WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks

KSII Transactions on Internet and Information Systems (TIIS).
2015.
Mar,
9(3):
901-920

- Received : August 11, 2014
- Accepted : December 26, 2014
- Published : March 31, 2015

Download

PDF

e-PUB

PubReader

PPT

Export by style

Share

Article

Metrics

Cited by

TagCloud

Wireless Sensor Networks (WSNs) are widely used in geographically isolated applications like military border area monitoring, battle field surveillance, forest fire detection systems, etc. Uninterrupted power supply is not possible in isolated locations and hence sensor nodes live on their own battery power. Localization of sensor nodes in isolated locations is important to identify the location of event for further actions. Existing localization algorithms consume more energy at sensor nodes for computation and communication thereby reduce the lifetime of entire WSNs. Existing approaches also suffer with less localization coverage and localization accuracy. The objective of the proposed work is to increase the lifetime of WSNs while increasing the localization coverage and localization accuracy. A novel intelligent unmanned aerial vehicle anchor node (IUAN) is proposed to reduce the communication cost at sensor nodes during localization. Further, the localization computation cost is reduced at each sensor node by the proposed intelligent arc selection (IAS) algorithm. IUANs construct the location-distance messages (LDMs) for sensor nodes deployed in isolated locations and reach the Control Station (CS). Further, the CS aggregates the LDMs from different IUANs and computes the position of sensor nodes using IAS algorithm. The life time of WSN is analyzed in this paper to prove the efficiency of the proposed localization approach. The proposed localization approach considerably extends the lifetime of WSNs, localization coverage and localization accuracy in isolated environments.
W
ireless sensor networks are used in many geographically isolated applications like natural disaster management systems, military applications, forest fire detection systems, deep ocean navigations, industrial automations, elder people health care systems, smart home automation applications, etc. Akyildiz.etl
[1]
explain the applications of sensor networks, factors influencing the design of sensor networks, architecture of sensor network communications and the sensor network protocol stack in detail. Ramesh
[2]
explored the design, development and deployment of a wireless sensor network for landslide detection with the capability of providing real time data via the internet and issuing warnings ahead of time using the innovative warning system.
Yick.etl
[3]
explain the types of sensor networks, operating systems and platforms, WSN standards, data storage methods, network services required to co-ordinate the power management, task distribution, and resource usage, data compression, data aggregation, security mechanisms in WSNs. WSN is a collection of sensor nodes and energy lack of a single sensor node causes severe impacts. Sensor node’s battery energy is consumed in active mode, idle mode and sleep modes as explored by Perumal.etl
[4]
. The
Fig. 1
shows the various energy consuming modes of a sensor node.
Energy consuming modes of a sensor node
Anastasi.etl
[5]
discusses the mobility based energy conservation schemes using mobile sink based and mobile relay based approaches. Aguiar.etl
[6]
proposed an integer programming model for optimizing energy consumption. The importance of energy conservation in WSNs is explained by Heinzelman.etl
[7]
. The process of estimating the physical location of sensor nodes is localization and it is very important as the sensed data becomes meaningless without the location of the event. The detailed classification of the localization algorithms is explained by Han.etl
[8]
. Pal
[9]
explains about the centralized and distributed localization schemes in detail. Existing localization algorithms consume more energy by heavy computation and communication overheads thereby dry the sensor node’s battery quickly. Ssu.etl
[10]
proposed a range free localization scheme using mobile anchor points equipped with the GPS that broadcasts its current location periodically to the sensor nodes, where sensor nodes compute their location using the data received from the mobile anchors. Ou & Ssu
[11]
proposed a range free localization scheme, that uses the location beacon messages transmitted by the flying anchor nodes. In this method, each sensor node is need to calculate their location with the help of the radio beacons received. Sheu.etl
[12]
proposed a localization scheme, which involves inter-sensor communication including sample selection phase, neighbour constraint exchange phase and refinement phase.
Xiao.etl in
[13]
proposed a localization scheme which involves anchor classification phase, distance estimation phase using different anchor distance estimator and location estimation phase. Ou
[14]
proposed a localization scheme with beacon scheduling, which forces each sensor node to execute the complex geometrical calculations to determine their locations. Mobile anchor node based position scheme is explained by Liao.etl
[15]
insists the inter-sensor communication, which causes unnecessary delay, data loss and high energy consumption. Johansson.etl
[16]
proposed a centralized spring based localization algorithm for large scale wireless sensor networks to reduce the computation cost at sensor nodes. This approach increases the communication overhead due to inter-sensor communication during localization. Bin.etl
[17]
proposed an improved weighted centroid localization algorithm to improve the location accuracy with minimum energy consumption. Arkin.etl
[18]
proposed an approach for the base station positioning to transmit the sensor data in an energy efficient way with low duty cycling and minimum end to end delay to maximize the sensor network lifetime. Carli.etl
[19]
proposed a new approach to tackle the routing and localization problems together for reducing the network signalling communication as maximum as possible which reduces power consumption in wireless sensor networks.
From the review of existing localization approaches, we observed that high communication and computation overhead at sensor nodes reduce the overall lifetime of WSNs. Any approach in WSNs must conserve the battery energy of the sensor nodes. We propose an IUAN approach with intelligent arc selection based localization algorithm to conserve energy in each sensor node to extend the life time of sensor networks deployed in geographically isolated location. The section 2 explains the IUAN assisted LDM construction approach. IAS algorithm for sensor node location computation is explained in section 3. Section 4 gives the simulation results and WSN lifetime analysis. Section 5 gives the conclusion.
Architecture of the proposed IUAN
A The IUAN contains IUAN Control Unit (ICU), sensor ID database (DB
_{SID}
), visitor queue (VQ), signal strength-distance database (DB
_{SSD}
), IUAN location database (DB
_{ILOC}
) and location-distance database (DB
_{LD}
). The ICU controls the overall operation of the IUAN like receiving sensor id message (SID) from sensor nodes, activating GPS receivers, communication with CS, guiding the IUAN in an optimistic trajectory. When an IUAN enters into the transmission range of a sensor node, the sensor node transmits its SID to that IUAN and the ICU executes the sequence of processes to construct the location-distance message (LD message). IUAN receives the SIDs from sensor nodes and stores the SIDs along with their signal strength (SS
_{SID}
) and corresponding time of reception TOR
_{SID}
in the VQ as shown in
Fig. 3
.
Visitor Queue (VQ) Organization
TOR
_{SID}
is the time at which the IUAN receives the SID. Whenever, the IUAN receives the SID (at TOR
_{SID}
), it stores the SID, its own location (LOC
_{IUAN}
) along with TOR
_{IUAN}
to the DB
_{ILOC}
where TOR
_{IUAN}
= TOR
_{SID}
. The
Table 1
gives the structure of the DB
_{ILOC}
.
Structure of the IUAN location database (DB_{ILOC})
The proposed approach needs at least three Location-Distance Messages to compute the location of a sensor node. The IUAN moves continuously and collects the SIDs from sensor nodes deployed in the field. The
Table 1
shows three different locations {(x
_{1}
,y
_{1}
), (x
_{2}
,y
_{2}
), (x
_{3}
,y
_{3}
)} of a single IUAN at three different time instants T
_{1}
, T
_{2}
and T
_{3}
within the transmission range of a sensor node (say SID
_{1}
). As the three different locations are observed within the transmission range of the same sensor node SID
_{1}
at different time instants, the
Table 1
has different time instants T
_{1}
, T
_{2}
and T
_{3}
with different locations {(x
_{1}
,y
_{1}
), (x
_{2}
,y
_{2}
), (x
_{3}
,y
_{3}
)} for same SID
_{1}
.
The IUAN authenticates the SIDs in the VQ using the DB
_{SID}
as DB
_{SID}
contains valid sensor id numbers. The invalid SIDs are ignored and LD messages are constructed for only the valid sensor nodes. In our approach, the DB
_{SID}
contains the identity of all valid sensor nodes deployed by the application user. Here SID
_{1}
is a valid SID for the sensor node (say SN-1). Each SID is identified by the predefined secret code (equivalent to password). For example, SID
_{1}
is interpreted as 1043. When an IUAN receives SID
_{1}
message from SN-1, it immediately extracts the secret code (1043), determines the signal strength and stores these details in the visitor queue along with the time of reception (TOR
_{SID}
). Then the IUAN control unit compares the secret code with the DB
_{SID}
. As this secret code is matched with the database, then the IUAN understands that this SID
_{1}
belongs to valid group. Otherwise this will be ignored and removed from the visitor queue. The secret codes other than stored in the DB
_{SID}
are considered as invalid SIDs.
The DB
_{SSD}
is used to withstand with radio irregularity. The signal strength at the locations around the transmission range of a sensor node varies with the distance and environmental effects. The path loss effect causes the radio signal to attenuate variously in different directions. The proposed work assumes the radio irregularity model (RIM) given by Zhou.etl
[23]
. The
Table 2
shows the structure of the DB
_{SSD}
, where the sample values of the signal strengths (SS) at the receiver at 3.048 m away from the mica2 mote are measured by the series of radio beacon transmissions in four directions. The signal strength around each sensor node is calculated based on the signal strength-distance relation using RSSI measurements with the knowledge of degree of irregularity (DOI). For a valid SID, an IUAN fetches the distance (D) between itself and the a sensor node using the corresponding SS
_{SID}
. In our approach, the computation cost for the signal strength and distance measurements are shifted from the sensor nodes to the powerful IUAN to conserve the energy at each sensor node. During the validation of SID and distance fetching process, the IUAN moves to different locations. Hence after fetching the distance, the IUAN fetches the corresponding location information (LOC
_{IUAN}
) at which it received the SID, using the TOR
_{IUAN}
and TOR
_{SID}
.
RSSI value and distance of signal strength-distance database (DB_{SSD})
This mechanism ensures the construction of valid location and distance information. The IUAN constructs the LD message (LDM) and stores in the DB
_{LD}
database, where each LDM contains the location (L), distance (D) and the corresponding SID. The
Table 3
shows the list of symbols used in the LDM construction Algorithm 1 and corresponding flow diagram is shown in
Fig. 4
.
Flow diagram of the LD message construction algorithm
List of symbols used in LD message construction algorithm
Algorithm 1: LDM Construction
Input: SID from Sensor Node
Output: LD Message (LDM)
1:
Begin
2: Interrupt Process 1: Whenever SIDi is received from sensor node
3: measure SS
_{SIDi}
4: VQ ← enqueue (SIDi, SS
_{SIDi}
, TOR
_{SIDi}
)
5: DB
_{GLOC}
← insert(LOC
_{IUAN}
, SIDi, TOR
_{IUAN}
=TOR
_{SIDi}
)
6: end Interrupt Process 1
7: while(VQ != NULL)
8: if SIDi∉DB
_{SID}
then
9: VQ← dequeue (SIDi, SS
_{SIDi}
, TOR
_{SIDi}
)
10: else
11: D ←select D from DB
_{SSD}
where SS=SS
_{SIDi}
12: L ←select LOC
_{IUAN}
from DB
_{ILOC}
where TOR
_{IUAN}
= TOR
_{SIDi}
13: LDM.x ← LOC
_{IUAN}
.x
14: LDM.y ←LOC
_{IUAN}
.y
15: LDM.d ←D
16: LDM.id ←SIDi
17: LDM ←ConstructLDMPacket (LDM.x, LDM.y, LDM.d, LDM.id)
18: insert LDM into DB
_{LD}
19: VQ←dequeue (SIDi, SS
_{SIDi}
, TOR
_{SIDi}
)
20: delete LOC
_{IUAN}
, SID
_{i}
, TOR
_{IUAN}
from DB
_{ILOC}
where TOR
_{IUAN}
=TOR
_{SIDi}
and SID = SID
_{i}
21: end if
22: end while
23:
End
After constructing the LDM, the ICU removes the corresponding entries from the VQ and DB
_{ILOC}
to manage the storage efficiency. The CS aggregates DB
_{LD}
database of all IUANs and selects the sufficient LDMs to calculate the locations of the sensor nodes.
_{IUAN}
and the distance between the LOC
_{IUAN}
and the corresponding sensor node’s location (LOC
_{S}
). The proposed algorithm is an optimum version of the trilateration method. Our algorithm selects the boundary points and arc angles to construct the intelligent arc segments, where the intersection of these arcs gives the location of the sensor node. The algorithm starts with three LD message inputs, where these messages are constructed within the range of a sensor node as shown in the
Fig. 5
. The proposed algorithm has 6 phases.
Three LDMs constrcued within the range of a sensor node
In phase 1, the LD messages are processed to extract the IUAN
_{Centres}
{C
_{1}
,C
_{2}
,C
_{3}
} and the corresponding IUAN
_{Distances}
{r
_{1}
,r
_{2}
,r
_{3}
}, where r
_{I}
is the distance between IUAN centre C
_{i}
and the sensor node. In phase 2, the boundary points (BPoints) around each IUAN
_{Centre}
are calculated using the 2D translation as shown in the
Fig. 6
. All BPoints and IUAN
_{Centres}
contain the associated ‘x’ and ‘y’ co-ordinate values and based on these both the IUAN
_{Centres}
and BPoints are classified as the ‘x’ axis centre points (XCPoints), ‘x’ axis boundary points (XBPoints), ‘y’ axis centre points (YCPoints), ‘y’ axis boundary points (YBPoints). Each IUAN
_{Centre}
has four associated bounday points. Eg: {P
_{1}
,P
_{2}
,P
_{3}
,P
_{4}
}is the set of boundary points around the IUAN centre (C
_{1}
). A complete circle around this centre can be constructed using these 4 boundary points and the corresponding distance/radius r
_{1}
. Similarly, three circles can be constructed around the three centres. The intersection of these three circles gives the location of the sensor as these locations and distances are constructed within the range of the sensor node. This method is referred as trilateration. Our approach optimizes the trilateration method by constructing the intelligent arcs using the intelligent boundary points, instead of considering the complete circles, which reduces the computation cost significantly in the localization process of the large volume of sensor nodes.
Computation of boundary points
Phase 3 selects the intelligent boundary points on ‘x’ axis and ‘y’ axis, which contribute to the construction of the intelligent arcs and they are referred as IXBPoints and IYBPoints respectively. Among the 6 boundary points {P
_{2}
,P
_{4}
,Q
_{2}
,Q
_{4}
,R
_{2}
,R
_{4}
} on ‘x’ axis, only 3 points contribute to the intelligent arcs. Similarly among the 6 boundary points {P
_{1}
,P
_{3}
,Q
_{1}
,Q
_{3}
,R
_{1}
,R
_{3}
}on ‘y’, only three points contribute to the intelligent arcs. The XCPoints and XBPoints are grouped as Points1 and Points2 respectively. The intelligent points IXBPoints are selected from Points2, where XCPoints lies between the range of first and last XCPoints in the Points2. This selection decision is taken based on the fact that, the boundary points lies out of this range are not contributing to the intelligent arcs. Similarly IYBPoints are selected. The
Fig. 7
shows the intelligent boundary points IXBPoints and IYBPoints selected in phase 3.
Selection of intelligent boundary points
Definition of an arc: An arc can be constructed with a centre point C(x,y) and radius (r). The points on the arc is defined as the set of points P(h,k) using the parametric equations (1) and (2), ∀ Ɵ, Ɵ
_{1}
≤ Ɵ≤ Ɵ
_{2}
where 0 ≤ Ɵ
_{1}
≤ 2π and Ɵ
_{1}
< Ɵ
_{2}
< (Ɵ
_{1}
+2π). The point P
_{1}
(x
_{1}
,y
_{1}
) with Ɵ = Ɵ
_{1}
is called the start point of the arc, and the point P
_{2}
(x
_{2}
,y
_{2}
) with Ɵ = Ɵ
_{2}
is called the end point of the arc.
After selecting the intelligent boundary points, phase 4 identifies the starting and ending angles of each intelligent arc. The sensor node is positioned, where the three intelligent arcs intersect. So any two arbitrary arcs can be constructed, as the intersection of any two intelligent arcs gives the sensor node’s location. Phase 5 constructs any two arbitrary intelligent arcs using the parametric Equations (1) and (2). Phase 6 compares the points on the arbitrarily selected (two) intelligent arcs and identifies the common point, i.e. the intersection of the two arcs. This common point is the location of the sensor node S (LOC
_{s}
.x, LOC
_{s}
.y) as shown in the Fig. 8a and Fig. 8b. The Algorithm 2 explains the mathematical logic behind the proposed intelligent arc selection based centralized localization algorithm.
Algorithm 2: Intelligent Arc Selection based Centralized Localization Algotithm
Input: LDM
_{1}
, LDM
_{2}
, LDM
_{3}
, where LDM
_{1}
.id= LDM
_{2}
.id= LDM
_{3}
.id
Output: Sensor Node’s Location S (LOC
_{S}
.x, LOC
_{S}
.y)
Begin
End
Phase 1: Extracting Location Distance (LD) Messages
1:
Procedure ExtractLDMessage
2: C(1).x ←LDM
_{1}
.x
3: C(1).y ←LDM
_{1}
.y
4: C(2).x ←LDM
_{2}
.x
5: C(2).y ←LDM
_{2}
.y
6: C(3).x ←LDM
_{3}
.x
7: C(3).y ←LDM
_{3}
.y
8: r
_{1}
←LDM
_{1}
.d
9: r
_{2}
←LDM
_{2}
.d
10: r
_{3}
←LDM
_{3}
.d
11: IUAN
_{Centres}
←{C(1).x , C(1).y, C(2).x , C(2).y, C(3).x , C(3).y}
12: IUAN
_{Distances}
←{r
_{1}
, r
_{2}
, r
_{3}
}
13: return (IUAN
_{Centres}
, IUAN
_{Distances}
)
14:
End
Phase 2: Computation of Boundary Points
1:
Procedure
BPoints (IUAN
_{Centres}
, IUAN
_{Distances}
)
2: B(i).x ← C(j).x; where B ∀ P, Q, R; i=1,3; j=1,2,3;
3: B(i).y ← C(j).y; where B ∀ P, Q, R; i=2,4; j=1,2,3;
4: B(i).x ← C(j).x - r
_{k}
; where B ∀ P, Q, R; i=2; j=1,2,3; k=1,2,3;
5: B(i).x ← C(j).x + r
_{k}
; where B ∀ P, Q, R; i=4; j=1,2,3; k=1,2,3;
6: B(i).y ← C(j).y + r
_{k}
; where B ∀ P, Q, R; i=1; j=1,2,3; k=1,2,3;
7: B(i).y ← C(j).y - r
_{k}
; where B ∀ P, Q, R; i=3; j=1,2,3; k=1,2,3;
8: XCPoints ← {C(1).x, C(2).x, C(3).x}
9: YCPoints ← {C(1).y, C(2).y, C(3).y}
10: XBPoints ← {P(2).x, P(4).x, Q(2).x, Q(4).x, R(2).x, R(4).x}
11: YBPoints ← {P(1).y, P(3).y, Q(1).y, Q(3).y, R(1).y, R(3).y}
12: return (XCPoints, XBPoints, YCPoints, YBPoints)
13:
End
Phase 3: Selecting Intelligent Boundary Points on ‘X’ and ‘Y’ axis
1:
Procedure
IXBPoints (XCPoints, XBPoints)
2: Points1 ←{C(1).x , C(2).x , C(3).x, P(2).x , P(4).x , Q(2).x, Q(4).x , R(2).x, R(4).x}
3: Points2 ←Sort (Points1), where C(i).x < C(j).x < C(k).x; ∀ i,j,k = 1,2,3; i ≠ j ≠ k
4: IXBPoints ⊂ Points2, where C(i).x < {IXBPoints} < C(k).x
5: IXBPoints ←{P(m).x , Q(n).x , R(o).x}, wher m,n,o are either 2 or 4
6: return (IXBPoints)
7:
End
8:
Procedure
IYBPoints (YCPoints, YBPoints)
9: Points1 ←{C(1).y , C(2).y , C(3).y, P(1).y , P(3).y , Q(1).y, Q(3).y , R(1).y, R(3).y}
10: Points2 ←Sort (Points1), where C(i).y < C(j).y < C(k).y; ∀ i,j,k = 1,2,3; i ≠ j ≠ k
11: IYBPoints ⊂ Points2, where C(i).y < {IYBPoints} < C(k).y
12: IYBPoints ←{P(m).y , Q(n).y , R(o).y}, wher m,n,o are either 1 or 3
13: return (IYBPoints)
14:
End
Phase 4:
1:
Procedure
Start_End_ArcAngles (IXBPoints, IYBPoints)
2: if P(m).y = P(1).y then Ɵ
_{1}
←π/2
3: else Ɵ
_{1}
←3π/2
4: end if
5: if P(m).x = P(4).x then Ɵ
_{2}
←0π
6: else Ɵ
_{2}
←π
7: end if
8: if Q(m).y = Q(1).y then Ɵ
_{3}
←π/2
9: else Ɵ
_{3}
←3π/2
10: end if
11: if Q(m).x = Q(4).x then Ɵ
_{4}
←0π
12: else Ɵ
_{4}
←π
13: end if
14: return (Ɵ
_{1}
, Ɵ
_{2}
, Ɵ
_{3}
,Ɵ
_{4}
)
15:
End
Phase 5
1:
Procedure
Arc_Segments (XCPoints, YCPoints, St_End_Angles, IUAN
_{Distances}
)
2: A
_{1}
(i).x ←C(1).x+r
_{1}
.cos (Ɵ), where Ɵ
_{1}
≤ Ɵ
_{i}
≤Ɵ
_{2}
∀ i=1,2,…n
3: A
_{1}
(i).y ←C(1).y+r
_{1}
.sin (Ɵ), where Ɵ
_{1}
≤ Ɵ
_{i}
≤Ɵ
_{2}
∀ i=1,2,…n
4: A
_{2}
(j).x ←C(2).x+r
_{2}
.cos (Ɵ), where Ɵ
_{3}
≤ Ɵ
_{j}
≤Ɵ
_{4}
∀ j=1,2,…n
5: A
_{2}
(j).y ←C(2).y+r
_{2}
.sin (Ɵ), where Ɵ
_{3}
≤ Ɵ
_{j}
≤Ɵ
_{4}
∀ j=1,2,…n
6: A
_{1}
←{(A
_{1}
(i).x, A
_{1}
(i).y) ∀ i=1,2,…n }: set of points on arc A
_{1}
7: A
_{2}
←{(A
_{2}
(j).x, A
_{2}
(j).y) ∀ j=1,2,…n }: set of points on arc A
_{2}
8: return (A
_{1}
, A
_{2}
)
9:
End
Phase 6
1:
Procedure
Sensor_Location (A
_{1}
, A
_{2}
)
2: Compare {(A
_{1}
(1).x, A
_{1}
(1).y), ... (A
_{1}
(n).x, A
_{1}
(n).y)} and {{(A
_{2}
(1).x, A
_{2}
(1).y), ... (A
_{2}
(n).x, A
_{2}
(n).y)}
3: if ((A
_{1}
(i).x, A
_{1}
(i).y) = (A
_{2}
(j).x, A
_{2}
(j).y)) then
4: LOC
_{s}
.x ←A
_{1}
(i).x
5: LOC
_{s}
.y ←A
_{1}
(i).y
6: end if
7: return S(LOC
_{s}
.x, LOC
_{s}
.y)
8:
End
The control station stores the location of sensor nodes in the sensor position database (DB
_{SP}
) along with the SID. This database is used to identify the location of event as each sensor node sends the sensed information along with their identification.
Simulation parameters
Localization communication cost (E_{comm})
The values in the
Table 5
clearly show that the proposed localization approach consumes less communication cost than the existing localization approaches. The proposed approach conserves an average of 3393x10
^{3}
nJ energy in localization communication cost than the existing approaches. This energy conservation is achieved by the proposed IUAN assisted LDM construction approach by reducing the communication overhead at each sensor node during localization. The pictorial representation of the localization-communication cost of proposed and existing localization approaches is shown in the
Fig. 9
.
Localization communication cost
Three different IUANs constructing LDMs for a single sensor node
The proposed approach prevents the IUANs from receiving more than three SIDs from a single sensor node thereby conserves the localization-communication cost at each sensor node. The simulation is performed to observe the localization-coverage in the snake like walk model and random walk model, where 30, 60, 90, 120, 150 IUANS are used to interact with the sensor nodes ranging from 300, 600, 900, 1200 and 1500 respectively. The localization coverage results of the proposed and existing localization approaches in snake like walk model and random walk model are given in
Table 6
and
Table 7
respectively.
Localization coverage in snake like walk model
Localization coverage in random walk model
The simulation values in
Table 6
and
Table7
show that the proposed localization approach gives an average of 12.15%, 10.86% extra coverage than the existing approaches respectively.
Localization computation cost (E_{comp})
The tactice of selecting the intelligent arcs in the proposed IAS approach reduces the localization-computation cost and conserves energy than the exixting localization approaches. The pictorial representation of the localization-computaion cost of the proposed and existing localization approaches is shown in the
Fig. 11
. This clearly demosntrates that the proposed energy efficient localization approach consumes less localization-compuation cost than the existing localization approaches.
Localization computation cost
Average localization error (m) for 900 sensor nodes with various transmission ranges
Average localization error versus radio range
From the graph shown in
Fig. 12
, it is observed that the proposed localization approach outperforms the existing localization approaches in terms of accuracy. The simulation results show that the proposed approach gives an average of 0.89 m accuracy than the existing approaches.
^{3}
nJ of average energy per day for usual tasks like sensing, executing security algorithms, routing process, etc. Both the proposed localization approach and
[16]
calculate the sensor node location at control station and anchor node respectively. Hence their localization-computation cost is not consumed at the sensor nodes. For the localization approaches
[10]
,
[11]
and
[17]
, the localization-computation cost is consumed at sensor nodes. The
Table 10
shows the total energy consumption.
Total energy consumption
From
Table 10
, it is observed that the proposed localization approach consumes less computation cost than the existing approaches. The proposed approach conserves an average of 435.38x10
^{3}
nJ energy in computation cost than the existing approaches. The lifetime of the WSNs depends on the sensor node’s remaining energy, which is the energy left over with sensor nodes after localization process. The
Fig. 13
shows the lifetime of 1500 sensor nodes for the remaining energy.
Life time of the WSN with 1500 sensor nodes for the remaining energy
The
Fig. 13
clearly shows that both the proposed localization approach and
[16]
provides longer lifetime for the WSN than
[10
,
11
,
17]
. This performance is achieved as these two approaches calculate the location of sensor nodes in control station and anchor node. Further, the proposed energy efficient localization approach gives extra lifetime than
[16]
due to the IUAN assisted LDM construction approach and IAS based location computation.
^{3}
nJ energy in localization-communication cost than the existing localization approaches. The LDM construction approach also increases the localization-coverage. In snake like walk model, the proposed LDM construction approach gives an average of 12.15 % extra localization coverage than existing localization approaches. In random walk model, the proposed LDM construction approach gives an average of 10.86 % extra localization coverage than existing localization approaches.
The proposed intelligent arc selection approach removes the localization-computation overhead at each sensor node thereby the energy is conserved significantly at sensor nodes. The proposed energy efficient IAS localization approach conserves an average of 435.38x10
^{3}
nJ energy in localization-computation cost than the existing localization approaches. The proposed localization approach also increases the localization accuracy. For 900 sensor nodes with transmission ranges of 10 m, 15 m, 20 m, 25 m and 30 m, the proposed localization scheme gives an average of 0.89 m accuracy than the existing localization schemes. The analysis of WSN lifetime clearly shows that the IUAN assisted LDM construction and IAS based location computation of the proposed energy efficient localization approach significantly conserves energy at sensor nodes. The proposed approach prolongs the WSN lifetime by an average of 34 minutes than the existing localization approaches.
Dr.P.Shunmuga Perumal has received Doctorate of Philosophy from Anna University, Chennai, India. He has received M.E. degree in VLSI Design from Anna University, Chennai, India. He has received B.E. degree in Information Technology from M.S. University, India. He is currently working as a Teaching Fellow in the Department of Information Science and Technology, College of Engineering, Anna University, Chennai, India. His research interests include military applications with unmanned aerial vehicles, wireless sensor networks, power generation for geographically isolated applications, wireless networks and location based services.
Dr.V.Rhymend Uthariaraj is currently a Professor and Director in Ramanujan Computing Centre, College of Engineering, Anna University, Chennai, India. He has received Doctorate of Philosophy from Anna University, Chennai, India. He has received M.E. degree in Computer Science and Engineering from Anna University, Chennai, India. His research area includes wireless sensor networks, power generation, network security, pervasive computing, distributed computing and computer algorithms.
Mr.V.R.Elgin Christo has received B.Tech degree in Information Technology from Anna University, Chennai, India. He is doing M.Tech in Information Technology in Anna University, Chennai, India. His area of interest covers military applications with wireless sensor networks, data mining, internet of things, embedded systems, wireless networks and location based services.

1. Introduction

PPT Slide

Lager Image

2. Intelligent UAV Anchor Node (IUAN) Design and LDM Construction Approach

In the proposed work, unmanned aerial vehicles (UAVs) are used as IUANs by integrating the intelligence systems. The IUAN has its own energy to both fly and broadcast the beacon packets over the geographically isolated locations. Guerrero.etl
[20]
proposed an approach, where UAVs are used to carry self-positioning device and transmitter to localize the sensor nodes. Yadav.etl
[21]
explained about the localization method using global positioning system (GPS) enabled flying anchor nodes. Vincent.etl
[22]
employs the UAVs to distribute the energy burden across the WSNs. Our main idea is to construct the relevant location and distance data from the sensor nodes and compute their locations in the CS. In our approach, UAVs are utilized as flying anchor nodes and referred as intelligent UAV anchor nodes (IUANs). The novel design of the proposed IUAN is shown in the
Fig. 2
.
PPT Slide

Lager Image

PPT Slide

Lager Image

Structure of the IUAN location database (DBILOC)

PPT Slide

Lager Image

RSSI value and distance of signal strength-distance database (DBSSD)

PPT Slide

Lager Image

PPT Slide

Lager Image

List of symbols used in LD message construction algorithm

PPT Slide

Lager Image

3. Intelligent Arc Selection (IAS) based Localization Algorithm

For the state-of-art, we propose a novel approach to completely remove the computation cost from individual sensor nodes during localization process with minimum communication overhead. Our approach computes the location of each sensor node in CS, where the computing and communication resources are not constraint. The proposed localization algorithm aggregates the LDM from different IUANs and computes the location of a sensor node with three relevant LD messages. Each LD message contains the LOC
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

- (IUANCentres, IUANDistances) ←ExtractLDMessage (LDM1, LDM2, LDM3)
- (XCPoints, XBPoints, YCPoints, YBPoints) ←BPoints (IUANCentres, IUANDistances)
- IXBPoints ←IXBPoints (XCPoints, XBPoints)
- IYBPoints ←IYBPoints (YCPoints, YBPoints)
- St_End_Angles ←Start_End_ArcAngles (IXBPoints, IYBPoints)
- (A1, A2) ←Arc_Segments (XCPoints, YCPoints, St_End_Angles, IUANDistances)
- (LOCS.x, LOCS.y) ←Sensor_Location (A1, A2)

4. Simulation Results and Analysis

The performance of the proposed IUAN assisted LDM construction approach and existing localization approaches
[10
,
11
,
16
,
17]
are evaluated by considering the parameters localization-communication cost and localization-coverage. The performance of the proposed localization approach and existing approaches are evaluated in a series of simulations using ns-2 simulator and compared. The
Table 4
shows the list of parameters used in the simulation.
Simulation parameters

PPT Slide

Lager Image

- 4.1 Localization Communication Cost

An energy efficient localization algorithm shall not consume more communication cost at each sensor node to transmit and receive many beacons during localization period, since high communication cost reduces the lifetime of the sensor nodes and WSNs. The IUAN assisted LDM construction approach significantly reduces the localization-communication cost at each sensor node and its performance is compared with the existing localization approaches proposed by
[10
,
11
,
16
,
17]
. The simulation assumes of first order radio model, where 60nJ of energy is consumed for transmitting one bit and 50nJ of energy is consumed for receiving one bit as explained by Heinzelman.etl
[7]
. Each SID and acknowledgement packet has the size of 3 byte. Using the equations (3.4) and (3.5), it is calculated that each sensor node consumes 480nJ of energy for transmitting 3 byte of message and 400nJ of energy for receiving 3 byte of message. The simulation is performed with the number of sensor nodes ranging from 300 to 1500 and the corresponding localization-communication cost is tabulated in
Table 5
.
Localization communication cost (Ecomm)

PPT Slide

Lager Image

PPT Slide

Lager Image

- 4.2 Localization Coverage

The trajectory of the IUAN significantly influences the localization coverage while it constructs the location-distance messages for unknown sensor nodes. The IUAN aims to construct at least three location-distance messages for each sensor node to calculate their location. The proposed LDM construction approach gives better localization coverage. In existing localization schemes, sensor nodes are insisted to receive many beacon messages from single flying anchor node to compute their location which is not possible always.
In the proposed approach even if a single IUAN is not able to receive three SIDs and construct three LDMs for a sensor node, another IUAN may receive the balance SIDs and construct the LDMs for that sensor node. This flexibility increases the localization coverage even with the minimum level of anchor guiding mechanisms, where the existing localization approaches need highly complex anchor guiding mechanisms to guide the flying anchor nodes in the efficient trajectory to localize maximum number of sensor nodes.
The localization coverage performance of the proposed LDM approach is compared with the localization algorithms proposed by
[10
,
11
,
16
,
17]
. The simulation is performed in ns-2 simulator by assuming the snake like walk model and random walk model. The
Fig. 10
shows the scenario where three different IUANs receive SIDs from a single sensor node and construct LDMs using the proposed LDM approach.
PPT Slide

Lager Image

Localization coverage in snake like walk model

PPT Slide

Lager Image

Localization coverage in random walk model

PPT Slide

Lager Image

- 4.3 Localization Computation Cost

The existing localization algorithms
[10
,
11
,
17]
insist each sensor node to execute computations to find their location, which consumes huge energy from sensor node battery. The centralized localization algorithm proposed by
[16]
calculates the location of the sensor nodes in anchor nodes. The proposed IAS based localization algorithm removes the localization-computation cost at individual sensor node. The proposed IAS based localization approach also reduces the energy consumption in the control station by minimizing the localization-computation cost. The proposed approach significantly conserves energy thereby increases the life time of the WSNs. The simulation assumes 2.25 nJ energy consumption for single multiplication operation. The
Table 8
shows the localization-computation cost of the proposed localization approach and existing localization approaches
Localization computation cost (Ecomp)

PPT Slide

Lager Image

PPT Slide

Lager Image

- 4.4 Localization Accuracy

Location error is the measure of the distance between the estimated location and the actual location of the sensor node. The radio propagation patterns are not isotropic. Radio irregularity is caused primarily by the non-isotropic properties of the propagation media and the heterogeneity of the components. The irregular radio propagation patterns potentially interfere with the localization mechanisms thereby reduce the localization accuracy. The RIM model proposed by Zhou et al (2005) has been used in the proposed localization approach to estimate a realistic radio propagation pattern in a two dimensional plane and improve the localization accuracy.
The performance of the proposed localization scheme is evaluated and compared with the localization schemes proposed by
[10
,
11
,
16
,
17]
. The simulation of the localization accuracy is performed with 900 sensor nodes for radio ranges of 10 m, 15 m, 20 m, 25 m and 30 m. The
Table 9
shows the average localization error obtained by both the proposed and existing localization approaches. The
Fig. 12
. shows the pictorial representation of average localization error with various transmission ranges for proposed and existing localization approaches.
Average localization error (m) for 900 sensor nodes with various transmission ranges

PPT Slide

Lager Image

PPT Slide

Lager Image

- 4.5 Analysis of WSNs Lifetime

One of the fundamental design challenges in designing a wireless sensor network is to maximize the network lifetime. Each sensor node of the network is equipped with a limited power battery. Once the sensor nodes are deployed, it is often infeasible or undesirable to recharge sensor nodes or replace their batteries with manual intervention. These physical constraints make energy as a crucial consideration to design a long life time sensor network.
The WSN lifetime is analyzed with the proposed and existing localization approaches and compared. In the proposed approach, IUANs are utilized to collect SIDs from sensor nodes and to construct LDMs. Each IUAN has own power to fly and communicate with sensor nodes. Whenever an IUAN need energy, it can recharge its battery backup in control station as explained by Perumal.etl
[24]
. Hence energy is not a scarce resource for IUAN and energy consumption of IUAN does not affect the WSNs lifetime. Hence the analysis is performed only for the wireless sensor network and the energy requirements of control station and IUANs are ignored. Each sensor node has 0.001J of initial energy. Each sensor node consumes 200x10
Total energy consumption

PPT Slide

Lager Image

PPT Slide

Lager Image

5. Conclusion

A novel IUAN assisted localization approach is proposed to conserve the energy at each sensor node in geographically isolated applications. The proposed localization approach uses RIM model to withstand the radio irregularity nature for better location accuracy. The proposed IUAN assisted LDM construction approach conserves an average of 3393x10
BIO

Akyildiz I.F.
,
Su W.
,
Sankarasubramaniam Y.
,
Cayirci E.
2002
“Wireless sensor networks: a survey,”
Computer Networks
38
393 -
422
** DOI : 10.1016/S1389-1286(01)00302-4**

Ramesh MV
2014
“Design, Development, and Deployment of a Wireless Sensor Network for Detection of Land slides,”
Ad Hoc Networks
13
2 -
18
** DOI : 10.1016/j.adhoc.2012.09.002**

Yick J.
,
Mukherjee B.
,
Ghosal D.
2008
“Wireless sensor network survey,”
Computer Networks
Elsevier
52
2292 -
2330
** DOI : 10.1016/j.comnet.2008.04.002**

Perumal S.
,
Uthariaraj R.
,
Ajay Khanna A
2013
“A survey on active mode energy consuming factors of sensor Nodes in WSN,”
International Journal of Electronics Communication and Computer Engineering (IJECCE)
4
(1)
1507 -
1510

Anastasi Giuseppe
,
Conti Marco
,
Di Francesco Mario
,
Passarella Andrea
2009
“Energy conservation in wireless sensor networks: A survey,”
Ad Hoc Networks
Elsevier
7
537 -
568
** DOI : 10.1016/j.adhoc.2008.06.003**

Barbosa de Aguiar A.
,
Neto Alvaro de M. S.
,
Pinheiro P. R.
,
Coelho Andre L. V.
2009
“Applicability of a Novel Integer Programming Model for Wireless Sensor Networks,”
International Journal of Computer Science and Information Security
3
(1)

Rabiner Heinzelman W.
,
Chandrakasan A.
,
Balakrishnan H.
“Energy-Efficient Communication Protocol for Wireless Microsensor Networks,”
in Proc. of the 33rd Hawaii International Conference on System Sciences
2000

Han G.
,
Xu H.
,
Trung Q.
,
Jiang Duong, J.
,
Hara Takahiro
2013
“Localization algorithms of Wireless Sensor Networks: a survey,”
Telecommunication Systems
52
(4)
2419 -
2436
** DOI : 10.1007/s11235-011-9564-7**

Pal A.
2010
“Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges,”
Network Protocols and Algorithms
2
(1)
** DOI : 10.5296/npa.v2i1.279**

Ssu K. F.
,
Ou C. H.
,
Jiau H. C.
2005
“Localization with Mobile Anchor Points in Wireless Sensor Networks,”
IEEE Transactions on Vehicular Technology
54
(3)
** DOI : 10.1109/TVT.2005.844642**

Ou C. H.
,
Ssu K.
2008
“Sensor position determination with flying anchor in three dimensional wireless sensor networks,”
IEEE Transactions on Mobile Computing
1084 -
1097

Sheu J. P
,
Hu W. K.
,
Lin J. C.
2010
“Distributed Localization Scheme for Mobile Sensor Networks,”
IEEE Transactions on Mobile Computing
9
(4)

Xiao Q.
,
Xiao B.
,
Cao J.
,
Wang J.
2010
“Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme,”
IEEE Transactions On Mobile Computing
9
(11)
** DOI : 10.1109/TMC.2010.129**

Ou C. H.
2011
“A Localization Scheme for Wireless Sensor Networks Using Mobile Anchors With Directional Antennas,”
IEEE Sensors Journal
11
(7)
** DOI : 10.1109/JSEN.2010.2102748**

Liao W.H.
,
Lee Y.-C.
,
Kedia S.P.
2011
“Mobile anchor positioning for wireless sensor networks,”
IET Communications
5
(7)
914 -
921
** DOI : 10.1049/iet-com.2010.0336**

Johansson A.
,
Roberg C.
,
Heinkel U.
“Centralized Spring-Based Localization Algorithm for Large Scale Wireless Sensor Networks,”
in Proc. of 9th International Multi-Conference on Systems, Signals and Devices
2012
1 -
6

Bin L.
,
Zheng D.
,
Yu N.
,
Yun L.
2013
“An Improved Weighted Centroid Localization Algorithm,”
International Journal of Future Generation Communication and Networking
6
(5)
45 -
52
** DOI : 10.14257/ijfgcn.2013.6.5.05**

Arkin EM
,
Efrat A
,
Mitchell JSB
,
Polishchuk V
,
Ramasubramanian S
,
Sankararaman S
,
Taheri J
2014
“Data Transmission and Base-Station Placement for Optimizing the Lifetime of Wireless Sensor Networks,”
Ad Hoc Networks
12
201 -
218
** DOI : 10.1016/j.adhoc.2011.09.010**

Carli M.
,
Panzieri S.
,
Pascucci F.
“A Joint Routing and Localization Algorithm for Emergency Scenario,”
Ad Hoc Networks
13
19 -
33
** DOI : 10.1016/j.adhoc.2012.09.001**

Guerrero E.
,
Gao Q.
,
Xiong H. G.
2010
“Employing Unmanned Aerial Vehicles for Localization of Sensor Nodes in Wireless Sensor Networks,”
Journal of Networking Technology
1
(1)
44 -
57

Yadav V.
,
Kumar Mishra M.
,
Sngh A. K.
,
Gore M. M.
2009
“Localization Scheme for Three Dimensional Wireless Sensor Networks Using GPS Enabled Mobile Sensor Nodes,”
International Journal of Next Generation Networks (IJNGN)
1
(1)
60 -
72

Vincent P.
,
Tummala M.
,
McEachen J.
2008
“A new method for distributing power usage across a sensor network,”
Ad Hoc Networks
6
1258 -
1280
** DOI : 10.1016/j.adhoc.2007.11.014**

Zhou G.
,
Tian H. E.
,
krishnamurthy S.
,
Stankovic John A.
2005
“Models and Solutions for Radio Irregularity in Wireless Sensor Networks,”
ACM 0000- 0000/2005/0000-0001

Perumal S.
,
Uthariaraj R.
,
Christo Elgin
2013
“Novel steam powered gravity assisted standalone power system (SP-GA-SP System) design for remote wireless sensor networks,”
Advanced Materials Research
440
248 -
253

Citing 'WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks
'

@article{ E1KOBZ_2015_v9n3_901}
,title={WSN Lifetime Analysis: Intelligent UAV and Arc Selection Algorithm for Energy Conservation in Isolated Wireless Sensor Networks}
,volume={3}
, url={http://dx.doi.org/10.3837/tiis.2015.03.004}, DOI={10.3837/tiis.2015.03.004}
, number= {3}
, journal={KSII Transactions on Internet and Information Systems (TIIS)}
, publisher={Korean Society for Internet Information}
, author={Perumal, P.Shunmuga
and
Uthariaraj, V.Rhymend
and
Christo, V.R.Elgin}
, year={2015}
, month={Mar}