This application claims priority to French Application No. 10 01869 filed on Apr. 30, 2010. The above-identified patent application is incorporated herein, by reference, in its entirety.
This invention relates to a method for configuring a wireless network of unattended ground sensors, of the type consisting of interconnected nodes each including a sensing module named a sensor, an own power supply source, computing means, communication means, means for saving an operating configuration and means for managing its operation according to this configuration stored in memory.
Networks of unattended ground wireless sensors designated as UGS networks (Unattended Ground Sensor networks), are intended to detect an intrusion in a zone to be monitored and inform about this intrusion after detection. They consist of stand-alone devices forming nodes which have a stand-alone power supply, radio communications capabilities, observation capabilities (via the use of transducers or more complex modules), and (more or less high) computing capacities.
These nodes are set in a network most often by using self-organization functions in the fashion of so-called ad hoc networks. In this case, since communication is a priori only possible between the nodes within radio range, a routing protocol (for example Direct Broadcasting) then ensures the relay of data packets in order to ensure connectivity from one end to the other when this is allowed by the topology of the network.
In UGS networks, the nodes are dropped (for example jettisoned by an airplane, deposited by an operator on foot) in a localization or a given geographical zone in order to accomplish a monitoring function. The dropped sensors monitor collaboratively (or not) the activities of interest (for example, intrusions) in the zone where they operate, and then return alerts to so-called gateway nodes so that they are transmitted to other portions of the monitoring system (for example a control and monitoring centre, other sensors, actuators).
UGS networks have military applications within the scope of monitoring missions, but also civil applications for monitoring critical infrastructures (for example classified factories, bridges) or for environmental monitoring (for example seismic risk, agriculture, ecology).
UGS nodes generally have power supply constraints. In the majority of the cases, they operate on a battery. In order to save on the battery, they are equipped with an intermittent standby mechanism for the measurement sensors and the transmission means.
The operator should then upon deployment or during operation, decide on a certain number of parameters of the system, i.e.:
The selection of the parameters of the system strongly influences its performances.
For example the following performance indicators are defined:
In UGS networks, the operating unit in charge of its configuration and of its deployment should therefore decide on the system parameters corresponding to a given operating point (for example Pmd<10%, 10 deployed nodes). This problem is difficult and requires good understanding of the compromises encountered by the system, the latter being strongly related to the selected protocols, to the behaviors of the hardware modules, etc.
In T. He, S. Krishnamurthy, L. Luo, T. Yan, L. Gu, R. Stoleru, G. Zhou, Q. Cao, P. Vicaire, J. A. Stankovic, T. F. Abdelzaher, J. Hui, and B. Krogh, “Vigilnet: An integrated sensor network system for energy-efficient surveillance,” ACM Trans. Sen. Netw., Vol. 2, no. 1, pp. 1-38, February 2006, the authors present the design and the application of a monitoring system, designated as VigilNet, based on a UGS network. The authors show the compromises which such a system encounters within the framework of the use of duty cycles. In an extension of the preceding investigations, J. Jeong, Y. Gu, T. He, and D. Du, “VISA: Virtual Scanning Algorithm for Dynamic Protection of Road Networks,” in Proc. of 28th IEEE Conference on Computer Communications (INFOCOM 09), Rio de Janeiro, Brazil, April 2009, proposes the detection of the passing of vehicles along a road. Each sensor periodically performs detection. The proposed strategy consists of defining a scheduling of these detection periods as a periodic scanning over the whole length of the monitored road segment.
In L. Lazos, R. Poovendran, and J. A. Ritcey, “Analytic evaluation of target detection in heterogeneous wireless sensor networks,” ACM Trans. Sensor Networks, Vol. 5, no. 2, pp. 1-38, March 2009 noted as [Lazos09], the authors consider a UGS network wherein: (1) the sensors permanently observe the appearance of the target in their coverage zone, (2) the targets have an arbitrary incidence but a rectilinear trajectory. The authors propose the use of analytical geometry with integration in order to calculate the detection probability of these targets by at least one sensor within the framework of a deterministic (i.e., knowing the positions of the sensors) or stochastic (i.e., only knowing the number of sensors) deployment. In the stochastic case, an exact mathematical expectation is found for the non-detection probability. In the deterministic case, the authors give a formulation of the lower and upper limits which does not take into account the existence of cycles for activating/putting on stand-by the measurement and/or communication modules.
In P. Medagliani, J. Leguay, V. Gay, M. Lopez Ramos, G. Ferrari. “Engineering Energy-Efficient Target Detection Applications in Wireless Sensor Networks.” Conference IEEE Percom 2010 (Mannheim, Germany, March 2010) designated in the following by [Meda09], the authors consider the case of stochastic deployment and extend the work of L. Lazos, R. Poovendran, and J. A. Ritcey, “Analytic evaluation of target detection in heterogeneous wireless sensor networks,” ACM Trans. Sensor Networks, Vol. 5, no. 2, pp. 1-38, March 2009, by integrating the fact that the sensors may perform their observation periodically (and not permanently) in order to reduce their power consumption. The authors also propose modeling of the delay for transmitting the alerts by considering the case of the X-MAC protocol, which also uses periodic activations/deactivations of the communication interface in order to reduce power consumption. Finally, this work comprises a model of the power consumption of a network of sensors, giving the possibility of more globally inferring the lifetime of the network from the remaining power and from the activity/vigilance level of the UGS network. The authors show the use of this analytical framework with multi-objective optimization techniques. This allows the operator to view the global performances of the system depending on its constraints (for example lifetime, detection performance). The operator may thereby perceive the compromises with which he/she has to cope and decide on the configuration which he/she desires to adopt. The proposed tool is used for a fixed number of nodes, randomly deployed.
In J. J. Sylvester, “On a funicular solution of Buffon's “problem of the needle” in its most general form,” Acta Mathematica, Vol. 14, no. 1, pp. 185-205, 1890., Sylvester tackles the so-called <<needle>> geometrical problem: a plane is striated with parallel lines spaced out by a distance. A needle of length l is randomly thrown. What is the probability that the needle will cut one of these lines? the resolution of this problem by Sylvester gives the possibility of analytically refining the upper limit given by L. Lazos, R. Poovendran, and J. A. Ritcey, “Analytic evaluation of target detection in heterogeneous wireless sensor networks,” ACM Trans. Sensor Networks, Vol. 5, no. 2, pp. 1-38, March 2009, for the non-detection probability in the deterministic case.
The analytical framework proposed in [Meda09] allows modeling of an UGS system within the framework of stochastic deployment. From an operational point of view, the operators may handle this model by using optimization tools for observing the space of optimum configurations according to objectives and constraints defined by the operator himself/herself. With this, the underlying compromises of the system's operation may be understood. The constraints and objectives may for example be the maximization of the detection performances subject to constraints on the delays for transmitting the alerts.
This model and the tooling do not provide results specific to a given deployment of sensors (a more interesting case for UGS network operators). They provide average results (in the mathematical sense) which have to be used as an indication by the operators in order to decide on the parameterization of their network. Moreover, they do not provide assistance to the operator for placing the nodes in a particular geographical zone. Finally, there is no tool with which the operator may be informed on the minimum number of nodes required for meeting the constraints and operational objectives to be fulfilled.
The methods of the state of the art do not provide assistance to the UGS network operators for placing the nodes and configuring the parameters of the system within the scope of a particular operational background of the camp/zone monitoring type.
Moreover, the methods of the state of the art do not allow determination of the minimum number of nodes required on a set of distinct zones to be monitored, each having constraints and particular operational objectives.
The object of the invention is to propose a method and a device for configuring a network of deposited wireless sensors in one or more geographical zones which allow determination of the number and position of the sensors in order to attain performances meeting targeted performance criteria.
For this purpose, the object of the invention is a method for configuring a network of deposited wireless sensors of the aforementioned type, characterized in that it includes the following steps:
According to particular embodiments, the method includes one or more of the following features:
The object of the invention is a device for configuring a network of deposited wireless sensors of the aforementioned type, including means for applying the steps of the method as defined above.
The object of the invention is also a computer program including specific instructions applying the method as defined above, when used on a computer.
The invention will be better understood upon reading the description which follows, only given as an example and made with reference to the drawings wherein:
A top view of a site which has to be protected is illustrated In
This network includes a set of nodes 2 interconnected by wireless connections 3 directly or indirectly connecting the nodes to the monitoring terminal 1A. The indirect connections are made as known per se through other intermediate nodes.
The nodes 2 each correspond to a sensor of the network. They each include for example a seismic sensor with which vibration of the ground may be detected in its field of action when a person or a vehicle penetrates therein. Each of the nodes in addition to its own sensor has an own power supply source, its means for communicating with the other nodes 2 and/or the terminal 1A, its own computing means as well as means for saving an operating configuration and for managing its operation according to this configuration stored in memory.
In the example of
The method is applied in a portable device used by the operator and notably including, as illustrated in
As known per se, notably from [Meda09], several performance criteria, noted as CP, are defined for characterizing the operation of a UGS network in a given zone. For example, are considered as CPs:
For each type of CP, the device applying the method includes a model in an empirical form (for example an abacus) or in analytical form (a mathematical expression). Each model takes into account the configurable parameters of the system subsequently described in a section (for example: placement of the nodes, proportion of the time when the sensor module is active βsens, proportion of the time during which the radio module is active βcomm). An example for each of the CPs mentioned above, is given in the subsequent description.
Within the scope of deployment of a UGS network for monitoring purposes, two categories of CPs are defined:
For example, the operator wishes to maximize L considering constraints on Pmd and D, one has: CPO={L}, CPC={Pmd, D}, with CPC*={Pmd*=10% and D*=100 ms}. In this case, the optimization technique for example indicates that the maximum value of L is 30 days.
During the application of the method, the operator initially specifies among the whole of the CPs at least one CPC, associated with a CPC* value, and at least one CPO. A CP type cannot be both associated with a CPC and a CPO.
An n-uplet of values corresponding to different CPs, which characterizes the operation of the UGS network for a given proportioning of the system parameters of the UGS network, is called an operating point noted as PF. For example, for the parameterization (βsens=4%, βcomm=13%) and a certain placement of nodes, the operating point PF is thus defined: Pmd=17%, D=113 ms, L=27 days.
The object of the method is to assist an operator in charge of the deployment or maintenance of the UGS network by assisting him/her with making the system configuration selections considering:
The method may be used for configuring k sub-systems deployed in a set of zones to be monitored, noted as Z={Z1, Z2, . . . , Zk}, each zone having specific operational constraints.
In order to determine the optimum configuration of a zone, the method provides two modes which the operator may select and which correspond to two different approaches:
In this case, no objective is set on the CP to be optimized. The purpose is to determine if it exists, the optimum PF for a given number of nodes, i.e. the PF which observes the constraints and gives the best value which may be expected for CPO, regardless of the latter.
For example, if CPO={L}, CPC={Pmd, D}, with CPC*={Pmd*=10% and D*=100 ms}, the method determines that the best operating point with 5 nodes, considering L is such that: L=30 days, Pmd=10%, D=100 ms.
An objective is set on the CP to be optimized. The purpose is to determine the minimum number of nodes to be used such that CPOobj, is attained and the constraints are observed for the optimum PF.
For example, if CPO={L} with CPOobj=Lobj=10 days, and CPC={Pmd, D}, with CPC*={Pmd*=10% and D*=100 ms}, the method indicates that the minimum required number of nodes so that the sub-system lasts for at least 10 days is of 3 nodes.
By acting on the number of nodes, their possible positions, on the constraints (for example CPC*, size of the zone) and defined objectives (for example CPOobj, the operator is invited to perform the global method, noted as PROC_GLOBALZ, iteratively until operating points are found which are satisfactory for the whole of the zones within the limit of the total number of nodes at his/her disposal.
The global method for assisting with the deployment is noted as PROC_GLOBALZ. This method is applied on a set of zones Z, the characteristics and operational constraints of which vary.
According to the invention, the method is iterative and the main steps are applied several times with different numbers of nodes.
Schematically, in order to start using the method, the operator:
After iteration of the method, the operator:
As long that this has not resulted in a feasible configuration meeting his/her operational needs on each zone (for example: there remains zones where no operating point meets the constraints, or zones where the objective on the CP to be optimized is not attained), the steps of the method are reiterated:
The global method (procedure PROC_GLOBALZ) is called as follows. The corresponding inputs and outputs as well as its operation are detailed hereafter.
PROC_GLOBALZ(Ntot, {CPC*(i), CPOobj(i), POSN0(i), Nsupp(i), Nmax(i), d(i)} for any zone Zi={(POSNreq(i), PFopt(i), CONF(i), Nreq(i), MS(i)) for any zone Zi}
Inputs
The operator defines (the corresponding steps of
The total sum of the Nsupp(i) is less than or equal to Ntot.
Outputs
The operator obtains at the output:
The method operates iteratively by requesting an interaction with the operator at the end of each iteration. In particular, an iteration of the global method consists of:
As long as a feasible configuration meeting the operational needs of the operator is not attained on each zone, the method is reiterated by initializing or modifying the set of constraints and objectives which the operator wishes to attain.
The method may thus be expressed by the following algorithm always described with reference to
Execute in step 22 the optimization process per zone: PROCZi
Store in step 24:
Nreq(i): the number of nodes required in the zone
POSN(i): the positioning of the nodes in the zone
PFopt(i): the optimum operating point if it has been determined
CONF(i): the parameterization of the corresponding system
MS(i): the output pattern of PROCZi
If the output pattern of PROCZi is
PROBLEME=VRAI/*PROBLEM=TRUE*/
A test is conducted in step 26 in order to determine according to the value of the variable PROBLEME, whether the CPs cannot be attained in at least one zone.
Display, in step 28, for each zone: Nreq(i), PFopt(i), POSN(i), CONF(i) and the output pattern.
RETOUR=STOP /*RETURN=STOP*/
else:
Calculate, in step 30, the required accumulation of nodes at least on the whole of the zones and the number of nodes which may be potentially reallocated Nrealloc.
In step 32, a test is conducted on the value of Nrealloc.
If Nrealloc is zero
The operator is informed in step 14 that it is impossible to configure a UGS network over the whole of the zones within the limit of the available nodes and considering the optionally defined constraints and objectives.
Suggest in step 14 relaxation of the optionally defined constraints and/or objectives in the zones for which the output pattern is ECHEC_CONTRAINTES-IRREALISABLES or ECHEC_CPO-OBJECTIF-INATTEIGNABLE
RETOUR=STOP /*RETURN=STOP*/
The nodes available at the zones having returned ECHEC_CONTRAINTES-IRREALISABLES/*FAILURE_UNACHIEVABLE-CONSTRAINTS*/ or ECHEC_CPO-OBJECTIF-INATTEIGNABLE/*FAILURE_CPO-UNATTAINABLE OBJECTIVE*/ are reallocated to the operator in step 16.
In steps 10 and/or 12, store in memory the new allocation of nodes per zone and/or the new constraints and/or the new objectives.
PROBLEME=NULL /*PROBLEM=NULL*/
Start again
The operation of the optimization process on a zone Z noted as PROCZ will now be described with reference to
The inputs and corresponding outputs are detailed hereafter.
PROCZ(CPC*, CPOobj, POSN0, Nsupp, Nmax, d)=(POSN PFopt, Nreq, CONF, MS)
The following inputs may be initialized by the operator upon the first call to the procedure, or incremented or decremented during an iteration of the procedure.
The inputs are distributed as follows:
The method produces at the output:
For a given number of nodes, the process PROCZ determines in a zone:
In MODE1, the process PROCZ shows the above results to the operator at the end of an iteration of the procedure PROC_GLOBALZ.
In MODE2, the process PROCZ iterates on the number of nodes used until the minimum required number of nodes is determined in order to attain an objective value on the CPOs. For this number of nodes, the process PROCZ shows the results to the operator at the end of an iteration of the procedure PROC_GLOBALZ.
The method operates stepwise as follows:
In step 50, the position of the whole of the nodes noted as POSN is determined
POSN is the whole of the positions of the nodes which maximize the non-detection probability in the hypothetical situation when the sensor module of each node is constantly active (i.e., βsens=1).
wherein POSN is the geographical position of the set of the nodes deployed in the zone. This set includes the N0 nodes, the position of which is set by the operator and the additional Nsupp nodes to be placed in the zone.
Keep POSN in memory
and wherein FPOS is the optimization technique described below.
The optimization function FPOS is applied in order to determine the optimum positioning of a certain number of sensors inside a zone.
In order to suggest a positioning of the nodes in a coverage zone, the non-dominated sorting genetic algorithm techniques known per se are applied. FPOS then determines the whole of the positions of the nodes such that the value of Pmd is minimum in the case when the sensor modules of the nodes are permanently active.
It is possible to set upon input the position of a certain number of nodes.
FPOS Inputs
FPOS Outputs
This space gives the whole of the particular realizations of CPO which are obtained for any CPC below the CPC* “threshold” values. This set may be viewed as a multi-dimensional graph G as illustrated in
ECPC*,CPO={CPC(0), CPO(0) such that CPO(0)=FOPT(CPC(0), POSN)
for any CPC(0) which satisfies CPC*}
wherein FOPT designates a single- or multi-objective optimization technique described below.
By using the analytical models described earlier, two optimization methods may be used depending on whether it is sought to determine the optimum value of one or more performance criteria subject to certain constraints.
The applied optimization method is called FOPT
The latter may be applied if the whole of the identified equations for modeling the systems forms a convex set.
FOPT Inputs
FOPT Outputs
For example, if the operator chooses to have:
Then ED*=100ms,Pmd*=10%,L={Lopt(0), (Pmd)max(0), Dmax(0) such that:
Lopt(0)=FOPT((Pmd)max(0), Dmax(0)) and (Pmd)max(0)<=Pmd* and Dmax(0)<=D*)}
Still in this example, the graph G is then such that in
a) If: ECPC*,CPO is void during step 62
For example, there exists no PF with 5 nodes in the zone such that Pmd<1% and D<15 ms. It is then impossible to determine an achievable value, and a fortiori an optimum value for the lifetime.
Tell the operator in step 64 that it is possible to configure and operate the UGS network in an operating point such that the threshold values on the CP constraints are satisfied.
Suggest in step 64 that the operator try again by modifying the initial input parameters. For example, the operator may:
b) Else: ECPC*,CPO is non-void (CPOperf exists) (test carried out in 62)
In step 68 the most performing value of CPOperf is determined on the space of the solutions ECPC*,CPO (if it is non-void)
The most performing value of CPO on the space of solutions ECPC*,CPO is noted as CPOperf
For example, Lperf (Pmd*, D*)=max Lopt(0) on the set ED*, Pmd*, L. In the example Lperf(Pmd*=10%,D*=100 ms)=25 d considering ED*=100ms,Pmd*=10%, L
The optimum operating point is noted as PFopt, such that CPO=CPOperf and CONF is the parameterization of the system with which PFopt, may be attained.
Determining and keeping PFopt and CONF in memory.
A test is carried out in step 70 for defining the return mode.
i) If no objective was defined on the CPOs (MODE1), i.e. the operator seeks to operate the UGS network in a PF meeting the constraints (CPC*) and limits himself/herself to knowing the most performing value on a CP to be optimized (CPO).
Displaying, in step 72, the optimum operating point and the configuration obtained in step 54, as well as the topology obtained in step 50 and the number of nodes used (Nsupp+N0)
RETOUR=SUCCES_PAS-DE-CPO-OBJECTIF-DEFINI (step 74)
/*RETURN=SUCCESS_NO-DEFINED-CPO-OBJECTIVE*/
Start again
ii) Else: an objective CPOobj was defined on CPO (2)
A test is carried out in step 76 for defining the attaining of the objective CPO_OK.
(1) If CPOperf does not satisfy CPOobj (if the best performance attainable on the CP to be optimized is below the objective)
Display in step 80 the optimum operating point and the configuration obtained in step 54 at the preceding iteration, as well as the topology obtained in step 50 and the number of nodes used (Nsupp+N0) at the preceding iteration.
RETOUR=SUCCES_CPO-OBJECTIF-ATTEINT-MIN-NCEUDS (step 82)
Start again
CPO_OK=FAUX (step 83)/*CPO_OK=FALSE*/
A test is carried out in step 84 for defining whether Nsupp is equal to the available maximum optionally defined in step 84.
If Nsupp is equal to the optionally defined available maximum.
Display in step 86 the optimum operating point and the configuration obtained in step 54, as well as the topology obtained in step 50 and the number of nodes used (Nsupp+N0)
RETOUR=ECHEC_CPO-OBJECTIF-INATTEIGNABLE (step 88)
/* RETURN=FAILURE_CPO-UNATTAINABLE-OBJECTIVE*/
Else
(2) Else: CPOperf satisfies CPOobj in step 76 (i.e. the best attainable performance on the CP to be optimized is beyond the objective)
A test on the value of CPO_OK is carried out in step 92
Display, in step 80, the optimum operating point and the configuration obtained in step 54, as well as the topology obtained in step 50 and the number of nodes used (Nsupp+N0)
Else (i.e. CPO_OK=VRAI /*CPO_OK=TRUE*/ OR CPO_OK=NULL)
Else
Display in step 80 the optimum operating point and the configuration obtained in 3), as well as the topology obtained in 1) and the number of nodes used (Nsupp+N0)
RETOUR=SUCCES_CPO-OBJECTIF-ATTEINT-MIN-NCEUDS (step 82)
/*RETURN=SUCCESS_CPO-OBJECTIVE-ACHIEVED-MIN-NODES*/
Start again
In the zone Z1, MODE1 is used because the operator wishes to know the configuration which as a priority meets the constraints on Pmd and D, and secondarily gives the best lifetime. For the given number of nodes, the process determines the best operating point if it exists.
In the zone Z2, MODE2 is used because the operator wishes to know the configuration which meets the constraints on Pmd and D, and such that the best lifetime is beyond an objective. After a few iterations, the process determines the minimum required number of nodes so that the best operating point if possible satisfies both the constraints and the objective. This minimum number of nodes is possibly greater than or less than the number of nodes initially allocated to the zone.
An alternative noted as PROC_MAX-SURFACEZ of the procedure PROCZ, illustrated in
For example, by having 15 nodes, the operator wishes to know what is the maximum coverage of the zone around a given location, which will guarantee him/her that the non-detection probability is less than 10%.
The procedure is noted as PROC_MAX-SURFACEZ(CPC*, Nsupp) or, in order to simplify PROC_MAX-SURFACEZ. The procedure operates as follows, the inputs and corresponding outputs are detailed hereafter.
The following inputs are initialized by the operator upon the first call to the procedure.
The inputs are distributed as follows:
The procedure produces as output:
For a given number of nodes, the process PROC_MAX-SURFACE determines in a zone:
As long as there exists an optimum operating point, the process PROC_MAX-SURFACE iterates on the size of the zone until the maximum size is determined so that an optimum operating point exists. For this maximum size, the process shows the results to the operator at the end of an iteration of the procedure PROC_GLOBALZ.
The method operates stepwise as follows:
Tant que RETOUR=CONTINUER /*While RETURN=CONTINUE*/
POSN is the set of the positions of the nodes which minimizes the non-detection probability in the hypothetical situation when the sensor module of each node is permanently active (i.e., βsens=1).
wherein Fpos is the optimization technique described in section 6.4 “Optimization techniques”. Keeping POSN in memory.
This space gives the whole of the particular realizations of CPO which are obtained for any CPC beyond the CPC* “threshold” value. This set may be viewed as a multi-dimensional graph G.
ECPC*,CPO={CPO(0), CPO(0) such that CPO(0)=FOPT(CPC(0), POSN)
For any CPC(0) which satisfies CPC*}
wherein FOPT designates a single- or multi-objective optimization technique as described earlier.
a) If: ECPC*,CPO is void.
For a zone centered on C and of size d, it is impossible to configure and operate the UGS network in an operating point so as to meet the constraints.
(For example, in a zone with a width of 1,000 m where 5 nodes are deployed, it is impossible to find a configuration of the UGS network such that Pmd<10%.)
If d=dmin
For the minimum size of the zone, it is impossible to configure and operate the UGS network in an operating point such that the constraints are satisfied.
Else
dmax=d−dstep (Determine the maximum size of the zone)
Determine the most performing value of the CPO, noted as CPOperf, for the space of solutions ECPC*,CPO kept in memory at the preceding iteration.
Display the optimum operating point, the topology kept in memory at the preceding iteration and the obtained maximum size dmax.
RETOUR=SUCCES_TAILLE-MAXIMALE-ATTEINTE
/* RETURN=SUCCESS_SIZE-MAXIMUM-ATTAINED*/
Start again.
b) Else: ECPC*,CPO is non-void
d=dmin+dstep (Increment the size of the zone)
Store the graph G in memory representing ECPC*,CPO and the topology determined in 1).
Start again
The optimization process is achieved on a description of the system in the form of a “system model”. This model consists of functions or relationships between the parameters describing the operation of the system. It allows performance indicators to be derived on which the operator places objectives (for example maximization of the lifetime of the system L). The method may for example include the following functions:
Subsequently in this section, 3 functions are shown which characterize the operation of the system. These functions characterize the non-detection probability Pmd, the lifetime of the system L and the alert transmission delay D. The extension of the formulation of the non-detection probability Pmd proposed by [Lazos09] within the framework of the use of sleep cycles, forms a contribution of this document. The remainder of the formulations is taken again from the state of the art.
It should be noted that optimization techniques used for determining the operating points of the system are generic so that other models may be integrated into the system. This may allow refining of the modeling of the system and/or extension of the performance indicators characterizing the operation of the system.
Assumptions
In order to be able to calculate Pmd (the non-detection probability), the following assumptions are made. The zone of interest to be monitored is a square of width ds (dimension: [m]). N sensor nodes having circular coverages of radius rs illustrated in
The sensor nodes include at least two sub-modules: (i) the sensor module (for example a transducer) and (ii) the wireless communication module. In order to reduce the consumption of both of these modules, duty cycles are used. These cycles alternatively consist of a phase during which the module is active and a phase during which the module is inactive. They are characterized by two parameters: the period of the cycle Tsens (dimension: [s]) and the proportion of the time βsens in [0,1] during which the module is active as illustrated in
Modeling the Non-Detection Probability PMd
Let us consider N sensor nodes placed in a certain way and let us consider βsens=1, the detection probability corresponding to the probability that the trajectory of the target crosses at least one sensor Pd is expressed in the following way:
P
d=1−Pmd=P(l∩(1∪2∪ . . . ∪N)) (1)
wherein l is the line corresponding to the trajectory of the target, Ai the surface area of the range of the sensors of the node i.
Equation (1) may be rewritten by using the Feller's inclusion-exclusion principle, as the sum of the joint probabilities that a line cuts various sensor coverages. One then has:
According to [Lazos09], the case of deterministic deployment of the sensor nodes cannot be easily calculated analytically. On the other hand, the upper and lower limits may be calculated. According to the inequalities of Bonferroni, the following lower and upper limits may be calculated:
P
d
−P
d
≦P
d
≦P
d
(3)
wherein Pd1 and Pd2 are expressed as follows:
The equations (4) and (5) do not take into account βsens. Subsequently in this calculation, we extend Pd1 and Pd2 in order to take into account the duty cycles of the sensor module which are then expressed as:
wherein the new introduced factors are:
In order to estimate the lower and upper limits of equation (3), Pd1 and then Pd2 are calculated.
Formulation of Pd1
In the case when the coverage zone of the sensor module is a disk of radius rs, we have m1(i)=2πrs/4 ds and the factor P{Activityi} may be calculated according to the results shown by [Meda09] (equation 10).
Formulation of Pd2
According to equation (7), Pd2 is expressed as follows:
i-Calculation of m2(i,j)
The term m2(i,j)=P(l∩i∩j≠0) expresses the probability that the trajectory of the target cuts the ranges of both nodes i and j.
Considering the possible overlapping of the coverages of nodes i and j, the general formulation of m2(i,j) is as follows:
wherein the corresponding terms are, and as illustrated in
According to our assumptions, the formulation of m2(i,j) is obtained by knowing that Li=Lj=2πrs, L0=4 ds and on the other hand according to [Lazos09] (equations 37 and 38):
ii-Calculation of P{Activityi,j}
By definition, P{Activityi,j} is the joint probability of two compatible events, i.e. the sensor modules of the nodes i and j are or become active when the target crosses their coverage zones. One therefore has:
P{Activityi,j}=P{Activityi}·P{Activityj} (9)
By distinguishing the case when the node i is active upon the target entering its zone and the case when it becomes active during the crossing, we have, like for the calculation of P{Activityi} for Pd1 (see [Meda09]):
P{Activityi}=βsens+(1−βsens)P{εdet|
wherein P{εdet|
since Ta is uniformly distributed over the interval [0,c] wherein c=(1−βsens)Tsens.
Formulation of the length of the Li ou Lj chord.
The considered trajectories cut both the ranges of i and of j. According to the diagrams of
On the basis of geometrical considerations, the length of the chord, noted as l, forming a particular realization of Li, depending on the entry angle θ, is obtained:
wherein b1=√{square root over (rs2+d2−2rsd cos θ)} and wherein d is expressed as follows:
depending on whether node i or node j is considered.
As equation (11) is quite complex, l may approximately be fitted with a parabolic function: l=a1θ2+a2θ+a3 with θ in [θlim
By utilizing this approximation and by applying the same fundamental theorem as in [Meda09] (equations 6 and 7), and by performing the substitution Y=L/v we obtain:
and otherwise 0.
wherein c=(1−βsens)Tsens.
Finally, by integrating over the whole of the realizations of Li (resp. Lj), it is shown that:
Thus, P{Activityi}=P{Activityj}, and finally Pd2 is obtained by combining equations (8), (9), (10) and (12).
Delay for Transmitting the Alerts
We propose an analytical model for the alert transmission delay, i.e. the duration between the detection of the presence of an intruder by a sensor node and the notification of this detection to the gateway node. In the following, we calculate the delay at a radio hop, noted as D1 hop, and then the delay over a multi-jump path.
In order to model the delay, we consider X-MAC, a low power and asynchronous MAC layer protocol used in the networks of sensors applying activation cycles for radio. X-MAC uses a mechanism for listening to a low power channel (Low Power Listening or LPL) in order to allow communication between a transmitter and a receiver which do not synchronize their waking and sleeping programs. Indeed, when a node wishes to send data, it transmits a preamble for a duration at least as long as the sleep interval of the receiving node. This guarantees that the receiver will awaken, detect the preamble and remain awake for receiving the data from the transmitter node. X-MAC uses a hashed preamble with which the sender rapidly alternates between the sending of the destination address of the data packet and a short waiting time. This allows the addressee to abort the process in order to receive the data.
The average transmission delay, at one jump, may be expressed as follows:
wherein βcomm is the (normalized) proportion of the time during which the radio transmission module is active on the cycle of duration Tcomm, and SP, Sal, Sd, being the respective durations of the elementary preamble, of the receipt of acknowledgment of the preamble, and of the sending of the data packet relating to the detected intrusion. If the state of the addressed node is considered, i.e. the active or inactive state of its communication module, the probability that a node begins its transmission when the addressed node is active is βcomm and the associated delay is SP+Sal+Sd. Conversely, the probability that a node is off is 1−βcomm. We evaluate D1 hop by averaging between the least favorable case and the most favorable case in terms of delay. The most favorable case is the one when the node begins to transmit its preamble exactly from the moment when the addressed node awakes from its sleeping cycle. In that case, the packet is transmitted after the duration Sp+Sal+Sd. In the least favorable case, the transmitter node waits for the whole sleeping duration of the addressed node. Further, as the addressed node should receive an entire elementary preamble before acknowledging the sending of the packet, the delay takes into account that two transmissions of the elementary preamble may be necessary before beginning the exchange of data. In this case, the transmission delay at one jump is (1−βcomm)Tcomm+(Sp+Sal) Sd. The equation (1) above is obtained by weighting in each equation the term related to the waiting before sending the preamble with the probability that the addressee is in the active or inactive state, and (2) by averaging the least and most favorable cases.
Energy Consumption Model
Given that the nodes operate on a battery, how they consume energy has a direct influence on the lifetime of the monitoring system. In order to take this into account, we propose here a simple energy model for the energy consumption at the scale of the network of sensors.
The energy consumption of the nodes may be given by the sum of the energies consumed by its hardware components. For the sake of simplicity, we only integrate into the energy model the contributions of the detection module and of the radio transceiver. We also define the lifetime of the network as the time required for having the residual average energy Er pass under a threshold value Eth.
In order to obtain an expression of the lifetime of the network, we evaluate the energy consumed after a given time interval t. ET, the average residual energy at instant t, may be expressed as follows:
E
r(t)=NEi−NΩtott
wherein Ei is the initial energy of a node and Ωtot is the power required by the operation of the detection and communication modules.
According to the description of the X-MAC protocol, the communication module may be in one of the four following states: (i) transmission, (ii) reception, (iii) sleeping and (iv) LPL. The respective power budgets are noted as ΩR, ΩT, Ωs and ΩLPL.
Ωtot may then be calculated as follows:
Ωtot=Ωs+ΩLPL+(ΩR+ΩT)PdNTarget
wherein ΩR, ΩT, Ωs and ΩLPL are the powers described earlier; Pd is the target detection probability, and Ntarget is the number of times a target appears during a reference period.
The remainder of the calculation appears in [Meda09].
The application of the global method for assisting with the deployment of a UGS network is detailed hereafter. Two types of scenarios are contemplated:
“Single Zone” Scenario
In this case, it is for example conceivable that the operator has 20 nodes to be deployed for monitoring a square surface with a side of 1,000 meters. The performance constraints that the monitoring system has to meet, are a delay D of less than 100 ms on the one hand, and a miss-detection probability, Pmd, of less than 10% on the other hand. Finally the presence of large passage points imposes that the operator places a sensor at each of the corners of the zone.
By initializing the method described in the document, with 13 nodes made available in a first phase (N0=4, Nsupp=9), the method will thus suggest to the operator the positioning of the nodes as indicated in
Considering the space of solutions, the best of the optimum values of the lifetime is about 25 days, with as performances Pmd=10% and D=100 ms. The method informs the operator about this optimum operating point, as well as about the associated system configuration.
With MODE2 and an objective for example set to 20 days, the process would have reiterated with a smaller number of nodes to be deployed. On the contrary, with an objective for example set to 30 days, the process would have reiterated with a larger number of nodes to be deployed.
“Multiple-Zones” Scenario
This scenario envisions the deployment of a UGS network over a set of zones, knowing that there exist different constraints for each of the zones. The motivation for such a deployment may be:
Let us take the example of the extension of the monitoring zone around the camp.
After a 1st iteration of the global method consisting of successively applying PROCZ1 and then PROC_MAX-SURFACEZ2, the operator for example obtains the following results:
Considering these results, either the operator is satisfied with the suggested deployment and configuration, or else he/she for example chooses to reiterate the procedure by reallocating the 2 nodes still available to him/her, to zone 2 in order to at most extend the coverage of the latter. After a second iteration of the global method, it obtains different results in the 2″ zone. For example the maximum size is then 1,289 m. The method shows the optimum operating point and the corresponding configuration.
The advantages of this method are:
Number | Date | Country | Kind |
---|---|---|---|
FR1001869 | Apr 2010 | FR | national |