Conference PaperPDF Available

"A New WSN Deployment Algorithm for Water Pollution Monitoring in Amazon Rainforest Rivers

Authors:

Abstract and Figures

In this paper, we study the wireless sensor network deployment for water pollution monitoring in the Amazon rainforest rivers. Our objective consists in minimising the number of deployed geographical field installations along the river, while ensuring the detection of the substance spilled in the given river regardless of the position of its source. A geographical field installation is formed by a set of barrier coverage underwater sensors which detect the pollutant if its molarity in the water is greater than a predefined threshold. Indeed, the substance molarity is inversely proportional to the moving distance. To generate the best topology, we propose a sub-optimal novel geographic Installation Field Deployment Algorithm based on the Backtracking heuristic named BT-FIDA. Since the river has a several forks, in order to reduce the number of installation fields, BT-FIDA minimises the rate of at least 2-covered river segments. The simulation results obtained show that our proposal minimises the number of field installations (i.e., deployment cost) while minimising the rate of areas which are miss-covered and over-covered.
Content may be subject to copyright.
A New WSN Deployment Algorithm for Water
Pollution Monitoring in Amazon Rainforest Rivers
Zakia Khalfallah, Ilhem Fajjari, Nadjib Aitsaadi, Rami Langar and Guy Pujolle
LIP6 University of Paris 6 4, Place Jussieu, 75005 - Paris, France
VIRTUOR: 4 Residence de Galande, 92320 Chatillon, France
LiSSi - University of Paris EST Creteil (UPEC): 122, rue Paul Armangot, 94400 Vitry Sur Seine, France
zakia.khalfallah@lip6.fr, ilhem.fajjari@virtuor.fr, nadjib.aitsaadi@u-pec.fr, rami.langar@lip6.fr, guy.pujolle@lip6.fr
Abstract—In this paper, we study the wireless sensor network
deployment for water pollution monitoring in the Amazon
rainforest rivers. Our objective consists in minimising the number
of deployed geographical field installations along the river, while
ensuring the detection of the substance spilled in the given river
regardless of the position of its source. A geographical field
installation is formed by a set of barrier coverage underwater
sensors which detect the pollutant if its molarity in the water is
greater than a predefined threshold. Indeed, the substance molar-
ity is inversely proportional to the moving distance. To generate
the best topology, we propose a novel geographic Installation
Field Deployment Algorithm based on the Backtracking heuristic
named BT-FIDA. Since the river has a several forks, in order to
reduce the number of installation fields, BT-FIDA minimises the
rate of at least 2-covered river segments. The simulation results
obtained show that our proposal minimises the number of field
installations (i.e., deployment cost) while minimising the rate of
areas which are miss-covered and over-covered.
Keywords: River monitoring, coverage, under-water WSN,
optimisation, backtracking heuristic.
I. INTRODUCTION
Over 97% of all the water on earth is salty and most of the
remaining 3% is frozen in the polar ice-caps [1]. The fresh
water contained in rivers, lakes and underground represent less
than 1%. Fresh water which is paramount necessity for human
life is a precious resource and the increasing pollution of our
rivers is a cause for alarm. Chemical waste products from in-
dustrial processes are willingly and/or accidentally discharged
into rivers, which is catastrophic for the biodiversity of fauna
and flora. We notice that in most of the industrial pollution
river disasters, the spilled substances include cyanide, zinc,
lead, copper, cadmium, mercury, etc. These substances may
seep into the water in such high concentrations so that fish and
other animals are immediately killed. Sometimes the pollutants
impact food chains and accumulate until they reach toxic
levels, eventually killing birds, fish and mammals.
In this paper, we tackle the underwater wireless sensor
network deployment problem for water monitoring in rivers. In
fact, this work is undertaken within the FP7 European project
GOLDFISH [2], which is focused on the monitoring of
water quality in the Amazon rainforest rivers. The objective
is to reduce the deployment cost by minimising the number
of geographical Field Installations (FI) along the river, while
guaranteeing the detection of a pollutant chemical substance
whatever the geographic area in which it is spilled (i.e.,
the pollution source). It is worth pointing out that each
geographical FI ensures a barrier coverage of a river and
any moving pollutant substance crossing a barrier is detected
if its molarity is greater than a predefined threshold. Indeed,
based on the propagation of a pollutant within water [3], the
substance concentration in water is inversely proportional to
its moving distance due to the river current. Based on the
latter water propagation model, two succeeding FIs cannot
be geographically separated by more than a predetermined
distance calculated with respect to the river’s proprieties and
the sensitivity of underwater sensors.
In order to generate the best FIs topology, we propose
a novel heuristic named Deployment Algorithm based on
Backtracking heuristic called BT-FIDA. Our proposal adopts
a divide and conquer strategy and operates as follows. First,
the river is modelised as a directed graph with many sources
(located in mountains) and one sink (located in the sea or
ocean). Then, BT-FIDA generates the prominent candidate
positions which could host FIs by applying three basic
heuristics: i) Max-FIDA, ii) Min-FIDA and iii) Avg-FIDA.
Afterwards, BT-FIDA runs a backtracking algorithm to select
the best candidate positions to deploy the FIs. Note that the
above three basic heuristics (i.e., Max-FIDA,Min-FIDA and
Avg-FIDA) make use of a recursive cut of the directed river
graph to generate the candidate positions. Based on exten-
sive simulations with a real river in the Amazon rainforest,
BT-FIDA obtains a good level of performance in terms of i)
number of FIs, ii) the rate of miss-covered segments and iii)
the rate of K-covered segments with K2.
The rest of this paper is organised as follows. The next
section will describe the architecture of the water river mon-
itoring system. In Section III, we will formulate the water
monitoring optimisation problem. Then, we will describe our
field installation deployment algorithm (BT-FIDA) and the
simulation results obtained, respectively in Section IV and
Section V. In Section VI, we will summarise the main research
papers related to the issue handled in this paper. Finally,
Section VII will conclude the paper.
II. ARCHITECTURE OF THE WATER RIVER MONITORING
SY ST EM
The water river monitoring system is composed of a set of
FIs deployed along the river and a set of gateways. In fact,
(a) FIs deployment (b) Components of an FI
Fig. 1. Architecture of water river monitoring system
each FI is associated with a single gateway deployed on a
bank of the river. Hereafter, we will describe the components
of i) the Field Installation and ii) the Gateway.
The Field Installation: It is formed by a set of clusters
ensuring barrier coverage of a river. Indeed, we assume
that any chemical substance crossing the FI is detected.
In fact, the micro-deployment of clusters within the FI
is out of the scope of this paper and can be achieved
based on the related research work [4]. Each cluster is
composed of a set of static underwater sensors and one
surface water antenna. Indeed, the set of clusters within
each FI builds a static ad hoc network, which sends the
monitored events to the gateway. Note that a reactive or
proactive routing protocol can be installed within a cluster
network.
The Gateway: is a centralised node that collects all
the detected events with an FI. Moreover, it sends the
detected alarms to the control room via a cellular and/or
satellite communication.
Fig. 1 summarises the global architecture of the water river
monitoring system and the components of an FI.
III. FORMULATION OF FIS DE PL OYM EN T PROBLEM
In this section, we will formulate the geographical field
installation deployment problem along the river. To do so, first
we propose to model the river as a directed graph denoted
by ~
G=V~
G, E ~
G, where V~
Gand E~
Gare
respectively, the sets of i) river’s forks and sources and ii)
river’s segments connecting the sources and forks. It is worth
pointing out that the direction of each segment eE~
G
is the same as the river’s current. In this work, we assume
that each fork wV~
Gcontains multiple incoming edges,
denoted by {e
w}. Besides, we assume that it has only one
outgoing segment denoted by e+
wand its next-hop node is
denoted by w+. In other words, many streams merge to form
one larger canal. On the other hand, we assume that the river
carries the water in only one sea or ocean area. Hence, the
graph ~
Ghas many sources (i.e., nodes without incoming edges)
and only one sink (i.e., nodes without outgoing edges). Each
segment eE~
Gis characterised by its distance and the
average velocity of the water, respectively denoted by D(e)
and V(e).
The molarity level of a pollutant can be predicted as a
function of time and space making it possible to model the
behaviour of the solutes over the river course. As proposed
in [5], we model the concentration (i.e., molarity) time and
space function of a pollutant chemical substance in the river
water as:
C(x, t) = M
2·Aπ·DL·t·exp (xU·t)2
4·DL·t(III.1)
where i) xis the distance in the downstream direction ex-
pressed in meters (m), ii) tis the duration between the spill
and the monitoring at point xexpressed in seconds (s), iii) M
is the mass of the contaminant expressed in kilograms, iv) A
is the cross-sectional area of the river expressed in m2, v) DL
and Uare, respectively, longitudinal dispersion and advective
velocity expressed in m2/s and m/s.
We notice that the concentration decreases as the moving
distance and the duration from the spill of the chemical
substance increases. Hence, the risk consists in no detecting
the pollutant since the underwater sensors can send the alarm if
and only if the substance’s molarity is greater than a predefined
threshold. Note that the latter reflects the hardware sensitivity
of the underwater sensors. In this sense, we can define a full-
river-coverage notion as the ability of the deployed FIs to
detect in the river a substance spilled anywhere.
Our objective is thus to minimise the cost of deployment,
while guaranteeing the full-river-covergae of the monitoring
system. The above objective (i.e., cost) can be evaluated by
the number of FIs denoted by NF I . To minimise the cost,
it is equivalent to maximise the distance between successive
FIs. Formally:
maximise "min
FI jˆ
FI \{FIi}{d(FIi,FIj)}#,∀FIiˆ
FI
(III.2)
where ˆ
FI is the set of deployed field installations and
d(FIi,FIj)is the euclidean distance separating FIiand
FIj.
On the other hand, we must guarantee the full-river-
coverage. To do so, the maximum distance between two
successive FIs cannot exceed a predefined distance Dth
which depends on the sensitivity of the hardware underwater
sensor. Formally,
min
FI jˆ
FI \{FIi}{d(FIi,FIj)}≤Dth,∀FIiˆ
FI (III.3)
We will now outline our geographic river filed installation
deployment problem, as follows:
∀FIiˆ
FI
maximise minFI jˆ
FI \{FIi}{d(FIi,FIj)}
subject to:
∀FIiˆ
FI minFI jˆ
FI \{FIi}{d(FIi,FIj)}≤Dth
Our problem is a non-linear multi-objective combinatorial
optimisation problem, which is NP-hard. In the next section,
we will propose a novel geographic Installation Field Deploy-
ment Algorithm based on the Backtracking heuristic called
BT-FIDA.
IV. PROPOSAL: FIELD INSTALLATION DE PL OYM EN T
ALG OR IT HM BA SE D ON BACKTRACK IN G HE URISTIC
The FI deployment problem is highly complex and the
generation of the optimal solution within a polynomial time
for a large scale river deployment is not possible. Thus,
we propose here a novel algorithm named Backtracking
based Installation Field Deployment Algorithm,BT-FIDA.
We notice that our problem is a combinatorial optimisation
problem. Thus, the size of the solution space is finite but is
exponential. Our proposal BT-FIDA operates as follows. First,
in order to minimise the number of combinations, hence the
time complexity, BT-FIDA generates the prominent candidate
positions (i.e., PS) to deploy FIs. To achieve this, BT-FIDA
runs three basic heuristics denoted by i) Max-FIDA, ii)
Min-FIDA and iii) Avg-FIDA. Then, BT-FIDA takes into
account the union of the above positions and runs a beam
search backtracking algorithm [6] [7] by building a partial
solution tree and selects the best one. The best branches are
explored by going down and going back up in the partial
tree solution until BT-FIDA converges to the best leaf (i.e.
the global solution). It is worth noting that the optimality is
impacted by the width of the partial tree solution and the cost
function φevaluating the solution in terms of i) number of
FIs (i.e., NF I ), ii) rate of miss-covered (i.e., Mcov ) and
ii) rate of K-covered (i.e.,Ocov) segments in the river with
Algorithm 1: BT-FIDA
1PSM in Min-FIDA (~
G,Dth)
2PSM ax Max-FIDA (~
G,Dth)
3PSAv g Avg-FIDA (~
G,Dth)
4PS PSM in PSM ax PSAvg
5FI-backtracking (~
G,PS, φ)
K2. The pseudo-algorithm of our proposal is summarised
in Algorithm 1.
In the following, we will explain in depth i) Min-FIDA,
ii) Max-FIDA, iii) Avg-FIDA and iv) FI-backtracking
heuristics.
A. Min-FIDA heuristic
The main idea behind the Min-FIDA heuristic consists in
deploying FIs recursively and by associating a level for each
node wV~
G. In this aim, we note all the source nodes
(i.e., without incoming edges) by W0={wi
0}and their level
is initialised to 0. Next, the level of each fork node wV~
G
is denoted by Lwand is equal to:
Lw= max
v∈W{Lv}+ 1,(IV.4)
where Wis the set predecessor nodes of win directed graph
~
G. We note the fork nodes with level 1as W1={wi
1}.
Min-FIDA operates as follows. First, for each source node
wi
0 W0,Min-FIDA deploys an FI every Dth along its
corresponding outgoing edge e+
wi
0
and the process will be
deceased just after overtaken its successor fork node wi
1. Note
that e+
wi
0
is the link connecting wi
0to its successor node
wi
0
+=wi
1 W1. The set of FIs deployed after the fork
node wi
1is denoted by Swi
1. The deployed FIis are added
in the set PSmin but without including Swi
1. Once all the
source nodes have been explored, Min-FIDA deals with the
fork nodes W1. In fact, two cases can arise for each fork node
wi
1 W1.
1) The maximum distance between the wi
1and FIk Swi
1
is located within e+
wi
1
(i.e., outgoing edge). We denote
the furthest field installation in Swi
1from wi
1by FIf.
Formally, FIfsatisfies the following constraint:
d(wi
1,FIf) = max
FI k∈Swi
1{d(wi
1,FIk)},(IV.5)
where d(wi
1,FIk)is the euclidean distance between the
fork node wi
1and FIk. In this case, Min-FIDA deploys
a field installation at FIf. Formally,
PSmin PSmin {FIf}(IV.6)
Then, Min-FIDA shrinks e+
wi
1
(i.e., outgoing link) by
moving the fork node wi
1to FIf. Moreover, all the
edges {e
wi
1}(i.e., incoming links) and their correspond-
ing sources are removed from the directed graph ~
G.
Fig. 2. Min-FIDA: Graph reducing process
2) The farthest FIk Swi
1from the fork node wi
1is not
deployed within its outgoing link e+
wi
1
. In other words, it
is deployed deeper in the graph ~
G. As above, FIfis the
furthest field installation in Swi
1from wi
1. In this case,
Min-FIDA adds a i) meta source node mnwi
1and a
ii) meta edge emnwi
1
between the meta node mnwi
1and
wi
1
+node. Note that wi
1
+is the successor of wi
1in ~
G.
The distance of the meta edge D(emnwi
1
)is set to the
distance of d(wi
1, wi
1
+)plus the (Dth d(wi
1,FIf)).
Then, all the fork node wi
1’s incoming links and their
corresponding sources are removed from the directed
graph ~
G.
The above cases are depicted in Fig. 2.
Once all the fork nodes (i.e., W1) have been processed,
the new graph, denoted by ~
G0, is generated. As presented
above, it is formed by the same nodes and links of ~
Gexcept:
i) the source nodes W0and their outgoing links have been
removed, ii) W1s outgoing links have been shrunk and iii)
meta source nodes and links could be added. Min-FIDA
applies recursively the same process for ~
G0until V~
G0=.
It is straightforward to see that the nodes of level 1become
sources in the new graph (i.e., level 0). We notice that
with this strategy, we will certainly obtain miss-covered river
segments since we select the farthest field installation from the
fork nodes. The pseudo algorithm of Min-FIDA heuristic is
summarised in Algorithm 2.
B. Max-FIDA heuristic
The heuristic is similar to Min-FIDA except in the way it
computes the moving destination of fork nodes W1(i.e. nodes
with level 1). The fork node wi
1 W1is moved to FIn, which
respects the following constraint:
d(wi
1,FIn) = min
FI k∈Swi
1{d(wi
1,FIk)}(IV.7)
It is straightforward to see that FInis the nearest field
installation to fork node wj
1. Moreover, we notice that with
this strategy, we will certainly obtain over-covered (i.e., no
hole of detection) river segments since we select the nearest
field installation from the fork nodes.
C. Avg-FIDA heuristic
As in the Max-FIDA heuristic, the same difference consists
with the way to compute the moving destination of fork nodes
W1(i.e. nodes with level 1). The fork node wi
1is moved to
the point PAvg , which respects the following formula:
PAvg =PF Ik∈Swi
1d(wi
1,FIk)
|Swi
1|(IV.8)
It is worth pointing out that Avg-FIDA will certainly obtain
both over and miss covered river segments since we select the
mean position of FIs deployed beyond a fork node.
D. FI-backtracking heuristic
Once the potential candidate deployment positions have
been generated PS, which is equal to PSM in PSM ax
PSAv g,BT-FIDA runs the backtracking algorithm by
judiciously exploring the arrangement of all the prominent
positions in PS. Due to its high complexity for exploring
all possible solutions, we make use of the beam search
backtracking decision heuristic. In fact, it consists in keeping
only a predefined number Klimit of the best partial solutions,
in terms of cost function φat each level of the solution tree.
This will reduce the memory requirement and the exploration
time. Formally, the cost function is defined as:
φ= 1 1
NFI ·Ocov
α·exp hMcog
βi(IV.9)
where αand βserve to normalise the parameters.We recall
that i) NFI is the number of deployed FIs, Mcov and Ocov
are the rates of respectively miss-covered and over-covered
(i.e., K-covered with K2) segments in the river. Note that
miss-covered metric Mcov is more penalising than the over-
covered metric. Hence, we apply the exponential function to
Mcov.
V. PE RF OR MA NC E EVALUATI ON
In this section, we will evaluate the performance of our
proposal BT-FIDA. To do so, first we will detail the sim-
ulation environment. Then, we will recall the performance
metrics. Afterward, we will briefly describe the baseline
FI Deployment Algorithm, denoted by Base-FIDA, used
for comparaison. Finally, we will illustrate the main results
obtained and highlight the benefit of our proposal BT-FIDA.
A. Simulation Environment
As mentioned in Section I, our proposal is validated within
a real Amazon Rainforest river. The map of the river is
illustrated in Fig. 3. We formulate the above river as a directed
graph with parameters illustrated in Table I.
TABLE I
PARAMETERS OF THE DIRECT RIVER GRAPH ~
G
Parameter Value
|V~
G|121
|E~
G|120
PeE(~
G)(D(e)) 323.838 Km
Avg(D(e)) 2.7K m
Fig. 3. Amazon rainforest river map
Based on the inputs of our partner CapSenze company [8] in
FP7 GOLDFISH project according to their tests and hardware
sensors, the maximum distance Dth, in which a substance can
move within the river, while remaining detectable, is set to
6Km. In fact, beyond Dth , the pollution will be not detected.
We set the parameters of the cost function αand βto 2.
B. Performance Metrics
We recall hereafter, the main performance metrics to eval-
uate our deployment strategies of FIs within a river.
NFI is the number of deployed FIs within ~
G
Mcov is the rate of miss-covered edges among the whole
graph (i.e., PeE(~
G)D(e))
Ocov is the rate of K-covered edges among the whole
graph (i.e., PeE(~
G)D(e)). That means the rate of
segments covered at least by two FIs.
C. Base-FIDA: baseline appraoch
For comparison purposes, we present here a simple de-
ployment strategy named Base-FIDA. It recursively deploys
BT−FIDA Min−FIDA Max−FIDA Avg−FIDA Base−FIDA
0
5
10
15
20
25
Percentage (%)
Over−covered areas
Miss−Covered areas
Fig. 4. Comparison of miss and over covered areas in river
FIs each Dth starting from the sink node of the river (i.e.,
sea and/or ocean). The process will be stopped until all
the sources nodes are covered. In fact, the deployment is
performed following the reverse direction of the current river.
The position of the first FI will be deployed at the sink node.
It is worth pointing out that Base-FIDA will guarantee 0%
of over and miss detected of segments in the rivers. However,
once Base-FIDA arrives to the source nodes, many FIs
will be deployed but cover a short segments compared to the
coverage range of any FI (i.e., Dth ).
D. Evaluation Results
As mentioned earlier, our proposal BT-FIDA will exploit
the prominent positions generated by Min-FIDA,Max-FIDA
and Avg-FIDA. In fact, we can see that our proposal is a
hybrid approach, which selects at each level the best posi-
tions obtained by the latter three heuristics. In Table II, we
present the results obtained by our proposal compared with the
baseline approach (i.e., Base-FIDA) and the aforementioned
heuristics: Min-FIDA,Max-FIDA and Avg-FIDA.
TABLE II
COST PERFORMANCE
Strategy NFI
BT-FIDA 23
Base-FIDA 54
Min-FIDA 19
Max-FIDA 34
Avg-FIDA 25
As we can see, our proposal BT-FIDA outperforms all
the heuristics and achieves the desired goal of minimising
the deployment cost (i.e., NFI ), while guaranteeing the full-
river coverage. In other words, the rate of lack-covered areas
MFI = 0%.
Specifically, as illustrated in Table II, our proposal reduces
the cost of deployment by 32.35% compared to Max-FIDA,
while guaranteeing the full-coverage of the whole river as
depicted in Fig. 4. On the other hand, BT-FIDA needs only
more 4field installations than Min-FIDA in order to remove
the hole detection. We notice that the Avg-FIDA heuristic
presents both hole and over detected areas within a network,
which may miss the propagation of the pollutant. Besides, our
16.6
16.8
17
17.2
17.4
17.6
17.8
15 20 25 30 35 40 45
Rate of over-covered areas
Partial tree solutions width
Fig. 5. Impact of Klimit
proposal reduces the number of FIs compared to the average
heuristic.
As expected, the baseline approach shows the worst results.
In fact, since the deployment starts from the destination (i.e.,
sea and/or ocean), the strategy will deploy many FIs nearest
the sources, which cover tiny segments. This explains its
highest cost. However, Base-FIDA ensures 0% of over and
miss detected segments. We notice that our proposal reduces
the deployment cost by 57.40% compared to the baseline,
while the constrains are not violated.
In Fig. 5, we illustrate the impact of the size of the best
partial solution at each level of the solution tree. We notice
that even Klimit our proposal deploys the same number of
FIs, which is equal to 23 and guarantees a full-coverage.
On the other hand, we notice that the reduction of the rate
of over-covered segment is tiny. Consequently, we conclude
that setting Klimit to 15 is sufficient and the performance are
steady.
VI. RE LATE D WO RK
To the best of our knowledge, there is no research paper
tackling the geographical filed installation deployment prob-
lem in rivers. In fact, i) the stream river direction, ii) river
topology and iii) the propagation model of pollutant substances
in rivers makes the underwater sensor network deployment
problem atypical and more challenging. Indeed, the classical
coverage definition of an area is not valid and it has been
evolved in our paper. However, hereafter we will describe
the main network deployment research fields, which are very
close to our problematic but unfortunately the related strategies
cannot be used.
In [9] [10], the authors aimed to develop novel remote real-
time monitoring technologies that can continuously collect
water quality parameters in lakes, rivers and reservoirs. The
system can be used to investigate various water quality param-
eters for real time surveillance by remote users via Internet.
Unfortunately, the deployment problem of sensors has not been
addressed.
In literature, the classical deployment issue of terrestrial
sensor networks has been studied in depth. In fact, we can
classify them in three groups. First, the random strategies [11]
in which the sensors are randomly deployed with respect to
a predefined random distribution. The second is a regular
deployment [12] [13] algorithms, which make use of basic
structures such as: triangle, square, polygon, hexagon, etc.
Finally, virtual force approaches [14] in which sensors move
by attractive and/or repulsive forces of neighboring sensors
and obstacles until the convergence to the steady state (i.e.,
best topology). Unfortunately, the above proposals cannot be
applied. In fact, the coverage definition and the assumptions
(e.g. target propagation model, topology of deployment area,
etc.) are different than those of field installation deployment
problem in rivers.
The underwater 2-dimensional and 3-dimensional deploy-
ment algorithms [15] [16] proposed in literature cannot be
applied within a water monitoring of rivers context. Indeed,
all the sensor nodes are deployed at the same depth with
two-dimensional strategies and sensor nodes may be floating
at an arbitrary one with three-dimensional approaches. We
notice that the above methods focused on the event detection
within a predefined small zone and the monitored event moves
only in this latter. The proposed strategies do not deal with
different geographical zone (i.e., field installations), which
are correlated in term of sensing coverage range in a river.
Noting that the above methods can be exploited within one
field installation in the river to guarantee full barrier coverage
and reduce the needed number of sensors.
The second research filed similar to our problem is the
urban traffic surveillance based on wireless sensor net-
works [17] [18] [19]. In fact, we can say that a river is
comparable to road map and the river current to the traffic
flow. Nevertheless, the road traffic is bidirectional and the
pollutant target substance spreading has a unique sense. This
considerably affects the way of sensor placement. Moreover,
a car cannot disappear in the road. It means that even if roads
present a large hole of coverage areas, the system will be
able to detect the cars by focusing the deployment in the road
connection points. It is not the case for pollutant substance
monitoring in which the detection strongly depends on its
molarity.
VII. CONCLUSION
In this paper, we studied the underwater sensor network
deployment problem for river monitoring. To the best of
our knowledge, we are the the first to tackle this problem.
We proposed a novel deployment algorithm called BT-FIDA
based on the backtracking and beam search heuristics. The
proposal is validated with a real river in Amazon rainforest.
Through extensive simulation results, we have shown that
the deployment cost is minimised and the full-coverage is
guaranteed.
Acknowledgments This work is supported by the European
commission within the FP7 GOLDFISH Project. We would like
to thank all the partners of GOLDFISH project.
REFERENCES
[1] A.AL-Hamdi, M. Akram, and A. M. HASAN, “Development of an ICT-
based layer model for improving managerial decision making on water
issues in arid and semi-arid regions,” International Journal of Computer
and Information Technology, 2012.
[2] F. Solano, “European FP7 Goldfish project website,
http://www.goldfish-project.eu/, 2011-2014.
[3] I. Stoian, G. Ungureanu, M. Mircea, Z. Moldovan, M. Cristea, and
A. Imre, “Rivers water quality monitoring modeling and simulation of
pollutants propagation,” IEEE International Conference on Automation,
Quality and Testing, Robotics, vol. 1, pp. 267–270, 2008.
[4] A. Chen, Z. Li, T. H. Lai, and C. Liu, “One-way barrier coverage with
wireless sensors,” IEEE INFOCOM, pp. 626–630, 2011.
[5] R. L. Runkel and K. E. Bencala, “Transport of reacting solutes in rivers
and streams,” Environmental Hydrology - Kluwer Academic Publishers,
pp. 137–164, 1995.
[6] W. Baritompa, D. W. Bulger, and G. R. Wood, “Generating functions
and the performance of backtracking adaptive search, J. of Global
Optimization, vol. 37, pp. 159–175, 2007.
[7] M. Fliedner, N. Boysen, and A. Scholl, “On the part inventory model
sequencing problem: complexity and beam search heuristic,” J. of
Scheduling, vol. 14, pp. 17–25, 2011.
[8] “Capsenze compagny, http://www.capsenze.se/About.html.
[9] B. OFlynn, R. Martinez-Catala, S. Harte, C. OMathuna, J. Cleary,
C.Slater, F. Regan, D. Diamond, and H. Murphy, “Smartcoast: A wireless
sensor network for water quality monitoring,” IEEE Local Computer
Networks conference (LCN), 2007.
[10] T. L. Dinh, W. Hu, P. Sikka, P. I. Corke, L. Overs, and B. S. Brosnan,
“Design and deployment of a remote robust sensor network: Experiences
from an outdoor water quality monitoring network,” IEEE Int. Workshop
Practical Issues in Building Sensor Netw. Appl, 2007.
[11] R. Niu and P. K. Varshney, “Distributed detection and fusion in a large
wireless sensor network of random size,” EURASIP Journal on Wireless
Communications and Networking, 2005.
[12] Y. Wang, C. Hu, and Y. Tseng, “Efficient deployment algorithms
for ensuring coverage and connectivity of wireless sensor networks,
Proceedings of the First International Conference on Wireless Internet,
2005.
[13] S. Megerian, F. Koushanfar, G. Qu, G. Veltri, and M. Potkonjak,
“Exposure in wireless sensor networks: Theory and practical solutions,”
Journal of Wireless Networks ACM Kluwer Academic Publishers, vol. 8,
no. 5, pp. 443–454, 2002.
[14] N. Aitsaadi, N. Achir, K. Boussetta, and G. Pujolle, Artificial potential
field approach in wsn deployment: Cost, qom, connectivity, and life-
time,” Computer Networks - Elsevier, vol. 55, pp. 84–105, 2011.
[15] D. Pompili, T. Melodia, and I. Akyildiz, “Three-dimensional and
twodimensional deployment analysis for underwater acoustic sensor
networks,” Elsevier Ad Hoc Network journal, 2009.
[16] N. Aitsaadi, N. Achir, K. Boussetta, and G. Pujolle, “Underwater sensor
network deployment for water quality monitoring, IEEE/OES OCEANS,
pp. 1–6, 2007.
[17] X. Lu, H. Huang, and J. Long, “A bi-level programming model for
network traffic surveillance of optimal camera location, International
Joint Conference on Computational Sciences and Optimization, 2011.
[18] X. P. Li and Y. F. Ouyang, “Reliable sensor deployment for network traf-
fic surveillance,” Elsevier Transportation Research B: Methodological,
vol. 45, 2011.
[19] S. Coleri, S. Y. Cheung, and P. Varaiya, “Sensor networks for monitoring
traffic, Forty-Second Annual Allerton Conference on Communication,
Control, and Computing, 2004.
Algorithm 2: Min-FIDA heuristic
1Inputs: ~
G=V~
G, E ~
G,Dth
2Output: PSM in
3PSM in
4~
G0~
G
5while V~
G06=do
6W0 {wV~
G0:Lw= 0}
7W1 {wV~
G0:Lw= 1}
8foreach wi
0 W0do
9wi
1wi
0+(successor of wi
0)
10 Swi
1
11 P os position(wi
0)
12 k0
13 while wi
1is not overtaked do
14 Deploy a FIkwhich is Dth away from P os
15 if FIkovertakes wi
1then
16 Swi
1 Swi
1 {FIk}
17 else
18 PSM in PSMin {F Ik}
19 P os position(FIk)
20 kk+ 1
21 V~
G0V~
G0\W0(remove source
nodes)
22 E~
G0E~
G0\ w∈W1{e
w}(remove
incoming links)
23 foreach wj
1 W1do
24 Locate FIfsatisfying:
d(wi
1,FIf) = maxF I k∈Swi
1{d(wi
1,FIk)}
25 PSM in PSMin {F If}
26 if FIfis deployed within e+
wi
1
then
27 Position of wi
1is moved to FIf
28 else
29 V~
G0V~
G0 {mnwi
1}(add
meta-node)
30 E~
G0E~
G0 {emnwi
1}(add
meta-link between mnwi
1and wi
1
+)
31 D(emnwi
1
)
d(wi
1, wi
1
+)+(Dth d(wi
1,FIf))
32 V~
G0V~
G0\{wi
1}
33 E~
G0E~
G0\{ewi
1}
... where Ω (1) T , Ω (2) T and ℓ are given by ...
... Notice that Ω (2) T is real symmetric then V −1 Ω ...
... As Ω (2) T is indefinite, there are two solutions of β that are possible. One is that β = −1/σ min when σ min < 0, the other one is that β = −1/σ max when σ max > 0. ...
Preprint
In this work, we propose a joint collaboration-compression framework for sequential estimation of a random vector parameter in a resource constrained wireless sensor network (WSN). Specifically, we propose a framework where the local sensors first collaborate (via a collaboration matrix) with each other. Then a subset of sensors selected to communicate with the FC linearly compress their observations before transmission. We design near-optimal collaboration and linear compression strategies under power constraints via alternating minimization of the sequential minimum mean square error. We show that the objective function for collaboration design can be non-convex depending on the network topology. We reformulate and solve the collaboration design problem using quadratically constrained quadratic program (QCQP). Moreover, the compression design problem is also formulated as a QCQP. We propose two versions of compression design, one centralized where the compression strategies are derived at the FC and the other decentralized, where the local sensors compute their individual compression matrices independently. It is noted that the design of decentralized compression strategy is a non-convex problem. We obtain a near-optimal solution by using the bisection method. In contrast to the one-shot estimator, our proposed algorithm is capable of handling dynamic system parameters such as channel gains and energy constraints. Importantly, we show that the proposed methods can also be used for estimating time-varying random vector parameters. Finally, numerical results are provided to demonstrate the effectiveness of the proposed framework.
... For example in [18], Simulated Annealing is used to perform search for the best sink locations while the overall study tries to consider the optimum configuration for sensor locations, scheduling of sensors, location of sink, and sensor-to-sink data routes. Similarly, in [19], a Beam search backtracking algorithm is employed as a part of the sub-optimal novel geographic installation field deployment algorithm, in order to generate the best topology for WSN nodes. ...
Article
Full-text available
Wireless sensor network (WSN) is a key technology trend in emerging internet of things paradigms which are commonly used for application areas such as smart-cities, smart-grids, wearables, and connected health. There is a wealth of literature which considers various cluster-based routing protocols such as LEACH, HEED, and UHEED where these protocols are compared in terms of the network lifetime and/or the total number of packets successfully received by the base station under various operational conditions. While existing studies present various approaches to form WSN clusters in the most efficient way, various parameters are manually-assigned their values such as the radius of the cluster, the number of nodes in the cluster, and the number of clusters that should be formed to reach the base station. The choice of correct parameters is essential for reaching the most efficient configuration, however existing studies do not specify a systematic way for tuning these parameters. In other words, the optimization of cluster-based WSNs through fine tuning of related system parameters is not considered in the existing studies. We believe that presenting a generic approach to tune the parameters of clustering algorithms in order to optimize the performance metrics of WSNs is a significant contribution. In this study a systematic and an efficient method is presented to tune the parameters of clustering and routing protocols. Instead of brute force, or trial and error approaches, simulated annealing and K-beams algorithms are adopted together with discrete event system simulator OMNET++ with Castalia Framework. Results are presented comparatively with brute force approach in order to show the efficiency of the new approach in finding the optimum configuration in terms of energy efficiency as well as the rate of successfully received packets.
... Moreover, it proves to be costly, unable to take take timely preventive measurements and its propagation is exploited by loss in signals (LOS), providing low quality monitored data. As an example, Ge and Wang proposed Backtracking based installation field deployment algorithm (BT-FIDA) algorithm [14] to minimize deployment cost of sensors. Its simulation results into good performance and full coverage of area but is hard to cover vast areas of Amazon rain forest rivers. ...
Article
Full-text available
The deterioration of water quality due to natural and man-made hazards has affected the life on the Earth. Hence, water quality needs to be monitored regularly. The traditional approaches for monitoring are observed to be more expensive, time consuming with complex infrastructure and are less accurate. Therefore, there is a scope for improvement in monitoring approaches. For the purpose, the paper has presented multi-parametric sensors network topology (MPST). The topology has polyhedron infrastructure to observe the temporal and spatial variations like electrical conductivity, pH, temperature, chloride and dissolved oxygen; in shallow river water. Its main features are energy efficient, in-expensive infrastructure that requires less manpower, sustainable and can cope with varying currents of water. The MPST is tested at Sutlej river, Bassi, Ludhiana in India and the generated results are analyzed on various physical parameters. Further, it is compared with traditional sampling method for the accuracy. From the results, the topology is identified as an economical, scalable and convenient way for river water quality monitoring.
Article
In this work, we propose a joint collaboration-compression framework for sequential estimation of a random vector parameter in a resource constrained wireless sensor network (WSN). Specifically, we propose a framework where the local sensors first collaborate (via a collaboration matrix) with each other. Then a subset of sensors selected to communicate with the FC linearly compress their observations before transmission. We design near-optimal collaboration and linear compression strategies under power constraints via alternating minimization of the sequential minimum mean square error. The objective function for collaboration design is generally non-convex. We establish correspondence between the sparse collaboration matrix and the non-sparse vector consisting of the nonzero elements of the collaboration matrix. Then, we reformulate and solve the collaboration design problem using quadratically constrained quadratic program (QCQP). The compression design problem is solved using the same methodology. We propose two versions of compression design, one centralized scheme where the compression strategies are derived at the FC and decentralized, where the local sensors compute their individual compression strategies independently. Importantly, we show that the proposed methods can also be used for estimating time-varying random vector parameters. Finally, numerical results are provided to demonstrate the effectiveness of the proposed framework.
Article
Data integrity and correctness are essential for many internet of things applications. This work addresses the data completion problem for long-term operating, large-scale and heterogeneous wireless sensor networks (WSNs), using tensor completion technique. In most previous works, the data models only involve single temporal and single spatial dimensions, ignoring the higher-order intrinsic structures. Besides, most existing schemes use low-rankness and sparsity in a fixed domain to describe the data correlation, but neither can fit well with all the temporal, spatial and attribute correlation. To address these issues, we first propose a higher-order tensor model for data from WSNs, namely multilinear plus sparse (MPS) model, which has multiple temporal, multiple spatial and one attribute modes. The core idea is to describe the temporal-spatial-attribute correlation by the sparsity in the multilinear transform domain. Appropriate sparsifying transforms can be flexibly determined according to the specific natures of each mode. For the temporal and spatial modes, analytical transforms are adopted considering computational efficiency and addressing continuity feature. For the attribute mode, we utilize MPS to propose a robust $\ell _{0}$ -norm based principle component analysis (robust $\ell _{0}$ -PCA) algorithm to adaptively learn the sparsifying transform for various heterogeneous networks. Finally, based on MPS and the learned transform, we develop an efficient tensor completion algorithm using alternating direction method of multipliers, namely MPS-TC. The experimental results on real-life WSN data verify that the proposed robust $\ell _{0}$ -PCA algorithm can learn an attribute transform more robustly than the conventional PCA and $\ell _{1}$ -PCA algorithms; and the proposed MPS-TC algorithm outperforms the state-of-the-art tensor completion algorithms in terms of signal-to-noise ratio and root mean square error.
Chapter
Wireless sensor networks (WSN) are widely used in environmental applications where the aim is to sense a physical phenomenon. Air pollution is one of the main physical phenomena that still need to be studied and characterized. Using WSN for air pollution monitoring usually targets two main applications: regular mapping and the detection of high pollution concentrations. Both of these applications need a careful deployment of sensors in order to get better knowledge of air pollution while ensuring a minimal deployment cost. In this chapter, we present three formulations of the deployment issue of sensor and sink nodes based on integer linear programming modeling (ILP) while tackling the two main applications of air pollution monitoring. In the first ILP model, we target the regular mapping of air pollution based on predicted pollution maps. In the second and third ILP model, we target the detection of pollution threshold crossings. The second model is based on predicted pollution maps as in the first one, whereas the third one is based on pollution emission inventory which describes pollution sources and their emission rates. In addition to the constraints of pollution coverage, we also ensure that the deployed networks are connected and their financial deployment cost is minimized. We perform extensive simulations in order to analyze the performance of the proposed models in terms of coverage and connectivity results.
Article
We study the sparse signal reconstruction problem in a wireless sensor network (WSN) using distributed compressed sensing (DCS). The sparse signals from multiple sensors are modeled by the mixed-support set (MSM) model, which characterizes the inter-correlation of the signals by the common support set and represents the individual features by the innovation support sets. A novel algorithm, namely common-innovation subspace pursuit (CISP), is proposed to estimate the common and innovation support sets separately, to reduce the reconstruction error and computing time. The proposed algorithm consists of two stages, the eigen-value decomposition (EVD) based common subspace pursuit (ECSP) and projection based innovation subspace pursuit (PISP). We analyze the convergence performance of the CISP algorithm, where a bound of reconstruction error is provided. Furthermore, a range of simulations and experiments are conducted to evaluate the performance of the proposed algorithm. The results of simulations on a hierarchical clustering based WSN show that the proposed CISP algorithm is superior over the orthogonal matching pursuit (OMP) and distributed parallel pursuit (DIPP) algorithms in terms of both reconstruction error and runtime, in the scenario of a large scale sensor network. Moreover, the experiments on the real data from the temperature and humidity sensors deployed in the Intel Berkeley lab verify that, the proposed CISP algorithm is capable of reconstructing the multiple sparse signals accurately and efficiently, in the reallife application.
Article
The sensors in water surface sensor networks are sparsely deployed, which means the distance between sensors is generally larger than the sensors' communication radius. So, it is difficult for sensors to aggregate their data by multi-hop routing. If water surface mobile sink is to be used to collect the sensors' data, its path forming method is a key issue. In this paper, the Voronoi diagram and dominating set theory are introduced, and a path forming method called PFVD for water surface mobile sink is proposed. Firstly, the water surface sensor network structure is converted to a Voronoi diagram, the adjacent sensors' data can be collected at the generated Voronoi vertexes position. Secondly, the dominating set theory is used to compute the minimum set of Voronoi vertexes which can gather all the sensors' data. Lastly, based on the minimum set, the final path for mobile sink is formed. Theoretical analysis and extensive experiments demonstrate that PFVD has the advantages of short path and balanced energy consumption in different scale networks.
Article
This paper considers the problem of decentralized sequential estimation in dynamic wireless sensor networks. A coherent medium access control (MAC) layer is considered, and optimal linear precoder and decoder matrices are designed to minimize the mean-square error (MSE) in an online setting. Different from the state-of-the art decentralized estimators, the proposed framework is flexible enough to handle time-varying parameters, channel gains, and power constraints. Although the general transceiver design problem is non-convex, a fast block coordinate descent-based method is proposed that incurs very low complexity and yields near-optimal solutions. Motivated by the need to reduce the communication overhead incurred by the centralized schemes, two fully distributed transceiver design algorithms that make use of the constrained linear minimum MSE machinery, are also advocated. The resulting approximate precoders are not only near-optimal but can also be calculated locally at each sensor. Finally, the entire framework is generalized so as to allow tracking of parameters that follow a known statespace model. Extensive simulations are provided to demonstrate the efficacy of the proposed class of algorithms.
Article
Full-text available
Fresh water is an essential element for human survival and land-based life forms. Right quantity and quality of fresh water is a fundamental element for human continued existence and land-based life forms. About 97% of earth water is salt water and from remaining 3% only 0.4% fresh water is available for human use. Many countries of the world are facing problem of inadequate drinking water supply, management of wastewater and basic sanitation. About more than one billion peoples did not have access to the safe water and two billions are lack of safe sanitation. This is a constant challenge for several regions of the world. Effective water management is very important to overcome the water problems. Nevertheless, with the use of Information & communication technology (ICT) techniques, this situation can be improved. In this research paper we have discussed the essential factors that effects on different water issues in arid and semi-arid resigns, moreover these water problems are classified into structured, semi-structures and unstructured. To improve the managerial decision making on water challenges; we also have proposed an ICT based layer model with consideration on operations, operational management, tactical management and strategic management.
Article
Full-text available
In this chapter we discuss the major processes affecting solutes in rivers and streams. Here a solute is generally defined as any substance or entity that is transported downstream by the flowing waters. Under this definition, solutes may be pollutants, such as pesticides and hydrocarbons, or naturally occurring substances such as dissolved gases, nutrients, and trace elements. Study of the processes affecting solutes is an important undertaking, as pollutants may pose a threat to public health when the affected waterbody is used as a water supply or for recreational purposes. Another important issue is the effect of pollutants on the aquatic organisms that inhabit the stream ecosystem.
Article
Full-text available
Traffic surveillance is currently performed with inductive loop detectors and video cameras for the efficient management of public roads. This paper proposes an alternative traffic monitoring system using wireless sensor networks that offers high accuracy and lower cost compared. The system consists of two parts: wireless sensor network and access point. Traffic information is generated at the sensor nodes and then transferred to the access point over radio. Our prototype called Traffic-Dot achieves vehicle detection accuracy of 97% and accurately measures speed with a node pair. The communication protocol PEDAMACS (Power Efficient and Delay Aware Medium Access Protocol for Sensor Networks) is shown to increase the lifetime of the system up to several years while still guaranteeing the timely arrival of information from the sensor nodes to the access point.
Conference Paper
Full-text available
The implementation of the Water Framework Directive (WFD) across the EU, and the growing international emphasis on the management of water quality is giving rise to an expanding market for novel, miniaturized, intelligent monitoring systems for freshwater catchments, transitional and coastal waters. This paper describes the "SmartCoast" Multi Sensor System for water quality monitoring. This system is aimed at providing a platform capable of meeting the monitoring requirements of the Water Framework Directive. The key parameters under investigation include temperature, phosphate, dissolved oxygen, conductivity, pH, turbidity and water level. The "Plug and Play" capabilities enabled by the Wireless Sensor Network (WSN) platform developed at Tyndall allow for integration of sensors as required are described, as well as the custom sensors under development within the project.
Conference Paper
Full-text available
Cameras enable synthesis of disaggregated vehicle information from multiple locations. This paper addresses the problem of how to determine the optimal locations of cameras for best traffic surveillance in urban road networks. All users are divided into multiple classes according to their own acceptance degree of camera monitoring (ADOCM). A bi-level programming model for camera location problem (CLP) is introduced. The objective of upper level problem is to maximize the total observed traffic flow from the viewpoint of network planners. The lower level problem is to depict the logit-based stochastic route choice behavior of users. The method of successive averages (MSA) and Frank Wolfe algorithm are employed to solve the problem. Numerical examples show the managerial insight that the behavior against camera monitoring has brought considerable loss to network traffic surveillance.
Article
New sensor technologies enable synthesis of disaggregated vehicle information from multiple locations. This paper proposes a reliable facility location model to optimize traffic surveillance benefit from synthesized sensor pairs (e.g., for travel time estimation) in addition to individual sensor flow coverage (e.g., for traffic volume statistics), while considering probabilistic sensor failures. Customized greedy and Lagrangian relaxation algorithms are proposed to solve this problem, and their performance is discussed. Numerical results show that the proposed algorithms solve the problem efficiently. We also discuss managerial insights on how optimal sensor deployment and surveillance benefits vary with surveillance objective and system parameters (such as sensor failure probabilities).
Article
Backtracking adaptive search is a simplified stochastic optimisation procedure which permits the acceptance of worsening objective function values. Key properties of backtracking adaptive search are defined and obtained using generating functions. Examples are given to illustrate the use of this methodology.
Article
Underwater sensor networks find applications in oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation, and tactical surveillance. In this paper, deployment strategies for two-dimensional and three-dimensional communication architectures for underwater acoustic sensor networks are proposed, and a mathematical deployment analysis for both architectures is provided. The objective is to determine the minimum number of sensors to be deployed to achieve optimal sensing and communication coverage, which are dictated by application requirements; provide guidelines on how to choose the optimal deployment surface area, given a target body of water; study the robustness of the sensor network to node failures, and provide an estimate of the number of redundant sensor nodes to be deployed to compensate for potential failures.
Conference Paper
One of the extensively studied coverage models in wireless sensor networks is barrier coverage, which guarantees that any movement crossing the given belt must be detected, while the direction of the movement is not required. For some intrusion detection applications, it may be the case that only one direction of crossing (the belt) is illegal such as border guarding. Therefore, we introduce a new coverage model called one-way barrier coverage, which requires that the network reports illegal intruders while ignores legal intruders. We propose an appropriate definition for one-way barrier coverage. We deeply investigate one-way barrier coverage with binary sensors. Our research illustrates that it is not straightforward to provide one- way barrier coverage even though there is only one intruder. When there are multiple intruders, we introduce the concept of neighboring barriers and design different protocols to provide one-way barrier coverage for different sensor models based on neighboring barriers.
Article
In this paper, we address a wireless sensor network deployment problem. It is considered when the deployment field is characterized by a geographical irregularity of the monitored event. Each point in the deployment area requires a specific minimum guarantee of event detection probability. Our objective is to generate the best network topology while minimizing cost of deployment, ensuring quality of monitoring and network connectivity, and optimizing network lifetime. The problem is formulated as combinatorial optimization problem, which is NP-complete. Unfortunately, due to the large solution state space and the exponential computational complexity, the exact methods can be applied only in the case of small-scale problem. To overcome the complexity of an optimal resolution, we propose new scalable deployment heuristics based on artificial potential field and Tabu search metaheuristic, namely potential field deployment algorithm (PFDA) and multi-objective deployment algorithm (MODA). We compare our proposal to the related deployment strategies, the obtained results show that PFDA and MODA obtain the best performances.