Next Article in Journal
A Novel Complex-Coefficient In-Band Interference Suppression Algorithm for Cognitive Ultra-Wide Band Wireless Sensors Networks
Previous Article in Journal
Automatic Detection of Driver Fatigue Using Driving Operation Information for Transportation Safety
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Max-Flow Based Algorithm for Connected Target Coverage with Probabilistic Sensors

1
School of Computer Science, Hangzhou Dianzi University, Hangzhou 310018, China
2
School of Science, Hangzhou Dianzi University, Hangzhou 310018, China
3
College of Economics, Hangzhou Dianzi University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(6), 1208; https://doi.org/10.3390/s17061208
Submission received: 7 April 2017 / Revised: 10 May 2017 / Accepted: 19 May 2017 / Published: 25 May 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
Coverage is a fundamental issue in the research field of wireless sensor networks (WSNs). Connected target coverage discusses the sensor placement to guarantee the needs of both coverage and connectivity. Existing works largely leverage on the Boolean disk model, which is only a coarse approximation to the practical sensing model. In this paper, we focus on the connected target coverage issue based on the probabilistic sensing model, which can characterize the quality of coverage more accurately. In the probabilistic sensing model, sensors are only be able to detect a target with certain probability. We study the collaborative detection probability of target under multiple sensors. Armed with the analysis of collaborative detection probability, we further formulate the minimum ϵ-connected target coverage problem, aiming to minimize the number of sensors satisfying the requirements of both coverage and connectivity. We map it into a flow graph and present an approximation algorithm called the minimum vertices maximum flow algorithm (MVMFA) with provable time complex and approximation ratios. To evaluate our design, we analyze the performance of MVMFA theoretically and also conduct extensive simulation studies to demonstrate the effectiveness of our proposed algorithm.

1. Introduction

With wide deployment of wireless sensors in the real world, such as air quality monitoring and intrusion detection, wireless sensor networks (WSNs) have attracted tremendous research attention. Sensor coverage is one of the fundamental issues in WSNs. Sensors deployed under stochastic or manual deployment work cooperatively to accomplish a task such as sensing a certain field of interest. Based on the coverage subject, coverage issues can be classified into three categories: target coverage (e.g., [1,2,3,4,5,6]), area coverage (e.g., [7,8,9,10]) and barrier coverage (e.g., [11,12,13,14,15]). The objective of target coverage aims to activate a subset of sensor nodes to monitor targets, which randomly appear in the 2D plane. In the context of the detection application, a target usually represents a static object that periodically generates some event signals, such as an acoustic signal.
In general, WSNs contain one or more sinks, which collect data from sensor nodes. Two sensor nodes can communicate with each other directly if they are within their communication range. As further studies of target coverage, connected target coverage (CTC) includes a more practical constraint, i.e., all active sensor nodes in CTC must be connected to the sink (probably via some relaying nodes). In order to transmit sensing data to the sink, each sensor node must find a route to the sink. Under this restriction, the nodes can communicate with each other and exchange information constructing an ad hoc network. Associated with this issue, existing work focuses mainly on two categories of optimization problems.
One of them is to find the least cost of potential sensor nodes satisfying both coverage and connectivity from a given set of sensor nodes, such as [1,16,17,18]. We name this problem the minimum cost CTC problem. The CTC problem under both the Boolean sensing model and the probabilistic model has been proven to be NP-hard [1,18]. This strategy minimizes the overall network cost as covering targets with the minimum number of sensor nodes. Consequently, if expensive sensors remain as a constraining resource that is economically infeasible for substantial over provision, we should take the minimum number of sensors as an optimization objective.
Most studies are concerned with maximizing network lifetime (e.g., [19,20,21]) in the CTC problem as for sensors’ limited resources. The maximum lifetime CTC problem aims to schedule the activation of sensors to prolong network lifetime. To make a network last beyond the lifetime of an individual node, redundant nodes must be deployed. Hence, low-cost sensors with adequate energy may be the ideal basis for this issue.
In this paper, we study the CTC problem with omnidirectional probabilistic sensors working cooperatively. This is motivated by the observation that much work has been done to address the CTC problem; however, few of them take the probabilistic model (e.g., [1,16,17,21]) into consideration. Existing work makes a perfect assumption that a target will be covered when it lies in the sensing range of a sensor node (binary detection mode). This means that the event will be detected with probability 100 % , either the target is located very close to the sensor, or it lies on the border of the sensing range. In practice, the sensing capability of a sensor is always affected by environmental factors, especially for acoustic sensors. Associated with the reasons mentioned above, the sensing quality of a sensor is represented by its detection probability, which follows a probabilistic distribution. Several empirical models have been proposed (e.g., [22,23]). Since the probabilistic sensing model utilizes a log-distance path loss model [23], it means that the signal attenuates over distance, and it can be detected with high probability closer to the sensor. Leveraging the sensing model from probabilistic sensors, we can characterize the quality of sensor coverage more accurately.
We begin by highlighting the challenges we face with existing mechanisms. Considering the CTC problem under the probabilistic sensing model, we define the minimum ϵ -connected target coverage ( ϵ -CTC) problem. The objective of the problem is to activate the minimum static sensors to achieve the detection probability threshold ϵ for all of the targets. All sensors work in a cooperative fashion, which can improve the detection probability of all targets and reduce the number of active sensors impressively. Furthermore, all active sensors should retain connectivity with the sink (via the relaying node). The challenge of the minimum ϵ -CTC problem we face is how to activate as few sensors as possible, to achieve high detection threshold ϵ and provide connectivity for WSNs. Much different from sensors based on the 0/1 coverage model, probabilistic sensors have to cooperate with each other to achieve threshold ϵ . This means that two or more sensors must be activated for one target, while only one is needed in the 0/1 disk model. This results in the sharp growth of candidate activation schemes, while taking all targets into consideration simultaneously. As a result, it is a non-trivial task to determine a better scheme from a tremendous amount of candidate schemes. Besides, different activation schemes will bring in different costs in connectivity. This induces further complexities in finding candidate activation schemes, as we must take account of the cost for connectivity at the same time. Although the probabilistic model was adopted in [19,20], is has been proven inadequate for a variety of reasons. In [19], an unrealistic assumption is made that a target can be always detected with a probability over the detection threshold by at least one sensor, while the authors in [20] take mobile sensors into consideration. Essentially, both of them fail to schedule probabilistic sensors to detect targets in a cooperative fashion. In [18], an efficient algorithm probabilistic sensors coverage algorithm (PSCA) is presented based on set selection resulting in a better schedule scheme. However, PSCA is time consuming and unfeasible in large-scale WSNs.
To overcome the deficit of existing work where many redundant sensors are needed to achieve the unrealistic assumption in [19] and expensive mobile sensors are required in [20], we design an efficient algorithm with cost-effective static sensors to address the above challenges, inspired by the principle that sensors work in a collaborative way. The cost in [19,20] is high, since they fail to make sensors collaborate with each other. We firstly theoretically analyze the collaborative detection probability of a target by multiple sensors. Based on the theoretical analysis, we define the detection gain used to characterize a sensor’s influence on some targets. A target is deemed to achieve threshold ϵ when its cumulative detection gain by sensors exceeds a certain threshold. On the basis of graph theory, we map the minimum ϵ -CTC problem into a flow network. We show that the problem is NP-hard and propose a bounded approximation Algorithm 1, named the minimum vertices maximum flow algorithm (MVMFA). The key insight of MVMFA is that each augmenting path picked out by the pivotal Algorithm 2 FindPath has more flow and few inactive sensors. This means that a sensor with a high detection probability, but passing few relaying sensors by, will be activated firstly. Our main contributions are summarized as follows.
  • We formulate the minimum ϵ -CTC problem with omni-directional probabilistic sensors.
  • By reducing a minimum ϵ -detection coverage problem to the minimum ϵ -CTC problem, we prove it is NP-hard and transform it to the max-flow problem.
  • We propose the minimum vertices maximum flow algorithm to solve our problem and theoretically show its time complexity and approximation bound.
The rest of the paper is organized as follows. In Section 2, a review of the relevant literature is given. In Section 3, the problem statement and formulation are presented. Section 4 discusses the theoretical analysis of the problem. Section 5 presents our algorithm design and analysis. Simulation results are presented in Section 6, and finally, we conclude the paper in Section 7.

2. Related Work

WSNs have many applications in air quality, water pollution, intrusion detection, etc. [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,24]. Among the tremendous works in the research field of coverage, we survey the related CTC research proposals in the following section.
In earlier research related to CTC problem, the concept of connected coverage in target coverage in WSNs was proposed by Zhao in [25]. The objective of connected coverage is to maximize the network lifetime. They defined a maximum cover tree (MCT) problem, scheduling sensors into multiple sets. Each set represents a cover tree, which is rooted at the sink node that can cover all of the target points. The MCT problem is also NP-complete, and they provide an approximation algorithm. In [26], a round-based localized algorithm is proposed to coordinately determine sensor’ sensing range in order to prolong the WSN’s lifetime. However, in [26], only the sensors routed to the sink are required to be active, instead of all sensors in the backbone. Both target coverage and connectivity are satisfied in [25,26].
There are two primary approaches to classify existing research on the CTC problem. One is the type of optimization objective: the minimum cost CTC problem [1,16,17,27] or the maximum lifetime CTC problem [26,28,29,30]. Early work on the minimum cost CTC problem [1] assumed that the energy cost of WSNs included energy for both coverage and connectivity, called minimum-energy connected coverage (MeCoCo). By a reduction from the geometric set cover problem, the MeCoCo problem was proven to be NP-hard. The authors were the first to provide approximation algorithms with provable performance ratios for this problem. Similar to [1] except for the definition of the cost, the minimum cost CTC problem is addressed in [16,17], where the goals of the problem are to schedule the minimum sensors with the constraints of coverage and connectivity. Two approximate methods based on the local search technique and genetic algorithm, respectively, were provided in [16] with efficient results. In [17], an oppositional gravitational search algorithm (OGSA)-based approach was proposed to solve the similar problem in [16]. The simulation results show that the solution OGSA outperforms the approach of [16]. The objective of minimum cost CTC in [27,28] was to design an efficient algorithm to place minimum relaying nodes to provide desired k-connectivity. A genetic algorithm-based approach, as well as a greedy-based approach are proposed in [27] for minimum cost CTC, and a heuristic is designed for maximum lifetime in [28]. In [30], multiple sensing units are additionally taken into account. Two distributed heuristic schemes, REFS (remaining energy first scheme) and EEFS (energy efficiency first scheme), are proposed. Evaluations show that both of them can prolong the network lifetime effectively. However, EEFS outperforms REFS in network lifetime, but REFS is time saving.
Another way to classify existing work is by the type of sensing models. Some early works assumed that the sensing model was a 0/1 disk [16,28,29,30,31], while more recent work began to take probabilistic models into consideration [18,19,20,23,32,33,34]. An algorithm, CWGC-PM (communication weighted greedy cover probabilistic model), is specially designed to solve the CTC problem under the probabilistic coverage model in [19]. However, they make an unrealistic assumption that each target is always detected with a probability over the detection threshold by at least one of the active source sensors. In [20], mobile sensors are adopted to cover target beyond the detection threshold by moving closer to target. Probabilistic sensors were also employed to cover a series targets in [32,33]. A genetic algorithm based on a probabilistic coverage matrix is designed to select the minimum sensors to meet the probability of detection requirement in [32]. However, they fail to take account of connectivity. Additionally, probabilistic sensors were used in [33] to track moving targets. The probabilistic sensors coverage algorithm (PSCA) with provable approximation ratios [18] for the minimum ϵ -detection coverage problem aims to reduce the number of active sensors. They map the problem into a set select problem by constructing the candidate coverage set (CCS) and activate sensors for coverage requirement from the CCS. Moreover, a Steiner tree algorithm is used to picked out some sensors as relay nodes to maintain the network connectivity.
In summary, although probabilistic sensors have been adopted for the coverage problem [18,19,20,23,32,33,35], there are still some differences. The subject detected in [13,33,35] is different from us, since the work in [13] focuses on barrier coverage. The paper [33] is for moving targets tracking, and the paper [35] solves the area coverage problem [19]. Additionally, the authors in [23,32] fail to take connectivity into consideration. Despite that PSCA [18] could obtain a better performance in the number of active sensors, it is infeasible for large-scale WSNs because of the high time complexity. In this study, an approximate algorithm, MVMFA, is proposed to schedule the sensors, such that a given set of targets can be detected beyond the detection threshold ϵ , and the sensing information can be routed to the sink.

3. Preliminaries and Problem Formulation

In this section, we first describe the probabilistic sensing model in detail. After that, we present the network model for our research. This is followed by a formal statement of the minimum ϵ -connected target coverage problem. For convenience, the symbols in this paper are shown in Table 1.

3.1. Sensing Model

Targets are often modeled as a set of discrete space points within the sensor field. However in this paper, a target denotes a static object that generates some event signals periodically, such as the acoustic signal. Heterogeneous probabilistic sensors will be deployed to capture the occurrence of the event by receiving the signal from a target object. A target will obtain the coverage requirement when it can be detected by sensors beyond the detection probability threshold ϵ . Under this circumstance, an occurrence of the event will be captured beyond the minimum detection probability ϵ . In this study, the meaning of the target is the same as the target in [18].
In the probabilistic sensing model, sensors detect targets by received energy, which attenuates as the distance increases. As a result, probabilistic sensors, which can characterize the quality of coverage more accurately, are often used in the field of detection applications. The detection probability is a attenuation function p = λ ( d ) , where d is the distance between sensors and targets. It is a continuously decreasing distance-dependent attenuation function. Several models have been proposed (e.g., [23,34,36]). For example, the work in [22] suggested that the detection probability of a location t by a sensor i can be characterized by:
p i ( t ) = e α d ( i , t ) , i f d ( i , t ) r s k 0 ,     o t h e r w i s e
where α is a parameter representing the physical characteristics of the sensor, d ( i , t ) is the distance between i and t and r s k is the detection boundary of the probabilistic sensors. The detection probability is considered zero once the distance between some target and some sensor is beyond r s k . Assuming that the energy radiated by targets is equal, Figure 1 describes the relationship between detection probability and distance, where α = 0.1 .
Multiple probabilistic sensors working in a cooperative fashion can enhance the detection probability impressively. Assuming that s t is the sensor set around the target t, the collaborative detection probability of t is denoted by P ( t ) . P ( t ) is computed by the probability formula, which integrates the detection probability of each sensor in s t , i.e.,
P ( t ) = 1 i s t ( 1 p i ( t ) )
Figure 2 presents the collaborative detection probability, for two sensors i and j located at ( 0 , 14 . 14 , 0 ) and ( 14 . 14 , 0 , 0 ) , respectively. If an event occurs at the middle point between them, the collaborative detection probability is 0 . 60 , while the individual detection probabilities for both i and j is 0 . 36 .
Each sensor to be routed to the sink (probably via some relaying nodes) has a transmission radius R t . Two sensors can communicate with each other within Euclidean distance R t . We denote it as relaying sensor, which is only activated for communication.

3.2. Network Model

Our WSNs with static probabilistic sensors will be deployed in an L × L 2D Euclidean plane under stochastic deployment. As Figure 3 shows, a probabilistic sensor is denoted by four-tuple < x , y , α , r s k > , where x , y is the coordinate in the 2D plane; α and r s k are intrinsic parameters of the sensor as the previous section mentioned. All sensors are heterogeneous in terms of α and r s k , but share the same transmission radius R t . Let S denote the sensor set, and D denote the target set. All targets appear randomly in the same plane: D S = ø. Each target can be detected by multiple sensors nearby, and vice versa. We assume that the location information of sensors and targets can be obtained by some localization methods previously. There also exists a sink node, and all active sensors must be routed to it.

3.3. Problem Statement

The CTC problem requires that the detection probability of each target is at least ϵ by activating sensors from the randomly-deployed S. Given the detection probability threshold ϵ , we formally define the minimum ϵ -connected target coverage problem based on our sensing model and network model as follows.
Minimum ϵ -connected target coverage problem (minimum ϵ -CTC problem): Given a set of sensors S, a set of targets D and a sink S , targets in D randomly distributed are required to be detected with the minimum detection probability ϵ . We aim to activate a subset C S with the least sensors that the detection probability of each target in D detected by sensors in C is at least ϵ . In addition, all sensors in C need to be routed to the sink S (via relaying sensor nodes).
Indeed, it is a challenge to find the optimum solution for the minimum ϵ -CTC problem in polynomial time.

4. Theoretical Analysis

For mapping our problem into a network flow problem, we first linearize the collaborative detection probability formula similar to [13,18]. Next, we prove that the minimum ϵ -CTC problem is NP-hard by a reduction from the minimum ϵ -detection coverage problem. Lastly, we describe the transformation from our problem to a network flow problem in detail and present a method to set r s k .

4.1. Analysis of Detection Probability

Given a target t detected by a sensor set s t , the detection probability is Equation (2). According the coverage requirement, P ( t ) should be larger than ϵ . Then, we can get:
P ( t ) = 1 i s t ( 1 p i ( t ) ) ϵ
We linearize the formula as follows.
P ( t ) = 1 i s t ( 1 p i ( t ) ) ϵ
1 ϵ i s t ( 1 p i ( t ) )
ln ( 1 ϵ ) i s t ln ( 1 p i ( t ) )
ln ( 1 ϵ ) i s t ln ( 1 p i ( t ) )
The term Ψ = ln ( 1 ϵ ) is defined as the aggregate gain threshold.
Sensor detection gain ϕ i ( t ) : A target can get detection gain from sensor i according to the formula:
ϕ i ( t ) = ln ( 1 p i ( t ) )
The detection gain reflects how much impact a sensor has on one target.
Cumulative detection gain i s t ϕ i ( t ) : A target’s cumulative detection gain is to aggregate detection gains from the surrounding sensors.
Obviously, if the target t satisfies the coverage requirement, then its cumulative detection gain must be larger than Ψ , i.e.,
i s t ϕ i ( t ) Ψ

4.2. NP-Hardness

In this section, we prove the NP-hardness of the minimum ϵ -CTC problem theoretically by a reduction from the minimum ϵ -detection coverage problem [18]. We have previously proven that the minimum ϵ -detection coverage problem is NP-hard without taking connectivity into consideration. According to the proven NP-hardness, for any instance in the minimum ϵ -detection coverage problem, it should be reduced to the minimum ϵ -CTC problem in polynomial time.
Theorem 1.
The minimum ϵ-CTC problem is NP-hard.
Proof of Theorem 1.
Assume an instance of the minimum ϵ -detection coverage problem, S = { 1 , 2 , . . . , n } and D = { t 1 , t 2 , . . . , t m } , where S denotes the sensor set and D denotes the target set. It aims to activate the least sensors from S that all targets in D must be detected beyond the detection probability threshold ϵ . Note that all sensors in the minimum ϵ -detection coverage problem share the same parameters. The reducing procedure will be presented in detail.
As shown in Figure 4, we calculate the diameter (denoted by ) of the sensor set S based on the rotating calipers [37] in O ( n ) time, followed by computing the convex hull of S . For each sensor i in S , a corresponding probabilistic sensor i is created at the same location with the same r s k and R t = . Additionally, for each target t i in D , a corresponding target t i is put at the same location. Lastly, we put the sink S anywhere in the convex hull. As a result, any active sensor can communication with the sink directly with one hop. Under these settings, the minimum ϵ -CTC problem is to find the least probabilistic sensors with r s k and R t , centered in sensors { 1 , 2 , . . . , n } to detect all targets, which is exactly the same as the minimum ϵ -detection coverage problem.
In other words, the minimum ϵ -detection coverage problem is a special case of the minimum ϵ -CTC problem, under the constraints of homogeneous sensors with the same r s k and R t = . In [18], the minimum ϵ -detection coverage problem has been proven NP-hard. Therefore, the minimum ϵ -CTC problem must also be NP-hard. ☐

4.3. Problem Transformation

Both the detection probability and detection gain will be very small when the distance between sensor and target is large. Furthermore, it will be more cost-effective to obtain the probability with short distance.
Minimum detection probability p m i n : p m i n is a pre-defined threshold set by applications. If the detection probability of a target t is detected by one sensor i to be less than p m i n , we take it as zero, otherwise e α d ( i , t ) .
We have previously presented a method in [18] to determine the p m i n for different detection probability threshold ϵ . Here, we give a suggestion to design the r s k for each probabilistic according to:
e α r s k = p m i n
r s k = ln p m i n α
Due to requirements of both coverage and connectivity, the minimum ϵ -CTC problem is complex. We introduce a network flow model to solve it.
Based on the analysis of detection probability, we further build a flow graph G = ( S D { S } { S } , E ) to characterize the feature of the network where S denotes the sensor set, where D is the target set; S denotes the sink; S represents the super source we created; and E is the edge set. In order to transform our problem to a max-flow problem, we create a super source S as the source of the flow graph G.
The construction of G is as follows:
(1)
For t D , we add directed edge S , t into E with capacity Ψ . We name it the virtual edge.
(2)
For t D , i S , if p i ( t ) > p m i n , it will be linked with an directed edge t , i with capacity ϕ i ( t ) according to Equation (3). We denote it the sensing edge.
(3)
For i S , i S , if d ( i , i ) < R t , an undirected edge ( i , i ) will be added into E and its capacity is + . We denote it the communication edge.
(4)
For i S , if d ( i , S ) < R t , then i , S E with capacity + .
We show an example of G in Figure 5.
Theorem 2.
When G’s maximum flow equals | D | × Ψ , the sensors delivering the maximum flow satisfy both the coverage and connectivity requirements for the minimum ϵ-CTC problem.
Proof of Theorem 2.
When the maximum flow reaches | D | × Ψ , it means that each virtual edge is saturated. As a result, the flow from each target is Ψ , and it will be transferred to the sink S by communication edges. Assuming for each, t D , s t denotes the sensor set that transfers flow from t, we can get i s t ϕ i ( t ) i s t f ( i ) = Ψ ( f ( i ) is the flow value through node i). As a result, the detection probability of t is at least ϵ based on Equation (4). Since Ψ flows from t will eventually arrive at the sink S , each sensor in s t can communicate with the sink (probably via some relaying nodes). ☐
According to Theorem 2, we can reduce the minimum ϵ -CTC problem to the minimum vertices maximum flow problem.
Minimum vertices maximum flow problem: Based on the flow graph G = ( S D { S } { S } , E ) we constructed, our ultimate aim is to find a minimum set C S , and the subgraph of the max flow of G = ( C D { S } { S } , E ) (the G construction method is the same as G) is equal to | D | × Ψ .
Without a doubt, the minimum vertices maximum flow problem is also NP-hard.

5. Algorithm Design

Based on the above analysis, we have proven the minimum vertices maximum flow problem to be NP-hard. It is hard to find the optimal solution in polynomial time. In this section, we first design an approximation solution, named the minimum vertices maximum flow algorithm (MVMFA). Next, the time complexity and approximation ratios are proven in theory.

5.1. Approximation Algorithm

The minimum vertices maximum flow problem aims to find a minimum set C S to meet upper flow value | D | × Ψ . We design the MVMFA (Algorithm 1) based on the FindPath, which aims to find the augmenting path.
Firstly, we create flow graph G as mentioned in Section 4. As we know, the key to solve the problem using the network flow is to map the problem into the network flow graph. MVMFA is based on the classical network flow method of Ford–Fulkerson. The basic idea of MVMFA is to find the augmenting path iteratively with a bigger ρ :
ρ = a u g m e n t i n g p a t h f l o w t h e n u m b e r o f i n a c t i v e s e n s o r n o d e s
and the flow will be sent to the sink S along the path. The distinction between MVMFA and other maximum flow algorithms, such as Edmonds-Karp [38] and Dinic [39], is the method to find the augmenting path. Probabilistic sensors will be activated along the augmenting path.
Algorithm 1 MVMFA.
1:
C r e a t e a s u p e r s o u r c e s
2:
C r e a t e G = ( S D { S } { S } , E )
3:
C =
4:
call F i n d P a t h t o f i n d a p a t h μ ( S , S ) w i t h a b i g g e r ρ
5:
if f l o w o f μ ( S , S ) i s 0 then
6:
    return C
7:
else
8:
     s e n d t h e f l o w a l o n g t h e a u g m e n t i n g p a t h μ ( S , S )
9:
     a c t i v a t e t h e s e n s o r n o d e s i n μ ( S , S ) a n d p u t t h e m i n t o C
10:
    goto 4
11:
end if

5.2. Algorithm Analysis

We analyze the performance of our proposed algorithm MVMFA theoretically in this section.
In this paper, we present the FindPath algorithm (Algorithm 2) to find an augmenting path μ ( S , S ) . FindPath is based on the priority queue and breadth-first-search method. We define the structure NodeInfo to record the information of the search nodes.
struct NodeInfo{
  f l o w ;
  c o u n t ;
  i d ;
  N o d e I n f o * f a t h e r ;
};
As mentioned above, f l o w represents the flow value, while c o u n t is the number of inactive sensor nodes when achieving some search node. I d is the sensor identifier corresponding to the search node. In the priority queue we defined, the search node with bigger ρ will be in front of the queue (if the count is zero, the ρ with bigger flow is larger than the others).
Algorithm 2 FindPath.
1:
c r e a t e a p r i o r i t y _ q u e u e N o d e I n f o * Q ;
2:
c r e a t e a n i n i t i a l s e a r c h n o d e w h e r e f l o w = 0 , i d = S , c o u n t = 0 a n d f a t h e r = N U L L ;
3:
p u s h t h e i n i t i a l s e a r c h n o d e i n t o Q ;
4:
b F i n d P a t h = FALSE ;
5:
while Q i s n o t e m p t y do
6:
    pop the first search node pnode of Q;
7:
    if p n o d e i d i s S then
8:
         b F i n d P a t h = TRUE ;
9:
         c a l c u l a t e t h e r o u t e μ ( S , S ) b y t h e f a t h e r ;
10:
         return μ ( S , S ) ;
11:
    end if
12:
     u = p n o d e i d ;
13:
    if u i s u n v i s i t e d then
14:
         s e t u v i s i t e d ;
15:
    else
16:
         c o n t i n u e ;
17:
    end if
18:
    for e a c h a d j a c e n t v e r t e x i o f u do
19:
        if i i s n o t v i s i t e d a n d c u , i > 0 then
20:
            c r e a t e a n e w s e a r c h n o d e n e w
21:
           if i i s a c t i v e then
22:
                n e w c o u n t = p n o d e c o u n t ;
23:
           else
24:
                n e w c o u n t = p n o d e c o u n t + 1 ;
25:
           end if
26:
            n e w i d = i ;
27:
            n e w f l o w = m i n ( c u , i , p n o d e f l o w ) ;
28:
            n e w f a t h e r = p n o d e ;
29:
            Q . p u s h ( n e w ) ;
30:
        end if
31:
    end for
32:
end while
33:
if b F i n d P a t h i s FALSE then
34:
     return 0 ;
35:
end if
Lemma 1.
After each invocation of FindPath, some sensing edge or virtual edge will be saturated.
Proof of Lemma 1.
All vertices in G can be divided into five parts as Figure 6 shows, super source, target nodes, sensor nodes, relaying nodes and the sink S . The characteristic of our flow graph G determines that the flow in μ ( S , S ) starts from the virtual edge, passes the sensing edge and arrives at the sink through the communication edge. The flow value of each augmenting path relies on the capacity of the virtual edge and sensing edge due to the limited capacity.
Before we first call FindPath, all sensor nodes have not been activated. Assuming μ ( S , S ) = S , t , a , b , c , . . . , S is the first augmenting path by FindPath, S , t denotes virtual edge, while t , a represents the sensing edge. It is obvious that the flow in μ ( S , S ) is m i n ( c ( S , t ) , ϕ a ( t ) ) ( c ( S , a ) is the capacity of S , a ). Thus, S , a or t , a will be saturated. In either case, t , a will not appear in the augmenting path any more.
After that, the augmenting path μ ( S , S ) = S , t , a , b , c , . . . , S that FindPath explores later has two scenarios:
(1) μ ( S , S ) does not contain activating sensor nodes. This scenario is the same as μ ( S , S ) , and t , a will not be selected by FindPath anymore.
(2) μ ( S , S ) contains activating sensors. Without loss of generality, we assume c is the first active sensor node, which is in μ ( S , S ) . There is no doubt that flow in μ ( S , S ) equals m i n ( c ( S , t ) , ϕ a ( t ) ) . Due to the active sensor node c , there must be a path μ ( c , S ) in which all sensor nodes have to be activated previously. Along μ ( c , S ) , flow will not decrease while the count of the search node will not increase. Whether the flow is c ( S , t ) or ϕ a ( t ) , FindPath will not pass t , a anymore. In summary, after each invocation of FindPath, some sensing edges or virtual edges must be saturated. Meanwhile, FindPath passes every sensing edge at most once. ☐
Theorem 3.
The time complexity of MVMFA is O ( κ | D | × | E | 2 × log | E | ) , where κ is the maximum out-degree of targets.
Proof of Theorem 3.
Lemma 1 shows that each sensing edge is selected at most once. Hence, FindPath is invoked at most t = 1 | D | o u t d e g r e e ( t ) times ( o u t d e g r e e ( t ) denotes the out-degree of target t). In FindPath, the while loop executes at most O ( | E | ) times because each edge is pushed into the priority queue at most once (each search node represents an edge). In the while loop, it costs O ( | S | l o g ( | E | ) ) time to push adjacent search nodes into the priority queue. Therefore, the time complexity of MVMFA is O ( | S | l o g ( | E | ) ) × O ( | E | ) × t = 1 | D | o u t d e g r e e ( t ) = O ( κ | D | × | E | log ( | E | ) | S | ) . ☐
We assume N is the size of C computed by MVMFA, while N o p t is the optimum.
Theorem 4.
N N o p t β h m a x ln ( 1 ϵ ) l n ( 1 p m i n ) , where h m a x = max t D h o p ( t , S ) ( h o p ( a , b ) is the minimum hops from a to b minus one) and β is the maximum indegree of sensor nodes.
Proof of Theorem 4.
Assuming MVMFA invokes k times FindPath, each flow value is denoted by ϕ 1 , ϕ 2 , . . . ϕ k , and each count is Δ 1 , Δ 2 , . . . Δ k , respectively.
According to FindPath based on the priority queue and the breadth-first-search, we can find the augmenting path with a bigger ρ . We can get:
ϕ 1 Δ 1 ϕ m i n 1 Δ 1 ϕ 2 Δ 2 ϕ m i n 2 Δ 2 . . . ϕ k Δ k ϕ m i n k Δ k
where in the i-th invocation of the FindPath, ϕ m i n i denotes the minimum flow of all search nodes and Δ i represents the maximum count. In the worst case scenario, the augmenting path may arrive at the sink with the flow value ϕ m i n i and Δ i inactive sensors. Furthermore, Δ i is not larger than h m a x , i.e.,
Δ i h m a x
with Equations (5) and (6),
ϕ i Δ i ϕ m i n i h m a x ln ( 1 p m i n ) h m a x , i = 1 , 2 , . . . k
According to Equations (5) and (7), we can get:
ϕ 1 + ϕ 2 + , . . . , + ϕ k Δ 1 + Δ 2 + , . . . , + Δ k ln ( 1 p m i n ) h m a x
| D | × Ψ N ln ( 1 p m i n ) h m a x
N | D | ln ( 1 ϵ ) ln ( 1 p m i n ) × h m a x
The minimum ϵ -CTC problem concentrates on finding the minimum C. When we just take account of coverage without connectivity, we assume N c is the minimum number sensors ensuring coverage needs. Obviously, N o p t N c . Let β denote the maximum indegree of sensor nodes. It means one sensor can detect at most β targets. Therefore, the least number of sensors we need satisfies:
N o p t N c | D | β
With Equations (8) and (9),
N N o p t ln ( 1 ϵ ) | D | h m a x ln ( 1 p m i n ) × | D | β = β h m a x ln ( 1 ϵ ) ln ( 1 p m i n )

6. Performance Evaluation

In order to illustrate the effectiveness and efficiency of our new method, we present the simulation results. At the same time, we compare our algorithm with the minimum weight barrier algorithm (MWBA) [13], the localized coverage quality algorithm (LoCQAL) [20] and PSCA [18]. In our simulation studies, static probabilistic sensors are randomly deployed in different size areas, with the constraint that each target is detected at least ϵ . We predefine the p m i n equal to 0 . 2 for all simulations. Furthermore, we randomly assign the parameter α for each sensor, ranging from 0 . 8 to 1. However, we adjust the parameter r s k for each sensor with the constraint of p m i n = 0 . 2 . This paper adopts the exponential attenuation probabilistic model proposed in [22].

6.1. Algorithm Evaluation

As shown in Figure 7, extensive simulations are conducted to evaluate the performance of MVMFA, in terms of detection region size L, number of targets | D | and detection threshold ϵ . The number of sensors | S | ranges from 100 to 300. For a given | S | , we randomize the sensors in a square of L × L = 75 | S | m2 plane and generate different target sizes to calculate the corresponding active sensors. All sensors have a communication radius R t = 40 m. We repeat each experiment 30 times in the same scenario and compute the average as the result for different parameters.
The purpose of the minimum ϵ -CTC problem is to minimize the number of activated probabilistic sensors, including the relaying sensors. Figure 7a–c show the number of sensors activated by MVMFA under different detection thresholds ϵ , 0 . 7 , 0 . 8 and 0 . 9 . Different lines correspond to different target sizes | D | (15, 20 and 25). Three remarkable observations are: (i) the algorithm has a better stability with the target size | D | increasing; (ii) the bigger the detection probability threshold ϵ , the larger the number of the active sensors is; and (iii) given the requirements of both coverage and connectivity, increasing the network size brings the number of active sensors up.
In Figure 8, we evaluate the performance of MVMFA with respect to the density ω = | S | L × L and ϵ . We fix the length of the sensor field L = 150 m and generate ω × L × L sensors, the number of targets being 15, 20 and 25, respectively. We vary 1 ω to 75, 80, 85, 90, 95, 100, respectively, and vary ϵ to 0.7, 0.8, 0.9, respectively. Figure 8 shows the number of active sensors with different densities and ϵ . As expected, the number of active sensors increases with larger 1 ω and ϵ , respectively.

6.2. Comparison of the Algorithms

In this subsection, we first compare the performance of MVMFA with that of MWBA (minimum weight barrier algorithm) [13]. As we mentioned in the Related Work section, MWBA is designed to solve barrier coverage with the probabilistic sensors, aiming to prolong the lifetime of WSNs. One of the key differences is the method used to construct the network flow graph. However, under some modifications of the graph construction in MWBA, it can be used to solve our problem. To apply MWBA to our problem, we adopt FlowOrientedMWBA with the constraint of each sensor’s weight being one.
The number of sensors achieved by MVMFA and MWBA versus different ϵ and | D | is plotted in Figure 9. We fix the network size | S | to 300 and R t to 40 m, while varying the detection probability ϵ in Figure 9a and the target size in Figure 9b. The target size is set to 20 in Figure 9a, and the detection probability threshold is 0.8 in Figure 9b. The plots suggest that MVMFA always has a better performance compared with MWBA in different scenarios. MVMFA uses FindPath to find the augmenting path, while MWBA invokes Breadth First Search (BFS) in the Edmonds–Karp algorithm. The FindPath always finds a better augmenting path with bigger ρ (more flows and less inactive sensors), whereas BFS fails to take the state of sensors (inactive or active) into consideration. It hence naturally outperforms MWBA.
As shown in Figure 10, the methods considered include our new method MVMFA, the probabilistic sensor coverage algorithm (PSCA) in [18], the localized coverage quality algorithm (LoCQAL) in [20]. In order to apply the LoCQAL method to our problem, the probabilistic sensors in the LoCQAL method is set static. We randomly deploy 150 sensors with the detection probability threshold ϵ 0.8 in this comparison experiment.
We vary the communication radius R t ranging from 18 m to 42 m in Figure 10a and also simulate different application scenarios by varying target size | D | ranging from 10 to 28 in Figure 10b. With a larger communication radius R t , we observe less sensors being activated in WSNs. This is because a larger communication radius R t leads to fewer relaying sensors being activated in connectivity. As shown in Figure 10b, more sensors will be activated with the target size increasing. In addition, it is obvious that our method is more efficient than both the PSCA method and the LoCQAL method. This is because in LoCQAL, the relaying nodes in the connected domination set (CDS) are always activated. Nevertheless, only the sensors routed to the sink are required to be active in our method MVMFA and PSCA, instead of all sensors in the CDS. The PSCA method is similar to our approach MVMFA in terms of performance, but it has a high time complexity. Since an enumeration algorithm called the candidate coverage set algorithm was used in PCSA, it is infeasible in large-scale WSNs.

7. Conclusions

In this paper, we study the minimum ϵ connected target coverage problem in WSNs. We aim to capture occurrences of the events by receiving the signal from a target object. We adopt omni-directional probabilistic sensors with the exponential attenuation probabilistic model. Based on the theoretical analysis of the probabilistic model, we propose the minimum ϵ -CTC problem with the NP-hard proof. In order to solve the problem, we map the minimum ϵ -CTC problem into a maximum flow problem with an extra optimization objective. We prove the MVMFA approach with provable time complexity and approximation ratios. Extensive simulation studies are conducted to evaluate our method, and the results demonstrate the effectiveness of our proposed algorithm.
In this work, we have neglected the energy consumption of different sensors and focus on the least number of activating sensors. However, there also exist sensors that are activated as relaying nodes. As just for connectivity, the relaying nodes consume less energy. In our future work, we will focus on minimizing the total energy cost of both coverage and connectivity. On the other hand, sensors with directional sensing ability are increasingly adopted for energy conservation. However, existing proposals mostly assume omni-directional probabilistic sensors. This motivates us to investigate the connected target coverage problem under directional probabilistic sensors. The evaluation of our algorithm in the real test-bed is also a meaningful work in the future.

Acknowledgments

This work is supported by National Science Foundation of China (61370087, 11671115) and the Zhejiang Provincial Science and Technology Project (2017C01065).

Author Contributions

This paper was prepared through a collective effort of all of the authors. In particular: Anxing Shan has contributed the objective function definition, the constraints definition, performed the simulations, the analysis of the results, the preparation of the diagrams and figures and the preparation of the text; Xianghua Xu has contributed the concept of the research, the state-of-the-art and references, as well as the optimization algorithm concept; Zongmao Cheng has contributed the interpretation of the simulation results, the description of the optimization algorithm, the formal definition of the optimization problem.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Han, K.; Xiang, L.; Luo, J.; Liu, Y. Minimum-energy connected coverage in wireless sensor networks with omni-directional and directional features. In Proceedings of the ACM international symposium on Mobile Ad Hoc Networking and Computing, Hilton Head, SC, USA, 11–14 June 2012; pp. 85–94. [Google Scholar]
  2. Tsai, H.W.; Jhong, J.J.; Lin, M.R. The angle coverage algorithm of mobile object in wireless camera sensor networks. In Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, Aizuwakamatsu, Japan, 2–4 November 2013; pp. 422–428. [Google Scholar]
  3. Wu, M.C.; Lu, W.F. On Target Coverage Problem of Angle Rotatable Directional Sensor Networks. In Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan, 3–5 July 2013; pp. 605–610. [Google Scholar]
  4. Yan, T.; He, T.; Stankovic, J.A. Differentiated Surveillance for Sensor Networks. In Proceedings of the International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA, 5–7 November 2003; pp. 51–62. [Google Scholar]
  5. Liao, Z.; Wang, J.; Zhang, S.; Cao, J.; Min, G. Minimizing movement for target coverage and network connectivity in mobile sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1971–1983. [Google Scholar] [CrossRef]
  6. Feng, J.; Zhao, H.; Lian, B. Efficient and Adaptive Node Selection for Target Tracking in Wireless Sensor Network. J. Sens. 2016, 2016, 1–9. [Google Scholar] [CrossRef]
  7. Chen, J.; Zhang, L.; Kuo, Y. Coverage-Enhancing Algorithm Based on Overlap-Sense Ratio in Wireless Multimedia Sensor Networks. IEEE Sens. J. 2013, 13, 2077–2083. [Google Scholar] [CrossRef]
  8. Senouci, M.R.; Mellouk, A.; Assnoune, K. Localized Movement-Assisted SensorDeployment Algorithm for HoleDetection and Healing. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1267–1277. [Google Scholar] [CrossRef]
  9. Yildiz, E.; Akkaya, K.; Sisikoglu, E.; Sir, M.Y. Optimal Camera Placement for Providing Angular Coverage in Wireless Video Sensor Networks. IEEE Trans. Comput. 2014, 63, 1812–1825. [Google Scholar] [CrossRef]
  10. Fu, Y.G.; Zhou, J.; Deng, L. Surveillance of a 2D Plane Area with 3D Deployed Cameras. Sensors 2014, 14, 1988–2011. [Google Scholar] [CrossRef] [PubMed]
  11. Wang, Z.; Liao, J.; Cao, Q.; Qi, H.; Wang, Z. Barrier Coverage in Hybrid Directional Sensor Networks. IEEE Trans. Mob. Comput. 2013, 13, 222–230. [Google Scholar]
  12. He, S.; Gong, X.; Zhang, J.; Chen, J.; Sun, Y. Barrier Coverage in Wireless Sensor Networks: From Lined-Based to Curve-Based Deployment. INFOCOM 2013, 12, 470–474. [Google Scholar]
  13. Chen, J.; Li, J.; Lai, T.H. Energy-Efficient Intrusion Detection with a Barrier of Probabilistic Sensors: Global and Local. IEEE Trans. Wirel. Commun. 2013, 12, 4742–4755. [Google Scholar] [CrossRef]
  14. DeWitt, J.; Shi, H. Maximizing lifetime for k-barrier coverage in energy harvesting wireless sensor networks. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 300–304. [Google Scholar]
  15. Wang, Z.; Chen, H.; Cao, Q.; Qi, H.; Wang, Z. Fault tolerant barrier coverage for wireless sensor networks. INFOCOM 2014, 1869–1877. [Google Scholar]
  16. Rebai, M.; Snoussi, H.; Hnaien, F.; Khoukhi, L. Sensor deployment optimization methods to achieve both coverage and connectivity in wireless sensor networks. Comput. Oper. Res. 2015, 59, 11–21. [Google Scholar]
  17. Jehan, C.; Punithavathani, D.S. Potential position node placement approach via oppositional gravitational search for fulfill coverage and connectivity in target based wireless sensor networks. Wirel. Netw. 2016, 1–14. [Google Scholar] [CrossRef]
  18. Shan, A.; Xu, X.; Cheng, Z. Target Coverage in Wireless Sensor Networks with Probabilistic Sensors. Sensors 2016, 16, 1372. [Google Scholar] [CrossRef] [PubMed]
  19. Kim, C.M.; Kim, Y.; Kang, I.S.; Lee, K.; Han, Y.H. A scheduling algorithm for connected target coverage under probabilistic coverage model. In Proceedings of the International Conference on Information Networking, Bangkok, Thailand, 28–30 January 2012; pp. 86–91. [Google Scholar]
  20. Zorbas, D.; Razafindralambo, T. Prolonging network lifetime under probabilistic target coverage in wireless mobile sensor networks. Comput. Commun. 2013, 36, 1039–1053. [Google Scholar] [CrossRef]
  21. Willson, J.; Zhang, Z.; Wu, W.; Du, D.Z. Fault-tolerant coverage with maximum lifetime in wireless sensor networks. Comput. Commun. 2015, 1364–1372. [Google Scholar]
  22. Wang, Y.C.; Hu, C.C.; Tseng, Y.C. Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network. IEEE Trans. Mobile Comput. 2008, 7, 262–274. [Google Scholar] [CrossRef]
  23. Hefeeda, M.; Ahmadi, H. Probabilistic coverage in wireless sensor networks. In Proceedings of the Conference on Local Computer Networks (LCN), Sydney, Australia, 17 November 2005; pp. 1–10. [Google Scholar]
  24. Wang, B. Coverage problems in sensor networks: A survey. Acm Comput. Surv. 2011, 43, 87–88. [Google Scholar] [CrossRef]
  25. Zhao, Q.; Gurusamy, M. Lifetime Maximization for Connected Target Coverage in Wireless Sensor Networks. IEEE/ACM Trans. Netw. 2008, 16, 1378–1391. [Google Scholar] [CrossRef]
  26. Lu, M.; Wu, J.; Cardei, M.; Li, M. Energy-Efficient Connected Coverage of Discrete Targets in Wireless Sensor Networks. Int. J. Ad Hoc Ubiq. Comput. 2009, 4, 137–147. [Google Scholar] [CrossRef]
  27. Gupta, S.K.; Kuila, P.; Jana, P.K. Genetic Algorithm for k-Connected Relay Node Placement in Wireless Sensor Networks. In Proceedings of the Second International Conference on Computer and Communication Technologies, Chengdu, China, 14–17 October 2016; pp. 721–729. [Google Scholar]
  28. Mini, S.; Udgata, S.K.; Sabat, S.L. M-Connected Coverage Problem in Wireless Sensor Networks. Int. Sch. Res. Netw. 2012, 2012, 858021. [Google Scholar] [CrossRef]
  29. Zorbas, D.; Douligeris, C. Connected coverage in WSNs based on critical targets. Comput. Netw. 2011, 55, 1412–1425. [Google Scholar] [CrossRef]
  30. Shih, K.P.; Chen, H.C.; Chou, C.M.; Liu, B.J. On target coverage in wireless heterogeneous sensor networks with multiple sensing units. J. Netw. Comput. Appl. 2009, 32, 866–877. [Google Scholar] [CrossRef]
  31. Zhao, N.Q.; Gurusamy, M. Maximizing Network Lifetime for Connected Target Coverage in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Wireless and Mobile Computing, NETWORKING and Communications, Wimob 2006, Montreal, QC, Canada, 19–21 June 2006; pp. 94–101. [Google Scholar]
  32. Carter, B.; Ragade, R. A probabilistic model for the deployment of sensors. In Proceedings of the Sensors Applications Symposium, 2009 (SAS), New Orleans, LA, USA, 17–19 February 2009; pp. 7–12. [Google Scholar]
  33. Shi, K.; Chen, H.; Lin, Y. Probabilistic coverage based sensor scheduling for target tracking sensor networks. Inf. Sci. 2015, 292, 95–110. [Google Scholar] [CrossRef]
  34. Ren, S.; Li, Q.; Wang, H.; Chen, X.; Zhang, X. A study on object tracking quality under probabilistic coverage in sensor networks. ACM Sigmobile Mobile Comput. Commun. Rev. 2005, 9, 73–76. [Google Scholar] [CrossRef]
  35. Wu, Y.; Yin, J.; Li, M.; Zhu, E. Efficient algorithms for probabilistic k-coverage in directional sensor networks. In Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, 15–18 December 2008; pp. 587–592. [Google Scholar]
  36. Zou, Y.; Chakrabarty, K. Sensor deployment and target localization in distributed sensor networks. ACM Trans. Embed. Compu. Syst. (TECS) 2004, 3, 61–91. [Google Scholar] [CrossRef]
  37. Toussaint, G. The rotating calipers: An efficient, multipurpose, computational tool. In Proceedings of the International Conference on Computing Technology and Information Management (ICCTIM), Dubai, UAE, 9–11 April 2014; pp. 215–225. [Google Scholar]
  38. Edmonds, J.; Karp, R.M. Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems; Springer-Verlag: New York, NY, USA, 1972; pp. 248–264. [Google Scholar]
  39. Dinic, E.A. Algorithm for solution of a problem of maximal flow in a network with power estimation. Dokl. Akad. Nauk SSSR 1970, 194, 754–757. [Google Scholar]
Figure 1. Change in detection probability with distance (m), where α = 0 . 1 .
Figure 1. Change in detection probability with distance (m), where α = 0 . 1 .
Sensors 17 01208 g001
Figure 2. Change in collaborative detection probability with two sensors i and j.
Figure 2. Change in collaborative detection probability with two sensors i and j.
Sensors 17 01208 g002
Figure 3. Omni-directional probabilistic sensor denoted by a four-tuple.
Figure 3. Omni-directional probabilistic sensor denoted by a four-tuple.
Sensors 17 01208 g003
Figure 4. A reduction from the minimum ϵ -detection coverage problem to the minimum ϵ -CTC problem. Indeed, each sensor after the reduction has a communication radius. For simplicity, we draw only one sensor with the communication radius.
Figure 4. A reduction from the minimum ϵ -detection coverage problem to the minimum ϵ -CTC problem. Indeed, each sensor after the reduction has a communication radius. For simplicity, we draw only one sensor with the communication radius.
Sensors 17 01208 g004
Figure 5. An example of the flow graph.
Figure 5. An example of the flow graph.
Sensors 17 01208 g005
Figure 6. A flow graph can be divided into five parts: super source, target nodes, sensing nodes, relaying nodes, sink node.
Figure 6. A flow graph can be divided into five parts: super source, target nodes, sensing nodes, relaying nodes, sink node.
Sensors 17 01208 g006
Figure 7. Performance of the minimum vertices maximum flow algorithm (MVMFA) with different | S | and | D | . (a) ϵ = 0 . 7 ; (b) ϵ = 0 . 8 ; (c) ϵ = 0 . 9 .
Figure 7. Performance of the minimum vertices maximum flow algorithm (MVMFA) with different | S | and | D | . (a) ϵ = 0 . 7 ; (b) ϵ = 0 . 8 ; (c) ϵ = 0 . 9 .
Sensors 17 01208 g007
Figure 8. Performance of MVMFA with different sensor densities ω and ϵ . (a) | D | = 15 ; (b) | D | = 20 ; (c) | D | = 25 .
Figure 8. Performance of MVMFA with different sensor densities ω and ϵ . (a) | D | = 15 ; (b) | D | = 20 ; (c) | D | = 25 .
Sensors 17 01208 g008
Figure 9. Impacts of ϵ (a) and | D | (b) to MVMFA and the minimum weight barrier algorithm (MWBA).
Figure 9. Impacts of ϵ (a) and | D | (b) to MVMFA and the minimum weight barrier algorithm (MWBA).
Sensors 17 01208 g009
Figure 10. Performance of PSCA, the localized coverage quality algorithm (LoCQAL) and MVMFA with different R t (a) and | D | (b).
Figure 10. Performance of PSCA, the localized coverage quality algorithm (LoCQAL) and MVMFA with different R t (a) and | D | (b).
Sensors 17 01208 g010
Table 1. Summary of notations.
Table 1. Summary of notations.
SymbolDescription
Sthe sensor set
Dthe target set
p i ( t ) the detection probability of target t by sensor i
P ( t ) the collaborative detection probability of target t
ϕ i ( t ) the detection gain of target t from sensor i
ϵ the detection probability threshold
Ψ aggregate gain threshold
p m i n the minimum detection probability threshold
S the sink node
S the super source of the flow graph G

Share and Cite

MDPI and ACS Style

Shan, A.; Xu, X.; Cheng, Z.; Wang, W. A Max-Flow Based Algorithm for Connected Target Coverage with Probabilistic Sensors. Sensors 2017, 17, 1208. https://doi.org/10.3390/s17061208

AMA Style

Shan A, Xu X, Cheng Z, Wang W. A Max-Flow Based Algorithm for Connected Target Coverage with Probabilistic Sensors. Sensors. 2017; 17(6):1208. https://doi.org/10.3390/s17061208

Chicago/Turabian Style

Shan, Anxing, Xianghua Xu, Zongmao Cheng, and Wensheng Wang. 2017. "A Max-Flow Based Algorithm for Connected Target Coverage with Probabilistic Sensors" Sensors 17, no. 6: 1208. https://doi.org/10.3390/s17061208

APA Style

Shan, A., Xu, X., Cheng, Z., & Wang, W. (2017). A Max-Flow Based Algorithm for Connected Target Coverage with Probabilistic Sensors. Sensors, 17(6), 1208. https://doi.org/10.3390/s17061208

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop