Area Coverage Vs Event Detection in Mixed Sensor Networks



Similar documents
Core Maths C2. Revision Notes

K-Means Cluster Analysis. Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 1

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

2.1 Three Dimensional Curves and Surfaces

INVESTIGATIONS AND FUNCTIONS Example 1

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Example: Document Clustering. Clustering: Definition. Notion of a Cluster can be Ambiguous. Types of Clusterings. Hierarchical Clustering

More Equations and Inequalities

Physics 53. Kinematics 2. Our nature consists in movement; absolute rest is death. Pascal

COMPONENTS OF VECTORS

Section 7.2 Linear Programming: The Graphical Method

Progressive Recovery For Network Virtualization After Large-Scale Disasters

SECTION 7-4 Algebraic Vectors

Math, Trigonometry and Vectors. Geometry. Trig Definitions. sin(θ) = opp hyp. cos(θ) = adj hyp. tan(θ) = opp adj. Here's a familiar image.

Solutions to Exercises, Section 5.1

Affine Transformations

CS Computer Networks 1: Routing Algorithms

D.2. The Cartesian Plane. The Cartesian Plane The Distance and Midpoint Formulas Equations of Circles. D10 APPENDIX D Precalculus Review

Cluster Analysis Overview. Data Mining Techniques: Cluster Analysis. What is Cluster Analysis? What is Cluster Analysis?

Lecture 1 Introduction Rectangular Coordinate Systems Vectors Lecture 2 Length, Dot Product, Cross Product Length...

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Cluster Analysis: Basic Concepts and Algorithms

Connecting Transformational Geometry and Transformations of Functions

MAT188H1S Lec0101 Burbulla

sin(θ) = opp hyp cos(θ) = adj hyp tan(θ) = opp adj

Area and Arc Length in Polar Coordinates

Section V.2: Magnitudes, Directions, and Components of Vectors

Downloaded from equations. 2.4 The reciprocal function x 1 x

The Mathematics of Engineering Surveying (3)

Functions and Graphs CHAPTER INTRODUCTION. The function concept is one of the most important ideas in mathematics. The study

Solving Quadratic Equations by Graphing. Consider an equation of the form. y ax 2 bx c a 0. In an equation of the form

Complex Numbers. w = f(z) z. Examples

2.6. The Circle. Introduction. Prerequisites. Learning Outcomes

SECTION 2.2. Distance and Midpoint Formulas; Circles

{ } Sec 3.1 Systems of Linear Equations in Two Variables

IN THIS PAPER, we study the delay and capacity trade-offs

5.2 Inverse Functions

Trigonometry Review Workshop 1

A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment

2.6. The Circle. Introduction. Prerequisites. Learning Outcomes

COMPLEX STRESS TUTORIAL 3 COMPLEX STRESS AND STRAIN

D.3. Angles and Degree Measure. Review of Trigonometric Functions

Product Operators 6.1 A quick review of quantum mechanics

SECTION 5-1 Exponential Functions

Zeros of Polynomial Functions. The Fundamental Theorem of Algebra. The Fundamental Theorem of Algebra. zero in the complex number system.

3 Optimizing Functions of Two Variables. Chapter 7 Section 3 Optimizing Functions of Two Variables 533

9.5 CALCULUS AND POLAR COORDINATES

Examples: Joint Densities and Joint Mass Functions Example 1: X and Y are jointly continuous with joint pdf

Core Maths C3. Revision Notes

Factoring bivariate polynomials with integer coefficients via Newton polygons

LESSON EIII.E EXPONENTS AND LOGARITHMS

MATH REVIEW SHEETS BEGINNING ALGEBRA MATH 60

Chapter 13 Introduction to Linear Regression and Correlation Analysis

Double Integrals in Polar Coordinates

Higher. Polynomials and Quadratics 64

Identifying second degree equations

Analytic Models of the ROC Curve: Applications to Credit Rating Model Validation

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

A Survey on Rendezvous Data Collection in Wireless Sensor Networks. Presented by Longfei Shangguan Supervisor:Dr.Yunhao Liu

Rotated Ellipses. And Their Intersections With Lines. Mark C. Hendricks, Ph.D. Copyright March 8, 2012

Pulsed Fourier Transform NMR The rotating frame of reference. The NMR Experiment. The Rotating Frame of Reference.

4 Constrained Optimization: The Method of Lagrange Multipliers. Chapter 7 Section 4 Constrained Optimization: The Method of Lagrange Multipliers 551

Data Mining Cluster Analysis: Basic Concepts and Algorithms. Clustering Algorithms. Lecture Notes for Chapter 8. Introduction to Data Mining

Spin-lattice and spin-spin relaxation

2D Geometrical Transformations. Foley & Van Dam, Chapter 5

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

Mathematics Placement Packet Colorado College Department of Mathematics and Computer Science

ACT Math Vocabulary. Altitude The height of a triangle that makes a 90-degree angle with the base of the triangle. Altitude

Rotation of Axes 1. Rotation of Axes. At the beginning of Chapter 5 we stated that all equations of the form

Decentralized Utility-based Sensor Network Design

Chapter 8. Lines and Planes. By the end of this chapter, you will

Clustering. Clustering. What is Clustering? What is Clustering? What is Clustering? Types of Data in Cluster Analysis

Implicit Differentiation

Addition and Subtraction of Vectors

C3: Functions. Learning objectives

So, using the new notation, P X,Y (0,1) =.08 This is the value which the joint probability function for X and Y takes when X=0 and Y=1.

Applied Algorithm Design Lecture 5

REVIEW OF ANALYTIC GEOMETRY

3D Arm Motion Tracking for Home-based Rehabilitation

Quadratic Equations and Functions

1. a. standard form of a parabola with. 2 b 1 2 horizontal axis of symmetry 2. x 2 y 2 r 2 o. standard form of an ellipse centered

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Introduction to Plates

EXPANDING THE CALCULUS HORIZON. Hurricane Modeling

Transcription:

Area Coverage Vs Event Detection in Mied Sensor Networks Theofanis P. Lambrou and Christos G. Panaiotou KIOS Research Center, Dept. of Electrical and Computer Engineering, Universit of Cprus, Nicosia, Cprus. e-mail: {faniseng,christosp}@uc.ac.c) Abstract: This paper considers the problem of improving the monitoring capabilit of a sparse stationar sensor network b using mobile sensor nodes and addresses the trade off between area coverage and fast event detection. Though these are two similar objectives, the can lead to two different strategies. In this contet, this paper derives the optimal search path strateg for minimizing the event detection time in the case of two uncovered regions. Finding the optimal searching path is an NP-hard problem, which implies that we can not find the optimal solution of an arbitrar problem instance in reasonable time, due to large number of uncovered regions and mobile nodes. Thus using the principles of the derived solution, an efficient and distributed path planning strateg is also presented for the general case. Simulation results are included to demonstrate the effectiveness of the proposed approach. 1. INTRODUCTION Area monitoring or surveillance is a problem that has attracted significant attention over the past ears and a number of technologies have been proposed to address it. One of these technologies is wireless sensor networks WSNs), with stationar, mobile or both tpes of nodes [Lambrou and Panaiotou, 2009]. In this contet, the problem is to monitor an area for the occurrence of certain events or targets. In [Poduri and Sukhatme, 2004; Estrin et al., 2002], it was shown that large scale sensor networks consisting of a large number of mobile and static nodes are considered to be candidates for man applications including environmental monitoring and event detection in the near future. Several authors have addressed the problem from an area coverage point of view. To quantif the qualit of monitoring, man authors have used the concept of k- covered areas which means that each point in the area is monitored b at least k sensors. On the other hand, other authors [Lambrou and Panaiotou., 2007; Ghosh, 2004] have tried to identif the weak points in the monitoring sstem b detecting the coverage holes, i.e., the areas not covered b an sensor. The aforementioned approaches refer to WSNs with stationar nodes. The problem of coverage has also been addressed using mobile sensor networks. For eample, in [Liu et al., 2005], area coverage and event detection capabilities resulting from the continuous random movement of mobile sensors has been studied. Several other authors have also addressed the problem of area coverage using mobile nodes [Cortes et al., 2004; Li and Cassandras, 2005; Butler and Rus, 2003; Poduri and Sukhatme, 2004]. The This work is partl supported b the European Project CONtrol for COORDination of distributed sstems CON4COORD - FP7-2007-IST-2-223844) and the Research Promotion Foundation of Cprus. problem has been addressed using mied sensor networks [Lambrou and Panaiotou, 2009].i.e., networks with both stationar and mobile nodes) where mobiles collaborate with stationar and other mobiles nodes to cover the area more effectivel. In this approach, mobile nodes search the uncovered areas and avoid sampling areas that are covered b stationar or other mobile nodes. Theoretical work on searching for targets in unknown location was initiated b B. Koopman [Koopman, 1956] and was further developed b L. Stone [Stone, 1975] who studied the moving target problem. However, in [Koopman, 1956; Stone, 1975], the focus in on the search effort allocation problem rather than the path finding problem which is the emphasis of this work. Depending on the tpe of wireless sensor network used, there is a fundamental trade off that involves the area coverage and the dela to detect an event. In monitoring applications with stationar sensor nodes, an event is either detected or not it is not detected if it occurs in a coverage hole) and detection is done immediatel assuming a connected network where the message propagation time is negligible). On the other hand, in applications with mobile nodes, it is possible to search and cover the entire field, however, this will take time, thus an event ma remain undetected for a significant amount of time. An important question that arises is how to search the area such that events are detected in minimum time. Intuitivel, one ma argue that in order to minimize the detection time, one needs to first search the areas where it is most likel to find the event. However, because of the time that ma be needed b the mobile to get to the most likel area, it ma be faster to first search less likel areas that are closer to the mobile node. The main contribution of this work is that it addresses this trade-off and determines the optimal strateg for a single mobile in a small two-hole network. The principles of the two-hole optimal strateg are then used to derive Copright b the International Federation of Automatic Control IFAC) 11791

a heuristic) distributed path planning strateg for a group of mobile nodes. We emphasize that the solution to the general path planning strateg is an NP-complete problem it can be reduced to the multi-agent travelling salesman problem). Etensive simulation results indicate the benefits of the developed distributed strateg. The remaining of the paper is organized as follows. Section 2 describes the model that has been adopted and the underling assumptions. Section 3 derives the optimal search strateg with respect to the detection time) of the mobile node in a two-hole network. Motivated b the results of Section 3, Section 4 presents a distributed path planning algorithm that can be utilized b a set of mobile nodes in order to navigate through the sensor field. Section 5 presents the simulation results. The paper concludes with Section 6. 2. MODEL DESCRIPTION In this paper, we address the problem of detecting a stationar event target) using a mied sensor network consisting of both mobile and static nodes. In this section we present the modeling assumptions and define some concepts and objectives that will be used in the sequel. We consider a mied sensor network made of a large number of sensornodes deploed in a largeregionawhen a large region is to be monitored b a sensor network, it is desirable to deplo randoml a large number of inepensive, low power sensor nodes to the given area as manual deploment is impractical). However, the problem is that a dense deploment is not alwas feasible due to high cost even though each sensor could be cheap, deploing a large number of them is still epensive) thus a WSN with static sensors ma not be able to guarantee full coverage. It is also noted that as time passes, more coverage holes ma be created due to the random failure of some sensors due to ageing). We assume that the region under monitored is a rectangular area A = R R and a set S with S = S static sensor nodes that are randoml placed in the area A, at positions i = i, i ), i = 1,,S. In addition, we assume that a set M of M = M mobile sensor nodes are available and their position after the k-th time step is i k) = i k), i k)), i = 1,,M, k = 0,1,. We also consider a static event which has occurred at random point e = e, e ) in the environment. Weassumethatallstaticandmobilenodeshaveacommon known) sensing range r d with the sensing area of πr 2 d and a common communication range r c > r d. For notational convenience, we define the set of all sensor nodes N = S M and in this set the mobile nodes are re-indeed as m = S + 1,,N, where N = S + M. It is assumed that all sensors know their location through a combination of GPS and localization algorithms. Furthermore, it is assumed that all sensors can reach the gatewacommonl referred to as sink in the WSN literature) using multihop communication. The neighborhood of a sensor s is the set of all sensors nodes that are one hop awa, i.e., the nodes that are located at a distance less than or equal to r c from s. This set is denoted b H rc s) = {j : s j r c, j N,j s} 1) At an point in time, the sensor field can be partitioned into two regions in terms of coverage:covered b static or mobile sensors) and uncovered. The covered region means that an point in the region is within the sensing area coverage) of at least one sensor, thus if an event occurs in that area it will be detected immediatel. The uncovered region is the complement of the covered region. Ever sensor has a sensing area and the union of the sensing areas of all sensors is called the sensing area coverage. If an event occurs in an uncovered region then it is possible to be detected b mobile sensors, but with some dela. To make the concept of area coverage more concrete, the entire sensor field is discretized into an X Y grid. The current state of the sensor field is represented b a X Y matri G k, k = 0,1,, which corresponds to the confidence in detecting an event. If the i,j)- th cell falls in the detection range of a functioning static sensor, then the corresponding G k i,j) = 1, for all k and we are confident that no event will occur in the area of the corresponding grid cell without being detected. If the matri element has the value 0, then we have no wa of knowing if an event has occurred in the corresponding area. This matri represents the accurate state of the sensor field and is updated as the mobiles move around in the field. Thusat everstep, weuse the followingupdating rule for ever element of matri G k. { 1, if i,j) Drd G k+1 i,j) = s ), s N 2) G k i,j), otherwise where s arethecoordinatesofsensorsinthegridg k and D rd s ) is the set of Grid cells covered b sensor s N with detection range r d. The area coverage C k represents the area coverage over a time interval [0,k] and is defined as 1 X C k = X Y Y G k i,j) 3) i=1 j=1 3. PROBLEM DEFINITION AND SOLUTION To make the analsis more concrete, let T be the generall random time when an event has been detected, then the objective of the paper is to determine the paths of the mobile sensors in order to solve P). P) := min{e[t]} where E[ ] denotes the epectation operator. In a general setting, assuming that there are h uncovered locations coverage holes) it can be shown that P) can be reduced to multiple travelling salesman problem mtsp) which is widel known to be an NP-complete problem. Thus, more efficient search approaches are needed. Furthermore, it is desirable to determine solution strategies that are distributed in nature, thus each mobile can determine its path b itself utilizing onl information that is locall available since such strategies will significantl reduce the communication overhead and can easil adapt to changes in the environment node failures). Net, we consider the smallest instance of the problem whichcanprovidesomeinsighttothenatureofthegeneral solution. 11792

3.1 The single mobile, two-hole problem In this section we assume a scenario where a single mobile node is available and an event has occurred in either of two locations h = 2 coverage holes). The objective of the mobile is to decide which location to search first such that the detection dela E[T] is minimized. Before we proceed with the derivation of the optimal strateg, we also make the following assumptions/definitions. A1. There are onl two uncovered regions coverage holes) with areas and ) and centroids geometric centers), C b and C s respectivel. It is also assumed that there is no overlap between the two holes. A2. An undetected event eist and it can occur at an point of the uncovered region with equal probabilit. A3. The mobile node is initiall placed at position O at distance d b = C b O from hole and at distance d s = C s O from hole. The distance between the two coverage holes is indicated b d sb = C s C b. A4. The mobile sensor detects a target within its detection range r d with probabilit 1 while it detects targets outside its detection range with probabilit 0. A5. The speed of the mobile is v. A6. An ehaustive search of a coverage hole with area A is performed in A/2r d v) time units. Using assumptions A1 and A2 one can obtain the probabilit of an event occurring in either of the two holes b P ) =, and P ) = 4) + + Also,fromassumptionA2andA5,giventhattheeventhas occurred in a hole of area A, then the time to detect the event assuming ehaustive search is uniforml distributed in the interval [0,A/2r d v)]. Therefore the average time to detect the event is simpl A/4r d v) half the time to search the entire hole). Note that the uniform distribution assumption was made to simplif the analsis but the main results would also hold for an other event distribution. O Fig. 1. Problem geometr θ d s d b Fig. 1 illustrates the geometr of the problem. An event that will occur in either or will remain undetected unless a mobile node finds it. A mobile node can reach either of the holes and search it sequentiall, e.g., b following a path on concentric circles spiral-in or spiralout path) or making S shaped moves parallel sweeps) until the entire area is covered. Net, consider the scenario where, given that an event has occurred, a mobile node initiall located at O should conduct an ehaustive search of the two coverage holes in order to find it. In this scenario, the mobile has two options; it can either go and C s dsb d sb C b search first and then to or it can follow a reverse path, i.e., first search and then. In the following analsis, our objective is to determine the strateg that the mobile should follow in order to minimize the time to detect the event. E[T] = E[T ] P )+E[T ] P ) 5) wheree[t A j ]denotestheepectedt giventhattheevent is located in A j, j {b,s}. When the mobile follows the path from O C s C b, the epected event detection time E[T sb ] is given b ds E[T sb ]= v + 1 ) + 22r d v + ds = v + 2r d v + d sb v + 1 ) 6) 22r d v + On the other hand, if the mobile follows the path from O C b C s the epected event detection time E[T bs ] is given b E[T bs ]= db v + 1 22r d v db ) + + ) As + 7) = v + 2r d v + d sb v + 1 22r d v In order for the mobile to decide which path to follow, it needs to compute E[T sb ] and E[T bs ] and follow the path that minimizes the epected detection time. This decision problem i.e. which is the minimum epected detection time between E[T sb ] and E[T bs ]) can be reduced b comparing the terms of 6) and 7) and ignoring all common terms in the inequalit E[T sb ] E[T bs ]. Consequentl, we have E[T sb ] E[T bs ] d sb ) d b d s ) + ) 8) Net, we consider the following cases: C1 { = = A}: The decision problem E[T sb ] E[T bs ] reduces to d s d b, i.e., the mobile should go to its nearest coverage hole first. The proof follows easil b substituting = = A in eq. 8). C2 {d b = d s = d}: The decision problem E[T sb ] E[T bs ] reduces to, i.e., the mobile should go to the biggest hole first. The proof again follows easil b substituting d b = d s = d in eq. 8). C3 { > and d b < d s }:Thedecisionistoalwasgoto the biggest hole which is also located nearer to the mobile. The proof follows b comparing the terms of eq. 8). Using the conditions of this case, the right hand side is alwas less than the left hand side, therefore E[T sb ] > E[T bs ]. C4 { > and d b > d s }: The decision depends on the relative position d sb ) and area ratio = / ) of the bigger hole with respect to the smaller one. Specificall, if thesmallerholeislocatedinsidean eggshaped areathen the decision is to search the smaller hole first, otherwise, it is better to search the larger hole first. The proof follows b solvingeq.9) defined b the cosinesrule ofthe triangle in Fig. 1. Using the cosines rule we know that d 2 sb = d 2 s +d 2 b 2d s d b cosθ). 9) Also, using some algebra, one can rewrite eq. 8) according to the condition that the mobile should visit the smaller hole first. Thus we have d sb +1 1 d b d s ) 10) 11793

where = / > 1. Substituting eq. 10) in eq. 9), we get a single equation eq. 11) with one unknown, d s which denotes the decision boundar that determines which hole will be visited first. ) 2 +1 1 d b d s ) = d 2 s +d 2 b 2d s d b cosθ) 11) Therefore, the mobile should search the smaller hole first if its centroid is located within the egg-shaped region defined b the solution of eq. 11 in the polar coordinate sstem. The accepted solution of the eq. 11) is the following eq. 12)) where r = d s ) +1) 2 1) 2 cosθ)) 2 4 ) 2 d b +1) 2 1) 2 cosθ) r = 4 θ = [0,2π) 12) This holds true when O = 0,0). One can use eq. 12) to draw the region in polar coordinate sstem. This eggshaped region is illustrated in Fig. 2 and indicates that if the centroid of the small hole is located inside this shape the epected detection time is minimized when following the O C s C b path. It is also important to consider that for the case when = 1 case C1 { = = A}) the egg-shaped region becomes a circular region r = d b in eq. 12)) which means that it is better to follow the O C s C b onl if d s < d b. O θ d s Fig. 2. The Egg-shaped region for = 3 and O = 0,0). Finall, in the more general case, when O = 0, 0 ) = r o,θ o ) the analtical equation can be found using two translations of the polar coordinate sstem. The first translation will be a rotation of the polar ais through an angle of θ o, thus we have r = rθ θ o ) θ 13) = θ = [0,2π) Thesecondtranslationwillbeamovefrom0,0)tor o,θ 0 ) of the polar ais, thus now we have r = r 2 +ro 2+2r r o cosθ θ o ) 14) θ =arctan 3.2 Discussion d b C s dsb d sb C b r sinθ)+r o sinθ o) r cosθ)+r o cosθ o) The solution to the single mobile, two-hole problem indicates that rather than first searching the areas that are most likel to hide an event, often it is optimal with respect to the detection dela) to search areas that are located closer to the current position of the mobile even if it is less likel to find an event in them. In addition, from the derived egg-shaped region see fig. 2), there is alwas a region around the mobile where if a small hole is located, then it should be searched first even if a larger hole is present. This implies that a local search i.e., a search closertothecurrentlocationofthemobile)isbetterthana more global search i.e., a searchin a largeror the entire area). This motivates the approach of the search strateg that is presented in the net section which searches for coverageholes onl in a small radius aroundthe mobile. Net we also consider the two-mobile two-hole problem. For this problem, there are several possible scenarios depending on the current positions of the mobiles, the positions and sizes of the holes. A first option is to assign a hole to each mobile and the obvious assignment would be the one that minimizes the total distance traveled b the two mobiles. Another option would be to assign both holes to one mobile while the other one can remain either idle if it is located far awa from both holes) or it can assist with the search in one of the two holes. In other words, it is possible to have two mobiles search the same hole simultaneousl. In the latter case, the two mobiles should collaborate b not searching the same area. In the net section, we present a distributed path planning algorithm that can be used b each of the mobiles to search of events and is motivated b the above analsis. 4. MOBILE PATH PLANNING ALGORITHM In this section we present an efficient path planning algorithm that can be used b mobile nodes) in order search an area for events and improve the area coverage. The objective of each mobile is to collaborate with the sensor nodes stationar or mobile) in the field to search areas in its immediate neighborhood that are not covered b other nodes. Furthermore, the approach is dnamic in the sense that each mobile determines the coverage holes at ever step in order to capture possible changes in the environment, e.g., failures of static nodes. Before we proceed, let us present the information structure that is needed b mobile nodes) in order to run the pathplanning algorithm. Each mobile uses an X Y matri P m k, m M where it keeps the state of the field. Ideall P m k should remain P m k = G k at all times k, since the matri G k represents the accurate global state of the field which is used for the computation of the area coverage C k. Clearl, in a dnamic environment where several sensors move, fail or more sensors are added, it is impossible to guarantee that P m k = G k at all times. However, we emphasize, that the proposed algorithm, that will run b a mobile located at some position m k), computes its path based onl on local information, i.e., information in the submatri of P m k that corresponds to the cells D rc m k)), and thus, it is sufficient to have accurate information onl for the D rc m k)) submatri. This is easil attainable since the required information can be obtained from the one-hop neighbors. Distributed Path Planning: The path planning algorithm is based on Receding-Horizon approach where at each step the mobile s controller evaluates the cost of moving to a finite set of candidate positions and moves to the 11794

one that minimizes an overall cost. Suppose that during the kth step, the mobile node is at position k) and is heading to a direction θ. The net candidate positions are the ν {2n+1, n Z + } points 1,, ν that are uniforml distributed on the arc that is ρ meters awa from k) and are within an angle θ φ and θ + φ. The mobile node evaluates a cost function J i ) for all candidate locations 1,, ν ) andmovestothe location k+1) = i = k)+ρ.e iθ+ϕ i ) where i is the imaginar unit and i is the inde that minimizes J i ). J i ) = min {J i)} 15) 1 i ν In this model, θ is the direction that the mobile is heading, ρ is the distance that the mobile can cover in one time step, φ is the maimum angle that the mobile can turn in a single step, and ν is the number of candidate positions that is being evaluated for the net step. The objective function that each mobile is tring to minimize is of the form J) = w j J j ) 16) j wherej j )isaspecificobjectiveandw j sarenon-negative constant weights such that j w j = 1. As indicated b the analsis of the previous section, the optimal polic is to head towards the bigger hole in the areabut in the wa,the mobile should search smallerholes that are in the egg-shaped areaaround it. Thus, the objective 16) should be such that the mobile will approimate that behavior. After an etensive investigation [Lambrou and Panaiotou, 2009], two specific normalized functions havebeen selected: J t ) which penalizes positions that are awa from large coverage holes and J s ) which penalize positions that are close to static sensors. How J t ) and J s ) are computed is presented net. The objective of J s ) function is to push the mobile awa from areas covered b other sensors, thus the J s ) used involves a repulsion force that pushes the mobile awa from its closest neighbor. The form of this function is given b J s ) = ma j H rc m) { ep j 2 )} r 2 d 17) where H rc m) is the set of all nodes in the communication ranger c ofthe mobilem. The detectionranger d quantifies the size of the region around the mobile m to be repelled b its neighbors. This objective forces the mobile to pass from areas not covered b other sensors i.e., search areas in the immediate neighborhood of the mobile) i.e., search small holes that are located close to the mobile. Even if the mobile should search smaller holes in its immediate vicinit, it should eventuall make some progress towards approaching the larger coverage hole. This is achieved b the target function. In this function, each mobile has a destination point t e.g., the centroid of the larger coverage hole), and the target cost J t ) is a function that pulls the mobile towardsits target. J t ) is a function of the distance between the mobile and the target position and should take smaller values as the mobile moves towards the target destination thus for the purposes of this paper it is given b J t ) = t. 18) An important parameter of the path planning algorithm is the radius of the search area where a target position can be found. The importance of the parameter will be discussed in the net section. To compute J t ), one needs to determine a target position t and in our case the target position is assumed the centroid of the largest coverage hole in the search area defined b. This is achieved b the Zoom algorithm [Lambrou and Panaiotou., 2007] which is an efficient algorithm that can run at ever step k. The idea of the algorithm is to divide the submatri of P m k that corresponds to the cells D rz m k)) in four equalsegments, and choose the segment with the maimum number of empt cells i.e the segment with the maimum number of cells with Pi,j) = 0 and repeats until either the segment size is equal to a single cell or until all segments have the same number of empt cells. In the first case, the hole center position will be the center of the cell. In the second case, the hole center position will be the center of the segment during the previous iteration. Search Neighborhood : An important consideration for the above path planning algorithm is the size of the neighborhood where the mobile needs to search for its target largest coverage hole). In principle, the search area should be the entire field area A. However, this approach suffers from two main implementation issues. To determine and maintain the coverage map of the entire field requires an ecessive communication overhead. Furthermore, the entire field is bound to have a large number of uncovered areas and computing the optimal path is a hard problem can be reduced to the Euclidean path Travelling Salesman Problem shown to be NP-Complete with compleit On!) for n-cities [Papadimitriou, 1977], however due to page limitation we do not present the proof). Thus, it is desirable to search in smaller areas in order to provide a computationall tractable solution. The results of the previous section also support this strateg. The basic idea is rather than searching for the largest coverage hole in A, one should search for big enough holes that are located close to the mobile search for a local big enough hole rather than search for the biggest global one). Thus, the proposed algorithm searches for the biggest hole in a radius aroundthe mobile.an importantquestionishow big should be. If is too small, then there is a risk that the search strateg of the mobile will be mopic alwas searching in smaller holes never reaching the larger holes. On the other hand, if is too big, then the mobile will give more priorit to larger holes that are located far awa ignoring large enough holes that are located close to it. Thus, an optimal eists, however it is not eas to compute. Distributed Collaboration between Mobile Nodes: When multiple mobile nodes are used, it is desirable that the collaborate so the can search different areas to avoid duplication of work. Due to the localized nature of the proposed algorithm, if two mobiles are located sufficientl far apart, then the are guaranteed to search different coverage holes. However, when two mobiles come sufficientl close to each other, the information the will use to estimate the net target position will be the same and as a result the will all estimate the same target 11795

location. Clearl, this is not a good collaboration strateg. To avoid this problem we utilize a collaboration protocol that enables mobile nodes to echange some information in order to avoid converging to the same point. When two mobiles come into communication range r c for the first time the are out of communication range at step k 1 but the are in communication range at k) the echange their cognitive map Pk m, thus the now know what areas each one has searched so far. From this point onward, at ever step, the mobiles echange their current locationsto update their Pk i matri as well as their computed target location in order to avoid going towards the same point. Afterwards each mobile utilizes target point information from its neighbors in the zoom algorithm [Lambrou and Panaiotou., 2007] to find a target point that is different than the target points of its neighboring mobiles With this simple scheme, the mobiles avoid eploring the same areas. This scheme has some important benefits. It is distributed no need for a central controller), it is simple, and utilizes onl local information the relevant information in the submatri D rz i k)), which corresponds to the neighborhood of the cognitive map P i k ). 5. SIMULATION RESULTS In this section we investigate performance of the proposed path planning algorithm in terms of area coverage and event detection time for a team of five mobile nodes using MonteCarlosimulationfordifferent values.weconsider 100 sensor fields with 400 randoml deploed stationar sensors in a 200m 200m area. In each field one undetected static event eists placed randoml in one of the holes). The detection radius of all sensors is r d = 5m and the communication range r c = + r d = 30m. The weights are set to w t = w s = 0.5 and the mobile maneuverabilit parameters are set to ρ = 1m and φ = 35. Fig. 3 presents the average area coverage and average event detection time accomplished over 100 sensor fields after 1000 moving steps b M = 5 mobile nodes. These simulation eperiments indicate that when each mobile node is searching for an event in sparse stationar sensor fields, searching the event in local holes rather than searching it in a more global holes results in faster detection of the event. It is also shown that the neighborhood should not be ver big compared to WSN area) to avoid alwas heading towards the biggest hole but it should also be big enough to prevent the mobile for visiting ver small holes compared to the detection range r d of the mobile node. Also note that this trade off, also maimizes the area coverage. 6. CONCLUSION The objective of this work is to provide an analsis for deciding the optimum searching strateg that minimizes the epected detection time of an event in the contet of mied sensor networks. We have proved analticall that searching for an event locall under certain circumstances can lead to fast event detection. Analtical results have been etended through simulation for the general case where multiple mobile node are searching for an event in a sensor field area with several uncovered regions. Coverage %) Average Event Detection Time [Time Steps] 100 95 90 85 80 250 200 150 100 = 010 = 025 = 050 = 100 = 200 0 100 200 300 400 500 600 700 800 900 1000 Time Steps 50 0 a) Average area coverage. 10 25 50 100 200 [m] b) Average event detection time. Fig. 3. Performance evaluation over 100 sensor fields b 5 mobilesafter1000movingstepsfordifferent values. REFERENCES Z. Butler and D. Rus. Event-based motion control for mobile-sensor networks. Pervasive Computing, 2003. J. Cortes, S. Martinez, T. Karatas, and F. Bullo. Coverage control for mobile sensing networks. IEEE Transactions on Robotics and Automation, pages 243 255, 2004. D. Estrin, D. Culler, K. Pister, and G. S. Sukhatme. Connecting the phsical world with pervasive networks. IEEE Pervasive Computing, pages 59 69, 2002. A. Ghosh. Estimating coverage holes and enhancing coverage in mied sensor networks. In Local Computer Networks,, pages 68 76, 2004. B. O. Koopman. The theor of search ii - target detection. Operations Research, pages 503 531, 1956. T. Lambrou and C. Panaiotou. Collaborative event detection using mobile and stationar nodes in sensor networks. In The 3rd IEEE CollaborateCom, 2007. T. Lambrou and C. Panaiotou. Collaborative area monitoring using wireless sensor networks with stationar and mobile nodes. EURASIP Journal on Advances in Signal Processing, pages 1 16, 2009. W. Li and C. G. Cassandras. Distributed cooperative coverage control of sensor networks. In Proceedings of 44rd IEEE Conference on Decision and Control, 2005. B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsle. Mobilit improves coverage of sensor networks. In Proceedings of the ACM MobiHoc, 2005. Christos H. Papadimitriou. The euclidean travelling salesman problem is np-complete. Theoretical Computer Science, pages 237 244, 1977. S. Poduri and G.S. Sukhatme. Constrained coverage for mobile sensor networks. In Robotics and Automation. Proceedings. ICRA., pages 165 171 2004. Lawrence D. Stone. Theor of optimal search. Academic Press, 1975. 11796