Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2018 Sep 24;18(10):3221. doi: 10.3390/s18103221

A Practical Data-Gathering Algorithm for Lossy Wireless Sensor Networks Employing Distributed Data Storage and Compressive Sensing

Ce Zhang 1, Ou Li 1, Guangyi Liu 1,*, Mingxuan Li 1
PMCID: PMC6211113  PMID: 30250004

Abstract

Reliability and energy efficiency are two key considerations when designing a compressive sensing (CS)-based data-gathering scheme. Most researchers assume there is no packets loss, thus, they focus only on reducing the energy consumption in wireless sensor networks (WSNs) while setting reliability concerns aside. To balance the performance–energy trade-off in lossy WSNs, a distributed data storage (DDS) and gathering scheme based on CS (CS-DDSG) is introduced, which combines CS and DDS. CS-DDSG utilizes broadcast properties to resist the impact of packet loss rates. Neighboring nodes receive packets with process constraints imposed to decrease the volume of both transmissions and receptions. The mobile sink randomly queries nodes and constructs a measurement matrix based on received data with the purpose of avoiding measuring the lossy nodes. Additionally, we demonstrate how this measurement matrix satisfies the restricted isometry property. To analyze the efficiency of the proposed scheme, an expression that reflects the total number of transmissions and receptions is formulated via random geometric graph theory. Simulation results indicate that our scheme achieves high precision for unreliable links and reduces the number of transmissions, receptions and fusions. Thus, our proposed CS-DDSG approach effectively balances energy consumption and reconstruction accuracy.

Keywords: WSNs, CS, distributed data storage, packet loss rate, energy efficiency

1. Introduction

As the perceptual layer of the Internet of Things (IoT) [1,2], wireless sensor networks (WSNs) [3] are widely deployed for purposes such as environment monitoring [4], industry automation [5] and military reconnaissance [6]. WSNs consist of many sensors and play a key role in sensing and gathering data from the surrounding environment. Because of harsh environments and energy-limited nodes, there are two key considerations in WSNs design: reliability and energy efficiency. In addition, nodes that are closer to the sink require more forwarding tasks than others, resulting in higher energy consumption as well as a reduction in the lifetime of the entire network.

Compressive sensing (CS) theory [7,8] provides a new method for reducing communication energy consumption. CS points out that, for the compressible signals in WSNs, a small collection of linear projections is sufficient to achieve near-perfect reconstruction, which reduces energy consumption and prolongs network lifetime. Thus, a considerable amount of research has been conducted concerning ways to utilize CS to gather data in WSNs. The CS-based data-gathering schemes in [9,10,11] obtained the member node readings utilizing fixed routing, in which ordinary nodes forward compressed data to the static sink node through multi-hops. Lou et al. [9] and Lou et al. [10] combined CS and routing protocols to reduce the number of transmissions. In [11,12,13,14,15], the use of sparse measurement matrix is investigated to reduce the number of nodes involved in data gathering. Introducing CS effectively reduces the energy required for communication and distributes energy consumption loads more evenly. However, if a parent node (which holds a combination of child node readings) loses its packet, then all the information from the child nodes is also lost. Hence, unreliable links have a serious impact on data gathering and make it difficult to reliable gather data reliably through a centralized sink node. Additionally, Kong et al. [16] reported that unreliable links are widespread in WSNs, where the average packet loss rate is 40–50%. Thus, assuming completely reliable links is unfeasible and oversimplifies the problem.

To resolve this problem, distributed data storage (DDS) [17,18,19] is proposed to enable reliable data gathering by employing redundancy. In contrast to a centralized sink, a mobile sink collects data from a small subset of the total nodes to recover all the data. It is worth mentioning that DDS effectively reduces the impact of packet loss on data gathering because there is no static routing, although few researchers have focused on this advantage. However, DDS requires a large number of transmission tasks to ensure sufficient redundancy, which is potentially catastrophic for nodes with energy limitations. Thus, it is imperative to investigate effective ways to apply DDS for data gathering with the dual purposes of resisting packet loss and reducing the number of transmissions.

To address this problem, many studies have been carried out on this topic. In [20,21,22], CS is combined with DDS to exploit the advantages of both technologies. The goal of Talari et al. [20] was to reduce the number of transmissions by exploiting the spatial correlations of nodes based on CS with the broadcast properties of wireless channels. In this scheme, the nodes store received data and broadcast the data with a given probability. The performance of data reconstruction was further improved in [21]. Yang et al. [21] found that the number of receptions was higher than the number of transmissions. Hence, Yang et al. [21] focused on reducing the total number of both transmissions and receptions simultaneously. In [22], both the spatial and temporal correlations of nodes are exploited to reduce the number of transmissions. All the above studies take advantage of broadcast routing and consider how to reduce the transmission energy cost. However, compared with fixed routing, such as tree routing and cluster routing, broadcasting data consumes more reception energy because neighboring nodes receive broadcast data whether they need it or not. For example, in [20,21,22], the neighboring nodes first receive the broadcasting data and then determine whether to merge the data based on certain conditions. Consequently, broadcasting data consumes large amount of reception energy, although the received data are rarely merged. Furthermore, none of these studies consider the problem of packet loss; instead, they make the unrealistic assumption that the wireless links are completely reliable.

Tackling the abovementioned consideration, two challenges must be resolved. The first involves how to effectively reduce the quantity of data disseminated (transmissions and receptions), especially the number of receptions rather than the number of fusions. The second problem is related to reducing the impact of lossy links (namely, the packet loss rate) on data reconstruction. To solve these two challenges, a distributed data storage and gathering algorithm based on compressive sensing (CS-DDSG) is proposed utilizing CS and DDS. Relying on collected data, the mobile sink generates a sparse measurement matrix aimed at reducing communication energy consumption. Furthermore, it is proven that the measurement matrix satisfies the restricted isometry property (RIP) [23]. Based on random geometric graph theory, an expression of the total number of transmissions and receptions is formulated to analyze the energy consumption of CS-DDSG.

The reminder of this paper is organized as follows. In Section 2, we commence by reviewing the CS theory and introduce the network model. In Section 3, we present the proposed CS-DDSG algorithm, describe the formulation of the measurement matrix and provide a proof that this matrix can satisfy RIP. Based on the proposed scheme, we formulate the expression of the total number of transmissions and receptions in Section 4. We present our simulations and their results and investigate the performance of CS-DDSC in Section 5. Finally, concluding remarks are provided in Section 6.

