Next Article in Journal
Release and Detection of microRNA by Combining Magnetic Hyperthermia and Electrochemistry Modules on a Microfluidic Chip
Previous Article in Journal
Prototype of a Textronic Sensor Created with a Physical Vacuum Deposition Process for Staphylococcus aureus Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Maximum Target Coverage Problem in Mobile Wireless Sensor Networks

School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(1), 184; https://doi.org/10.3390/s21010184
Submission received: 4 December 2020 / Revised: 24 December 2020 / Accepted: 24 December 2020 / Published: 29 December 2020
(This article belongs to the Section Sensor Networks)

Abstract

:
We formulate and analyze a generic coverage optimization problem arising in wireless sensor networks with sensors of limited mobility. Given a set of targets to be covered and a set of mobile sensors, we seek a sensor dispatch algorithm maximizing the covered targets under the constraint that the maximal moving distance for each sensor is upper-bounded by a given threshold. We prove that the problem is NP-hard. Given its hardness, we devise four algorithms to solve it heuristically or approximately. Among the approximate algorithms, we first develop randomized ( 1 1 / e ) -optimal algorithm. We then employ a derandomization technique to devise a deterministic ( 1 1 / e ) -approximation algorithm. We also design a deterministic approximation algorithm with nearly 1 approximation ratio by using a colouring technique, where denotes the maximal number of subsets covering the same target. Experiments are also conducted to validate the effectiveness of the algorithms in a variety of parameter settings.

1. Introduction

Wireless Sensor Networks (WSNs) are widely valued and have received significant attention in the last two decades. They are low cost and flexible thus they are widely applied in many applications scenarios ranging from health-care [1,2], industrial inspection [3], environmental monitoring [4,5], military defense [6,7], agriculture monitoring [8,9]. Coverage, as a fundamental issue in WSNs, has a direct impact on the networks’ efficiency. Based on the range of interesting, coverage problem was divided into area coverage [10,11], target coverage and barrier coverage [12,13]. In area coverage, each point in the entire 2D/3D range of interest (ROI) needs to be observed by at least one sensor. In target coverage, the objective is to ensure that a set of finite points located in the ROI are covered. Barrier coverage mainly focuses on detecting the intrusion across the borders of ROI. Most of the research on deployment problem focused on the area coverage. However, target coverage is also of primary importance as it is common in applications. For example, in information collection, only the information on certain points needs to be collected. As sensors may be randomly deployed in a large area, relocating a subset of mobile sensors is often required to ensure effective coverage over the monitored area. For battery-powered sensors, the energy consumption in movement is much higher than that in sensing and communication. Therefore, efficient sensor movement and scheduling strategies are called for to save energy while still meeting the coverage requirement or improve coverage quality with limited mobility [14,15,16].
In this paper, we study a target coverage problem with sensors of limited mobility in Mobile Wireless Sensor Network (MWSM). The network model was first presented in Reference [17]. In this network model, targets would be covered in a disk centred the sensor, that is, the sensor covers a target if it locates in the disk of the target. Each mobile sensor can cover more than one target if it locates in the overlapped region. The surveillance region is divided into several subareas, where a different subset of targets is detected/covered. Liao et al. [17] aim to minimize the sum of movement distances subject to covering all the targets. Considering there are not always enough sensors to cover all the targets and the energy of each sensor is limited, we want to study how to cover maximized number of targets with sensors of limited mobility. We call it Maximum Target Coverage with Limited Mobility (MTCLM) Problem. As far as we know, the problem is first presented in this paper. We prove that the MTCLM problem is NP-hard, and propose four algorithms, including one heuristic algorithm and three approximation algorithms. The heuristic algorithm is to choose an available subset at present that has the most increased profit. The approximation algorithms include a randomized ( 1 1 / e ) approximation algorithm, where e denotes the base of the natural logarithm; a deterministic ( 1 1 / e ) approximation algorithm by applying derandomiziation technique, and a deterministic 1 approximation algorithm based on graph colouring technique, where is the maximal number of subsets covering the same target. Approximation algorithms are usually related to NP-hard problems. Since it is impossible to solve NP-hard in polynomial time, a polynomial-time suboptimal solution is acceptable. Different from heuristic algorithms, approximation algorithms can get a quality-guarantee solution, thus it requires provable solution quality and provable running time range.
To sum up, our contributions in this paper are the following:
  • We formulate the MTCLM problem and prove it NP-hard.
  • We propose four algorithms for the MTCLM problem, including one heuristic algorithm and three approximation algorithms.
  • We conduct experiments to validate the effectiveness of each algorithm in different conditions.
The rest of this paper is organized as follows—Section 2 reviews related works. The network model, the problem description and hardness are given in Section 3. Section 4 describes the four algorithms we present for the MTCLM problem. Section 5 presents the simulation results and investigates the performance of the algorithms proposed. Section 6 concludes the paper.

2. Related Works

Coverage Problem is so crucial that much research has done in the literature. Several survey papers related to the coverage issue in WSNs have been published [18,19,20,21,22], conclude the existing studies in different view. Reference [20] is the latest one published in 2019. It concluded the papers into three catalogues of coverage protocols: coverageaware deployment protocols, sleep scheduling protocols and cluster-based sleep scheduling protocols. It proposed that the more realistic model in WSNs is the future direction. Reference [22] described the deployment techniques in WSNs in detail, including Genetic Algorithms, Computational Geometry, Artificial Potential Fields, and Particle Swarm Optimization, and classifies the recent studies to the techniques. Reference [18] mainly concluded the studies on mobile wireless sensor networks (M-WSNs). It concluded that there were mainly four techniques to solve these problem proposed in M-WSNs, including optimization technique, computational geometry based technique, the virtual force-based technique, and geometry pattern based technique. Connectivity was usually considered in coverage problems [21]. Different from the above papers focusing on the deterministic model, Reference [19] concluded the coverage problem with uncertain properties and summarized the relevant models. Although the coverage problem had gotten so much attention, when a new technique was introduced to WSN, there were still considerable new researches. For example, with energy harvest technique getting mature, References [23,24,25,26,27,28] were proposed to study the coverage problem on the rechargeable WSN.
Most of the research on deployment problem focused on the area coverage. Target coverage is also an important topic. Most target coverage problems were NP-hard problem, optimization algorithms were applied to them including evolutionary algorithms [11,29,30,31,32] and combinatiorial algorithms [17,33,34,35,36].
A constrained Pareto-based multi-objective evolutionary approach (CPMEA) was proposed to find Pareto optimal layouts that maximized the coverage and minimized the sensors energy consumption while maintaining full connectivity between sensors [11]. A centralized genetic approach was provided to minimize the number of sensors and ensure targets K-coverage and M-connectivity simultaneously in Reference [29]. The fitness function was defined as a weighted sum of three factors: minimizing the number of sensors, maximizing the coverage performance and maximizing the communication connectivity. Dahiya et al. [30] proposed an algorithm to maximize the coverage of moving targets. They sampled the points on the trajectories of the mobile sensors uniformly to build a stationary probability distribution so that the uncertainty in the position of targets was fixed. A particle swarm intelligence (PSI)-based deployment algorithm was proposed to find the minimum number of static sensors to cover given targets in Reference [32]. Roselin et al. [31] proposed a sleep scheduling protocol to find disjoint covered set to extend the network lifetime while fulfilling the coverage and connectivity. Considering there were some crucial targets not be covered well, they classified sensors into four kinds and set their heuristic value, handled carefully the sensors which monitored the crucial targets.
The network model in our paper was first presented by Liao et al. [17]. In this paper, the Minimum Movement Target Coverage (MMTC) Problem was proved to be NP-hard. An extended Hungarian method was proposed to solve a particular case of the MMTC problem in which the distance between each pair of targets was longer than two times of sensing radius of sensors and a target based Voronoi greedy algorithm to solve the general case of MMTC. Another heuristic solution by minimizing the number of sensors needed was proposed in Reference [33]. Besides that, network connectivity was also considered in this paper. Another special case of MMTC, k-sink MMTC problem was proposed by Chen et al. [34], in which the sensors were located at k base stations and each station had infinite sensors, and  a PTAS was proposed to obtain a ( 1 + ϵ ) approximation solution. Reference [35] studied the MMTC problem with restricted mobility that sensors could move only in two mutually perpendicular directions. A heuristic algorithm was proposed to ensure coverage and connectivity. Nguyen et al. [36] proposed a more general problem for the target coverage and network connectivity than the MMTC problem, termed the Maximum Weighted Target Coverage and Sensor Connectivity with Limited Mobile Sensors (TAR-CC) problem. In this paper, a maximum-coverage-based algorithm and a Steiner-treebased algorithm were proposed. In Reference [37], they also showed the hardness of some related topic on target coverage problem and rectified the incorrectness of the proof in Reference [17] by reducing MMTC problem to the minimum geometric disk cover problem. No approximation algorithm for the MMTC problem has been presented until now.
In our paper, we study the MTCLM problem to cover maximum number of targets with sensors with limited mobility, which is different from the Maximum Weighted Target Coverage problem in Reference [36] because the mobility is limited. And the maximumcoverage-based algorithm is not suitable anymore.

3. Preliminary and Problem Statement

3.1. Network Model and Problem Definition

We study the MTCLM problem in the following model. All the networking nodes are located in an obstacle-free surveillance region, including sensors and targets. The network is represented as N ( T , S , D ) . T = { t 1 , t 2 , , t N } is the set of N targets distributed uniformly and randomly, each of which has its known position. S = { s 1 , s 2 , , s M } is a set of M homogeneous mobile sensors with the same sensing radius r, which are supposed to schedule to cover all the targets. The disk model is adopted. That means a target t is said to be covered if and only if at least one mobile sensor’s final position is in the disk centred target t with radius r. The mobile sensors have known initial position, and they can move in any direction and stop anywhere. In Figure 1, the mobile sensor s can cover target a, b, c because s is in the disk O ( a ) , O ( b ) , O ( c ) at the same time, where O ( t ) is a disk centred a target t with radius r. As a result, the surveillance region can be divided into several subareas. In some subarea, a subset of targets is covered. Let U T denote a subset of targets, R ( U ) be the corresponding subarea where the sensors cover the subset U of targets. Let SU = { U U T a n d R ( U ) = t U R ( t ) } denote the set of subsets corresponding to the subareas in surveillance region. Let K denote the number of the subareas/subsets, that is, | SU | = K .
Considering the limited energy of each mobile sensor, we present a maximum target coverage problem with sensors of limited distance. Let D = { d 1 , d 2 , , d M } be the mobile sensors’ corresponding moving distance constraint. The maximum target coverage problem with sensors of limited mobility is defined below:
Definition 1.
Maximum Target Coverage with Limit Mobility (MTCLM) Problem: Given M mobile sensors and N targets located at surveillance domain with known positions, the mobile sensor are homogeneous with the same sensing radius. With the maximal moving distance of sensors constrained, to find how to schedule the sensors to cover as many targets as possible.
Table 1 summarizes the notations used in this paper.

3.2. Hardness of The Problem

We prove the MTCLM problem is NP-hard by reducing the minimum geometric disk cover (MGDC) problem to it as in Reference [37]. The MGDC problem is NP-hard and its definition is showed as following:
Definition 2.
The minimum geometric disk cover problem (MGDC) [38]: Given a set of m points P = { p 1 , p 2 , , p m } , a disk radius r, and a constant k Z + , does there exist a set of centers C = { c 1 , c 2 , , c n } such that every point in P is covered by a disk centred at one of the centers in C and the cardinality of C, that is, n is not greater than k?
Then we prove the MTCLM problem is NP-hard.
Theorem 1.
The MTCLM problem is NP-hard.
Proof. 
We consider a special case of the MTCLM problem when the maximal distance of each mobile sensors is not constrained, that is, d i = for d i D , each mobile sensor alway be able to reach any subarea to cover targets. By reducing the MGDC problem to the special case of the MTCLM problem, we prove the MTCLM problem is NP-hard.
Given an MGDC instance like Definition 2, we construct an MTCLM instance. In this instance, there are M = n mobile sensors and N = m targets; the sensing radius of mobile sensors is r. The set of centers C = { c 1 , c 2 , , c n } is the set of final positions of the mobile sensors. If the MGDC instance is satisfied, that is, there exist n k = M disks covering all the points P , there must be less than M sensors located in centers C = { c 1 , c 2 , , c n } and the maximum number of covered targets in the MTCLM problem is N. Conversely, if the maximum number of targets covered in the MTCLM instance is m, there exist n k centers to cover all the points in P . The MGDC instance is satisfied. Else if the maximum number of targets covered in the MTCLM instance is less than m, there does not exist n k centers all the points in P . The MGDC instance is not satisfied.
Thus, the MTCLM problem is NP-hard. □

4. Algorithms

In this section, we propose four algorithms for the MTCLM problem, a heuristic algorithm, a randomized approximation algorithm, a derandomized approximation algorithm, and a deterministic approximation algorithm, respectively. Given an MTCLM instance, we should first find the subareas and its corresponding subsets, then find the minimal distances ω i j between each mobile sensor i and each subarea j. We will use the distance algorithm proposed in Reference [34] to solve the above two problems. That will take O ( M N 2 ) time. After pretreatment, we focus on the core issue on how to schedule the mobile sensors to cover the targets.
With the moving distance constraint, sensors can reach only some subareas. We construct a bipartite graph G ( ( S , JU ) , E ) . Each vertex i S denotes a sensor in S . Each vertex j JU denotes a subarea covering a set of targets U j SU . When the distance between sensor i and subarea R ( U j ) is smaller than the constrained moving distance of sensor i, that is, ω i j d i , there is an edge between vertex i and j, where ω i j is the minimum distance between sensor i and subarea j obtained in the pretreatment. The MTCLM problem is turning to be a matching problem except the weight is submodular. We formulate the MTCLM problem by an integer linear program (ILP) as following:
max t T y t ,
s . t . j JU x i j 1 f o r e v e r y s e n s o r i S ,
i S j : t U j , ( i , j ) E x i j y t f o r e v e r y t a r g e t t T ,
x i j { 0 , 1 } i S , j JU ,
y t { 0 , 1 } t T ,
where y t { 0 , 1 } denotes if target t T covered or not. x i j { 0 , 1 } denotes if sensor i S is scheduled to subarea R ( U j ) , U j SU . The first constraint is the feasibility constraint, the second is the coverage constraint.

4.1. Greedy Algorithm

In this subsection, we propose a heuristic algorithm by choosing the available subset which contains the most uncovered targets for each sensor.
In Algorithm 1, let X = { x i j : ( i , j ) E , x i j { 0 , 1 } } denote the solution. Let U ^ j U j denote the uncovered targets in current iteration, j JU . Let CT T denote the covered targets. For each sensor i S , to find the accessbile subset with the most uncovered targets. The time complexity of this algorithm is O ( M * N ) .
Algorithm 1: MTCLM_GREEDY(G, SU ).
Input:
graph G, SU
Output:
X, CT .
1:
  X = { x i j 0 , ( i , j ) E } ;
2:
  CT ;
3:
  U ^ j U j , j JU ;
4:
 for each i S do
5:
   l a r g m a x j JU , ( i , j ) E | U ^ j | ;
6:
   x i l = 1 ;
7:
   CT CT U l ;
8:
   U j ^ U j ^ U l , j JU ;
9:
 end for
10:
return X , CT ;

4.2. Randomized Algorithm

The Greedy algorithm presented above can not guarantee algorithm’s performance. Thus, we present three approximation algorithms which can make sure that the deviation of approximate solutions from the optimal value would not exceed a certain range. In this subsection, we propose a randomized approximation algorithm to obtain the expected value of the solution relative to the optimal value.
In this algorithm, we first obtain the optimal solution, { y t * } and { x i j * }, of the Linear Program Relaxation (LPR) of formulas ILP, by replacing the constraints (4), (5) with x i j [ 0 , 1 ] and y t [ 0 , 1 ] . Then for each vertex i S , we choose edge ( i , j ) with prob. x i j * . Without changing the approximation ratio, we shift the covered targets by avoiding to cover the same subset. We run the algorithm for several times until we obtain the acceptable approximation solution.
Theorem 2.
Algorithm 2 is a randomized ( 1 1 / e ) -approximation algorithm for the MTCLM problem.
Proof. 
In this algorithm, the prob. for sensor i S covering target t T is j : t U j , ( i , j ) E x i j * and each sensor i S sends to cover subsets independently. Therefore, the overall prob. of not covering target t sums up to i : ( i , j ) E ( 1 j : t U j x i j * ) . According to Arithmeticgeometric mean inequality and the coverage constraint of ILP, we can show that
i S : ( i , j ) E ( 1 j : t U j x i j * ) ( 1 y t * / m ) m ,
where m denotes the maximal degree of any vertex in SU in graph G. Again, it holds algebraically that 1 ( 1 y t * / m ) m y t * * ( 1 1 / e ) . It then follows that the prob. of covering target t in the algorithm is
1 i S : ( i , j ) E ( 1 j : t U j x i j * ) y t * * ( 1 1 / e ) ,
Remind that t T y t * is the optimal value of LPR, bigger than the optimal value of ILP. Let O P T denote the optimal value of ILP. Then the expected number of covered targets is
t T ( 1 i S : ( i , j ) E ( 1 j : t U j x i j * ) ) O P T * ( 1 1 / e ) .
It holds that the randomized rounding algorithm gives a randomized ( 1 1 / e ) -optimal solution.
Linear programs can be solved in polynomial time and so is Algorithm 2. The theorem is proved. □
In Algorithm 2, we use the recycle variable m a x _ r o u n d to avoid the sensors covering the same subset that would improve results and reduce instability in experiments.
Algorithm 2: MTCLM_RANDOM (G, SU ).
Input:
graph G, SU
Output:
X, CT .
1:
X = { x i j 0 : i S , j JU } ;
2:
CT ;
3:
computer the optimal solution to the LP x * , y * ;
4:
for each i S do
5:
  set m a x _ r o u n d a positive constant.
6:
  while m a x _ r o u n d > 0 do
7:
   set x i j = 1 with probability x i j * ;
8:
   if x k j = 0 k [ 1 , i 1 ] then
9:
    set x i j = 1 ;
10:
     CT = CT U j
11:
    break;
12:
   else
13:
    set x i j = 0
14:
     m a x _ r o u n d = m a x _ r o u n d 1 ;
15:
   end if
16:
  end while
17:
end for
18:
returnX, CT ;
The method of conditional expectation can be used to derandomize the solution, but the computing complexity depends on the maximal degree n of any vertex i S in graph G, that is, the maximal number of subareas a sensor can reach. We show the derandomized algorithm as below: Let J i denote the set of vertices { j : ( i , j ) E } for sensor i. j ¯ = { q JU , q j } . In each iteration k, X k 1 = { x i j i [ 1 , k 1 ] , j JU } is fixed. Set x k q = 1 to let the current conditional expectation maximized, that is, q = a r g m a x i J k E [ S L x k i = 1 ; x k i ¯ = 0 ; X k 1 ] , where S L denotes the value of the LPR. After M iterations, we can obtain deterministic ( 1 1 / e ) -optimal solution. In this algorithm, O ( M n ) linear programs need to be solved. At the worst cast, n = K is the number of vertices in JU . The number of subareas K 4 N 2 was proved in Reference [34]. Thus, n = O ( N 2 ) at the worst case. That would make the time complexity of the derandomized algorithm too high. Even though, there are still lots of situations in which n is constant in practical. With the moving distance constraint, each sensor is only allowed to reach a constant subarea, that is the derandomized algorithm suitable for.
Theorem 3.
Algorithm 3 is a deterministic ( 1 1 / e ) -approximation algorithm when n is constant.
Proof. 
As the explanation above, we prove the theorem by induction.
When k = 0 , E 0 = E [ S L ] with no x i j is fixed, is the expectation of the total number of covered targets. E 0 ( 1 1 / e ) * O P T is proved in Theorem 2, where O P T is the optimal solution of the ILP.
In each iteration k, E k 1 = E [ S L X k 1 ] where X k 1 is fixed. And  E k 1 = j J k E [ S L x k j = 1 , x k j ¯ = 0 ; X k 1 ] p ( x k j = 1 , x k j ¯ = 0 ) . We choose q = a r g m a x i J k E [ S L x k i = 1 ; x k i ¯ = 0 ; X k 1 ] , thus E k = E [ S L x k q = 1 , x k q ¯ = 0 ; X k 1 ] E k 1 .
After M iterations, the number of covered targets is E M E 0 ( 1 1 / e ) * O P T .
To sum up, there are M iterations, and in each iteration, we need to solve at most n linear programs. Thus the time complexity is O ( M n L ) , assuming the time complexity of a linear program is O ( L ) . When each sensor is only allowed to reach a constant subarea, that is, n is a constant, Algorithm 3 is linearly solvable. Now, we prove that Algorithm 3 is a deterministic ( 1 1 / e ) -approximation algorithm. □
Algorithm 3: MTCLM_DERANDOMIZED(G, SU ).
Input:
graph G, SU
Output:
X, CT .
1:
X = { x i j 0 : i S , j JU } ;
2:
CT ;
3:
computer the optimal solution to the LP: x * , y * ;
4:
for each i S do
5:
   q = a r g m a x j J i E [ S L x k j = 1 , x k j ¯ = 0 ; X k 1 ] ;
6:
  set x i q = 1 , x i q ¯ = 0 ;
7:
   CT = CT U q ;
8:
end for
9:
return X , CT ;

4.3. Deterministic Algorithm

The randomized algorithm needs to run several times to reduce instability. The derandomized algorithm can obtain an approximation solution determinately but costs too much time complexity at most time. In this subsection, we propose a deterministic algorithm to obtain a nearly 1 approximation value with less time complexity, where Δ is the maximal number of subsets covering the same target. Let { y t * t T } and { x i j * ( i , j ) E } denote the optimal solution of the LPR. We round up each of them to the closest fraction of the form a / H , H is a large integer and a is an integer between 0 and H. Mathematically, let y ^ t y t * H / H and x ^ i j is defined similarly. (The rounding would incur a quantization error which we analysis later). For the graph G ( ( S , JU ) , E ) , we duplicate each node j JU to H x ^ i j identical nodes covering the same set of targets and connect each duplicated node to the neighbor of j. We call the new graph the auxiliary graph G ¯ . We then find an edge-colouring of G ¯ such that any pair of edge sharing the same vertex in S is coloured differently. We can prove that H colours are sufficient. We can show by pigeon-hole principle that we can always find a colour that the vertices in JU covered by the edges in the colour cover at least t T y t * / Δ targets, that is, i S j JU : ( i , j ) E x ^ i j t T y t * / . To prove this by contradiction, assuming that this is not true. Then the
i S t T j : t U j , ( i , j ) E x ^ i j i S j JU : ( i , j ) E x ^ i j t T y t * .
It is leading to contradiction with the constraint (3) of the ILP.
The above analysis immediately implies that selecting the edges covered by the best coloured induced a Δ 1 -optimal solution. More applications of the method can be seen in Reference [39].
Each y t increases by at most 1 / H by the rounding, hence increases the objective function by at most N / H . Taking quantization error into consideration, the approximation ratio is ( 1 N H ) 1 . The auxiliary graph G ¯ has at most M + H N nodes, M * H N edges, to find a proper coloration by greedy will take time O ( M H N ) . If we set H = N 2 , the approximation ratio is ( 1 1 / N ) 1 and the time complexity is O ( M N 3 ) . Thus we get the Theorem 4.
Theorem 4.
Algorithm 4 is a nearly 1 approximation algorithm
Algorithm 4: MTCLM_COLOUR (G, SU ).
Input:
graph G, SU
Output:
X, CT .
1:
X = { x i j 0 : i S , j JU } ;
2:
CT ;
3:
computer the optimal solution to the LP: x * , y * ;
4:
y ^ t y t * H / H ;
5:
x ^ i j x i j * H / H ;
6:
build auxiliary graph G ¯ ;
7:
obtain a legal colouring of G ¯ greedily;
8:
for k [ 1 , H ] do
9:
  calculate the number of targets covered by each colour k;
10:
end for
11:
obtain colour q with the maximum number of covered targets;
12:
obtain the edges E q coloured by q in graph G ¯ ;
13:
for ( i , j ) E q do
14:
  if j is the duplication nodes of j in graph G then
15:
   set x i j = 1 ;
16:
    CT = CT U j ;
17:
  end if
18:
end for
19:
return X , CT ;

5. Simulation Experiments

Even though the performance of some algorithms we proposed have been proved in theory, we still conduct a set of simulation experiments by using Matlab to compare them, validate their effectiveness, and show the impression of some parameters. We consider four network parameters that may impact on the number of covered targets: the number of targets M, the number of sensors N, the size of the surveillance region, the moving distance constraint D . In the experiments, there are 200 targets and 20 mobile sensors uniformly, randomly generated in a square region of size 200 m × 200 m. The sensors’ coverage radius is r = 20 m, and their moving distance constraint is 40 m. Even though the moving distance constraint of each sensor can be different, in our experiments, we assume they are the same. To test the impression of each parameter, we vary it in experiments and keep the other parameters keep the same. For each combination of network parameters, we randomly generate ten instances of the network and report the mean performance result. We show the results in Figure 2 below. In Figure 2, we compute the results of the algorithms we present and compare them to the optimal solutions. The optimal solutions can be obtained by using Matlab’s toolbox ’Yalmip’, which is a free optimization solution tool developed by Lofberg.
In Figure 2a, the number of targets varied from 100 to 250. In Figure 2b, four different numbers of sensors are considered, namely N = 10 , 20 , 30 , 40 . We can observe that, when the number of targets increases or the number of sensors increases, the number of targets covered increases.
In Figure 2c, four different sizes of area are considered, namely 200 m × 200 m, 400 m × 400 m, 600 m × 600 m, 800 m × 800 m. We observe that when the size of the surveillance regionincreases, the number of targets covered decreases. It is easy to understand that when the size of the surveillance region increases whereas the number of targets remain unchange, the average density of targets gets low. The average number of targets in a subset decrease hence the total number of covered targets decreases.
In Figure 2d, the moving distance constraint varied from 10 to 60. It is observed that when the moving distance constraint increases, the number of targets covered increase, but the growth rate would become slower.
In the simulation experiments, we obtain the numbers of maximum covered tagets through four algorithms, which are smaller than the optimal solutions. We calculate the lower bound of the performance of each algorithm, which is the minimum ratio of the algorithm solution to the optimal solution in the experimental data. Table 2 lists the lower performance bound of each algorithm:
The approximation ratio is a performance lower bound, for example, in a maximization problem, approximation ratio α of the algorithm indicates the approximate solution obtained by the algorithm would at least α times greater than the optimal solution. Remind that the approximation ratio of algorithm MTCLM_RANDOM and MTCLM_DERANDOMIZED is 1 1 / e 0.63 , the approximation ratio of algorithm MTCLM_COLOUR is 1 0.5 which depends on the parameter , where denotes the maximal number of subsets covering the same target. As shown in Table 2, the experimental lower bounds of the performance of the algorithms meet the theoretical analysis. Also, we can see that MTCLM_GREEDY algorithm achieves relatively worse results especially when the size of area is small and the number of targets and sensors remains unchange. That is because when the density of the target and the sensor becomes higher, it cannot just greedily select the target area, it needs to rely on global information. The performance of algorithm MTCLM_RANDOM is with a certain degree of randomness. The algorithm MTCLM_DERANDOMIZED has the best performance but it has higher time complexity than others. The algorithm MTCLM_COLOUR performs better than the theoretical analysis. There are two possibilities, one is that the example with the worst performance is not found, and the other is that there is a more accurate approximation analysis method for algorithm MTCLM_COLOUR, which can be studied further.
Combined with theoretical analysis, we know how to choose a suitable algorithm among these four algorithms according to the actual situation. When the accuracy requirements are not very high and the time requirements are very strict, the MTCLM_GREEDY algorithm and the MTCLM_RANDOM algorithm are good choices. Because these two algorithms only need linear time complexity, but the MTCLM_GREEDY algorithm cannot get a provable performance and the MTCLM_RANDOM has a randomly biased performance. When the target density is not large, that is, the parameter is small, the MTCLM_COLOUR algorithm will achieve good performance. When a sensor can only reach a constant number of target areas, that is, the parameter n denoting the number of target areas a sensor can reach is a constant, the time complexity of the MTCLM_DERANDOM algorithm is not high, and a good approximation ratio can be obtained.

6. Discussion

In this paper, we are the first to present the MTCLM problem to maximize the number of covered targets with sensors under limited mobility constraints. It applies to improving the utilization efficiency of insufficient sensors. Considering that the MTCLM problem is NP-hard and the requirements for time and performance are different in actual situations, we have proposed four algorithms and provided proof of algorithm performance for three of them. Through theoretical and experimental analysis, we also provide the direction of the algorithm selection in actual situations. Moreover, the proposed solutions are applicable to solving relevant resource allocation problems with the same model. In the future, it is interesting to find a more efficient algorithm with a better approximation ratio.

Author Contributions

Conceptualization, D.L. and H.S.; Methodology, D.L., L.C.; Software, D.L.; Validation, D.L., H.S.; Investigation, D.L.; Resources, H.S.; Writing—original draft preparation, D.L.; Writing—review, H.S., L.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by National Key R&D Program of China Project #2017YFB0203201, Key-Area Research and Development Plan of Guangdong Province #2020B010164003. The corresponding author is Hong Shen.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, of in the decision to publish the results.

References

  1. Hackmann, G.; Guo, W.; Yan, G.; Sun, Z.; Lu, C.; Dyke, S. Cyber-physical codesign of distributed structural health monitoring with wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 63–72. [Google Scholar] [CrossRef] [Green Version]
  2. Shahin, M.K.; Tharwat, A.; Gaber, T.; Hassanien, A.E. A wheelchair control system using human-machine interaction: Singlemodal and multimodal approaches. J. Intell. Syst. 2019, 28, 115–132. [Google Scholar] [CrossRef]
  3. Li, X.; Li, D.; Wan, J.; Vasilakos, A.V.; Lai, C.F.; Wang, S. A review of industrial wireless networks in the context of industry 4.0. Wirel. Netw. 2017, 23, 23–41. [Google Scholar] [CrossRef]
  4. Lombardo, L.; Corbellini, S.; Parvis, M.; Elsayed, A.; Angelini, E.; Grassini, S. Wireless sensor network for distributed environmental monitoring. IEEE Trans. Instrum. Meas. 2017, 67, 1214–1222. [Google Scholar] [CrossRef]
  5. Roy, A.; Sarma, N. A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks. Digit. Commun. Netw. 2020. [Google Scholar] [CrossRef]
  6. Pawgasame, W. A survey in adaptive hybrid wireless sensor network for military operations. In Proceedings of the 2016 Second Asian Conference on Defence Technology (ACDT), Chiang Mai, Thailand, 21–23 January 2016; pp. 78–83. [Google Scholar]
  7. Shakila, R.; Paramasivan, B. Performance Analysis of Submarine Detection in Underwater Wireless Sensor Networks for Naval Application. Microprocess. Microsyst. 2020. [Google Scholar] [CrossRef]
  8. Mois, G.; Folea, S.; Sanislav, T. Analysis of three IoT-based wireless sensors for environmental monitoring. IEEE Trans. Instrum. Meas. 2017, 66, 2056–2064. [Google Scholar] [CrossRef]
  9. Srbinovska, M.; Gavrovski, C.; Dimcev, V.; Krkoleva, A.; Borozan, V. Environmental parameters monitoring in precision agriculture using wireless sensor networks. J. Clean. Prod. 2015, 88, 297–307. [Google Scholar] [CrossRef]
  10. Gupta, H.P.; Tyagi, P.K.; Singh, M.P. Regular Node Deployment for k-Coverage in m-Connected Wireless Networks. IEEE Sens. J. 2015, 15, 7126–7134. [Google Scholar] [CrossRef]
  11. Khalesian, M.; Delavar, M.R. Wireless sensors deployment optimization using a constrained Pareto-based multi-objective evolutionary approach. Eng. Appl. Artif. Intell. 2016, 53, 126–139. [Google Scholar] [CrossRef]
  12. Zhang, Y.; Sun, X.; Wang, B. Efficient algorithm for k-barrier coverage based on integer linear programming. China Commun. 2016, 13, 16–23. [Google Scholar] [CrossRef]
  13. Kim, D.; Wang, W.; Son, J.; Wu, W.; Lee, W.; Tokuta, A.O. Maximum lifetime combined barrier-coverage of weak static sensors and strong mobile sensors. IEEE Trans. Mob. Comput. 2016, 16, 1956–1966. [Google Scholar] [CrossRef]
  14. Gao, X.; Chen, Z.; Wu, F.; Chen, G. Energy Efficient Algorithms for k -Sink Minimum Movement Target Coverage Problem in Mobile Sensor Network. IEEE/ACM Trans. Netw. 2017, 25, 3616–3627. [Google Scholar] [CrossRef]
  15. Guo, J.; Jafarkhani, H. Movement-Efficient Sensor Deployment in Wireless Sensor Networks With Limited Communication Range. IEEE Trans. Wirel. Commun. 2019, 18, 3469–3484. [Google Scholar] [CrossRef]
  16. Elhoseny, M.; Tharwat, A.; Yuan, X.; Hassanien, A.E. Optimizing K-coverage of mobile WSNs. Expert Syst. Appl. 2018, 92, 142–153. [Google Scholar] [CrossRef]
  17. Liao, Z.; Zhang, S.; Cao, J.; Wang, W.; Wang, J. Minimizing movement for target coverage in mobile sensor networks. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012; pp. 194–200. [Google Scholar]
  18. Mohamed, S.M.; Hamza, H.S.; Saroit, I.A. Coverage in mobile wireless sensor networks (M-WSN). Comput. Commun. 2017, 110, 133–150. [Google Scholar] [CrossRef]
  19. Wang, Y.; Wu, S.; Chen, Z.; Gao, X.; Chen, G. Coverage problem with uncertain properties in wireless sensor networks: A survey. Comput. Netw. 2017, 123, 200–232. [Google Scholar] [CrossRef]
  20. Elhabyan, R.; Shi, W.; St-Hilaire, M. Coverage protocols for wireless sensor networks: Review and future directions. J. Commun. Netw. 2019, 21, 45–60. [Google Scholar] [CrossRef] [Green Version]
  21. Khoufi, I.; Minet, P.; Laouiti, A.; Mahfoudh, S. Survey of deployment algorithms in wireless sensor networks: Coverage and connectivity issues and challenges. Int. J. Auton. Adapt. Commun. Syst. 2017, 10, 341–390. [Google Scholar] [CrossRef]
  22. Deif, D.S.; Gadallah, Y. Classification of wireless sensor networks deployment techniques. IEEE Commun. Surv. Tutor. 2013, 16, 834–855. [Google Scholar] [CrossRef]
  23. Shi, T.; Li, J.Z.; Gao, H.; Cai, Z.P. Coverage in Battery-Free Wireless Sensor Networks. In Proceedings of the IEEE Conference on Computer Communications (IEEE Infocom 2018), Honolulu, HI, USA, 16–19 April 2018; pp. 108–116. [Google Scholar]
  24. Lin, C.; Zhou, Y.; Ma, F.; Deng, J.; Wang, L.; Wu, G. Minimizing charging delay for directional charging in wireless rechargeable sensor networks. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 1819–1827. [Google Scholar]
  25. Shi, T.; Cheng, S.; Li, J.; Cai, Z. Constructing connected dominating sets in battery-free networks. In Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
  26. Wang, C.; Li, J.; Yang, Y.; Ye, F. A hybrid framework combining solar energy harvesting and wireless charging for wireless sensor networks. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  27. Wu, T.; Yang, P.; Dai, H.; Xu, W.; Xu, M. Charging oriented sensor placement and flexible scheduling in rechargeable WSNs. In Proceedings of the IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, 29 April–2 May 2019; pp. 73–81. [Google Scholar]
  28. Shi, T.; Cheng, S.; Cai, Z.; Li, J. Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks. In Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  29. Gupta, S.K.; Kuila, P.; Jana, P.K. Genetic algorithm approach for k -coverage and m -connected node placement in target based wireless sensor networks. Comput. Electr. Eng. 2016, 56, 544–556. [Google Scholar] [CrossRef]
  30. Dahiya, S.; Singh, P.K. Optimized mobile sink based grid coverage-aware sensor deployment and link quality based routing in wireless sensor networks. AEU-Int. J. Electron. Commun. 2018, 89, 191–196. [Google Scholar] [CrossRef]
  31. Roselin, J.; Latha, P.; Benitta, S. Maximizing the wireless sensor networks lifetime through energy efficient connected coverage. Ad Hoc Netw. 2017, 62, 1–10. [Google Scholar] [CrossRef]
  32. Senouci, M.R.; Bouguettouche, D.; Souilah, F.; Mellouk, A. Static wireless sensor networks deployment using an improved binary PSO. Int. J. Commun. Syst. 2016, 29, 1026–1041. [Google Scholar] [CrossRef]
  33. Liao, Z.; Wang, J.; Zhang, S.; Cao, J.; Min, G. Minimizing movement for target coverage and network connectivity in mobile sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1971–1983. [Google Scholar] [CrossRef]
  34. Chen, Z.; Gao, X.; Wu, F.; Chen, G. A PTAS to minimize mobile sensor movement for target coverage problem. In Proceedings of the INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA, 10–14 April 2016; pp. 1–9. [Google Scholar]
  35. Choudhuri, R.; Das, R.K. Coverage of targets in mobile sensor networks with restricted mobility. IEEE Access 2018, 6, 10803–10813. [Google Scholar] [CrossRef]
  36. Nguyen, N.; Liu, B.; Wang, S. On New Approaches of Maximum Weighted Target Coverage and Sensor Connectivity: Hardness and Approximation. arXiv 2018, arXiv:1811.00487. [Google Scholar] [CrossRef] [Green Version]
  37. Nguyen, N.; Liu, B. The Mobile Sensor Deployment Problem and the Target Coverage Problem in Mobile Wireless Sensor Networks are NP-Hard. IEEE Syst. J. 2019, 13, 1312–1315. [Google Scholar] [CrossRef]
  38. Hochbaum, D.S.; Maass, W. Approximation schemes for covering and packing problems in image processing and VLSI. J. ACM 1985, 32, 130–136. [Google Scholar] [CrossRef]
  39. Barnoy, A.; Guha, S. Approximating the Throughput of Multiple Machines in Real-Time Scheduling. SIAM J. Comput. 2002, 31, 331–352. [Google Scholar] [CrossRef]
Figure 1. Subareas divided by targets.
Figure 1. Subareas divided by targets.
Sensors 21 00184 g001
Figure 2. To show the impression of four parameters on the four algorithms and the optimal solution. (a) shows the impression of the number of targets; (b) shows the impression of the number of sensors; (c) shows the impression of size of area; (d) shows the impression of the moving distance constraint of sensors.
Figure 2. To show the impression of four parameters on the four algorithms and the optimal solution. (a) shows the impression of the number of targets; (b) shows the impression of the number of sensors; (c) shows the impression of size of area; (d) shows the impression of the moving distance constraint of sensors.
Sensors 21 00184 g002
Table 1. Notations.
Table 1. Notations.
SymbolDefinition
T the set of targets: { t 1 , t 2 , , t N }
Sthe set of sensors: { s 1 , s 2 , , s M }
D the distance constraint of sensors: { d 1 , d 2 , , d M }
U a subset of sensors: U T
SU the set of subsets: { U 1 , U 2 , , U K }
Mthe number of sensors: | S |
Nthe number of targets: | T |
Kthe number of subareas: | SU |
rthe sensing radius of sensors
R ( t ) the sensing region of target t
R ( U ) the intersection of R ( t ) for all t U
Table 2. The experimental lower bounds of the performance of the algorithms.
Table 2. The experimental lower bounds of the performance of the algorithms.
Name of the AlgorithmLower Bound of the Performance
MTCLM_GREEDY0.78
MTCLM_RANDOM0.75
MTCLM_DERANCOMIZED0.91
MTCLM_COLOUR0.86
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Liang, D.; Shen, H.; Chen, L. Maximum Target Coverage Problem in Mobile Wireless Sensor Networks. Sensors 2021, 21, 184. https://doi.org/10.3390/s21010184

AMA Style

Liang D, Shen H, Chen L. Maximum Target Coverage Problem in Mobile Wireless Sensor Networks. Sensors. 2021; 21(1):184. https://doi.org/10.3390/s21010184

Chicago/Turabian Style

Liang, Dieyan, Hong Shen, and Lin Chen. 2021. "Maximum Target Coverage Problem in Mobile Wireless Sensor Networks" Sensors 21, no. 1: 184. https://doi.org/10.3390/s21010184

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop