Preprint
Article

Resilient Localization and Coverage in the Internet of Things

Altmetrics

Downloads

109

Views

36

Comments

0

A peer-reviewed article of this preprint also exists.

Submitted:

15 June 2023

Posted:

16 June 2023

You are already at the latest version

Alerts
Abstract
The proliferation of the Internet of Things (IoT) has revolutionized traditional services, giving rise to emerging smart infrastructures by connecting the physical and digital worlds. Sensory data is essential in IoT-based systems for providing context-aware and location-based services. Hence, the accurate localization of IoT devices is paramount. Anchor misplacement can significantly affect location information and coverage services in IoT. We study the effect of anchor misplacement in typical IoT settings where sensors are randomly deployed, can be mobile and may belong to multiple providers. We identify sensing coverage holes formed by anchor misplacement and analyze their presence and impact. To mitigate the impact of anchor misplacement on network reliability, we propose a framework to identify the affected sensor nodes and then identify and remove misplaced anchor nodes. The validity of our approach is verified, and its effectiveness is demonstrated by several experiments with different network topologies and parameters. Our results are promising and can be utilized in multiple coverage applications, such as smart agriculture systems and habitat monitoring, regardless of the sensors or deployment types. It also sheds light on best practices and methods for a reliable design of IoT-based systems.
Keywords: 
Subject: Computer Science and Mathematics  -   Computer Networks and Communications

1. Introduction

The Internet of Things (IoT) applications span many domains, from smart cities to intelligent transportation, homes, and healthcare. The realization of the IoT requires delivering reliable services. Sensors' physical location and sensing coverage are two primary services of IoT applications.

A. Localization in IoT Networks

The IoT constructs a large-scale network that is comprised of different sensing-enabled nodes. Wireless sensor networks (WSNs) are considered one of the leading IoT enablers. A WSN may consist of thousands of low-cost and low-power sensor nodes. There are many applications for WSNs such as military surveillance, wildlife tracking, and environment monitoring. Determining sensors' physical location is vital for reliable IoT-based services. Localization of sensors is the basis of data collection and route planning to deliver data to the target station. For example, autonomous vehicles would have server safety issues without an accurate location as crashes increase, and inaccurate reports from sensors embedded in wildfire monitoring systems would deem the service poor. Finding the location of a sensor can be classified as anchor-based or anchor-free localizations. Anchors are nodes with more capabilities than sensors, as they know their actual location. That is why anchor nodes can be used as references to locate the unknown locations of sensors.
On the other hand, anchor-free localization uses other tools such as relative positioning, mapping, and embedded GPS client. In this paper, we localize IoT sensors using the anchor-based method. In this context, we aim to use time of arrival (ToA) or time difference of arrival (TDoA) with the path loss model of signals measured at the receiving sensor.

B. Sensing Coverage in IoT Networks

A point in a sensing field is covered if it is within sensing proximity of one of the sensor nodes. That is if the Euclidian distance between this point and any sensor node is less than the sensing range. As a result, the sensing field could have full coverage or partial coverage. However, the partial coverage can be mitigated using cooperative sensor networks— deployed sensor nodes could belong to several owners. For example, consider heterogeneous temperature sensors deployed in a region and belong to three different sensing providers, sensing areas A, B, and C, as shown in Figure 1. These collective sensors can be viewed as shared resources. Their cooperation can provide a better quality of service (QoS). The use of such shared resources can be further enhanced with participatory sensors such as smartphones.

C. Deployment Methods in IoT Networks

The deployment strategies of sensor and anchor nodes vary according to the application, the target area size, the availability of information about the density and sensor locations, and whether or not the target region is accessible. In general, there are two deployment strategies: deterministic and random.

1). Deterministic Deployment

This deployment type depends on predefined parameters such as the shape of the network, the sensor's location, the distance between sensors, and the density. The deterministic deployment of sensors allows more control over their constrained resources. Most schemes dealing with deterministic deployment choose energy consumption as the most important metric to optimize [2,3,4]. An example of this deployment type is grid-based deployment: hexagon, square, and equilateral triangle. Equilateral triangle grid-based deployment guarantees complete coverage and requires a minimum number of sensing nodes [5]. The Art Gallery problem is a traditional problem of this type of deployment [6]. In this problem, one seeks to place a minimum number of sensor cameras such that every point in the gallery is monitored by at least one sensor camera.

2). Random Deployment

Unlike deterministic deployment, random deployment has no available information about the network's shape or the sensors' location. This deployment type is ideal for a large-scale network such as harsh and inaccessible areas like forests, mountains, and dangerous areas, viz., leaking chemical plants and nuclear plants. However, random deployment does not guarantee full sensing coverage [7]. Keeping all sensors active depletes their energy faster, consequently disconnecting the network. Thus, sensing reports may not be collected from some areas in the network. Therefore, a sleep mode is vital in this network to prolong its lifespan [8,9].

D. 1-hop vs. Multihop Communications

In wireless communications, a longer transmission distance requires higher transmission power. As a result, sensors with a low power supply use a short transmission range to save energy. Consequently, the aggregated sensing data is sent from a source node to a destination via multi-hops of intermediate nodes or relays. On the other hand, sensor nodes with a continuous power supply can communicate with a sink node via 1-hop communication (i.e., peer-to-peer communication).

E. The Relationship Between Localization and Sensing Coverage

Determining the existence of coverage holes and delineating them is a primary challenge in the IoT setting. Coverage holes occur when there is partial coverage in the sensing field. IoT applications vary in their sensing coverage requirements. For example, some applications require single-sensing coverage, meaning at least one sensor should monitor any point in the target region. In contrast, other applications require high coverage and, hence, require “k” sensors to monitor each point in the region [10].
On the other hand, there are several ways to estimate a sensor's location. Unfortunately, GPS is not usually one of them due to power limitations and to keep the costs of sensors low. Alternatives are anchor-based and anchor-free approaches. The former approach is widely used due to its accuracy. While the latter approach provides coarse-grain localization accuracy. In this paper, we adopt the anchor-based method.
The quality of sensing coverage is directly related to the validity of sensing reports aggregated at the sink node. However, these reports are affected by multiple error components, such as measurement error and anchor misplacement. Error components impact the estimation of the sensors' location. Hence, sensor nodes stamp inaccurate locations to their aggregated reports, reducing the quality of sensing service.

F. The Impact of Anchor Misplacement

Anchor misplacement refers to the problem where the anchor node is in a specific position but thinks it is in a different position [11]. For example, an anchor node B falsely perceives that it is in a particular position while it is in a different one. Many factors cause this problem, such as cyberattacks, soil erosion, a possible anchor displacement due to animal/human activities, or it could be mere human error. Localizing sensor nodes using misplaced/inaccurate anchor nodes leads to localization errors of sensor nodes [11,12]. Similarly, coverage quality would be affected as erroneously estimated sensor locations contribute to invalid sensing reports. Thus, the existence of anchor misplacement makes the sensing coverage worse. For example, anchor misplacement could cause a smart agriculture system to falsely irrigate the perceived dry regions or spray pesticides on healthy plants. Figure 2 shows the impact of a misplaced anchor on localizing sensor nodes in a 200 × 200 target field that contains 80 sensor nodes and 20 anchor nodes. The actual location of this anchor is (13.1,115), and its perceived/declared location is (6.1,108). The figure shows the affected sensors and their inaccurate locations.

G. Motivation

Cooperative sensing provides advantages to WSNs such as increasing sensing reliability and improving sensing coverage [12]. However, existing research on sensing coverage usually assumes a correct anchor node position. That is, literature research overlooked the anchor misplacement problem that impacts both localization and sensing coverage. Figure 3 shows the importance of mitigating the impact of the anchor misplacement problem on localization accuracy and, consequently, on the sensing coverage: the more misplaced anchor nodes, the more degradation in the reliability of IoT system services.
Furthermore, related research assumes sensors are homogeneous and belong to only one sensing service provider. Relevant research addresses deterministic sensor placement and deployment planning to achieve higher coverage and extend the network lifetime [13,14]. Whereas in this work, sensors can be heterogeneous, randomly deployed, and belong to different sensing service providers.
In the IoT security domain, the problem of anchor misplacement is more hazardous. For instance, a hacker could target anchor nodes and manipulate their locations which generates inaccuracy in the collected data and deems it unreliable. This problem becomes life-threatening when a software/hardware error or a malicious attack targets autonomous vehicular sensor nodes such as LiDAR (Light Detection and Ranging). The LiDAR technology is supposed to provide accurate geospatial data promptly to support decision-making. Thus, malicious altering of LiDAR data, such as positioning coordinates or injecting errors into distances to the surrounding vehicles or objects leads to serious safety issues.
The above discussion raises the following primary research questions: Q1: How does anchor misplacement affect the tradeoff between detection latency and service reliability? For a fixed number of misplaced anchors carrying out sensor localization, detecting misplaced anchors becomes more effective when more non-misplaced anchor nodes participate in validating the localization results of the misplaced ones. However, too many validators increase communication overhead, consequently increasing the latency to complete the detection phase. Q2: How does anchor misplacement affect the coverage of sensory data aggregation? Q3: Can we identify new types of coverage holes and calculate their area?
In this study, we aim to answer the above research questions by designing a distributed, fast, and reliable scheme to detect misplaced anchors in WSNs. We aim to minimize anchor validators so that reliability is high with low latency. Furthermore, we analyze the impact of anchor misplacement on sensory coverage is instrumental in cooperative WSNs.

H. Contributions

The contributions of our work can be summarized as follows:
  • We propose an effective framework to detect anchor misplacement. This requires minimizing the participating anchor validators so that the reliability of the service provided is high and the latency to converge is minimal.
  • We demonstrate and analyze the existence of the anchor misplacement problem and its impact on IoT reliability. We show that localizing sensors using misplaced anchors results in inaccurate positioning, affecting the integrity of sensory data.
  • We provide an insightful and detailed analytical study of the impact of anchor misplacement on sensor localization and sensing coverage.
  • We propose schemes to identify coverage holes caused by anchor misplacement, calculate their area size, and find upper and lower bounds for these uncovered areas. We utilize Delaunay Triangulation (DT) to partition the target sensing region into equilateral triangles. Since intra-triangle coverage holes are not uniform, our goal is to locally detect each hole and specify its area's upper and lower bounds. Our procedure to assess Intra-triangle Coverage (ITC) is distributed and requires only each triangle's vertices to be involved in the calculation. Thus, the ITC procedure is scalable and efficient in terms of power consumption.
  • We demonstrate the validity and effectiveness of our proposed approach under various settings. In addition, we show that our approach offers higher localization accuracy and smaller perceived uncovered areas.
To the best of our knowledge, this is the only research investigating IoT sensing coverage under anchor misplacement by locally identifying new coverage holes and quantifying their area.
The organization of the rest of this paper is as follows. Section II overviews preliminary definitions and models of sensing coverage using WSNs and different types of sensor deployment in WSNs. Section III presents the problem formulation and assumptions of our research. Preliminarily results using Voronoi Diagram (VD) and DT toward efficient coverage will be addressed in Section IV. Section V is devoted to studying ITC in detail. Section VI presents the dynamics of anchor misplacement on sensing coverage and provides an algorithm to calculate the lower and upper bounds of sensing coverage holes. A resiliency framework to detect and mitigate the impact of misplaced anchors will be provided in Section VII. Section VIII presents experimental results to validate our proposed framework and show its effectiveness. Section IX concludes the paper and discusses future research directions.

2. Preliminaries and System Model

Sensing coverage measures to what extent the sensing reports reflect the actual physical surroundings in the target sensing field. Thus, without proper coverage, sensing services may be deemed unreliable or even obsolete.
Table I. Notations and Acronyms.
Table I. Notations and Acronyms.
Preprints 76793 i001

A. Sensing Coverage Formulation

Sensing coverage holes are one of the main reasons that degrade the quality of sensing service. Coverage holes exist when any sensing node does not cover some points in the sensing field. The following is a definition of sensing coverage.
Definition 1: Let S denote the target sensing field and   N = { s i : s i i s a s e n s i n g n o d e ; 1 i n } , where n is the number of sensing nodes. (   x i ,   y i ) refers to the location of s i in a plane which is unknown initially. Each s i has estimated location (   x i ' ,   y i ' ) and a sensing range   R s i . Let p be a point in S, then p is covered if there is at least one s i such that p is within a distance of   R s i from s i . In other words, s i d p , s i R s i ,   1 i   n , where d a , b is the Euclidean distance between a and b.

B. Types of Sensing Coverage Holes Under Anchor Misplacement

Figure 4 shows the full and partial coverage.
Anchor misplacement poses new types of coverage holes as follows.
1)
The perceived coverage hole. Fig. 5 (a) shows an ideal case of a sensor s 1 that has been accurately localized with no impact of anchor misplacement. On the other hand, Figure 5 (b) shows the case where s 1 localized using a misplaced anchor. This creates a false perceived coverage hole that exists in two triangles s 1 ' s 2 ' s 3 ' and s 1 ' s 3 ' s 4 ' .
2)
The hidden unreported actual coverage hole. Figure 6 (a) shows the existence of actual coverage holes in triangles   s 1 s 6 s 7 and s 1 s 7 s 2 . On the other hand, Figure 6 (b) shows that anchor misplacement hides these holes by inaccurate localization of sensor s 1 .

C. Network and Sensing Models

We adopt cooperative sensing where sensor nodes belong to different providers. A set N of nodes includes sensor nodes, while a set M includes anchor nodes. Anchor nodes are placed in places of interest (i.e., known positions) so that they can be used to localize sensors' positions. WSN usually follows a multi-hop communication to route sensed data from source sensors to a sink node. In cooperative sensing, a source node could route its collected data to one or more sinks (i.e., data processing centers).
The rate at which the sensor s i generates sensed data packets will highly depend on the capability of s i . However, in WSNs this rate is set low to save the sensors' battery power and avoid congestion in the network.
Many sensing models can be constructed according to the application requirements and the surrounding environment. However, most of these models agree that sensing fades as distance increases. The following formula reflects this observation [15].
S N s i , p = λ ( d s i , p ) K
where SN denotes the sensibility between the sensor node s i and point p, and both λ and K are positive constants related to the sensor's technology.
There are two types of sensing models: binary disc and probabilistic.

1). Binary Disc Model

A sensor node is assumed to do 360° monitoring in the binary disc model. Therefore, a point in the sensing field is covered if it is within the circular sensing range of at least one sensing node. Otherwise, it is not covered, as given in the following equation.
C ( p ) = 1         i f   d s i , p   R s i 0         o t h e r w i s e              
Thus, the binary disc model abstracts the sensing coverage of s i   by a disc of radius   R s i as shown in Figure 7.
2). Probabilistic Sensing Model
This model depends on the uncertainty of sensor detection. It utilizes the detection probability when a point p is at a distance larger than the value of uncertainty, but within the range [16].
C p = 1 0 e α β γ i f   d s i , p R s i ϵ i f   d s i , p R s i + ϵ                               i f R s i ϵ < d s i , p <   R s i + ϵ
where ϵ is the uncertainty value in the sensor's detection, β = d s i , p (   R s i ϵ ) , and both α and γ are parameters that measure the probability of detection when p is at a distance greater than ϵ but still within a range of   R s i . Different values of these parameters reflect the characteristics of different types of sensors and, consequently, different detection probability scales.
In this research, we adopt the binary disk sensing model for the sake of simplicity. Figure 7 shows the disk model representation of the overlapped region in Figure 1.

D. Channel Model

Both anchor and sensor nodes are equipped with wireless transceivers. The transmission power of a node s i   is denoted by P s i   , and communicates with other nodes over wireless channels, following the standard path-loss model. The path loss between nodes s i and s j of Euclidean distance d is given in the db scale by the following formula.
P L d = P L d 0 + 10 η log d d 0
where P L d 0 is the path loss at the reference distance d 0 , and η is the path loss exponent.
To better estimate the distance between the IoT nodes s i   a n d   s j , we follow the formulation adopted in [17] for the variance:
σ s i , s j 2 = d s i , s j 2 S N R
where SNR is the signal-to-noise ratio.

E. Communication Model

Two sensor nodes are adjacent/neighbors if they can communicate directly (i.e., have 1-hop wireless-link communication). We define N H ( s i ) to denote the set of sensor nodes in the neighborhood of s i , that is, N H ( s i ) = { s j | d s i , s j P s i     a n d   d s i , s j P s j     ,   s i     s j ,   s j N } . Each sensor node that receives this information is able to estimate its distance from the emitting sensor using a signal strength indicator (SSI). The graph induced by all sensor nodes and wireless links is called a routing graph. Multiple routing paths could connect the source sensor node to a sink in a routing graph. A routing path is a sequence of wireless links that starts with a source sensor towards the sink with no node repetition.
During the validation of anchor misplacement, a node can be either a sender or a receiver of a message. The message is disseminated either in 1-hop or multi-hop manners. As discussed in subsection I.D, a node needs more power to communicate with other nodes in a single-hop way. Let P s i , s   be the transmission power required by the node s i to communicate with any node in the target field using a single-hop protocol. Similarly, let P s i , m   be the transmission power required by the node s i to multi-hop to the base station through its neighboring nodes. Clearly, P s i , s   P s i , m   . A node usually uses a single-hop communication to broadcast messages to all other nodes.

3. Problem description

Anchor misplacement degrades IoT-based system reliability and leads to special types of coverage holes due to inaccurate localization of the affected sensor nodes. Let B j be a misplaced anchor node and let M ' M   be the set of misplaced anchor nodes. Similar to the neighborhood of sensor nodes presented in Section II.C, the neighborhood, N H B ( B j ) , of the anchor node, B j , is the set of all anchor nodes that are connected with B j via 1-hop connection.
This paper addresses the impact of anchor misplacement on sensing coverage. Given a random deployment of sensor nodes and a localization error posed by some misplaced anchors on some sensor nodes, we investigate the new types of coverage holes, detect them, and find the size ratio of each type of coverage hole to the total area. Furthermore, we are interested in providing upper and lower bounds on coverage holes in a distributed manner.
Our analysis will utilize powerful structures in computational geometry, such as Voronoi Diagram (VD) and Delaunay Triangulation (DT). Our approach to detecting and bound coverage holes depends on the locality of each convex polygon of the computational structure that represents the sensing field.

A. Assumptions

For this research, we make the following assumptions:
  • First, IoT sensors can send/receive packets to/from their neighbors. This assumption is important to exchange the sensors' information locally to build our computational structure in a distributed way.
  • The locations of sensors are calculated priory. This assumption helps to construct the VD and DT.
  • No three neighboring sensors are collinear. This will enable the construction of the Delaunay Triangulation.
  • The sensing target field is bounded, which is the case for most IoT applications.

4. Computational geometry tools for analyzing Sensing Coverage: auxiliary results

This section provides auxiliary lemmas and corollaries to use later to detect coverage holes and their ratios. These auxiliary results rely on well-known computational geometry structures: Voronoi diagram (VD) and Delaunay Triangulation (DT). Next, we investigate the existence of full sensing coverage of a target field S.
Let p be a point in S. We call s i a dominant sensor of point p if s i has the shortest distance to p among all other sensors in S. That is
d o m p = s i d s i , p = m i n d s j , p , 1 j n ,   w h e r e s i , s j S . Let M a x M i n ( S ) = M a x p S d d o m p , p . Assume s i = d o m p has the maximum distance to a point p among all other sensor nodes; if M a x M i n S R s i then S is fully covered. However, calculating M a x M i n ( S ) over an infinite number of points p in S is not feasible. To overcome this problem, we utilize VD to cluster the sensing field S into adjacent convex polygons, called cells and denoted by Vor(s1), Vor(s2), ….., Vor(sn). Each cell Vor(si) is associated with only one sensor s i , 1 i n as shown in Figure 8.
The perpendicular bisector of the line segment connecting sensors s i and s j splits the plane into two half-planes. Let h ( s i , s j ) denote the half-plane that contains   s i , while h ( s j , s i ) denote the half-plane that contains   s j . Note that a point p h ( s i , s j ) if and only if d s i , p < d s j , p . Thus Vor( s i ) is the intersection of all half-planes generated by the perpendicular bisectors of the line segments of s i and each sensor in its neiborhood, i.e., N H ( s i ) . Each bisector line segment is called an edge, and the endpoints of this edge are called vertices. For any point p in   V o r ( s i ) , 1 i n , s i   the closest sensor to p. Note that if p is on a common edge of two neighboring polygons, then it is equidistant from the two sensors associated with these polygons [1].
The following lemma provides the necessary and sufficient conditions to have full coverage in VD.
Lemma 1 [1]: Sensing field S is fully covered if and only if all vertices in its corresponding Voronoi diagram have a distance less or equal to R s i to at least one of their associated sensors, s i .
The coverage problem of sensing field S is now converted, by Lemma 1, from checking a non-finite set of points in S into testing a finite set1 of points representing the cell's VD vertices. This lowers the computational cost, adding to the feasibility of the solution. If M a x M i n S R s i is maintained, the full coverage of S is guaranteed. Thus, VD is a powerful tool to show the existence of coverage holes in WSNs. However, VD is unable to quantify the area size of coverage holes. This is due to the fact that Voronoi polygons have different convex shapes with various numbers of edges and have a non-unit-circular model. Therefore, VD does not provide much information about the location and the size of each coverage hole in the field.
Consequently, there is a need for a more efficient structure to control and track the boundary of each coverage hole. To achieve this, we need to transform each VD cell into basic shapes that allow us to track closely and locally coverage holes. That is why we triangulate each Voronoi cell, where the vertices of the generated triangles are the sensors. Two sensors s i and s j form a triangle edge if Vor( s i ) and Vor( s j ) have a Voronoi edge e in common. This implies that a triangle edge, s i s j , that connects s i and s j is perpendicular to e and is bisected by e. This triangulation is called Delaunay Triangulation (DT) which provides angle-optimal planar triangles such that the circle that circumscribes any triangle, with non-collinear sensors, is devoid of any other sensors. Note that the strong property of convexity in VD is still held in DT as any triangle is a basic convex polygon. Figure 9 illustrates some triangulations of Voronoi cells. Next, we provide a corollary that links the coverage problem to the edges of DT.
Corollary 1 [1]: If a sensing field is fully covered, then the length of every edge, s i s j , of triangles is at most R s i + R s j .
In Delaunay triangulation of sensing field S , let s i and s j be two triangle vertices that have sensing ranges R s i and R s j , respectively, then the following lemma holds.
Lemma 2: Let ∆ be a Delaunay (acute) triangle with vertices s i , s j , and s k , and let r be a radius of the circle that circumscribes ∆. ∆ is fully covered if and only if the following formula holds.
R s i 2 + R s j 2 + R s k 2 9 3 2 π   r 2
Proof. Assume ∆ is fully covered. Let c be the center of the circle of radius r that circumscribes ∆. c is the furthest point in ∆ to the vertices s i , s j , and s k . The distance from any of the three vertices to c is equal to r , the circumscribed circle. Each of the sensor vertices will contribute to covering the intra-triangle of ∆. This contribution depends on the sensing range of each sensor vertex. Figure 10 illustrates the concept of sensing and intra-triangle coverage. Since ∆ is covered, then every point within ∆ including c is covered as well. Since ∆ is fully covered, the sum of contributions of the three sensors must cover the entire intra-triangle of ∆. This is formulated as follows:
C N T ( s i , ) + C N T ( s j , ) + C N T ( s k , ) A ( )
Where C N T ( s l , ) denotes the contribution of sensor s l in covering the area of triangle . This contribution represents a sector area with a radius R s l .
C N T ( s l , ) = α 2 R s l 2
For acute triangulation, α = π 3 . A = 3 4 a 2 , where a is ' s side length. Consequently (7) can be written as follows:
π 6 R s i 2 + π 6 R s j 2 + π 6 R s k 2 3 4 ( 3   r ) 2
This completes the proof of the “if” part.
To prove the (only if) part, assume the formula (6) is held. Let us prove the full coverage of ∆ by contradiction. Assume that ∆ is not fully covered. Consequently, there exists a point p in ∆ that is not covered by any sensor, i.e., d ( p , s l ) > R s l , where l { i ,   j ,   k } . This means
C N T s i , + C N T s j , + C N T s k , < A ( )
In the case of homogeneous sensors, we derive the following corollary about a lower bound for sensing coverage.
Corollary 2: A field of cooperative sensing that uses homogeneous sensors with a sensing range R s l is fully covered if the following formula holds.
R s l 2 3 3 2 π   r 2
Figure 11 shows homogeneous and heterogeneous sensors' lower bound sensing ranges to achieve full sensing coverage in a triangle ∆. For example, it is enough for homogeneous sensors to have a sensing range of at least 0.91 r to guarantee a full sensing coverage, as shown in the circle-marked blue curve. On the other hand, the square root of the left-hand side of the formula (10) should be lower bound by the red curve in order to achieve full sensing coverage.
In the next section, we investigate how to detect and define the bounds of each uncovered area in DT.

5. Intra-triangle coverage: beyond ideality

The coverage problem is reduced by DT to studying the coverage of each individual triangle in the whole triangulation. According to Lemma 2, if the condition of Lemma 2 is not fulfilled, then there is an uncovered area in the circumcircle of ∆. According to the largest angle θ in ∆, we differentiate three scenarios of the circumcenter: the circumcenter is inside ∆ if θ < π 2 , outside ∆ if θ > π 2 , or on the longest side opposite to θ = π 2 . Although DT provides the best possible optimal-angle planar triangles (angles around π 3 ), in random deployment, it is possible to find the largest angles greater than π 3 . The following question then arises: What is the minimum density of sensors such that DT is well-behaved?
Let R s l be the minimum sensing range among all IoT sensors in the target field S . In optimal cases, all angles of ∆ are equal to π 3 (i.e., equilateral triangle) and the length of the triangle's side is a = 3 R s l [18]. Thus the area of the triangle in this case is 3 3 4 R s l 2 . Furthermore, the number of triangles in any triangulation is 2N-2- β , where N is the number of sensors and β is the number of which are on the convex hull boundary of field S [19]. Assume the sensing field S has a size L x L; the area size that should be covered by each triangle is L 2 2 N 2 β . Therefore,
L 2 2 N 2 β < 3 3 4 R s l 2
This gives
2 L 2 3 3 R s l 2 + 2 + β 2 < N
We assume that the minimum density is achieved. As illustrated in the proof of lemma 2, the coverage contribution of a sensor s l is the size of the angular sector centered at s l with radius R s l . Calculating the contribution of s i in ∆ requires the angle at s l as shown in (8). Since the lengths of all edges of ∆ are known, we use the cosine formula to extract the angle at each sensor. That is
α = c o s 1 a 2 + b 2 c 2 2 a b
where a, b and c are the lengths of ∆'s sides, and α is the angle opposite to the side of length c. Therefore, α is plugged into (8) to get C N T ( s l , ) , where α is the angle at s l in a triangle ∆. The following formula gives the intra-triangle coverage of ∆, denoted by I T C ( ) . That is
I T C = s l V ( ) C N T ( s l , ) A m u t ,
where A m u t = A 1,2 + A 1,3 + A 2,3 A 1,2 , 3 , V(∆) is the set of the three vertices of ∆, and A i , j is the common area size contributed by both angular sectors centered, respectively, at vertices s i and s j , and A 1,2 , 3 is the area covered by all three vertices.
Next, we employ our analysis of intra-triangle coverage to detect coverage holes in a sensing target field.

6. A Deeper Look at the Effect of Anchor Misplacement on Sensing Coverage

We recall that anchor misplacement creates two new types of coverage holes: false perceived and hidden unreported actual coverage holes. We utilize our analysis in the previous section to address these new coverage holes in the vicinity of the sensor nodes that are affected by anchor misplacement (i.e., localized using misplaced anchor nodes). Let N ' N , be the set of affected sensor nodes. Further, let C s i denotes the actual sensing coverage area that is covered by sensor node s i . Next, we introduce several important auxiliary definitions.
Definition 2: The collective actual sensing coverage ( C a c t ) of all affected sensor nodes in WSN is defined as a union of their physical sensing coverage in the target field. That is,
  C a c t = i = 1 N ' C s i .
Let s i '   be the erroneous estimated location of s i . s i will report sensed data from an inaccurate location which creates a perceived coverage around   s i ' . Further, let C s i ' denotes the perceived sensing coverage area that is covered by the affected sensor node s i as if s i is in   s i ' coordinates.
Definition 3: The collective perceived sensing coverage ( C p e r ) of all affected sensor nodes in WSN is defined as follows. C p e r = i = 1 N ' C s i ' .
In practice, to compare C s i   and C ' s i and characterize which scenarios lead to which type of coverage holes, we use Delaunay Triangulation to study this problem in the locality of each affected sensor node. We use the implementation of a distributed algorithm in [20] to construct the DT that represents the target sensing field S. Lemma 2 provides a good criterion to show the existence of coverage holes. From the analysis in Section V, subtracting I T C from the full area size of ∆ gives the uncovered area inside ∆ as follows.
U N C ( , G ) = A I T C
where A refers to the area size of ∆ and it is given by the following equation.
A = d ( d a ) ( d b ) ( d c ) , where d = a + b + c 2 and a, b and c are the length of the sides of ∆.
Let s 2 be an affected sensor node by anchor misplacement. Its erroneous estimated location is denoted by s 2 ' with coordinates ( x ' ,   y ' ). Let v = ( x , y ) be its localization error vector. The corrected coordinates of the s 2 's position are ( x ' x , y ' y ) . Figure 12 shows the structural change of the Delaunay triangle due to the impact of anchor misplacement on localizing sensor s 2 .
In order to measure the sensing coverage holes posed by anchor misplacement, we need to calculate the sensing coverage in two cases: with and without the existence of anchor misplacement. That is, for each affected sensor node   s i , we measure the coverage hole by comparing the sensing coverage of s i and its neighbors on the one hand, and s i ' and its neighbors on the other hand. This allows us to compare C s i and C s i ' in their vicinities. Figure 5 and Figure 6 show the vicinity of affected sensor   s 1 (i.e., s 2 s 3 s 4 s 5 s 6 s 7 ) and the vicinity of   s 1 ' (i.e.,   s 2 ' s 3 ' s 4 ' s 5 ' s 6 ' s 7 ' ). The triangulation of these vicinities enables us to study the noncovered areas in each triangle.
Next, we utilize the concept of history in graph theory to demonstrate the above analysis and calculate the sensing coverage for each affected sensor node with and without the presence of anchor misplacement.

A. Anchor Misplacement as a Graph Operator

Let D T be a Delaunay Triangulation of IoT sensors in the target field with no anchor misplacement. Anchor misplacement triggers a change in D T which impacts the localization accuracy of sensor nodes. The change in D T could be either in length metric of edges or in D T structure as some sensors become connected or disconnected according to their erroneous location. Let D T ' denote the new triangulation after anchor misplacement. Having all these effects, anchor misplacement can be considered as a graph operator that maps an input-given graph (i.e., D T ) into a new graph D T ' . If s i D T is an affected sensor, then s i ' D T ' , meaning s i   has been localized correctly (before anchor misplacement), while it has been localized incorrectly after anchor misplacement, we call it   s i ' in this case. Accordingly, s i and s i ' can be visualized as different sensors from a geolocational perspective.
Let D T ( s i ) represents all triangles in D T that are induced by s i and its neighbors, i.e., N H   s i . Similarly, let D T ' ( s i ' ) represents all triangles in D T ' that are induced by s i ' and its neighbors, i.e., N H   s i . For example, the triangulation of D T ( s 1 ) includes all triangles in D T induced by s 1 and its vicinity, i.e., N H   s 1 =   s 2 ,   s 3   s 4   s 5   ,     s 6 ,   s 7 in Figure 5 and Figure 6. To this end, we call D T ( s i ) the graph history of D T ' ( s i ' ) since it is the previous graph state before anchor misplacement. We denote it D T h ' ( s i ' ) . That is, D T h ' ( s i ' ) = D T ( s i ) . The concept of graph history is not new in graph theory; it has been used in the literature in various domains such as characterizing the asymptotic behavior of iterated line and path graphs [21,22].
Clearly, the subgraphs D T ' ( s i ' )   and its history, D T h ' ( s i ' ) , may not be the same. Indeed, the erroneous localization of sensors drifts some vertices to be in D T ' ( s i ' ) but not in D T h ' ( s i ' ) or vice versa. The location of each sensor in the target field is a key point in our study as both subgraphs D T ' ( s i ' ) and D T h ' ( s i ' ) could be isomorphic2 but yet different in terms of edge lengths. Figure 13 shows one triangle of D T ' ( s 2 ' ) and its graph history, D T h ' ( s 2 ' ) .
We can construct D T h ' from D T ' in the following way: Identify the misplaced anchor nodes, then remove the affected sensor nodes s i with their linked edges and insert them again in their correct positions. Lastly, construct the triangulation in their locality. The average number of neighbors of s i , | N H s i | , is at most 6 and, therefore, the average number of triangles in both subgraphs D T ' s i and D T h ' s i will not exceed 6 [19]. This shows the low computational cost of our approach.

B. Identifying Coverage Holes under Anchor Misplacement

In this subsection, we detect/delineate the false perceived and hidden unreported actual coverage holes. To achieve this, we are interested in the common triangles of both D T ' s i ' and D T h ' s i ' . The empty intersection indicates that D T h ' s i ' is a totally new structure and none of N H ( s i ) belongs to D T ' s i ' . This happens when anchor misplacement poses an extremely high inaccurate location for sensor s i such that the estimated location s i ' is out of the vicinity of s i . We recognize the following categories of a possible common triangle ∆ between D T ' s i ' and D T h ' s i ' .
  • Full local coverage of ∆ is maintained in both D T ' s i ' and D T h ' s i ' .
  • Full local coverage of ∆ exists in D T h ' s i ' , but not in D T ' s i ' . This is the case of false perceived coverage hole.
  • There is no full coverage in both D T ' s i ' and D T h ' s i ' .
  • The full local coverage of ∆ exists in D T ' s i ' , but not in D T h ' s i ' . This is the case of hidden actual unreported coverage holes as shown in Figure 14.
Categories 1 and 3 deal with extreme cases where the triangle ∆ is either covered in both D T ' s i ' and its history or not.
We are interested in detecting, identifying, and finding the size of the coverage holes that belong to categories 2) and 4). Our analysis in Section IV allows us to detect the coverage whole. The approach we followed in Section V, i.e., intra-triangle coverage, provides an effective tool to calculate the size of the coverage hole. Identifying the type of coverage hole can be achieved using the concept of history illustrated in this subsection. Next, we find the coverage ratio of the perceived sensing, C ' s i to the actual sensing coverage, C s i . The coverage ratio in the categories 1-4 is denoted CRC1-CRC4, respectively.
C R C 1 = A r e a (   ,     D T ' s i ' ) A r e a (   ,       D T h ' s i ' ) C R C 2 = U N C ( ,   D T ' s i ' )   A r e a (   ,     D T ' s i ' ) C R C 3 = U N C ( ,   D T ' s i ' ) U N C ( ,   D T h ' s i ' ) C R C 4 = U N C ( ,   D T h ' s i ' )   A r e a (   ,     D T h ' s i ' )
Where A r e a (   ,   G ) refers to the area of triangle in graph G . U N C ( , G ) refers to the size of the uncovered area in as per (15). Note that if the ratio is not equal to 1 in both categories 1 and 3, then there is inaccurate sensing reporting of ∆ sensor nodes. In this case, the actual coverage in the history is either underestimated or overestimated.
The same approach is still valid if more than one sensor is affected in a triangle . Assume s i and s j are two affected sensors and neighbors in D T h ' s i ' . There will be some redundant calculations because D T h ' s i ' and D T h ' s j ' will have a triangle in common. Consequently, the I T C ( ) will be calculated twice as both s i and s j are affected. Therefore, the value of the whole I T C should be adjusted accordingly in both D T ' s i ' and D T h ' s i ' .
The coverage ratio in (16) is straightforward. We apply it to the intra-triangle to identify the different types of coverage holes posed by anchor misplacement and calculate the percentage of each one. We later utilize our resilience framework to identify the misplaced anchors and find the set of affected sensor nodes.

C. Calculating Lower and Upper Bounds of Coverage Holes

The intra-triangle coverage holes (or uncovered areas) have different shapes; however, we model the upper and lower bounds of each uncovered area in a triangle ∆ as circles. The lower bound circle is a circle centered in the centroid of the polygon that strictly contains the uncovered area in ∆; it is the largest circle that can be inscribed inside the uncovered area. On the other hand, the upper bound circle is the minimum circle that circumscribes the uncovered area of ∆. To compute lower and upper bounds for the uncovered area in ∆, we apply the following procedure: first, we find a set U of intersection points, namely the intersection points between angular sectors and the edges of ∆, and the intersection points of the angular sectors themselves. Let s i and s j be two vertices in ∆. If R s i + R s j > d ( s i , s j ) we exclude the intersection points between the circles centered in s i and s j and the edge s i s j . Let U ' be the new set of intersection points. The points of U ' form a polygon P . Our goal is to find the minimum/maximum circle that circumscribes/inscribed-in P . To achieve this, we need to determine the centroid c of this polygon. The coordinates of the centroid are given by the following formula [23]:
c x = 1 6 A i = 0 U ' 1 ( x i + x i + 1 ) ( x i y i + 1 x i + 1 y i )
c y = 1 6 A i = 0 U ' 1 ( y i + y i + 1 ) ( x i y i + 1 x i + 1 y i )
where A is the area and is given by A = 1 2 i = 0 U ' 1 ( x i y i + 1 x i + 1 y i ) , and ( x i , y i ) and ( x i + 1 , y i + 1 ) are two consecutive points on P 's hull. Let R l = M i n p i U ' d c , p i ) . The circle centered in c with radius R l represents a lower bound of the uncovered area in ∆. Likewise, let R u = M a x p i U ' d c , p i ) . Then π R u 2 represents the size of the minimum circle that circumscribes P and, hence, considers as an upper bound of the uncovered area in ∆. Therefore, we have the following bounding formula:
π R l 2 < U n c o v e r e d   A r e a < π R u 2 where both bounding circles are centered at the centroid of a polygon P that contains the uncovered area. It should be noted here that the use of centroid c instead of the circumcenter of ∆ is more effective for the following reasons: 1) the circumcenter of ∆ does not always belong to the uncovered area due to the variation of IoT sensor ranges. 2) The circumcenter could be outside ∆ which makes the calculation of intra-triangle coverage irrelevant. 3) The bounds using the centroid c are tighter as it represents the uncovered area more fairly. Next, we present the algorithm that takes a triangle as an input and provides a uniform upper and lower bound for the uncovered areas.
The steps of our above analysis to compute lower and upper bounds are summarized in the following algorithm.
Preprints 76793 i002
LUB algorithm assumes that all sensors have been localized, and their locations are known. While DT is being constructed, each sensor recognizes its neighbors in each triangle ∆ in DT. LUB algorithm first checks the existence of a coverage hole by calling HasCoverageHole(∆) function which simply checks ∆ against the coverage criteria in Lemma 2. If a coverage hole is discovered, the function findPolygon(∆) is invoked to find the polygon that strictly circumscribed the uncovered region as discussed in this section. findCentroid( P ) will apply the equations (17) and (18) to find the centroid of P . The remaining is to call findRaduisLowerBound( P , c) to calculate the shortest distance between P 's vertices and c which is the radius of the lower bound. Similarly, findRaduisUpperBound( P , c) returns the longest distance between P 's vertices and c.

7. Resiliency approach for misplaced anchors

In this article, we propose a distributed scheme that takes input from affected sensors during the validation processes, and outputs the set of misplaced anchors.

A. The Proposed Scheme

The proposed scheme aims to determine the localization's validity and, consequently, the sensing coverage's validity by identifying the misplaced anchors through their affected sensors.
The scheme consists of two phases: Phase 1 (identify affected sensors) in this phase, each node measures its distance to all other nodes in two ways: a) Euclidean distance and b) using the received signal strength (RSS). Let d s i , s j and d s i , s j ' be the distance between nodes s i and s j using Euclidean distance and RSS, respectively.
We define x ( i ) to be the distortion vector between d s i , s j , and d s i , s j ' for node s i and all other nodes s j as follows.
x ( i ) = d s i , s j d s i , s j ' 2
Where j [ 1 , n ] ,   j i . Clearly, the number of vectors is a multiple of the number of sensor nodes. Calculating all of them to get the average of the two-way distances, i.e., d s i , s j and d s j , s i and the same for d s i , s j ' and d s j , s i ' adds up to the overhead computation and consequently increases the latency of detecting misplaced anchors. To this end, we explore two cases: 1) calculate only one vector, from one sensor to all other sensors. For more efficiency, we opt to choose a sensor node close to the center of the target field. 2) calculate several vectors and get the average of two-way distances. Regardless of the cases used, phase 1 will output one vector. We sort this vector in descending order from high to low distortions. In either case, we use the K-means algorithm with K=2 clusters to classify the elements of the vector into two classes: relatively accurate and erroneous sensors localized by misplaced anchors.
Phase 2 (identifying misplaced anchors) this phase aims to use the result of the K-means in the previous phase to identify the set of misplaced anchors. Out of the two generated classes, the one with a high mean localization error value indicates the affected sensors. Consequently, the misplaced anchors are among those which have localized the affected sensors. To find the misplaced anchors set, let B L s i = { b k ,   k = { 1,2 , 3 } } be a set of anchors that participated in localizing sensor node s i   using the trilateration method. Further, let S a S be a set of relatively accurate locations of sensor nodes. We define benign anchors, B b , as a union set of anchor nodes that participated in localizing all relatively accurate sensors as follows.
B b = s i S a B L ( s i )
Consequently, the misplaced anchors, B m , belong to the complement set as follows. B m = B \ B b . Note that B m a n d   B b . need not be mutually exclusive. Indeed, misplaced anchors may participate in localizing some sensors, yet, K-means considers them to have relatively accurate locations. Next, we enhance the detection scheme to address this point.

B. Enhanced Detection Scheme

The previously proposed scheme could result in high false alarms of misplaced anchors. To mitigate this, we propose the following refinement procedure. First, we sort the class/group of relatively accurate sensors in descending order of localization error. Second, we test the sensors of the sorted group one by one. Let s i be the sensor with the highest localization error among other sensors in the sorted class. Further, let b 1 , b 2 , and b 3 are the anchors that participated in localizing s i . We test these three anchors against the following criteria: if any of these anchors is closer to the centroid of the affected group rather than the centroid of the relatively accurate sensors group, and its distortion from a benign anchor is greater than a threshold, then this anchor is switched to be B m . A threshold depends on historical data which considers SNR. To test an anchor, b j , we adopt a similar approach to our previous discussion of distortion between the Euclidean and RSS-based distances as follows.
d b i , b j d b i , b j ' 2 ε
where b i   is a benign anchor. We repeat the second step as long as there is at least one anchor participating in localizing sensor s i that satisfies the given criteria. To ensure the effectiveness of this procedure, we chose b i out of benign anchors that contributed to localizing sensors of the highest accuracy.

8. Numerical Results and Discussion

A. Simulation Results

In this section, we validate our resiliency approach and show its effectiveness. We conduct our experiments using a homogeneous and a heterogeneous network and apply the proposed framework to determine their network reliability. All the simulation results are obtained by repeating the experiments for a certain number of times and averaging the corresponding results. This number is related to the result convergence and variance. For example, if the results converge and come to a stable state with minimum variance after x number of runs, then we adopt x (or higher than x) as a reasonable number of runs.

B. Validation

We first show the validation of our approach in identifying the affected sensors and then misplaced anchors.
We intend to classify the two groups of sensors using K-means clustering. We use the experimental setting depicted in Figure 2. Running phase 1 of our approach results in Figure 15, showing the groups of affected and relatively non-affected sensors with their centroids. The majority of affected sensors are correctly included in group 1.
We continue to validate our approach by running the enhanced version of phase 2. We calculated localization errors of the two anchor classes for different trials (1, 2, 7, 11, 16, 20, 27, 40). We found that the result converges after 16 trials. Measuring the variance of localization errors suggests that 20 iterations are enough to provide convergent and stable results. Thus, each experiment is repeated 20 times for any given network topology. We take a random sample of 15 observations of averaged localization error values generated by the two anchor groups per iteration. To analyze the statistical significance of the difference between the localization errors generated by the two anchor classes, we adopt the following hypotheses:
  • Null hypothesis H 0 : μ = 0 , which means the true difference of means for the corresponding anchor groups is equal to zero.
  • Alternative hypothesis H a : μ 0 .
We use a 95% confidence interval which is equivalent to a significance level of α=0.05. We reject the null hypothesis if the p-value ≤ α. Rejecting the null hypothesis means that the difference between the localization error caused by these two anchor classes is statistically significant, which means that the test favors the alternative hypothesis. In this case, the zero value is not contained in the confidence interval.
The p-value of 1.9551e-04 suggests rejection of the null hypothesis, meaning the means of the two groups are significantly different. The lower and upper limits of the confidence intervals of the difference of means, [-4.505, -3.4446], confirmed this result.
The results show our approach's validation in identifying misplaced anchors with 95% confidence.

C. Verify the Effectiveness

In this section, we show the robustness of our framework against unreliable nodes. We verify the effectiveness of our framework by mitigating the impact of misplaced anchors on IoT nodes and lift their burden by excluding them as much as possible from the localization process.
We use NS-3 to simulate different scenarios of the conducted experiments where random non-uniform IoT sensors are deployed in the target field. These experiments intend to show the effectiveness of our framework. We also use the implementation of a distributed algorithm in [20] to construct the DT that represents the target sensing field. The simulation settings are summarized in Table I.
Table I. Simulation Settings.
Table I. Simulation Settings.
Preprints 76793 i003

1). The Effectiveness of Localization and Perceived Coverage

This experiment aims to show the impact on RMSD and perceived coverage holes as the proposed framework detects and excludes more misplaced anchors.
We use the Root Mean Square Distance (RMSD) to measure the localization error in the network.
R M S D = j = 1 n x j x j ' 2 + y j y j ' 2 n
where x j x j ' and y j y j ' respectively are the actual and estimated positions of sensor node j and n is the total number of sensor nodes. RMSD is widely used in the literature for the comparison of the estimation error in different localization algorithms.
Figure 16 shows the effectiveness of our proposed framework in decreasing both localization RMSD and the percentage of perceived coverage holes as the number of anchor nodes detected and excluded by our framework increases. The perceived lack of coverage has a sharper steep than the RMSD due to the fact that it is directly associated with the number of misplaced anchors in the network, while RMSD is more related to the quality of sensor localization, which is related to multiple factors such as the existence of enough number of reliable anchor nodes per sensor and the impact of SNR to the quality of distance measurements.

2). The Effectiveness of Perceived Coverage Holes for Different Sensing Range Values

To show the effectiveness of our approach for a heterogeneous network with different sensing range values, we simulate the following scenarios: given 40 objects in terrain, such as gas pipes. The sensor nodes have been deployed to fully monitor gas leakage for all pipes. We assume anchor-based localization is used to localize sensors. If anchor misplacement is incurred, we are interested in showing the impact of our proposed scheme on the percentage of miss-reported objects. To what extent does our framework help to overcome the false perceived coverage as more misplaced anchors are detected and excluded from the network services? The results are shown in Figure 17.
The 95% confidence interval shows that the percentage of miss-report objects of the three curves becomes statistically insignificant as more misplaced anchor nodes are detected and excluded. This is because regardless of the sensing range, the more misplaced anchors eliminated, the better the sensing reports' validity and, consequently, the fewer miss-reported objects. Our results suggest that using fewer sensing nodes with broader sensing ranges provides faster healing from anchors misplacement. In other words, the proposed framework significantly reduces miss-reported objects as the sensing range increases.

3). The Effectiveness of Perceived Coverage Holes for Different SNR Values

In these experiments, we demonstrate the performance effectiveness of our proposed framework for SNR values 10, 20, and 30 db. The idea is to assess the impact of anchor misplacement and measurement error on localization accuracy. Figure 18 shows that our framework is more effective for higher SNR. This can be interpreted as follows: as SNR values decrease, measurement error magnitude increases because the signal becomes weaker, reducing the reliability of the localization service. For SNR= 10 db, RMSD stays almost constant to the point that excluding more misplaced anchors nodes does not reduce the RMSD. Moreover, the 95% confidence interval shows the statistical significance of RMSD values for the various SNRs curves. This shows the severity of lower SNR values on sensing reliability.

9. Conclusion

In this paper, we propose a resilience framework to detect anchor misplacement, identify coverage holes, and quantify their area. Toward this, we conduct an in-depth computational geometry-based analysis of the target sensing field under the presence of error components, especially anchor misplacement. We utilized Voronoi Diagrams (VD) and Delaunay Triangulation (DT) to cluster the sensing field to efficiently assess the lack of coverage. Using VD and DT, we addressed the coverage hole problem using a limited number of points in the target sensing field, lowering the computational cost and increasing the feasibility of our schemes in the IoT environment. We assessed the intra-triangle coverage to show the existence of new types of coverage holes: actual unreported and perceived coverage holes.
Our experiments showed the validation and effectiveness of the proposed resilience framework in improving localization accuracy and sensing coverage, reinforcing the overall IoT-based system reliability. Our findings provide solid input for cooperative and overlapped IoT systems to optimize resource sharing by either tolerating coverage loss or deploying extra sensors to cover the coverage gap.
Future work includes designing a framework that extends the life expectancy of IoT networks by employing cooperative sensing and utilizing the intra-triangle analytics of this study. For example, overlapped sensors of multiple network operators can plan an intelligent sleep mode scheduling according to the role of each sensor. Mobile sensors can also be used to back up low-energy sensors and cover actual unreported sensing holes.

References

  1. Y. Al Mtawa, H. S. Hassanein, and N. Nasser, “Identifying Bounds on Sensing Coverage Holes in IoT Deployments,” in EEE Global Communications Conference (GLOBECOM), pp. 1–6, Dec. 2015.
  2. Mondal, A.; Mishra, D.; Prasad, G.; Hossain, A. Joint Optimization Framework for Minimization of Device Energy Consumption in Transmission Rate Constrained UAV-Assisted IoT Network. IEEE Internet Things J. 2021, 9, 9591–9607. [Google Scholar] [CrossRef]
  3. Raza, S.M.; Jeong, J.; Kim, M.; Kang, B.; Choo, H. Empirical Performance and Energy Consumption Evaluation of Container Solutions on Resource Constrained IoT Gateways. Sensors 2021, 21, 1378. [Google Scholar] [CrossRef] [PubMed]
  4. Martínez Rosabal, O. L. A. López, D. E. Pérez, M. Shehab, H. Hilleshein, and H. Alves, “Minimization of the Worst Case Average Energy Consumption in UAV-Assisted IoT Networks,” IEEE Internet Things J., vol. 9, no. 17, pp. 15827–15838, Sep. 2022.
  5. K. Xu, G. Takahara, and H. Hassanein, “On the robustness of grid-based deployment in wireless sensor networks,” IWCMC 2006 - Proc. 2006 Int. Wirel. Commun. Mob. Comput. Conf., vol. 2006, pp. 1183–1188, 2006. [CrossRef]
  6. Bottino, A.; Laurentini, A. A nearly optimal algorithm for covering the interior of an Art Gallery. Pattern Recognit. 2011, 44, 1048–1056. [Google Scholar] [CrossRef]
  7. R. Kumar, T. Amgoth, and D. K. Sah, “Deployment of Sensor Nodes for Connectivity Restoration and Coverage Maximization in WSNs,” 2021 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2021, pp. 209–213, Mar. 2021. [CrossRef]
  8. D. L. Shanthi, “Maximization of Disjoint K-cover Using Computation Intelligence to Improve WSN Lifetime,” Lect. Notes Networks Syst., vol. 458, pp. 223–238, 2022. [CrossRef]
  9. Touati, H.; Aboud, A.; Hnich, B. Named Data Networking-based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode. Concurr. Comput. Pract. Exp. 2021, 34, e6584. [Google Scholar] [CrossRef]
  10. Wang, S.-C.; Hsiao, H.C.W.; Lin, C.-C.; Chin, H.-H. Multi-Objective Wireless Sensor Network Deployment Problem with Cooperative Distance-Based Sensing Coverage. Mob. Networks Appl. 2021, 27, 3–14. [Google Scholar] [CrossRef]
  11. Y. Al Mtawa, N. Nasser, and H. S. Hassanein, “Mitigating anchor misplacement errors in wireless sensor networks,” in 11th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 569–575, Oct. 2015.
  12. F. B. Sorbelli, S. K. Das, C. M. Pinotti, S. Silvestri, and S. Sil, “Precise Localization in Sparse Sensor Networks using a Drone with Directional Antennas,” Proc. 19th Int. Conf. Distrib. Comput. Netw., 2018. [CrossRef]
  13. Maheshwari and N. Chand, “A Survey on Wireless Sensor Networks Coverage Problems,” Lect. Notes Networks Syst., vol. 46, pp. 153–164, 2019. [CrossRef]
  14. M. Farsi, M. A. Elhosseini, M. Badawy, H. Arafat Ali, and H. Zain Eldin, “Deployment techniques in wireless sensor networks, coverage and connectivity: A survey,” IEEE Access, vol. 7, pp. 28940–28954, 2019.
  15. S. K. Sowe, T. Kimata, M. Dong, and K. Zettsu, “Managing heterogeneous sensor data on a big data platform: IoT services for data-intensive science,” Proc. - IEEE 38th Annu. Int. Comput. Softw. Appl. Conf. Work. COMPSACW 2014, pp. 295–300, Sep. 2014. [CrossRef]
  16. Shakhov, V.V.; Koo, I. Experiment Design for Parameter Estimation in Probabilistic Sensing Models. IEEE Sensors J. 2017, 17, 8431–8437. [Google Scholar] [CrossRef]
  17. Y. Al Mtawa, H. S. Hassanein, and N. Nasser, “Measuring the validity of sensing coverage in the presence of anchor misplacement,” in IEEE International Conference on Communications (ICC), pp. 1–6, Jul. 2017. [CrossRef]
  18. G. Takahara, K. Xu, and H. Hassanein, “Efficient coverage planning for grid-based wireless sensor networks,” IEEE Int. Conf. Commun., pp. 3522–3526, 2007. [CrossRef]
  19. M. de Berg, O. Cheong, M. van Kreveld, and M. Overmars, “Delaunay Triangulations,” in Computational Geometry, Springer, Berlin, Heidelberg, 2008, pp. 191–218.
  20. Delaunay Triangulation C++ Library for 2D and 2.5D point clouds. Available online: https://www.geom.at/products/fade2d/ (accessed on 14 August 2022).
  21. Y. Al-Mtawa and M. Jazzer, “On Independence Problem of P2-Graph,” Int. J. Comput. Sci. Netw. Secur., vol. 9, no. 1, p. 205, 2009.
  22. Y. Al Mtawa, “Histories of Iterated Path Graphs,” J. Comb. Inf. \& Syst. Sci., vol. 32, pp. 175–188, 2007.
  23. P. Bourke, “‘Calculating the area and centroid of a polygon’ - Google Scholar,” 1988.
  24. M. de Berg, O. Cheong, M. van Kreveld, and M. Overmars, “Voronoi Diagrams,” in Computational Geometry, Springer, Berlin, Heidelberg, 2008, pp. 147–171.
1
The size of this set is at most 2n-5 [24].
2
Two graphs are isomorphic if they contain the same objects (i.e., vertices) linked in the same way.
Figure 1. Multi-hop cooperative sensing networks.
Figure 1. Multi-hop cooperative sensing networks.
Preprints 76793 g001
Figure 2. The impact of anchor misplacement on localizing sensor nodes.
Figure 2. The impact of anchor misplacement on localizing sensor nodes.
Preprints 76793 g002
Figure 3. Anchor misplacement influence on network reliability.
Figure 3. Anchor misplacement influence on network reliability.
Preprints 76793 g003
Figure 4. Full and partial sensing coverage using heterogeneous sensor nodes.
Figure 4. Full and partial sensing coverage using heterogeneous sensor nodes.
Preprints 76793 g004
Figure 5. A triangulation in the vicinity of sensor node s 1 . (a) An ideal case is where there are no coverage holes. (b) A perceived coverage hole due to anchor misplacement.
Figure 5. A triangulation in the vicinity of sensor node s 1 . (a) An ideal case is where there are no coverage holes. (b) A perceived coverage hole due to anchor misplacement.
Preprints 76793 g005
Figure 6. An actual unreported coverage hole can be identified by investigating the triangles in the vicinity of the affected sensor s 1 . (a) Original deployment with actual coverage hole. (b) An actual coverage hole is masked. Thus unreported.
Figure 6. An actual unreported coverage hole can be identified by investigating the triangles in the vicinity of the affected sensor s 1 . (a) Original deployment with actual coverage hole. (b) An actual coverage hole is masked. Thus unreported.
Preprints 76793 g006
Figure 7. Disk model of overlapped IoT sensing providers with coverage holes.
Figure 7. Disk model of overlapped IoT sensing providers with coverage holes.
Preprints 76793 g007
Figure 8. VD partitions sensing field into convex cells.
Figure 8. VD partitions sensing field into convex cells.
Preprints 76793 g008
Figure 9. Sample DT of VD: Triangulations incident to sensor s i .
Figure 9. Sample DT of VD: Triangulations incident to sensor s i .
Preprints 76793 g009
Figure 10. An illustration of sensing coverage using the concept of the intra-triangle contribution of a sensor node.
Figure 10. An illustration of sensing coverage using the concept of the intra-triangle contribution of a sensor node.
Preprints 76793 g010
Figure 11. An illustration of sensing ranges lower bounds presented by lemma 2 and corollary 2.
Figure 11. An illustration of sensing ranges lower bounds presented by lemma 2 and corollary 2.
Preprints 76793 g011
Figure 12. An example of structural change on DT due to correcting the location of s 2 ' to s 2 .
Figure 12. An example of structural change on DT due to correcting the location of s 2 ' to s 2 .
Preprints 76793 g012
Figure 13. A partial snapshot of D T ' ( s 2 ' ) and its history.
Figure 13. A partial snapshot of D T ' ( s 2 ' ) and its history.
Preprints 76793 g013
Figure 14. Actual unreported coverage hole with center x.
Figure 14. Actual unreported coverage hole with center x.
Preprints 76793 g014
Figure 15. An illustration of K-means application on sensors, generating two ployhsape regions/groups of sensors: affected and relatively non-affected by anchor misplacement.
Figure 15. An illustration of K-means application on sensors, generating two ployhsape regions/groups of sensors: affected and relatively non-affected by anchor misplacement.
Preprints 76793 g015
Figure 16. The behavior of RMSD and perceived coverage as the number of anchors detected and excluded increase.
Figure 16. The behavior of RMSD and perceived coverage as the number of anchors detected and excluded increase.
Preprints 76793 g016
Figure 17. Number of misplaced anchors vs. percentage of miss-reported objects.
Figure 17. Number of misplaced anchors vs. percentage of miss-reported objects.
Preprints 76793 g017
Figure 18. Number of misplaced anchors detected and excluded vs. localization RMSD.
Figure 18. Number of misplaced anchors detected and excluded vs. localization RMSD.
Preprints 76793 g018
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated