the network center, this method effectively

42

postpones the generation time of energy-holes near the static

43

Sink. However, in areas far from the center, there were still

44

many dead nodes. With the deepening of research, people

45

gradually find that the relationship between energy-holes and

46

network coverage scheduling is more obvious. For example,

47

for a static network, its coverage often depends on how to

48

reasonably select several optimal and minimum active node

49

sets. Only the nodes in one of the active node sets need to

50

monitor the network while the rest of them can sleep, which

51

greatly reduces energy consumption of the whole network.

52

Sun et al. pointed out that as long as the node sets are

53

reasonably selected, it can ensure that the energy-holes do not

54

appear for a long time [21].

55

Furthermore, Kacimi et al. discussed the load balancing

56

techniques to mitigate energy-hole problem in large-scale

57

WSNs, and proposed a distributed heuristic solution to

58

balance energy consumption of nodes by adjusting their

59

transmission power [22]. However, it is unrealistic to

60

frequently change the data transmission power of nodes.

61

Moreover, this is also easy to increase the energy

62

consumption of nodes. While Liu et al. pointed out that the

63

deployment density of nodes in the network should be

64

inversely proportional to the distance between them and Sink

65

[23]. On the basis of this theory, they accurately calculated

66

out the First Node Die Time (FNDT) and All Nodes Die Time

67

(ANDT). This is also the basis of the network model proposed

68

by our algorithm.

69

B. Achieving Energy Consumption Balance with the help of

70

Mobile Sink

71

Recently, many studies have shown that the energy-hole

72

problem can be effectively mitigated by using one or more

73

mobile Sinks [24].

74

Zhang et al. [25] proposed an optimal cluster-based

75

strategy to achieve load balancing in data collection with the

76

help of several mobile Sinks. Moreover, the Rendezvous

77

Points (RPs) and Rendezvous Nodes (RNs) were then

78

introduced to further reduce time delay. However, the

79

network topology in this method can never be changed

80

anymore, which is often unrealistic.

81

To enhance the network coverage and minimize the sensing

82

redundancy, Sahoo et al. proposed a distributed energy-hole

83

repair method [26]. According to their locations, nodes were

84

classed into three categories, that were cross triangle node,

85

hidden cross triangle node, and non-cross triangle node.

86

Through the interaction between different types of nodes,

87

high coverage redundancy areas and energy-holes were found

88

out. Subsequently, several nodes located in the high coverage

89

redundant area were moved to the location of the

90

energy-holes to repair them. Obviously, this method can

91

reduce the probability of energy-holes to some extent by

92

adjusting the network topology, but its real-time performance

93

still needs to be improved.

94

In [27], the author tried to solve the energy-hole problem

95

by using some mobile relay nodes. The network is divided

96

into several clusters with different sizes, and each "relay

97

node" is responsible for uploading the sensing data of several

98

clusters to Sink. That is to say, the relay node is a mobile data

99

collector relative to the "sub-region" composed of several

100

clusters. This algorithm is very suitable for event-driven

101

networks or networks that need continuous data transmission.

102

With the help of these "mobile relay nodes", the energy

103

efficiency as well as load balance of the whole network have

104

been greatly improved. However, this method relies too much

105

on "relay nodes". Once these relay nodes fail or their data

106

forwarding efficiency is low, some nodes (especially the

107

cluster header nodes) will prematurely die, resulting in the

108

energy-holes.

109

Abo-zahhad et al. used the clustering mechanism combined

110

with one mobile Sink to alleviate the energy-hole problem

111

[28]. Based on the adaptive immune algorithm of energy

(4)

dissipation, they calculated the optimal number of cluster

1

heads. Then, the trajectory of the mobile Sink was also

2

obtained, which can reduce the burden of cluster heads to a

3

certain extent and postpone the generation time of

4

energy-holes. However, this method did not fundamentally

5

solved the problem of unbalanced energy consumption of

6

nodes.

7

In the era of mobile Internet, more and more scholars point

8

out that besides Sink or relay nodes, other nodes should also

9

be able to move in WSNs. They believe that after being

10

deployed, nodes can move freely to the area where the

11

energy-holes appear, so that those holes can be repaired. In

12

this case, how to select out the appropriate nodes to repair the

13

holes and how to move these nodes to the right position are

14

two critical issues. One of the feasible solutions is to use the

15

"virtual force". Adjacent nodes can exert attractive or

16

repulsive force to each other. For non-adjacent nodes, there is

17

no virtual force between them. However, most of the current

18

researches on virtual force are still in the conceptual stage. In

19

these works, the magnitudes of virtual force between nodes

20

are not quantified according to the specific network structure.

21

In this paper, the distance between nodes in specific network

22

structure is fully analyzed, and two kinds of quantification

23

models for the virtual force are described. On this basis, the

24

network topology is optimized that can mitigate the

25

energy-hole problem.

26

C. Mitigating the Energy-hole Problem in Circular Network

27

Although the shape of Wireless Sensor Network is various

28

in real scenarios, it can be abstracted as a circular network

29

whether it is a cluster based structure or a multi-hop network

30

structure. In this section, we introduce the energy-hole

31

mitigation strategies in the circular network.

32

In [29], a circular network is divided into several annuluses

33

at first, and then each annulus is divided into smaller sectors.

34

The authors proved that this logical partition method can

35

reduce the probability of energy-holes. However, this method

36

did not take into account the distance between the node and

37

cluster head in the real scene, which may result in high energy

38

consumption.

39

A type of Wireless Sensor Network Energy Hole Alleviating

40

(WSNEHA) algorithm was proposed in [30]. The network was

41

divided into several annuluses with the same width, as shown

42

in Figure 1. A static Sink was located in the center of the

43

network, and nodes were evenly distributed in each annulus.

44

For each node in the second annulus, according to the

45

real-time energy consumption rate of all its possible

46

successors, the most suitable one was selected as its

47

forwarding node. Thus, the load of each node in the innermost

48

annulus can be balanced. On this basis, Jan et al. [31] further

49

discussed the load balancing problem of nodes in each

50

annulus, and its network structure is shown in Figure 2. In this

51

model, nodes were randomly distributed in each annulus.

52

Based on distance and energy constraints, each node adopted

53

the minimum bit error rate transmission strategy to select its

54

next hop forwarder. However, neither method mentioned

55

above is flexible enough. In the case of dense deployment of

56

nodes, their effect on mitigating energy-holes is not obvious.

57

58

Fig. 1. Network model of WSNEHA [30]. 59

60

Fig. 2. Network model proposed in [31]. 61

Wu et al. [7] pointed out that in a circular network with

62

non-uniform distribution of nodes and constant data

63

uploading rate, the phenomenon of unbalanced energy

64

consumption of nodes is unavoidable. However, if the number

65

of nodes can be increased from the outer annulus to the inner

66

one layer by layer according to geometric series, the

67

energy-hole problem may be avoided to some extent. For this

68

reason, they proposed a non-uniform node deployment

69

strategy and obtained the proportional relationship between

70

the number of nodes in the adjacent annulus. However, there

71

were too many nodes deployed near the network center,

72

which easily causes a lot of coverage redundancy.

73

D. Using Energy Replenishment Technology to Prevent the

74

Appearance of Energy-holes

75

All the methods mentioned above can not fundamentally

76

eliminate the energy-hole, and they can only postpone the

77

time it appears. In recent years, the continuous improvement

78

of Wireless Energy Transfer (WET) technology has made it

79

possible to replenish energy to the ubiquitous sensor nodes by

80

a non-contact way, that is, Wireless Rechargeable Sensor

81

Networks (WRSNs). For most of the energy replenishment

82

strategies, one or more Mobile Wireless Charger (MWC) are

83

often employed to periodically recharge all nodes along some

84

fixed trajectories, or they only recharge the nodes on demand

85

when randomly walking. In this way, as long as the nodes are

86

able to be charged in time before death, the energy-hole can

87

be eliminated theoretically.

88

Wang et al. [32] divided the network into annuluses to

89

alleviate the “energy-hole problem”. The recharging

90

threshold was set for each node depending on its energy

91

consumption rate and the length of the request queue, which is

92

more reasonable for large-scale networks. Moreover, the

93

recharging order of nodes was obtained by constructing a

94

Minimum cost Spanning Tree (MST) covering all nodes in

95

the recharging request queue. In this way, they can achieve a

(5)

relatively high recharging profit. However, the recharging

1

threshold in all these preceding works was mainly determined

2

by node’s energy, which failed to intuitively reflect the

3

residual lifetime of a node.

4

Zhu et al. [33] strictly limited the battery capacity of WCV

5

and proposed a type of Node Failure Avoidance Online

6

Charging scheme (NFAOC) based on node’s real-time energy

7

consumption rate. Nodes which cause the smallest number of

8

dead nodes is selected as the next recharging object, thereby

9

assuring high recharging efficiency. It should be pointed out

10

that this strategy tends to fall into local optimum during the

11

path construction phase, which reduces the number of nodes it

12

can serve. Therefore, it can not completely eliminate the

13

energy-hole.

14

In order to make MWC charge more nodes in a limited time,

15

Xu et al. [2] assumed that the actual energy required by the

16

node should be evenly replenished during multiple recharging

17

rounds. That is to say, only a part of energy need to be

18

replenished to node each time. Although this method

19

increases the number of nodes that a MWC can serve, it also

20

accelerates the scheduling frequency as well the energy

21

consumption rate of the MWC.

22

Although WRSN plays a positive role in alleviating the

23

energy-hole problem, it is also undeniable that the cost of the

24

wireless mobile charger is relatively higher and the

25

scheduling algorithm is a little complex. In addition, the

26

moving speed as well as the charging efficiency of WMC are

27

low. All these factors make it impossible for such methods to

28

completely prevent the generation of energy-holes.

29

On the basis of the above researches, we propose an

30

energy-hole mitigation strategy with the help of two kinds of

31

virtual force. Contributions of this paper can be concluded as

32

follows.

33

Firstly, under the action of virtual gravitation and repulsion

34

force, nodes are uniformly distributed in the network which

35

ensures that no blind area of perception appear during a long

36

time.

37

Secondly, position of each node is further optimized with

38

the help of the "virtual gravity generated by annulus". This

39

not only reduces the load of nodes near the center but also

40

ensures the coverage of the whole network.

41

Finally, nodes are classified into two categories, which are

42

responsible for sensing and data forwarding, respectively.

43

The optimal number of each kind of nodes located in each

44

annulus and the weights of all possible data uploading paths

45

in the "data forwarding area" are calculated out for path

46

selection. This further balance energy consumption on data

47

uploading.

48

The remainder of this paper is organized as follows. The

49

related works are described in section II. And the network

50

model as well as the virtual force based energy-hole

51

mitigation method are described in section III. Experimental

52

results of VFEM are shown in section IV and the conclusion

53

is provided in the last section.

54

III. METHOD DESCRIPTION

55

A. Network Model

56

It is assumed that N sensor nodes are randomly deployed in

57

a circular region whose radius is R. The base station B is

58

located at the center of network. According to [7], both the

59

maximum communication radius and maximum sensing

60

radius of each node are the same (the value of them is defined

61

as r). The initial topology after deployment is shown in Figure

62

3, in which the sensing data can be sent to the base station via

63

one-hop or multi-hop transmission.

64

65

Fig. 3. Nodes are randomly deployed in the circular network. 66

Without loss of generality, the energy dissipation model

67

adopted by VFEM is the same as that in [7] and [34], as

68

shown in Figure 4.

69

70

Fig. 4. Energy dissipation model [30]. 71

In formula (1) and (2), Esend and Erec are the energy 72

consumption of one node during its sending and receiving

73

phase. Eelecis the unit energy consumption of the circuit. εfsand 74

εamp are the signal amplifier in the free space and multi-path 75

fading environment, while d'= e efs amp denotes the threshold 76

distance.

77

To transmit a c-bit message a distance d, the radio expends

78 2 4 ' ( , ) ' elec fs send elec amp cE c d d d E c d cE c d d d e e ì + < ï = í + ³ ïî (1) 79

And to receive this message, the radio expends

80

( )

rec elec

E

c

=

cE

(2)

81

B. Node Position Adjustment Based on Virtual Force

82

between Sensors

83

Generally speaking, random deployment is easy to realize

84

in sensor network. However, uneven distribution of nodes in

85

the network could easily cause data redundancy and

86

perceptual holes. On the other hand, the long hop distance

87

between nodes may cause unbalanced energy consumption on

88

communication, and this also shorten the network lifetime.

(6)

Thus, the primary goal of VFEM is to make nodes distribute

1

as uniformly as possible.

2

According to [28], if sensor nodes can be finally deployed

3

as the structure shown in figure 5, the network is regarded as

4

to achieve a nearly uniform distribution. The black dots are

5

the ideal positions of nodes, while the hexagon in this figure is

6

the actual sensing region of each node when no coverage hole

7

appears. We can see that the area composed by all the regular

8

hexagons cover the whole network. In this case, the density of

9

nodes (defined as ρ) is 2

2 3 3l [28]. l is the length of each

10

regular hexagon and it is not difficult to know that,

11

(

)

2 3 3 1 l=

p

N+ R. 12 13

Fig. 5. Nodes are uniformly deployed in the circular network. 14

Nowadays, people have made a lot of efforts on improving

15

both the distribution of nodes in network and optimizing the

16

network topology [7, 13]. Node’s position adjustment with

17

the help of virtual force is one of the effective strategies. The

18

concept of virtual force was first proposed in path planning

19

and barrier avoidance for robots. Then, it was introduced to

20

Wireless Sensor Networks to try to solve the coverage

21

enhancement problem. The basic idea of virtual force is to

22

assume each node as charge so that it will obtain virtual force

23

from other nodes. With the effect of this virtual force, nodes

24

may move to other positions and finally achieve equilibrium

25

on force which ensures full coverage of the network.

26

Thus, in VFEM, it is regarded that one node has virtual force

27

(gravitation and repulsion) with another one when the distance

28

between them meets certain constraints. With the help of these

29

virtual force, nodes can move within the network (there is

30

friction between node and ground) and finally reach to a

31

stationary state in which the distance between two adjacent

32

nodes is nearly equal to l. Here, we take two sensor nodes (Si 33

and Sj) as an example to describe the definition of virtual force 34

in VFEM.

35

1) When

0

3l-d £dij£ 3l, it is assumed that, there is no

36

force between Si and Sj. dij is the Euclidean distance 37

between Si and Sj. Moreover, to avoid nodes’ repeated 38

movement that is caused by virtual force, d0is introduced 39

as the buffering distance and d

(

0,3 2l

)

.

40

2) If dij< 3l-d0, it is obvious that, the distance between Si 41

and Sj is short. To make the nodes approach the state of 42

uniform distribution as shown in Figure 5, Siand Sjneed to 43

get away from each other. Thus, there is only repulsion

44

force between Siand Sjin this case, and the value of this 45

force is η/dijβ. η is defined as the coefficient of this repulsion 46

and β is an adjustable parameter. Values of η and β are

47

described in the experimental section.

48

3) When 3l<dij<2 3l-d0, the distance between Siand Sj 49

could be considered a little long. Similarly, to make the

50

nodes approach the state of uniform distribution, Siand Sj 51

need to get close to each other. Therefore, there is only

52

gravitation force between Si and Sj in this case, and the 53

value of this it is set to λdijβ. λ is the coefficient of this 54

gravitation.

55

4) If 2 3

ij

d ³ l, it is known that, the distance between Siand 56

Sjis too long. So, there is no force between these two 57

nodes.

58

We use Fji to mark the virtual force from Sj to Si. In 59

summary, we can get

60 0 0 0 3 3 2 3 0 3 3 2 3 ij ij ji ij ij ij ij d d l d F d l d l d l d d l or d l b b h l ì < -ï ï =í < < -ï ï - < £ ³ î (3) 61

It is worth mentioning that, the base station is regarded as a

62

common sensor node, and it generates repulsion and gravitation

63

to other nodes. However, to ensure that the location of B does not

64

get change, we assume that the base station is not acted upon by

65

the virtual force generated by other nodes.

66

What’s more, to avoid nodes moving out of the network,

67

the network boundary exists repulsive force to Si(marked as 68

Fbi) in a certain range. The direction of Fbipoints to the center 69

of network and the value of it is defined as follows.

70

(

)

(

)

(

)

(

)

, 0 , 0 , i i bi i d b S d b S l F d b S l t h ì £ £ D ï = í ï > D î (4) 71

In formula (4), d(b,Si) is the shortest distance between Si 72

and the network boundary. Thus, d(b,Si)=R-d(B,Si). (d(B,Si) is 73

the Euclidean distance between base station B and node Si). In 74

addition, Δl is an adjustable distance, and Δl<<l.

75

Moreover, from the above analysis, it is easy to know that,

76

the minimum gravitation and repulsion force between two

77

nodes are l

(

3l

)

b and

(

3l d0

)

b

h - , respectively. The

78

minimum repulsion force generated from the network

79

boundary to the node is η/(Δl)τ. Therefore, to make the nodes

80

approach the state of uniform distribution, the friction f ought

81

to be smaller than the minimum value of virtual force. That is,

82

(

)

(

)

( )

(

3 , 3 0 ,

)

f <Min l l b h l-d b h Dl t (5) 83

Thus, the resultant force acting on Sicould be expressed as 84 follows. 85

(

)

1, N i ji bi j j i F S F F f = ¹ =

å

+ +

uuuuuur uur uur ur

(6)

86

So, when the sensor node is deployed in the network, it moves

87

along the direction of the resultant force until the value ofF S

( )

i uuuuuur

88

is equal to zero and will not change any more.

(7)

C. Optimum Number of Nodes in Each Annulus

1

Although the uniform distributed nodes can ensure that no

2

perceptual blind area appears for a long time, when radius of

3

the network is too big, nodes have no choice but to transmit

4

data to the base station with multi-hop transmission manner.

5

In this case, it will increase the load of the nodes near the

6

center. To relieve the "energy-hole problem", the "virtual

7

gravity generated by annulus" is proposed to further optimize

8

the positions of nodes.

9

Similar to Wu [7] and our previous work [35], in VFEM,

10

the circular network is divided into k annular regions with the

11

same width (marked as dw), as shown in Figure 6. The annular 12

regions from inside to outside are marked as C0, C1…Ck-1. 13

Actually, C0 is a circle whose radius is dw. As mentioned 14

above, nodes near the center may bear more data transmission

15

tasks. So, it is a good choice to allocate different number of

16

nodes in different annular regions to balance energy

17

consumption. However, this may increase the coverage

18

redundancy and the efficiency on data collection may also be

19

reduced. On the other hand, in most data collection and

20

routing methods, nodes are often regarded to be "fully

21

functional", that is, they can act as sensing terminals, relay

22

nodes, or even cluster heads. Nevertheless, the difference on

23

energy consumption between nodes may become larger and

24

larger in this way. Therefore, it is assumed that there are two

25

kinds of nodes exist in the network.

26

Sensing Nodes: These nodes (the white dots in Figure 6)

27

only do the sensing and data uploading tasks, and they can not

28

receive data form other nodes.

29

Relay Nodes: This type of nodes (the grey dots in Figure 6)

30

only receive data sending from nodes in the adjacent outer

31

annulus. Then, they forward these data to the relay nodes

32

located at the adjacent inner annulus so that all the sensing

33

data can finally be transmitted to the base station. It is worth

34

noting that, relay nodes can not perceive information.

35

36

Fig. 6. Network model of VFEM. 37

Moreover, to further enhance the efficiency on sensing and

38

to facilitate the relay nodes finding out the optimal data

39

uploading paths, nodes in the same annulus should be located

40

at the center of this annulus (the dotted line in Figure 6). In

41

this case, the shortest distance from the node to both the outer

42

and inner side of the annulus is dw/2. 43

It is assumed that, in a round of data collection time, each

44

sensing node gets c bits data and forwards them to the

45

next-hop node until to the base station. To avoid the

46

"energy-hole problem", energy consumption rate of each

47

node should be roughly the same with each other. That is,

48

E0′/E0≈E1′/E1≈...Em′/Em...≈Ek-1′/Ek-1. Em′ is defined as the total 49

energy consumption of nodes in Cmduring a round of data 50

gathering time, while Emis the sum of initial energy of all the 51

nodes in Cm. It is also assumed that, Nmsand Nmrrepresent the 52

number of sensing nodes and relay nodes in Cm, respectively. 53 Thus, 54

(

)

(

)

(

)

(

)

(

)

(

)

1 2 1 1 0 1 2 2 0 1 1 2 1 1 0 1 0 1 0 0 0

...

'

'

k s s s t k t r i k i t k s s r k k k k s s t t r i i s r k s s t t r i i s r

e N

e

e

N

e N

e N

N

N

e

e N

e

e

N

N

N e

e N

e

e

N

N

N e

-- = -- - -= -=

+

+

»

»

+

+

+

»

+

+

+

»

+

å

å

å

(7) 55

In formula (7), e0represents the initial energy of each node. 56

etand et′ are the transmission energy consumption of nodes in 57

Cm(m>0) and C0respectively during a round of data collection 58

time. eris the energy consumption on data receiving. That is to 59 say, 60 2 t elec fs

e

=

cE

+

c

e

d

(8) 61

(

)

2

'

2

t elec fs w

e

=

cE

+

c

e

d

(9) 62 r elec

e

=

cE

(10) 63

It is necessary to point out that, the parameter d in formula

64

(8) is defined as the expected value of distance between a pair

65

of transmitting and receiving nodes located in adjacent

66

annuluses. The value of it is discussed in the following section.

67

As mentioned before, nodes in C0only need to send data to 68

the base station, so the distance about the last hop is dw/2. 69

From the above analysis, it is known that, the number of the

70

sensing and relay nodes in each annulus are critical for

71

balance of energy consumption. Therefore, the values of Nms 72

and Nmrare discussed as follows. 73

To enhance the efficiency on data collection, sensing nodes

74

should meet the following conditions.

75

1) The sum of sensing regions of all these nodes should

76

cover the whole network. That is to say, there is no blind area

77

on sensing.

78

2) Each sensing node should be able to upload data to at

79

least one relay node in the adjacent inner annulus.

80

3) The proportion of overlapping coverage area in the

81

network should be as small as possible.

82

In order to meet condition 1) and 2), both the sensing radius

83

and communication radius are set to 1.5dw. Meanwhile, to reduce 84

the redundancy on data collection, nodes in each annulus should

85

be uniformly distributed. Moreover, area of the overlapping

86

sensing region should be as small as possible, as shown in Figure

87

7. The red dashed lines in Figure 7 are the perception boundaries

88

of each sensing node in Cm. 89

According to cosine theorem, the relationship between the

90

three sides of△ABC in Figure 7 can be expressed as follows.

(8)

(

)

(

(

)

)

(

(

)

)

(

)(

)

2 2 2 2 1.5 0.5 1 2 0.5 1 cos w w w w d m d m d m m d

a

= + + + - + + (11) 1 Thus, 2

(

) (

)

(

2 2

)

arccos 2 3 1 2 3 1 s m N m m m m

p

é ù ê ú = ê ú + - + + ê ú ê ú (12) 3

And the value of Nmrcould also be solved out by formula (7) 4 and (12). 5

(

)

[

]

(

)

1 1 1 1

1

1,

2

1

'

0

k s r t i m i r m k s r t i i

e e

N

m

k

N

e e

N

m

-= + -=

ìé

+

ù

Î

ú

ïê

ú

= í

é

ù

ï

ê

+

ú

=

ê

ú

î

å

å

(13) 6 That is, 7

[

]

1 1 2 1 1 2 1 1, 2 4 1 0 4 k s elec i i m elec fs r m k s elec i i elec fs w E N m k E d N E N m E d

e

e

-= + -= ìéæ ö ù ïêç + ÷ ú Î -ïêç + ÷ ú è ø ïê ú = í éæ ö ù ï êç ÷ ú ï + = êç ÷ ú ï + è ø ê ú î

å

å

(14) 8 9

Fig. 7. Deployment of nodes with no energy-holes. 10

On the other hand, for the sensing node in Cm(m>0), the 11

shortest and longest distance from this node to its next-hop

12

successor are dwand 1.5dwrespectively. As shown in Figure 7, 13

the next-hop successor of node A (e.g., node D) can only be

14

located at one position on curve ab. The angle value of

15

ABD is set to iα/n(i≤n). Thus, by using the cosine theorem,

16

it is easy to know the distance of segment AD, and the length

17

of the single hop distance could also be calculated out by

18 formula (15). 19

(

)

(

)

(

(

)

)

(

)(

)

(

)

2 2 2 1 0.5 0.5 1 lim 2 0.5 0.5 cos n w w n i w m d m d d n m m d ia n ®¥ = æ ö + + -ç ÷ = ç ÷ ç - + - ÷ è ø

å

(15) 20

It is known from formula (12) that, in formula (15),

21

(

)

(

)

(

2 2

)

arccos 2m 3m 1 2m 3m 1

a

= + - + + (16) 22

D. Nodes’ Positions Optimization based on Virtual Force

23

Generated from Annulus

24

As mentioned earlier, only if the number of the sensing and

25

relay nodes in Cmare equal to Nmsand Nmrrespectively, energy 26

consumption of them are nearly the same with each other. Thus,

27

we assume that the curve located in the middle of each annulus

28

(e.g., Cm) can also generate virtual force (marked as F C

(

m

)

uuuuuuur

) so

29

that corresponding number of nodes will finally move onto

30

each curve. The final distribution of nodes is shown in Figure 6.

31

Sphere of influence from this virtual force generated by

32

curve in Cm(m>0) is also an annular region whose center is 33

the base station. The inner and outer boundaries of these

34

regions are drawn with the red solid lines in Figure 8, and the

35

width of each region is marked as dF(Cm). So, lengths of the 36

inner and outer diameters of Cm are

( )

1 0 2

å

m=- F i i d C and 37

( )

0

2

å

im= dF Ci , respectively. The influenced area of the 38

virtual force generated by the curve located in the middle of

39

C0is a circle whose radius is dF(C0). 40

As mentioned in Section III.B, all nodes have been nearly

41

uniformly distributed in the network with the action of the

42

virtual force between nodes. Now, the virtual force generated

43

by annulus only needs to keep the number of nodes in the

44

sphere of influence approximately equals to Nms+Nmt. That is, 45

(

)

(

)

(

)

2 2 0 0 m m s t F m j j i j d C N R N N p p = = æ ö = + ç ÷ ç ÷ è

å

ø

å

(17) 46 So, 47

( )

(

2

)

(

)

0 0 = m m s t F m j j i j d C R N N N = = +

å

å

(18) 48

The value of dF(Cm) can be calculated out by mathematical 49

induction.

50

51

Fig. 8. Virtual force generated from annulus. 52

Due to this kind of virtual force, nodes move onto the curve

53

located in the middle of each annulus. Take Siin Figure 8 as an 54

example. The white dot formed by the dotted line is the

55

position of Siafter the action of the first kind of virtual force. 56

We can see that this position is in the scope of influence of the

57

virtual force generated by the dotted curve in Cm. Hence, Si 58

further moves to the position of the white dot formed by the

59

solid line.

60

Moreover, if nodes are uniformly distributed on the circular

61

arc, the minimum redundancy can be guaranteed. Therefore,

62

position of sensing nodes should be further improved. That is,

63

for two adjacent sensing nodes ( e.g., Si and Sj) in Cm, the 64

value of∠SiBSjshould be 2π/Nms, as the white nodes shown 65

in Figure 6.

(9)

In addition, from formula (13), it is not difficult to know

1

that, the number of the sensing nodes located in Cm+1(m>0) 2

and C1satisfy the following constraints. 3

(

)

( )

(

)

max 1 Num R avg j j

T

TP

t

Num R

=

D

=

å

D

(19) 4

(

)

1 1

1

'

1 0 k s s r r t i i

N

<

é

ê

ê

+

e e

å

=-

N

ù

ú

ú

=

N

(20) 5

So, the number of the relay nodes in Cm(k-1>m≥0) must be 6

larger than that of sensing nodes in Cm+1. Thus, these relay 7

nodes should also be uniformly distributed on the curve, as

8

the gray nodes shown in Figure 6. This ensures that each

9

sensing node is able to find out at least one relay node as its

10

next-hop successor, as shown in Figure 7. Sensing nodes in C0 11

straightly send data to the base station without forwarding.

12

Similarly, it is also known from formula (13) that, the

13

number of relay nodes in Cm(k-2>m≥0) is larger than that of 14

relay nodes in Cm+1. That means when the relay nodes are 15

uniformly distributed on each curve, each relay node in Cm+1 16

can certainly find out at least one relay node in Cm as its 17

next-hop successor.

18

Furthermore, with the help of formula (12) and (13), it can

19

also be concluded that, when m is smaller, the value of Nms 20

will be smaller too while the value of Nmrwill be larger. That 21

is, the closer to the base station, the less the number of sensing

22

nodes, but the more the number of relay nodes. In this way,

23

each node has more choices to select the optimal next-hop

24

successor, and the “hotspot problem” can also be alleviated to

25

a certain extent. It is helpful to postpone the generation time

26

of energy-holes.

27

E. Optimal Path for Data Uploading

28

Now, each node has moved onto the middle position of

29

each annulus with the help of the virtual force generated from

30

annulus, as shown in Figure 6. Meanwhile, all the sensing and

31

relay nodes have been uniformly distributed on the curve.

32

Although it is proved that, each node can find out at least one

33

successor for data uploading, if there is no limitation on path

34

selection, the hop distance might be long. As shown in Figure

35

9, the length of each hop is close to or equal to 1.5dw. This not 36

only increases the energy consumption on communication,

37

but also aggravates the burden on some relay nodes (e.g.,

38

node Si). 39

40

Fig. 9. Unreasonable data uploading paths. 41

Therefore, the concept of “data forwarding area” is

42

proposed here. As we know, the boundary of sensing range of

43

node Si in Cm (k>m>0) will intersect with the curve in the 44

middle of Cm-1at two points, such as point a and b in Figure 7. 45

The sector area formed by arc ab, line segment aB and line

46

segment bB is defined as the "data forwarding area" (the

47

sector region in Figure 10). For any sensing node Sj, the 48

next-hop successor of it can only be selected out from the

49

"data forwarding area".

50

51

Fig. 10. Data forwarding area. 52

For one sensing node (e.g., Si) in Cm+1 (k-1>m>0), it is 53

assumed that Sj(located at Cj) and S0(located at C0) are two 54

candidate relay nodes of Siin the "data forwarding area". Thus, 55

"Si→Sj→Sj-1→…→S0→B" can be regarded as one of the 56

possible data uploading paths (marked as pathi). The weight 57

of pathiis defined as follows. 58

(

)

1

(

)

2

(

)

(

)

2

(

)

1 0 0 , , i r j j j r j m W path E S d S S- E S d S B = =

å

+ (21) 59

In formula (21), Er(Sj) is the residual energy of Sj. d(Sj,Sj-1) 60

is the Euclidean distance between Sjand Sj-1while d(S0,B) is 61

the Euclidean distance between S0 and the base station. 62

Sensing node Sicalculates out all the possible paths’ weights 63

with the help of formula (21), and it then selects out the path

64

with the largest value of weight as the data uploading path

65

(the blue arrow in Figure 11).

66

67

Fig. 11. The optimal data uploading path. 68

Both the residual energy of the relay nodes in "data

69

forwarding area" and the hop distance between nodes are

70

considered in selecting out the optimal data uploading path.

71

For this reason, VFEM can ensure energy consumption

72

balance to a certain extent. However, it is possible for some

(10)

sensing nodes to choose the same relay node as the successor

1

in their uploading paths, which greatly increases the energy

2

consumption on some relay nodes (e.g., node S2in Figure 12). 3

In order to solve this problem, each sensing node should

4

monitor the residual energy of all the forwarding nodes in its

5

"data forwarding area" at the end of each round of data

6

uploading. When the residual energy of Sj is lower than its 7

threshold Eror the standard deviation for all the relay nodes in 8

the "data forwarding area" is higher than the threshold δ

9

(definition of δ is shown in formula (22) ), Sjwill select out 10

another data uploading path according to formula (21).

11

Meanwhile, these relay nodes whose residual energy is lower

12

than Erare regard as dead nodes. 13

(

)

(

)

(

)

( )

(

)

(

)

( )

(

)

2 2 1 1 i i Num S Num S r k r k k k r k i i E S E S D E S Num S Num S = = æ ö ç ÷ ç ÷ = - ç ÷ ç ÷ ç ÷ è ø

å

å

(22) 14

In formula (22), Num(Si) is the total number of relay nodes 15

in the “data forwarding area”.

16

17

Fig. 12. Loads on the relay nodes. 18

It is worth mentioning that, in VFEM, the

19

computation complexity on path selection is not high. Take a

20

circular network which is divided into 5 virtual annuluses as

21

an example, it is not difficult to know that, the number of

22

sensing nodes in C4, C3, C2, C1and C0are 11, 9, 7, 4 and 1. 23

While the number of relay nodes in C3, C2, C1 and C0are 24

⌈11(1+er/et)⌉, ⌈20(1+er/et)⌉, ⌈27(1+er/et)⌉ and ⌈31(1+er/et)⌉, 25

respectively. Due to the fact that the sensing and relay nodes

26

are uniformly distributed in each curve, there won't be too

27

many relay nodes in each "data forwarding area". For

28

example, for any sensing node in C4, the total number of relay 29

nodes in its "data forwarding area" is only⌈11(1+er/et)/11⌉+ 30

⌈20(1+er/et)/11⌉+⌈27(1+er/et)/11⌉+⌈31(1+er/et)/11⌉. Thus, 31

the there are at most ⌈(20×27×31/113)(1+e

r/et)4⌉ possible 32

paths for selection. It is known from [30] that, eris far less 33

than et, so the number of the possible paths for data uploading 34

is only about 13. Thus, computation cost on the optimal path

35

selection algorithm in VFEM is low.

36 37

IV. SIMULATION RESULTS AND ANALYSIS

38

Simulation results are carried out with the help of Matlab

39

8.5. All the experiments were carried on a server (the

40

operating system is Win 10) with Intel Xeon (E3-1225V6)

41

3.3GHz CPU, 16GB memory(DDR4, 2400MHZ), 8MB

42

cache and 2TB hard disk. All the algorithms were

43

implemented via Java code. We compare VFEM with SNAA

44

[35] (an energy-hole mitigation strategy proposed by our

45

previous work) and the method proposed by Wu [7]. In

46

SNAA, the circular network is also divided into virtual

47

annuluses with the same width. Nodes are non-uniformly

48

deployed, and the number of them increases in geometric

49

progression from the outer annuluses to the inner ones, which

50

effectively reduces the work load on nodes near the center.

51

Moreover, each node can find its optimal parent by

52

considering the residual energy of each candidate as well as

53

the distance between the two nodes in adjacent annuluses. The

54

node deployment model and the data uploading process in

55

SNAA are shown in Figure 13 and 14. Values of the

56

experimental parameters are shown in Table I. All the data of

57

each experiment were obtained after 100 times of simulations.

58

TABLE I 59

PARAMETER VALUES 60

Parameter Symbol Value Unit

Network Radius R 100 m

Number of Nodes N 103

Amount of Data Collected by One

Node in a Data Collection Cycle c 1000 bit

Friction f 30 N Adjustable Parameter η 5400 Adjustable Parameter λ 0.23 Adjustable Parameter β 2 Adjustable Parameter α 0.5 Adjustable Parameter φ 1.7

Initial Energy of Node E0 2.0 J

Threshold of

the Residual Energy δ 0.2 J

Energy Consumption of Sending

and Receiving Circuit Eelec 50 nJ×b

-1

Energy Consumption of Amplifier in

Free-Space Model εfs 10 pJ×(b/m

2)-1

Energy Consumption of Amplifier in

Multi-path Fading Model εamp 0.0013 pJ×(b/m

4)-1

61

62

Fig. 13. Node deployment model in SNAA [35]. 63

(11)

1

Fig. 14. Data uploading in SNAA [35]. 2

A. Values of the Coefficients of Virtual Force

3

It can be seen from Section III that, the value of λ and η will

4

determine the magnitude of the force to a large extent and

5

ultimately affect the distribution of nodes. Figure 15 shows

6

the results of node distribution with different values of λ and η

7

after the virtual force is applied. Without loss of generality, it

8

is assumed that 103 nodes are initially randomly deployed in

9

the circular network. To better show the nodes’ distribution in

10

different annuluses, boundaries of these annuluses (except the

11

network boundary) are painted with blue lines.

12

It is not difficult to know from figure 15(a) that, when

13

λ=0.4 and η=2000, the nodes’ distribution after virtual force

14

adjustment is not ideal. All nodes are clustered near the base

15

station and are located in the two innermost annuluses.

16

According to formula (3), we can see that the virtual force

17

between nodes in this case is mostly gravitation. The

18

magnitude of the repulsive force is close to or equal to the

19

virtual gravity only when the distance between nodes is very

20

short. Therefore, all nodes are close to the center of the

21

network due to the effect of gravitation. What’s more, when

22

the distance between each of them is short, the values of

23

virtual gravity and repulsion are equalized with each other so

24

that nodes will ultimately stay at or near the base station.

25

It can be seen from Figure 15(b) that the distribution of

26

nodes is relatively uniform in the case of λ=0.02 and η=12000,

27

but it tends to approach to the network boundary. This is

28

because most of the virtual force between nodes in this case

29

are repulsion. Only when the distance between them is short,

30

gravitation is generated (the repulsion is also large).

31

Therefore, nodes begin to stay away from the network center.

32

Since the boundary repulsive force is adopted in VFEM,

33

nodes can not move out of the network, but there are a

34

considerable number of nodes have moved to the vicinity of

35

the boundary.

36

From Section III.C-III.E, it is known that, neither of the

37

above cases can ensure the full coverage of the network. That

38

is, the virtual gravitation coefficient λ cannot be too small and

39

the virtual repulsion coefficient η cannot be too large.

40

By executing a mass of experiments, it is found that,

41

distribution of nodes after virtual force adjustment is ideal

42

when η=5400 and λ=0.23, as shown in Figure 15(c).

43 44 (a) η=2000, λ=0.4 (b) η=12000, λ=0.02 45 46 (c) η=5400, λ=0.23 47

Fig. 15. Distribution of nodes after virtual force adjustment. 48

B. Number of Nodes in Each Annulus

49

The mathematical expectations of the hop distance between

50

two nodes in adjacent annuluses are shown in Table II. Values

51

of these expectations are calculated by formula (15) when

52

R=100 and k takes 4, 5 and 6, respectively. It is not difficult to

53

find that when the value of k is unchanged, the hop distance

54

expectations of nodes are substantially equal to each other

55

except for the innermost annulus. So, for most of the relay

56

nodes, energy consumption on uploading one bit of data to their

57

next-hop successor are nearly the same. Although the closer to

58

the center of the network, the more the amount of data to be

59

uploaded by the relay nodes, the number of relay nodes located

60

in the vicinity of the network center is larger than that located in

61

other annuluses (as shown in Table III and Table IV). So, total

62

energy consumption of nodes in each annulus are basically the

63

same, which is consistent with the requirements of formula (7).

64

TABLE II 65

MATHEMATICAL EXPECTATIONS OF THE HOP DISTANCE 66

BETWEEN TWO NODES IN ADJACENT ANNULUSES 67 k=4 k=5 k=6 d0 12.5 m 10 m 8.3333 m d1 29.8094 m 23.8475 m 19.8729 m d2 29.5595 m 23.6476 m 19.7063 m d3 29.5309 m 23.6247 m 19.6873 m d4 - 23.6171 m 19.6810 m d5 - - 19.6781 m

Experimental results of the number of the sensing and relay

68

nodes in each annulus are shown in Table III and IV. It can be

69

found out that, total number of nodes is increasing from the

70

outermost annulus to the innermost one, but the increasing rate

71

has been slowing down. Total number of nodes in C1is very 72

close to that in C0. So, it can be concluded that VFEM can solve 73

the energy-hole problem by the optimal distribution of nodes

74

based on virtual force generated from annulus. In addition, the

75

number of sensing nodes in each annulus is small, which not

(12)

only ensures the full coverage of the whole network but also

1

minimizes the amount of the redundant data.

2

TABLE III 3

TOTAL NUMBER OF SENSING AND RELAY NODES IN EACH 4

ANNULUS (N=103, k=4) 5

Cm Nms Nmr Total number of Nodes

C0 1 35 36 C1 4 30 34 C2 7 17 24 C3 9 0 9 6 TABLE IV 7

TOTAL NUMBER OF SENSING AND RELAY NODES IN EACH 8

ANNULUS (N=200, k=5) 9

Cm Nms Nmr Total number of Nodes

C0 1 57 58

C1 4 52 56

C2 7 38 45

C3 9 21 30

C4 11 0 11

C. Residual Energy of Nodes in Each Annulus

10

Figure 16 and 17 show the residual energy of nodes in each

11

annulus at different network running times. Time of rounds at

12

the end of the network lifetime are 28956 and 34277,

13

respectively. The residual energy of each node in the

14

outermost annulus of the network at the same moment is

15

basically the same in any case. This is because in VFEM,

16

nodes in the outermost annulus are all sensing nodes and they

17

only need to upload their own sensed data to the next-hop

18

neighbor. As mentioned before, nodes in the outermost

19

annulus have the same amount of data to be uploaded in the

20

same period. Furthermore, it can be seen from Section III.E

21

that the lengths of single hop distances between nodes are

22

nearly the same with each other. So, lines in Figure 16(d) and

23

Figure 17(e) are substantially smooth.

24

Similarly, energy consumption of nodes in the innermost

25

annulus are also basically the same. This is because in VFEM,

26

most of nodes in the innermost annulus are relay nodes and the

27

hop distance for data uploading is only dw/2. Moreover, it is 28

known from Section III.D that, these relay nodes are uniformly

29

distributed in the center of the annulus, so it is almost no

30

difference among them on energy consumption.

31

Except for the innermost and the outermost annuluses, the

32

difference on energy consumption of nodes in other annuluses

33

is a little large. Residual energy of some nodes is too small.

34

According to the data collection path establishment method in

35

VFEM, it can be seen that not all nodes with forwarding

36

function are selected as the relay in the data upload path when

37

the network starts to run. Thus, the energy of some nodes can

38

be preserved at the beginning of the network lifetime, which

39

causes that the residual energy of nodes are different with

40

each other. However, it is not difficult to see from Figure

41

16(b), 16(c), 17(b), 17(c) and Figure 17(d) that at the end of

42

the network lifetime, the difference of the residual energy of

43

the nodes in these annuluses is not significant (e.g., the pink

44

lines in these figures). As the difference on energy

45

consumption between nodes continues to increase, some relay

46

nodes are unable to undertake the data uploading task, so the

47

sensing node are likely to reconstruct the routing path

48

according to formula (19). This realizes the energy balance

49

between nodes, and it effectively postpones the generation

50

time of energy-hole.

51

16 (a) 16 (b)

16 (c) 16 (d)

Figure

Fig. 1. Network model of WSNEHA [30].
Fig. 3. Nodes are randomly deployed in the circular network.
Fig. 5. Nodes are uniformly deployed in the circular network.
Fig. 6. Network model of VFEM.
+7

References

Related documents

The current implementation allows the user to trigger sending of a synchronization message, which we used to send these messages based on HMAC configuration and which phase the

There are two type of packets in the simulation: message packets, which are used by sensor nodes in the network to send information to the sink node, and the second type is

Furthermore, it is possible to communicate from an external process with every node within the sensor network simulated in Cooja by using the Native-Border-Router, a feature that

En annan aspekt som framkom var att närstående ville vara nära sina kära för att kunna agera som deras ombud och bevaka deras rättigheter eftersom denne var medvetslös och inte

21,6 % tycker att bankerna behöver vara mer tillgängliga, 30,1 % känner att bankerna måste underlätta för kunderna, 31,3 % vill att bankerna ska skapa mer personlig relation, 1,7

I have implemented this software in Contiki in order to compare the characteristics of existing data compression algorithms when they are used on dynamically linkable modules

The emulator is designed to handle real-time, two-way communication with up to 8 sensor nodes and is tested to be working using IEEE 802.15.4 compliant wireless sensor

3) Data Transmission: The SACC algorithm determines the sensor nodes to be activated, whereas the routing decision is to transmit the sensing report to the closest sink node hop by