2. Preliminaries and Network Model

In this section, we introduce CS theory and then describe the network model and our motivation.

2.1. Compressed Sensing

In WSNs, assume that N sensor readings are denoted by X=(x1,,xN)T, where xi,i[1,N] denotes the reading of node i with K-sparse representation at a basis ΨN×N:

X=Ψθ,  (1)

where θN is a coefficient vector corresponding to the sparse basis Ψ. X is K-sparse and compressive if the vector θ has at most K(KN) nonzero coefficients or (NK) smallest coefficients can be ignored.

We assume the measurement matrix is ΦM×N and is uncorrelated with the basis Ψ, then the CS measurements of X can be expressed as follows:

Y=ΦX=ΦΨθ=Θθ,  (2)

where MN and Θ=ΦΨ is a sensing matrix. The original signal X can be reconstructed with an overwhelming probability from M measurements by l1-norm minimization as follows:

min:X^=minX1  s.t.:Y=ΦX, (3)

where X^ denotes the reconstructed sparse signal of X.

To reconstruct X, two factors must be considered: (1) X is compressive at Ψ; and (2) Φ must satisfy the RIP with Mcklg(N/k). Therefore, K-sparse X satisfies the following condition:

(1ε)θ22Φθ22(1+ε)θ22,  (4)

where c,ε(0,1), while Φ satisfies RIP with the parameter ε.

2.2. Network Model

We consider a single-sink WSN consisting of N battery-powered sensors. The sensors are deployed in a square area with a boundary length of 1. We assume all nodes have an identical transmission radius of rt, and that any two nodes can communicate with each other if their Euclidian distance d satisfies drt. To guarantee the network connectivity, rt should also satisfy the following condition [24]:

rt2>SIn(N)/(πN),  (5)

where S denotes the deployment area and S=1×1. Let XN×1=(x1,,xN)T denotes the N node readings. Since the readings are spatiotemporally correlative with each other, X can be compressed on an orthogonal basis Ψ=(ϕi,j)N×N. The fast Fourier transform (FFT) orthonormal basis is adopted as the sparse representation basis in this paper. Let Φ=(φi,j)M×N denote the measurement matrix. The measurement vector YM×1 can be computed with Equation (2). Furthermore, we introduce the expression of Φ in Section 3. Thus, the CS-DDSG network model coincides with the CS model.

In addition, we define the normalized mean absolute error (NMAE) metric to evaluate the accuracy of reconstruction accuracy:

NMAE=X^X2X2=n=1N(x^nxn)2n=1Nxn2,  (6)

Equation (6) shows that the smaller the NMAE is, the better performance the algorithm can achieve.

2.3. Motivation

In this subsection, we investigate the impact of packet loss on the CS recovery performance relying on the fixed routing. Figure 1 presents the performance of the CDG [9] algorithm with cluster topology in unreliable links. In this scheme, there are 100 nodes and the member nodes forward the packets to the cluster head via a one-hop route. When the packet loss rate is 10%, the recovery accuracy is worse than the accuracy in the ideal link. Furthermore, increasing the measurements cannot improve the algorithm’s performance. For M=50 measurements, Figure 2 indicates that the accuracy declines with the increase of packet loss rate.

Figure 1.

Figure 1

Performance of CDG with ideal link and lossy link.

Figure 2.

Figure 2

The relationship between the packet loss rate and the NMAE.

We consider one of the clusters containing N1 nodes. For the CDG algorithm with fixed routing, the cluster head receives the data vector XN1×1=(x1,,xi,,xN1)T in reliable links. The measurements Y can be represented as

Y=(y1y2yM)=(ϕ11ϕ1N1ϕM1ϕMN1)(x1xixN1).  (7)

If the packet of node i is missing due to unreliable links, then its cluster head will receive XN1×1=(x1,,xi,,xN1)T and the measurement Y can be represented as

Y=(y1y2yM)=(ϕ11ϕ1N1ϕM1ϕMN1)(x1xixN1).  (8)

According to Equations (7) and (8), one missing packet affects every element yi of the measurement vector. Thus, the sink recovers all the data X using Y and Φ, which leads to an imprecise or invalid reconstruction. Furthermore, the accuracy is even worse under tree-based routing. This deficiency occurs because if one packet of a parent node is missing, then all the information from its child nodes is lost too. Additionally, simply increasing the number of measurements or the number of retransmissions does not help much in improving the recovery accuracy. Therefore, the CS-based algorithm is sensitive to packet loss. In the next section, we investigate how to resist unreliable links, while using fewer transmissions and receptions by utilizing broadcasting properties.

3. Proposed CS-DDSG Scheme

3.1. Procedures of CS-DDSG

Based on the network model, we propose CS-DDSG to avoid packet loss and reduce the total number of transmissions and receptions, as presented in Figure 3. The procedures involved in CS-DDSG are detailed below.

Figure 3.

Figure 3

Flow chart of CS-DDSG.

Stage 1. Initialization. The proposed scheme requires precise time to help nodes to cooperate with each other. Assuming the network is synchronized and slotted based on Reference Broadcast Synchronization (RBS) [25], which can achieve the goal of high accuracy and energy-efficiency. At the beginning of data gathering, each node senses a data xi and generates a coefficient φi=1. Then, each node i forms an initial packet, denoted by S(i) which defines has two components:

S(i)={S(i).id=[i]S(i).data=xi.  (9)

The component S(i).id stores the node ID of nodes and S(i).data stores the readings.

Stage 2. Broadcasting. After a fixed and long enough period of time for synchronization and initialization, Ns,(Ns<N) nodes are randomly selected as source nodes with a probability p1 in this stage. The source nodes broadcast their own packets and do not receive any packets. If an ordinary node m(m[1,N]) is located with the communication range of the source node n(n[1,N]) and has not received a packet before, then node m receives the data broadcasted by node n and updates its packet as follows:

S(m)={S(m).id=[m,n]S(m).data=xm+xn.  (10)

If node m has already received any other broadcast data, then this node stops receiving data; in other words, each node receives only one broadcast packet.

Stage 3. Forwarding. In the following, only the receiving nodes from Stage 2 continue to broadcast their updated packets to neighboring nodes with the probability p2. Similarly, the neighboring nodes around the forwarding nodes will receive a packet only if they have not received any prior packets. These new receiving nodes broadcast their updated packets as described above. Actually, the Stage 2 and Stage 3 could start simultaneously. Nodes get the packets of source nodes in Stage 2 and then decide whether to broadcast immediately. Thus, the neighboring nodes of those forwarding nodes could update their packets relying on the packets of source nodes or forwarding nodes. Finally, the forwarding operation will stop until there are no new reception nodes. Because of the reception condition and the small probability p2, in practice, the forwarding process stops after repeating only a few times, which is analyzed in Section 5 in detail.

Stage 4. Visiting. The mobile sink starts the visiting phase after a fixed and sufficiently long period, which can be preset according to the number of nodes N. M nodes are randomly queried by the mobile sink to extract the corresponding information, i.e., the measurement vector Y and the measurement matrix Φ. Finally, the entire network’s readings X can be reconstructed from Y and Φ based on Equation (3). The entire pseudocode of CS-DDSG is presented in Algorithms 1 and 2.

Algorithm 1 The CS-DDSG algorithm
Input:
 The probability of selecting source nodes: P1;
 The probability of forwarding: P2;
 The number of measurements: M;
Output:
 Measurement vector: y;
 Measurement matrix: Φ;
Stage 1:
1: for i = 1:N
2: S(i).id = [i];
3: S(i).data = xi;
4: end for
Stage 2:
5: Nodes select themselves with the probability p1 and broadcast their packets;
6: N2 = 0;
7: for i = 1:N·p1
8: for j = 1:N
9: if node i receives the broadcasting data from node j
10: S(j).id = [j,i];
11: S(j).data = xj + xi;
12: N2 = N2 + 1;
13: end if
14: end for
15: end for
Stage 3:
16: The receiving nodes in Stage 2 forward their update packets with probability p2.
17: N3 = N2p2;
18: for loop = 1:max
19: if N3 ≤ 1
20: break
21: end if
22: if node j forwards its packets
23: for i = 1: N
24: if node i has not received a packet and hears node j
25: S(i).id = [i,j];
26: S(i).data = xi + xj;
27: N3 = N3 + 1;
28: end if
29: end for
30: end if
31: The reception nodes in the stage 3 forwarding their packets with probability p2.
32: end for
Stage 4:
33: The mobile sink queries M nodes to generate Φ and Y .
34: Φ = zeros (M, N)
35: if node ik are queried
36: Ωk = S(ik).id;
37: Φ(k, Ωk) = 1;
38: end if
39: Return Φ and Y.
Algorithm 2 CS Reconstruction
Input:
 Measurement vector: y;
 Measurement matrix: Φ;
Output:
 Reconstructed vector: X^
1: Sink creates Y and BDM Φ based on yi and Φi;
2: θ^ = arg min ||θ||1 s.t. Y = ΦΨθ;
3: X^=Ψθ^

3.2. Selection of Parameters

In this subsection, we investigate the values of the parameters rt and p2. We consider a network with N=400 nodes, which are randomly deployed over an area of size S=1×1 in this paper. As described in Section 2, to ensure the network connectivity, rt must satisfy the condition in Equation (5). Thus, rt>0.069; we set rt=0.075.

In Stage 3 of CS-DDSG, nodes forward their updated packets with a probability p2 and all neighboring nodes can receive this data. For the sake of an appropriate p2 that reduces the number of transmissions Nt and increases the proportion of reception nodes Pr simultaneously, we simulate Nr and Pr versus p2 by setting p1=0.2 and rt=0.075 as shown Figure 4, where all normal nodes stop receiving any data after merging one packet. As Figure 4 shows, as p2 increases, the values of Nt and Pr both increase. Furthermore, Pr increases almost linearly with p2. Thus, when p2=0.32, 98% nodes receive a broadcast packet. Moreover, as p2 increase beyond 0.32, Nr increases less, while Pr increases sharply. Therefore, the appropriate value for p2 is 0.32, because that value provides a balanced trade-off between the number of transmissions and the percentage of receiving nodes.

Figure 4.

Figure 4

The impact of forwarding probability on the number of transmitting and receiving nodes.

3.3. Measurement Matrix Formulation

In this subsection, we present the formulation procedure for the measurement matrix. As we introduced above, in Stage 4, after the mobile sink queries the M nodes, which are denoted by (ni1,ni2,nik,niM),i1<i2<<iM,ik[1,N], the measurement matrix Φ is constructed based on the M packets. Suppose Ωk is the index of node ID and its definition is expressed as follows:

Ωk=S(nik).id.  (11)

Initially, Φ is an all-zero M×N matrix, then Φ is formulated at this step which is given by Equation (12):

Φ(k,j)={1,  j=Ωk0,  otherwise.  (12)

For example, assume there are five nodes in the network (i.e., N=5). If the mobile sink queries two nodes (i.e., M=2), then Φ can initially be expressed as follows:

Φ2×5=(0000000000).  (13)

Suppose that nodes 2 and 4 are selected by the sink, and their packets components are as follows:

S(2).id=[2,5]S(4).id=[1,4], (14)

then φ1,2=φ1,5=1 and φ2,1=φ2,4=1. Finally, the matrix Φ becomes:

Φ2×5=(0100110010).  (15)

Moreover, the measurement vector Y is expressed as follows:

Y=(S(2).data,S(4).data)T.  (16)

Obviously, Φ is a sparse matrix, whose sparsity degree is influenced by p, p1 and p2. Furthermore, Equation (12) indicates that Φ is constructed by relying on the gathered data, which precludes the need to measure lost data. Thus, Y is not influenced by lost packets at all. Therefore, CS-DDSG is resistant to the packet loss rate.

3.4. Does the Measurement Matrices Satisfy RIP?

The structure of measurement matrix Φ is random and relies on the receiving nodes. Thus, CS-DDSG avoids measuring the lost nodes and avoids the packet loss. The question is: Does Φ obey RIP to utilize the CS theory? Unfortunately, it is an NP-hard problem to prove the RIP property of a matrix. However, Yang et al. [21] reported that recovery performance can be guaranteed with high probability when the rows of the measurement matrix are linearly independent. We investigate this proposition below.

The rows of Φ are linearly dependent when one of the following two situations occurs.

Case 1.

Any row φk can be expressed as a linear combination of other rows.

Proof. 

The measurement coefficient is 1; thus, if φk can be expressed as a linear combination of rows φk1,,φkq, q=2,,N1, they satisfy the following:

φk=φk1++φkq.  (17)

Suppose Ik={j|φk,j0} and Iki={j|φki,j0}; if the condition of Equation (17) is satisfied, then Ik=i=1qIki and we can obtain

|Ik|>|Iki|,i[1,q],  (18)

where |·| denotes the number of elements in the set. Thus, Equation (17) can be satisfied when one of the following two situations occurs. The first situation would occur if node k were to receive packets from nodes k1,,kq and merge their packets. However, this situation contradicts the reception condition under which each node receives one packet. Thus, the condition of Equation (17) cannot occur.

The second situation would occurs when node k2 receives a packet from node k1 and node k3 receives a packet from node k2. It follows that node kq receives a packet from node kq1. Finally, node k receives the packet from node kq. According to the condition in Equation (10), Ikq satisfies the following:

Ikq={kq}(i=1q1Iki).  (19)

After node k updates its packet, Ik satisfies:

Ik={k}Ikq.  (20)

Obviously, kIk but kIkq. Thus, Ik={k}(i=1qIki) and Equation (17) is false.

Consequently, it can be concluded that no rows can be linearly expressed by other rows.  □

Case 2.

Any two rows φi and φj are linearly dependent.

Proof. 

φi and φj are linearly dependent if and only if they are precisely the same. However, according to the reception condition, each node receives only one packet and merges with its own unique packet. Therefore, although node i and node j may receive the same broadcasting packet from a common neighboring node, their packets will still be different. Therefore, none of the rows are linearly dependent.  □

In conclusion, the rows of the measurement matrix Φ are linearly independent; consequently, in CS-SSDG, X can be reconstructed from Y with a very high probability.

4. Formulating the Expression of the Total Number of Transmissions and Receptions

Compared with the mainstream algorithms [15,20,21], the proposed scheme CS-DDSG reduces the number of transmissions and receptions rather than the number of fusions. In this section, we formulate the total number of transmissions NTtot and receptions NRtot based on the random geometric graph (RGG) mode [26] and the torus convention [27] to investigate the efficiency in reducing NTtot and NRtot.

According to Section 3, NTtot and NRtot can be expressed as follows:

NTtot=NtП+NtШ=Ns+q=1NfNtqNRtot=NrП+NrШ=NrП+q=1NfNrq, (21)

where NtП and NrП denote the number of transmitting and reception nodes in Stage 2, respectively. NtШ and NrШ denote the number of transmitting and receiving nodes in Stage 3, respectively. Similarly, Ntq and Nrq represent the number of transmitting and receiving nodes in the qth forwarding of Stage 3, respectively. Nf denotes the number of forwarding iterations. In Stage 2, Ns nodes are selected to broadcast, thus NtП=Ns. Because the receiving nodes in Stage 3 forward their packet with the probability p2, Nrq1 and Ntq satisfy the following:

Ntq=Nrq1·p2.  (22)

When Ntq*=Nrq*1·p20, no node forwards packets and the forwarding process is completed. Thus, Nf=q*1, NtШ=q=1NfNtq,NrШ=q=1NfNrq. Additionally, Nr0=NrП and Nt0=Ns. Next, we formulate the expression of NrП, Ntq and Nrq.

4.1. Formulating NrП

Proposition 1.

The number of receptions in Stage 2 NrП is:

NrП=NsNπrt2CNs2π2Nrt4.  (23)

Proof. 

According to the procedures of Stage 2, NrП equals the number of neighboring nodes around all the source nodes Ns,nei minus the number of nodes Nr2 located in the overlapping communication region of the two sources nodes. This relation occurs because each node receives just one packet and the number of receptions for those nodes is counted twice, thus NrП can be represented as follows:

NrП=Ns,neiNr2.  (24)

The average number of neighboring nodes for all source nodes Ns,nei is expressed as follows:

Ns,nei=NsNπrt2S=NsNπrt2.  (25)

In Figure 5, the red circle denotes the communication region and S2 represents the shaded area jointly covered by the two source nodes. A and B are two intersections. When the distance between two source nodes d(O,O) satisfies 0<d(O,O)2rt, Nr2 exists. Thus, the probability pL of an existing communication between the two nodes is expressed as follows:

pL=p{d(O,O)2rt}=π(2rt)2S=4πrt2.  (26)

Figure 5.

Figure 5

Diagram of two communication nodes: (a) rt<d(O,O)2rt; and (b) 0<d(O,O)rt.

In the Ns source nodes, an average of NL nodes pairs satisfy the condition in Equation (26) (i.e., NL source nodes pairs can communicate with each other). The expressions for NL and Nr2 are, respectively, as follows:

NL=CNs2·pL=CNs2·4πrt2.  (27)
Nr2=NL×N×S¯2S.  (28)

Because the nodes are uniformly distributed and 0<d(O,O)2rt, the probability p{dx} is equal to

F1(x)=p{dx}=πx2π(2rt)2=x24rt2.  (29)

Thus, the probability density function (PDF) f1(x) is

f1(x)=F1(x)=x2rt.  (30)

In this case, the area S2/2 equals the area of sector OAB minus the area of triangle OAB:

S2=2(rt22×2arccosd2rt12×d2×2rt2d24)    =2rt2arccosd2rtd24rt2d2. (31)

Thus, the expected area of S2 is calculated as follows:

S¯2=02rtS2f1(x)dx=02rt(2rt2arccosx2rtx24rt2x2)x2rt2dx=π4rt2.  (32)

Combining Equations (27), (28) and (32), Nr2 can be formulated as:

Nr2=NL×N×S¯2S=CNs2·4πrt2·N·π4rt2=CNs2π2Nrt4.  (33)

Finally, we substitute Equations (25) and (33) into Equation (24), to obtain the representation of NrП:

NrП=NsNπrt2CNs2π2Nrt4.  (34)

4.2. Formulating Nrq

Figure 6 shows the forwarding procedure of Stage 3, where ntq denotes the transmitting node in the qth forwarding; its communication range is represented by the black circle. Node ntq1 broadcasts its packet in the (q1)th forwarding process. Because of the reception conditions, the nodes located in area S3 can receive the forwarded packet broadcast by ntq. Let Nr1q denotes the number of receiving nodes in area S3.

Figure 6.

Figure 6

Diagram of forwarding packets.

Besides, there are two situations should be considered:

  1. Case 1: As presented in Figure 7, there are two broadcasting nodes nt1q1 and nt2q1 in the (q1)th forwarding, while their communication ranges are represented by the two red circles. This case can be divided into two situations via the distance d(nt1q1,nt2q1): (a) 0<d(nt1q1,nt2q1)<rt; and (b) rt<d(nt1q1,nt2q1)<2rt. Taking the first situation as an example, if node ntq is located in the black area S4, the nodes in the shadow area S5 can receive packets from nodes ntq or nt2q1, thus the number of receptions of those nodes is counted twice, and that value should be subtracted from Nr1q. Suppose that the number of receiving nodes in areas such as S5 is Nr2q and that the number in areas such as S7 is Nr3q.

  2. Case 2: Similarly, there are two transmitting nodes nt1q and nt2q in the qth forwarding, whose communication ranges are represented by two black circles in Figure 8. This case can be divided into two situations via the distance d(nt1q,ntq1): (a) 0<d(nt1q,ntq1)<rt; and (b) rt<d(nt1q,ntq1)<2rt. Taking the first situation as an example, when node nt2q is distributed in the black area S8, the nodes located in shadow area S9 receive one of the packets broadcasted by node nr1q or nr2q. Thus, the number of receptions for those nodes is counted twice, which should be subtracted from Nr1q. Suppose that the number of reception nodes in areas such as S9 is Nr4q and the number in areas such as S10 is Nr5q.

Figure 7.

Figure 7

The diagram of Case 1: (a) 0<d(nt1q1,nt2q1)<rt; and (b) rt<d(nt1q1,nt2q1)<2rt.

Figure 8.

Figure 8

The diagram of Case 2: (a) 0<d(nt1q1,nt2q1)<rt; and (b) rt<d(nt1q1,nt2q1)<2rt.

In conclusion, the number of receptions Nrq for Stage 3 in the qth forwarding can be expressed as follows:

Nrq=Nr1qNr2qNr3qNr4qNr5q.  (35)

Next, we formulate the expression of Nr1q,Nr2q,Nr3q,Nr4q and Nr5q.

4.2.1. Calculating Nr1q

As shown in Figure 6, the nodes in shadow area S3 would receive the packet. Thus, Nr1q is calculated as follows:

Nr1q=Ntq×N×S¯3S.  (36)

In the above formula, S¯3 can be expressed as follows:

S¯3=πrt2S¯2.  (37)

Because the nodes are uniformly distributed and 0<d(O,O)rt, the probability p{dx} equals

F2(x)=p{dx}=πx2πrt2=x2rt2.  (38)

Thus, the PDF f2(x) is

f2(x)=F2(x)=2xrt2.  (39)

Combining Equations (31), (37) and (39), we obtain

S¯2=0rt(2rt2arccosx2rtx24rt2x2)2xrt2dx=(π34)rt2.  (40)
S¯3=πrt2S¯2=πrt2(π334)rt2=334rt2.  (41)

Thus, we obtain

Nr1q=NtqN334rt2.  (42)

4.2.2. Calculating Nr2q

Next, we formulate the expression of Nr2q. As presented in Figure 7a, the value of Nr2q is the number of receive node in area S5, thus we have

Nr2q=CNtq12×pL×Ntq×S¯4πrt2×N×S¯5S,  (43)

where S¯4 denotes the expected area of the black region, S¯5 denotes the expected area of the shadow region, and pL denotes the probability that the distance between two nodes satisfies 0d(O,O)rt. Thus, we have the following:

pL=p{d(O,O)rt}=πrt2S=πrt2.  (44)

As shown in Figure 7a, the area S4 equals twice the area of region ACD minus the half intersection area of circle A and B, i.e., S¯2/2, plus the half intersection area of circle O and O, i.e., S¯2/2. The area of region ACD equals to the area of sector ACD plus the area of sector OAC minus the area of triangle OCA; thus,

SACD=πrt2×π3+arcsin(d2rt)2π+πrt2×π32π12×rt×3rt2=rt22[π3+arcsin(d2rt)]+π6rt234rt2.  (45)
S4=SACDS¯22+S¯22=rt22[π3+arcsin(d2rt)]+π6rt234rt2S¯22+S¯22.  (46)

Combining Equations (39) and (46), we obtain

S¯4=0rt2×[rt22(π3+arcsinx2rt)+πrt263rt24]f2(x)dxπrt28+12(π334)rt2    =πrt22πrt28+12(π334)rt2=7πrt2833rt28, (47)

where 20rtxarcsinx2rtdx=(32π6)rt2. According to the method in [28], we can get the approximate value of S¯5, i.e., S¯5S5,max=πrt2/6. Finally, combining Equations (43), (44) and (47), we obtain

Nr2q=CNtq12NNtq6(7π8338).  (48)

4.2.3. Calculating Nr3q

The expression of Nr3q is similar to that of Nr2q:

Nr3q=CNtq12×pL×Ntq×S¯6πrt2×N×S¯7S,  (49)

As shown in Figure 7b, because rtd(O,O)2rt, S¯6 is calculated as follows:

S¯6=2SACD=rt2rt2×[rt22(π3+arcsinx2rt)+πrt263rt24]f1(x)dx    =rt2rtπ3xdx+12r2rxarcsinx2rtdx34r2rxdx    =(13π2432)rt2, (50)

where 12r2rxarcsinx2rtdx=π24rt238rt2, and S7 is expressed as

S¯7=S¯2S¯12,  (51)

where S¯12 is the intersection area of circle O and circle O when rtd(O,O)2rt, thus

S¯12=rt2rt(2rt2arccosx2rtx4rt2x22)x2rt2dx=33rt216,  (52)

and

S¯7=S¯2S¯12=(π43316)rt2.  (53)

Combining Equations (49), (50) and (53), we obtain

Nr3q=CNtq124rt2NNtqπ(132432π)(π43316).  (54)

4.2.4. Calculating Nr4q and Nr5q

As illustrated in Figure 8, the two black circles denote the communication range of two transmitting nodes, nt1q and nt2q, in the q forwarding. The red circle denotes the communication range of transmission node ntq1 in the q1 forwarding. The calculation of Nr4q and Nr5q is similar to that of Nr2q and Nr3q:

Nr4q=CNtq1CNtq11pL×CNtq11S¯8πrt2×NS¯9S,  (55)
Nr5q=CNtq1CNtq11pL×CNtq11S¯10πrt2×NS¯11S,  (56)

where S8 and S10 denote the area of the black region and S9 and S11 denote the area of the shadow region. Compared with Figure 7 and Figure 8, we have the following:

{S¯8=S¯4,S¯9=S¯5S¯10=S¯6,S¯11=S¯7.  (57)

Thus, the expressions of Nr4q and Nr5q are:

Nr4q=NtqNtq1πNrt4(Ntq1)6(7π8338)  (58)
Nr5q=4NtqNtq1Nπrt4(Ntq1)(132432π)(π43316)  (59)

In conclusion, by combining Equations (35), (42), (48), (54), (58) and (59), we can obtain the expression of Nrq:

Nrq=NtqN334rt2CNtq12NNtq6(7π8338)CNtq124rt2NNtqπ(132432π)(π43316)        NtqNtq1πNrt4(Ntq1)6(7π8338)4NtqNtq1Nπrt4(Ntq1)(132432π)(π43316). (60)

4.3. The Formulation of NTtot and NRtot

Theorem 1.

Assume that all N sensor nodes are deployed randomly and uniformly in a distributed WSNs with a boundary length of 1, and each node has a transmission range ofrt. If we gather data based on CS-DDSG scheme, thenNTtotandNRtotare, respectively, expressed as follows:

NTtot=Ns+q=1NfNtq,  (61)
NRtot=NsNπrt2CNs2π2Nrt4+q=1NfNtqN334rt2q=1NfCNtq12NNtq6(7π8338)q=1NfCNtq124rt2NNtqπ(132432π)(π43316)q=1NfNtqNtq1πNrt4(Ntq1)6(7π8338)q=1Nf4NtqNtq1Nπrt4(Ntq1)(132432π)(π43316), (62)

whereNr0=NrП,Nt0=Ns,Ntq=Nrq1×p1andNf=q*1, whereq*satisfiesNtq*=Nrq*1×p10. The expression forNrПis given in Equation (34).

Proof. 

As presented in the above derivation, we can obviously obtain Equation (61) based on Equation (21) and the correlative description in Stage 2 of CS-DDSG. Furthermore, by combining Equations (21), (34) and (60), we can obtain the expression of Equation (62).  □

5. Performance Evaluation and Analysis

To evaluate the effectiveness of CS-DDSG, we ran simulations in MATLAB 2012b. The simulation parameters were set as shown in Table 1. Furthermore, we adopted the FFT orthonormal basis and the orthogonal matching pursuit (OMP) method for the reconstruction algorithm. We used the real sensor readings extracted from the GreenOrbs [29] system.

Table 1.

Default Simulation Parameters.

Parameters Value
N The total number of sensors 400
a Boundary length 1
p2 The probability of forwarding in Stage 3 0.32
rt Communication radius 0.075

In this paper, we present the performance comparations of CS-DDSG, Compressive Sensing Data storage (CStorage) [20], Improved CStorage (ICStorage) [21], Compressed Network Coding based Distributed data Storage (CNCDS) [21] and Direct Cluster-Based Compressive Sensing Data Collection (DCCS) [15] on unreliable links. These first four schemes all combine DDS and CS to gather data. CStorage, ICStorage and CNCDS are concerned with reducing the number of transmission and fusions. In CStorage, intermediate nodes receive the broadcasting packets when they first receive, and then, they forward the received packet with a given probability. The intermediate nodes in ICStorage forward their own readings rather than the received source nodes readings. In the CNCDS scheme, the intermediate nodes receive broadcast packets only if the receiving node does not share any node IDs with the corresponding transmitting node. We also analyze the numbers of transmissions, receptions and fusions involved in the first four algorithms. DCCS combines CS and cluster topology to reduce the total power consumption with no consideration of packet loss rate. All member nodes gather data and transmit to cluster heads, where the CS measurements and measurement matrices are generated and send to sink directly. Additionally, we discuss the impact of packet loss rate, the number of measurements and the proportion of source nodes on the performance of CS-DDSG. The simulation results shown are the average values from 1000 runs.

First, we evaluate the performance on unreliable links when p1=0.3,M=50, as shown in Figure 9. It can be seen that: (1) As p increases, the reconstruction accuracy of all the algorithms decreases in Figure 9a. When p0.6, the NMAEs of the four algorithms are stable and increase gradually, which indicates that CS-DDSG is effective at resisting the packet loss. Although the packet loss rate impacts the nodes receiving broadcasting packets, the sink still gathers enough packets to recover the data. In addition, the sink constructs the measurement matrix based on received packets, which avoids the need to measure the lost nodes and reduces the impact of unreliable links on measurement vector Y. However, the performance of DCCS is poor with an increase in p. Sink cannot find the lossy nodes and still reconstructs data based on the original measurement matrices. Thus, DCCS is sensitive to p. (2) CS-DDSG outperforms the other algorithms. This improved performance occurs because in CS-DDSG, nodes receive only one packet which is broadcasted by its neighbor nodes in CS-DDSG. Thus, the measurement vectors have the characteristic of strong spatial correlation, which is utilized by CS to recover the data. However, in the other algorithms, nodes would fuse packets from distant nodes as long as the receipt condition is satisfied, which leads to a weak spatial correlation of measurement vectors. Thus, CS-DDSG outperforms the other algorithms.

Figure 9.

Figure 9

Performance of the different algorithms in unreliable links: (a) DDS-based algorithms; and (b) comparison between DDS-based algorithms and cluster-based algorithm.

We present the total number of transmissions, receptions and fusions of the four algorithms in Figure 10 when p=0.3 and p1=0.15. CS-DDSG requires fewer transmissions, receptions and fusions than do the CNCDS, CStorage and ICStorage schemes. This is because nodes in CS-DDSG receive packets only the first time and broadcast their packets with the probability p2, after which then they do not receive any data. However, for CNCDS, CStorage and ICStorage, nodes continue to receive packets as long as the reception condition is satisfied. CStorage and ICStorage in particular focus on reducing the number of transmissions. Moreover, compared with CNCDS, CStorage and ICStorage, CS-DDSG scheme reduces NTtot by up to 23.9%, 42.5% and 67.8%, respectively, and reduces NRtot by up to 73.8%, 80.2% and 89.9%, respectively.

Figure 10.

Figure 10

The total number of transmissions, receptions and fusions in Stages 2 and 3.

Furthermore, we investigate the fusion proportion of the total number of receptions. As presented in Figure 11, only 41% of the receiving nodes in CNCDS merge the received packets; the authors consider that only 41% of nodes lose energy. In fact, 59% of the receiving nodes also consume energy because they would receive the broadcast packet first and then determine whether the condition of CNCDS are satisfied; the received packets will be merged only if they satisfy the condition. Thus, energy is consumed even when the received packets are not fused. However, the number of receptions in [21] is the same as the number of fusions, which is less counted. Similarly, 46% and 48% of the receiving reception nodes in CStorage and ICStorage merge the packets, respectively. In CS-DDSG, all received nodes are fused and no redundancy occurs because the nodes receive packets only once. Thus, the energy consumption of CS-DDSG receiving nodes is much smaller than that of the other algorithms. In conclusion, CS-DDSG effectively reduces both the number of transmissions and receptions.

Figure 11.

Figure 11

The fusion proportion of the total number of receptions.

Figure 12 presents the number of fusions and receiving nodes during each forwarding round when p1=0.15. The forwarding process of CS-DDSG repeats five times, until no node remains to accept the broadcast packets, while CNCDS, CStorage and ICStorage repeat six, nine and twelve times, respectively. The network employing CS-DDSG has the fastest convergence and characteristics of efficiency due to the strictest reception conditions. Moreover, most of the data fusion occurs during Stage 2, and subsequently the number of fusions rapidly decreases in Stage 3 except in ICStorage.

Figure 12.

Figure 12

The number of fusions and receiving nodes during the forwarding process: (a) CS-DDSG; (b) CNCDS; (c) CStorage; and (d) ICStorage.

In Figure 13, we investigate the recovery performance of the algorithms when p1=0.3 and the number of measurements M, which is queried by the mobile sink, ranges from 15 to 150. It can be observed that, with an increase in M, the recovery accuracy of ICStorage, CStorage, CNCDS and CS-DDSG are improved and equivalent, while the performance of CS-DDSG becomes slightly better when M100. This improvement occurs because the more information that is gathered, the better is the reconstruction accuracy. According to Equation (12), the sink constructs measurement matrix Φ based on the packets fused by the forwarding nodes. The forwarding nodes of CS-DDSG receive only one packet, and the Φ is sparser than that in the others algorithms. Consequently, less information is gathered and fewer nodes contribute to data recovery for CS-DDSG. However, with an increase in M, more information is gathered and the gaps separating the four algorithms decrease. When M>100, CS-DDSG outperforms the four DDS-based algorithms due to the strong spatial correlation of the measurement vector. Moreover, the reconstruction accuracy of DCCS is the best when M is large enough and there is no packet loss. All nodes in DCCS participate in gathering data and DCCS adopts dense measurement matrix in clusters. Thus, more information is gathered. In addition, performance tends to be stable as M increases.

Figure 13.

Figure 13

Performance of the algorithms when p1=0.3.

Figure 14 shows the performance of CS-DDSG under different packet loss ratios p and probabilities p1 when M=40. As p increases, the value of NMAE remains stable, i.e., NMAE0.014. This result indicates that CS-DDSG effectively resists the packet loss and maintains high reconstruction accuracy even when unreliable links exist. Additionally, its accuracy is not influenced by p1 due to the very sparse measurement matrix.

Figure 14.

Figure 14

Performance of CS-DDSG with different p1 and p.

Finally, we investigate how the proportion of source nodes p1 impact the recovery accuracy in Figure 15. The simulation results show the following: (1) When p1=0.4, the value of NMAE decreases as M increases because more nodes participate in data reconstruction as M increases. (2) When M is fixed, CS-DDSG performance is improved and the trend of NMAE values is very close to the value of p1, varying from 0 to 0.6. This effect occurs because, when there are more source nodes, more nodes will receive broadcast packets before the sink obtains data. Hence, the amount of information used for reconstruction increases. However, due to the reception condition, the measurement matrix Φ is sparse. Thus, information is increasingly limited. As a result, the trends of the NMAE values are close to the different value of p1.

Figure 15.

Figure 15

Performance of CS-DDSG with different value of p1 and M.

6. Conclusions

In this paper, the data gathering problem is investigated in lossy WSNs using the simple but efficient proposed CS-DDSG algorithm that combines CS theory and DDS. Compared with other correlative and mainstream strategies, CS-DDSG balances the energy consumption and reconstruction performance effectively. In our proposed algorithm, nodes are selected to be source nodes with the probability p1 to broadcast their packets. The neighboring nodes around the source nodes receive the broadcasting nodes and update their own packets, which are broadcasted with the probability p2. Then, all receiving nodes forward their updated packets with the probability p2. The process will be repeated a few times until there are no receiving nodes. Each receiving node receives only one packet. In this way, the numbers of transmissions and fusions are reduced, and the CS reconstruction accuracy is guaranteed. Moreover, the expression of the total number of transmissions and receptions is formulated via RGG. The simulation results and analysis validate that CS-DDSG outperforms the other algorithms in unreliable links.

In addition, we investigate how the measurements M, the packet loss p and the probability p1 influence the performance of CS-DDSG. In future research, we plan to explore the possibility of temporal correlations of node readings. Another potential extension of this work is to more strictly demonstrate that the measurement matrix satisfies the RIP.

Nomenclature

WSNs Wireless Sensor Networks
CS Compressive Sensing
IoT Internet of Things
RIP Restricted Isometry Property
FFT Fast Fourier Transform
OMP Orthogonal Matching Pursuit
DDS Distribute Data Storage
NMAE Normalized Mean Absolute Error
RGG Random Geometric Graph
PDF Probability Density Function

Author Contributions

Conceptualization, O.L. and G.L.; Methodology, C.Z. and M.L.; Software, G.L. and M.L.; Writing—Original Draft Preparation, C.Z.; Project Administration, G.L.; and Funding Acquisition, G.L. and O.L.

Funding

This work was supported in part by the National Science and Technology Major Projects of China under grant No. 2016zx03001010 and National Natural Science Foundation of China No. 61601516.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Jesús R.M., José-Fernán M., Pedro C., Lourdes L. Combining wireless sensor networks and semantic middleware for an internet of things-based sportsman/woman monitoring application. Sensors. 2013;13:1787–1835. doi: 10.3390/s130201787. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Atzori L., Iera A., Morabito G. The internet of things: A survey. Comput. Netw. 2010;54:2787–2805. doi: 10.1016/j.comnet.2010.05.010. [DOI] [Google Scholar]
  • 3.Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E. Wireless sensor networks: A survey. Comput. Netw. 2002;38:393–422. doi: 10.1016/S1389-1286(01)00302-4. [DOI] [Google Scholar]
  • 4.Wu M., Tan L., Xiong N. Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications. Inf. Sci. 2016;329:800–818. doi: 10.1016/j.ins.2015.10.004. [DOI] [Google Scholar]
  • 5.Zhou M., Fortino G., Shen W., Jobin M.J., Bhattacharyya R. Guest editorial: Special section on advances and applications of internet of things for smart automated systems. IEEE Trans. Autom. Sci. Eng. 2016;13:1225–1229. doi: 10.1109/TASE.2016.2579538. [DOI] [Google Scholar]
  • 6.Đurišić M.P., Tafa Z., Dimić G., Milutinović V. A survey of military applications of wireless sensor networks; Proceedings of the Mediterranean Conference on Embedded Computing (MECO); Bar, Montenegro. 19–21 June 2012; pp. 196–199. [Google Scholar]
  • 7.Donoho D.L. Compressed sensing. IEEE Trans. Inf. Theory. 2006;52:1289–1306. doi: 10.1109/TIT.2006.871582. [DOI] [Google Scholar]
  • 8.Baraniuk R. Compressive sensing. IEEE Signal Process. Mag. 2007;56:4–5. [Google Scholar]
  • 9.Luo C., Wu F., Sun J., Chen C.W. Compressive Data Gathering for Large-scale Wireless Sensor Networks; Proceedings of the International Conference on Mobile Computing and Networking; Beijing, China. 20–25 September 2009; pp. 145–156. [Google Scholar]
  • 10.Luo J., Xiang L., Rosenberg C. Does Compressed Sensing Improve the Throughput of Wireless Sensor Networks; Proceedings of the IEEE International Conference on Communications; New York, NY, USA. 23–27 May 2010; pp. 1–6. [Google Scholar]
  • 11.Wang W., Garofalakis M., Ramchandran K. Distributed Sparse Random Projections for Refinable Approximation; Proceedings of the International Symposium on Information Processing in Sensor Networks; Cambridge, MA, USA. 25–27 April 2007; pp. 331–339. [Google Scholar]
  • 12.Wu X., Xiong Y., Yang P., Wan S., Huang W. Sparsest random scheduling for compressive data gathering in wireless sensor networks. IEEE Trans. Wirel. Commun. 2014;13:5867–5877. [Google Scholar]
  • 13.Han L.Y., Eftekhari A., Wakin M.B., Rozell C.J. The Restricted Isometry Property for Block Diagonal Matrices; Proceedings of the Information Sciences and Systems; Baltimore, MD, USA. 23–25 March 2011; pp. 1–31. [Google Scholar]
  • 14.Leinonen M., Codreanu M., Juntti M. Sequential compressed sensing with progressive signal reconstruction in wireless sensor networks. IEEE Trans. Wirel. Commun. 2015;14:1622–1635. doi: 10.1109/TWC.2014.2371017. [DOI] [Google Scholar]
  • 15.Nguyen M.T., Teague K.A., Rahnavard N. CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing block-wise compressive sensing. Comput. Netw. 2016;106:171–185. doi: 10.1016/j.comnet.2016.06.029. [DOI] [Google Scholar]
  • 16.Kong L., Xia M., Liu X.Y., Wu M.Y., Liu X. Data Loss and Reconstruction in Sensor Networks; Proceedings of the IEEE INFOCOM; Turin, Italy. 14–19 April 2013; pp. 1654–1662. [Google Scholar]
  • 17.Kong Z., Aly S., Soljanin E. Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J. Sel. Areas Commun. 2010;28:261–267. [Google Scholar]
  • 18.Zeng R., Jiang Y., Lin C., Fan Y., Shen X. A distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting. IEEE Trans. Parallel Distrib. Syst. 2012;23:1819–1830. doi: 10.1109/TPDS.2011.294. [DOI] [Google Scholar]
  • 19.Ren Y., Oleshchuk V., Li F.Y. A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs; Proceedings of the IEEE Global Telecommuncations Conference; Miami, FL, USA. 6–10 December 2010; pp. 1–6. [Google Scholar]
  • 20.Talari A., Rahnavard N. CStorage: Distributed Data Storage in Wireless Sensor Networks Employing Compressive Sensing; Proceedings of the IEEE GLOBECOM; Kathmandu, Nepal. 5–9 December 2011; pp. 1–5. [Google Scholar]
  • 21.Yang X., Tao X.F., Dutkiewicz E., Huang X.J., Guo Y.J., Cui Q.M. Energy-efficient distributed data storage for wireless sensor networks based on compressed sensing and network coding. IEEE Trans. Wirel. Commun. 2013;12:5087–5099. doi: 10.1109/TWC.2013.090313.121804. [DOI] [Google Scholar]
  • 22.Gong B., Cheng P., Chen Z., Ning L., Gui L., Hoog F.D. Spatiotemporal compressive network coding for energy-efficient distributed data storage in wireless sensor networks. IEEE Commun. Lett. 2015;19:803–806. doi: 10.1109/LCOMM.2015.2401008. [DOI] [Google Scholar]
  • 23.Candes E.J., Tao T. Decoding by linear programming. IEEE Trans. Inf. Theory. 2005;51:4203–4215. doi: 10.1109/TIT.2005.858979. [DOI] [Google Scholar]
  • 24.Gupta P., Kumar P.R. Critical Power for Asymptotic Connectivity in Wireless Networks; Proceedings of the IEEE Conference Decision and Control; Tampa, FL, USA. 16–18 December 1998; pp. 1106–1110. [Google Scholar]
  • 25.Elson J., Girod L., Estrin D. Fine-grained network time synchronization using Reference broadcasts. SIGOPS Oper. Syst. Rev. 2002;36:147–163. doi: 10.1145/844128.844143. [DOI] [Google Scholar]
  • 26.Penrose M. Random Geometric Graphs. 5th ed. Oxford University Press; Oxford, UK: 2004. pp. 90–102. [Google Scholar]
  • 27.Hall P. Introduction to the Theory of Coverage Process. John Wiley and Sons; Hoboken, NJ, USA: 1988. pp. 26–39. [Google Scholar]
  • 28.Yu C.W. Computing subgraph probability of random geometric graphs with applications in quantitative analysis of ad hoc networks. IEEE J. Sel. Areas Commun. 2009;27:1056–1065. [Google Scholar]
  • 29.Mo L., He Y., Liu Y., Zhao J., Tang S.J., Li X.Y., Dai G. Canopy Closure Estimates with Greenorbs: Sustainable Sensing in the Forest; Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys 7); Berkeley, CA, USA. 4–6 November 2009; pp. 99–112. [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES