1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta...

25
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Sc ience & Engineering The Pennsylvania State Un iversity ICNP 2003

Transcript of 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta...

Page 1: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

1

A Bidding Protocol for Deploying Mobile Sensors

GuilingWang, Guohong Cao, and Tom LaPorta

Department of Computer Science & Engineering

The Pennsylvania State University

ICNP 2003

Page 2: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

2

Outline

Introduction The bidding protocol Performance evaluation Conclusion and future work

Page 3: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

3

Introduction

In some harsh environments, manually deploying sensors is impossible – such as during in-building toxic-leaks– Alternative methods may lead to imprecise

placement resulting in coverage holes

Page 4: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

4

Introduction

Equip each sensor with a motor increases the network cost

– unnecessary when the coverage requirement is not very strict

– sensors can be scattered in the target field relatively uniformly

Deploy a mixture of mobile sensors and static sensors to construct sensor networks

– achieve a balance between sensor cost and coverage

Page 5: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

5

Introduction-Vironoi diagram-

Vironoi cellVironoi diagram

Page 6: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

6

The bidding protocol

Static sensors – detect the coverage holes locally– estimate the size of these holes– determine the target position inside the hole

Based on the properties of the Voronoi diagram, – static sensors can find the coverage holes locally – estimate the target location of the mobile sensors

Page 7: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

7

The bidding protocol

Mobile sensors : hole healing servers– base price: the estimate of generated coverage hole after it

leaves the current place– Mobile sensor only moves to heal another hole if its leaving

will not generate a larger hole than that to be healed

Static sensors are the bidders of the coverage hole healing services

– Their bids are the estimated sizes of the holes they detect – Mobile sensors choose the highest bids and move to the tar

get locations provided by the static sensors

Page 8: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

8

The bidding protocol

During the initialization, all static sensors broadcast their locations and identities locally

After the initialization period, static sensors broadcast this information again only when new mobile sensors arrive and need this information to construct their own Voronoi cells

Page 9: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

9

The bidding protocol

: static sensor

: mobile sensor

A

E

E

O

DC

Static sensors construct Vironoi

cell

Page 10: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

10

The bidding protocol

The bidding protocol runs round by round after the initialization period

Each round consists of three phases– advertisement, bidding , serving

Advertisement – Mobile sensors broadcast their base prices and locations in a local are

a– The base price is set to be zero initially

Bidding – static sensors detect coverage holes locally by examining their Voronoi

cells– If holes exist, they calculate the bids and the target locations for the m

obile sensors– static sensor find a closest mobile sensor whose base price is lower th

an its bid, and sends bidding message to this mobile sensor

Page 11: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

11

The bidding protocol

Serving– Mobile sensor chooses the highest bid and moves to heal

that coverage hole– The accepted bid will become the new base price of the

mobile sensor After the serving phase, another new round can start

after the mobile sensors broadcast their new locations and new base prices

when no static sensors can give out a bid higher than the base price of the mobile sensors

– protocol terminates

Page 12: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

12

The bidding protocol

: static sensor

: mobile sensor

A

E

W

O

DC

G

H

J

Broadcast base price

and ID

Page 13: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

13

The bidding protocol

: static sensor

: mobile sensor

A

E

W

O

DC

G

H

J

Static sensors detect coverage hole

Static sensors bid for mobile sensors

E bids GO bids JW bids H

(bids closest mobile sensor)

Page 14: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

14

The bidding protocol-bid estimation-

Static sensors construct Voronoi cells considering – static neighbors– mobile neighbors which are not likely to move

when detecting coverage holes, static sensors do not consider those mobile sensors which are about to leave

To construct its Voronoi cell, each sensor first calculates the bisectors of the considered sensors and itself based on the location information

Page 15: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

15

The bidding protocol-bid estimation-

If there exists a coverage hole, static sensor chooses the farthest Voronoi vertices as the target location of the coming mobile sensor

Page 16: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

16

o

The bidding protocol-bid estimation-

Na Nb

NcActual

additional coverage

Estimated coverage

Page 17: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

17

The bidding protocol-Optimize greedy heuristic-

Na

Nb

Nc A

B

C

Max distance

Page 18: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

18

Duplicate healing

Duplicate healing problem

Page 19: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

19

Duplicate healing-self-detection algo-

In the advertisement phase, mobile sensors broadcast their locations and base price

If a mobile sensor hears that another mobile sensor in its neighborhood has a higher base price than its own,

– Run the detection algorithm to check whether a duplicate healing has occurred

– If yes, the mobile sensor reduces its base price to zero it will likely to move to cover a different hole

Page 20: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

20

Performance evaluations

ns-2 (version 2.1b9a) 40 nodes randomly deployment MAC Protocol : 802.11 Routing protocol: DSDV Sensing range: 6 meter Communication range: 20 meter

Page 21: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

21

Performance evaluations

The number of sensors needed to reach certain coverage under different mobile percentage

Page 22: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

22

Performance evaluations

The figure shows the number of rounds needed to terminate in the worst case

Page 23: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

23

Performance evaluations

Duplicate healing number

Page 24: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

24

Performance evaluations

Average moving distance of mobile sensors

Page 25: 1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.

25

Conclusion

Propose to deploy a mixture of mobile and static sensors to construct sensor networks to provide the required uniform sensing service in harsh environments

Performance evaluation shows that can increase the coverage significantly with low communication overhead and limited movement

future work – study how obstacles on the field affect the performance, an

d how to deal with non-uniform sensing coverage