Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2020 Dec 27;21(1):121. doi: 10.3390/s21010121

Stochastic Latency Guarantee in Wireless Powered Virtualized Sensor Networks

Ruyan Wang 1,2,3, Ailing Zhong 1,2,3,*, Zhidu Li 1,2,3, Hong Zhang 1,2,3, Xingjie Li 1
PMCID: PMC7795341  PMID: 33375504

Abstract

How to guarantee the data rate and latency requirement for an application with limited energy is an open issue in wireless virtualized sensor networks. In this paper, we integrate the wireless energy transfer technology into the wireless virtualized sensor network and focus on the stochastic performance guarantee. Firstly, a joint task and resource allocation optimization problem are formulated. In order to characterize the stochastic latency of data transmission, effective capacity theory is resorted to study the relationship between network latency violation probability and the transmission capability of each node. The performance under the FDMA mode and that under the TDMA mode are first proved to be identical. We then propose a bisection search approach to ascertain the optimal task allocation with the objective to minimize the application latency violation probability. Furthermore, a one-dimensional searching scheme is proposed to find out the optimal energy harvesting time in each time block. The effectiveness of the proposed scheme is finally validated by extensive numerical simulations. Particularly, the proposed scheme is able to lower the latency violation probability by 11.6 times and 4600 times while comparing with the proportional task allocation scheme and the equal task allocation scheme, respectively.

Keywords: wireless virtualized sensor networks, wireless powered communications, effective capacity, latency guarantee, task allocation

1. Introduction

The rapid evolution of communication and intelligent technologies is inviting all human beings to the era of the Internet of everything, where unprecedented changes will have a profound impact on every single aspect of our daily interactions [1,2,3,4]. As a consequence, an exponentially increasing amount of data is needed to be sensed from different areas, which brings a large burden to the wireless sensor networks (WSNs). In this sense, virtualized WSN is proposed to manage the WSNs from different operators centrally with the objective of resource utilization improvement [5]. However, similar to the traditional WSNs, energy is one of the key factors bring performance bottlenecks to the virtualized WSNs. In addition to tag identification [6], radio frequency (RF) energy has been considered to be a stable energy source for wireless sensors. Moreover, wireless powered communication has attracted attention from both academia and industria [7,8]. Hence, it is a promising idea to integrate the wireless energy transfer (WET) technology into the virtualized WSNs, which is called wireless powered virtualized sensor networks.

Additionally, various types of Internet of Things applications are latency sensitive [9,10], where sensors are required to send data under different application latency requirements. Due to the time-varying wireless channel and large amount of sensing data, how to guarantee the latency requirement for different applications is worth studying in a WSN. Particularly, in a wireless powered virtualized sensor network, the data sensing task of an application is allocated to different sensor nodes with heterogeneous capabilities. Hence, latency guarantee in such type of network is more complex. To the best of our knowledge, a stochastic latency guarantee of wireless powered virtualized sensor networks is still an open problem.

Motivated by this, this paper studies a joint task and resource allocation scheme in a wireless powered virtualized sensor network under stochastic latency constraints. Firstly, a framework is constructed to integrate virtualized WSN and WET together, based on which an optimization problem is formulated with the objec tive of network latency violation probability (LVP) minimization. Then, effective capacity theory is applied to prove that identical latency performance can be guaranteed by the FDMA and TDMA modes in the considered network. Thereafter, a bisection search algorithm is proposed to determine the optimal task allocation scheme when system time configuration is given. Furthermore, the optimal energy harvesting time is obtained by a one-dimensional search scheme. Finally, insightful results are presented by numerical simulations. The main contributions of this paper are as follows:

  • A three-layer architecture for wireless powered virtualized sensor network is proposed. Based on the proposed architecture, we prove that the FDMA mode can guarantee identical latency performance to the TDMA mode, when each node is allocated equal frequency resource or time resource.

  • A joint task and resource allocation scheme is proposed to minimize the network latency violation probability. It is highlighted that the complexity of the proposed scheme is on a logarithmic level, which is applicable to the realistic engineering application.

  • Numerical analysis reveals that the data rate requirement of an application and the number of sensor nodes both have linear or approximately linear impacts on the optimal energy harvesting time. This can be useful to quickly find out the optimal energy harvesting configuration in a practical network.

The remainder of this paper is organized as follows: Section 2 introduces the related works. Section 3 proposes a wireless powered virtualized sensor network model and communication model. The problem of the stochastic latency guarantee strategy based on effective capacity theory is formulated in Section 4, and the optimal solution is obtained in Section 5. In Section 6, we analyze the simulation results. Section 7 gives a discussion of our work and finally concludes the paper in Section 8.

2. Related Work

In order to operate multiple applications effectively, virtualization idea is introduced to WSNs at node level or network level [5,11]. Virtualization technology can improve the physical resource utilization of a WSN due to resource multiplexing among different applications. However, the contention of multiple applications for network resources also brings extra latency overhead to the WSNs. In the literature, related works about virtualized WSNs usually focus on network metric optimization, such as traffic throughput, energy efficiency, etc. In [12], an SDSense architecture was proposed to decompose the network functions into slow and fast changing components. Under the SDSense architecture, all the parameters of the sensors nodes could be reconfigured, such that the throughput of the considered WSN was improved. To reduce the data backlogs in a single-hop WSN, a uniforming random ordered policy (UROP) was proposed by Gul et al., where nearly optimal traffic throughput was obtained over a finite time horizon [13]. In addition, evolutionary game theory was applied to allocate data sensing load among different sensor nodes under the data rate requirement constraint of a certain application [14]. In [15], the application sensing task assignment problem was studied to maximize the overall energy consumption, where sensor nodes’ available energy and virtualization overhead were taken into account. In [16], the authors focused on energy efficiency maximization and then proposed a novel cyber-physical-social smart system. The authors therein employed wireless network virtualization to enhance the diversity and the flexibility of the service operation and the system management, and proposed a robust energy-efficient resource allocation scheme to outage probability requirements of controllers and actuators. Works [12,13,14,15,16] have provided insightful results on performance optimization in virtualized WSN. However, latency analysis is absent in those works. In order to find out the optimal trade-off between quality of service (QoS) (e.g., reliability) and Quality of Information (e.g., sensing accuracy), an offline embedding algorithm that searches through all possible embedding was proposed in [17]. In this regard, the search time can be controlled intuitively according to the application requirements.

Recently, RF energy harvesting is considered as a promising technology for wireless power sensors that are energy limited [18]. In the literature, wireless powered sensor networks have attracted attention from the academia. In [19], simultaneous wireless information and the power transfer (SWIPT) technique were introduced to a mobile WSN where energy harvest by relay nodes can compensate their energy consumption on data forwarding. A cross-layer resource allocation scheme was proposed to maximize the energy efficiency under different scenarios. Aiming at improving energy efficiency for a TDMA based wireless energy harvesting sensor network, Ref. [20] proposes a scheme to optimize the system time allocation and transmission power configuration. In [21], an adaptive multi-sensing (MS) framework was proposed, where each node was mounted with heterogeneous sensors to sense multiple cross-correlated slowly-varying parameters/signals. To increase the energy efficiency, a network and node-level collaborations based multi-sensing scheme was studied to deal with a formulated multi-objective optimization problem that jointly takes sensing quality and network energy efficiency into account. Ref. [22] focused on system sum throughput maximization of the considered sensor network, where two scenarios were considered, i.e., multiantenna power station and the sensor nodes belong to the same or different service operator(s). The authors therein proposed two different schemes to optimize the system time and energy harvesting rate for the two scenarios, respectively. Similar to works [12,13,14,15,16], works [19,20,21,22] also aimed to optimize the energy efficiency or network throughput for a WSN. How to guarantee the application latency was still unknown.

In other wireless networks, such as Internet of Vehicles and mobile cellular networks, latency or delay analysis can be resorted to the effective capacity theory [23]. With consideration of the time-varying channel gain, the maximum traffic rate that can be sustained by a vehicle-to-vehicle (V2V) link was studied in [24], based on which, the latency violation probability of the V2V link can be deduced. Additionally, the aggregate effective capacity was derived for heterogeneous statistical QoS provisioning in a wireless powered sensor network [25]. Particularly, the aggregate effective capacity was maximized by solving the hybrid access point determined downlink energy assignment problem and the sensor node determined uplink power control problem, where the optimal system time allocation, the downlink energy assignment, and uplink power transmission were obtained. Meanwhile, network calculus is considered as a powerful tool in end-to-end performance analysis of wireless communication networks [26]. In [27], a network calculus based framework was constructed to guarantee the delay bound and the target reliability of each application for industrial WSNs with consideration of low-power communications and the harsh wireless environment. However, task allocation was not considered in [25,26,27].

In summary, how to allocate application tasks to the sensors under the latency requirement is still an open problem, which motivates this paper.

3. System Model

3.1. Network Model

In a wireless powered virtualized sensor network, the network service provider can rent node resources to different applications through the network virtualization technique. As depicted in Figure 1, the considered wireless powered virtualized sensor network consists of three layers, i.e., the infrastructure layer, the network service layer, and the application layer. More specifically, the infrastructure layer consists of a power station (PS), a base station (BS), and sensor nodes (SNs). The network service layer contains multiple VSNs constructed by operator, and the nodes in a VSN can communicate with each other. The application layer contains multiple applications that need data sensed from the infrastructure layer under given latency requirements. When an application initiates a request, the operator selects appropriate SNs, donated by SN={SN1,SN2,,SNK} to form a VSN. The corresponding tasks are assigned to the physical nodes mapped by the virtual nodes. Then, the application data request is completed by the K nodes cooperatively under the given latency requirement.

Figure 1.

Figure 1

Network model of wireless powered virtualized sensor networks.

3.2. Communication Model

The detailed infrastructure layer model is depicted in Figure 2. The total network bandwidth is denoted by Btot. The system time is divided into several time blocks with equal duration T. Each time block contains both the downlink energy harvesting (EH) process and the uplink data transmission (DT) process. In the EH process, the PS transmits RF signals to all SNs with a duration of τhT. In the DT process with duration τtT, each SN uses the harvested energy to transmit the sensing data to the BS cooperatively through FDMA or TDMA modes. Here, the DT duration and bandwidth for SNk are denoted by τkt and Bk, respectively. Specifically, in FDMA mode, the bandwidth are equally allocated to each node while the DT time of each node is equal to τtT, i.e.,

Bk=BtotK,τkt=τt. (1)

Figure 2.

Figure 2

Communication model of the sensor node.

In TDMA mode, each node can share the whole bandwidth while the DT time is equally allocated to each node, i.e.,

Bk=Btot,τkt=τtK. (2)

Both uplink and downlink channels are assumed to be quasi-static flat fading. We use gk to represent the channel gain due to small-scale fading between PS and SNk, and hk to represent the one between SNk and BS. The values of gk and hk remain unchanged during a time block while the values in different time blocks follow identically and independently distribution (i.i.d).

4. General Optimization Framework

Denote the transmission power of the PS by p0; ignoring the influence of background noise on energy collection, the received RF energy of SNk in the i-th time block holds as:

PkRF(i)=p0gk(i)lkh, (3)

where lkh is the path loss between PS and SNk, which depends on the distance between the PS and SNk.

The harvested RF energy needs to be converted into DC energy before it can be using by SNs. In order to better characterize the realistic RF energy conversion circuit, this paper adopts a nonlinear energy conversion model. In this model, the rate of DC energy collected by SNk in the i-th time block can be obtained as:

PkDC(i)=πk1evkPkRF(i)1+evk(PkRF(i)γk), (4)

where parameters πk, vk, and γk describe the nonlinear characteristics in the process of converting RF energy into DC energy due to the limitation of circuit hardware. Specifically, πk represents the maximum energy conversion rate, and vk and γk denote the circuit sensitivity and current leakage, respectively. The specific values can be obtained by fitting the relevant data of the actual energy conversion circuit [28,29]. The energy harvested by SNk holds as:

Pk(i)=PkDC(i)τhT, (5)

The harvested energy is assumed to used up for uplink DT, i.e., the transmission power holds as:

pk(i)=Pk(i)τktT=PkDC(i)τhτkt. (6)

According to Shannon’s theorem, the date transmission rate in the i-th time block holds as:

Rk(i)=Bklog2(1+pk(i)hk(i)lktN0Bk), (7)

where lkt represents the path loss between SNk and BS, N0 denotes the power spectral density of white Gaussian noise. Because the service process {Rk(i),i=1,2} is not related between time slots, the effective capacity of SNk can be expressed as [30]:

Ck(θk)=1θkTlnE[eθkτktTBklog2(1+pk(i)hk(i)lktN0Bk)], (8)

where E[·] denotes an expectation function, θk denotes the latency exponent of SNk. In [30], it is proved that Ck(θk) is monotonically decreasing with θk, i.e.,

Ck(θk=0)=E[Bklog2(1+pk(i)hk(i)lktN0Bk)],Ck(θk=)=0. (9)

In other words, when θk=0, the network does not need to guarantee the LVP. Additionally, a tighter LVP requires larger θk. Specifically, for a delay requirement Dmax which is the maximum data latency tolerance for an application, the LVP of the k-th SN holds as:

Pr{Dk>Dmax}=Pr{Qk>0}eθkCk(θk)Dmax, (10)

where Pr{Qk>0} denotes the probability that the buffer Qk of the k-th SN is nonempty in the steady state. For a system, the busy period is more worthy of being focused on, thus we assume Pr{Qk>0}=1. In addition, according to the effective capacity theory, the maximum traffic rate of k-th SN that can be supported holds as λk=C(θk).

Let λ denote the data rate requirement of the application. It is interesting to investigate how to guarantee the minimum LVP for such application through optimizing the network parameters such as EH duration, DT duration, and task allocation. Furthermore, the network LVP, i.e., Pr{D>Dmax}, is equal to the maximum LVP of the cooperative SNs. Hence, the optimization problem can be expressed as P1:

minmaxλ,τh,τtPr{Dk>Dmax},k{1,2,,K}s.t.C1:λ1+λ2++λKλC2:pk(i)pkmax,iC3:τh+τt1C4:λk=Ck(θk) (11)

where C1 ensures the source rate required by the application. Constraint C2 means the transmission power of a SN should be controlled within a maximum level. Constraint C3 means that the sum of EH duration and DT duration cannot exceed the duration of a time block. Constraint C4 reveals the relationship between the maximum sustained traffic rate and the effective capacity for a node.

5. Stochastic Latency Guarantee

In order to dealing with problem P1, we are interested in the difference of performance guarantee between the FDMA mode and TDMA mode. Surprisingly, if time and frequency resources are allocated equally to each SN, we can prove that the LVP performance of such two modes are identical, which is summarized in the following.

Theorem 1.

The network LVP with FMDA mode is equal to the one with TDMA mode.

Proof. 

According to Equations (1), (6), and (8), we have the effective capacity for the FDMA mode as:

CkFDMA(θk)=1θkTlnE[eθkτktTBklog2(1+pkhklktN0Bk)]=1θkTlnE[eθkτtTBtotKlog2(1+KPkDCτhhklktτtN0Btot)]. (12)

According to Equations (2), (6) and (8), we have the effective capacity for the TDMA mode as:

CkTDMA(θk)=1θkTlnE[eθkτktTBklog2(1+pkhklktN0Bk)]=1θkTlnE[eθkτtKTBtotlog2(1+KPkDCτhhklktτtN0Btot)]. (13)

Comparing Equations (12) and (13), we have CkFDMA(θk)=CkTDMA(θk). According to Equation (10), the LVP based on FDMA is equal to that based on TDMA for any SN when other parameters are fixed. As a result, the network LVPs based on such two modes are identical, which proves Theorem 1.  ☐

Based on Theorem 1, the solutions of problem P1 under the FDMA and TDMAs are identical. Additionally, the effective capacity of each SN is related to latency exponent θk, which further affects the LVP performance according to Equation (10). The following theorem will reveal the relationship between the LVP performance and θk.

Theorem 2.

The LVP of a node decreases as the latency exponent θk increases.

Proof. 

According to Equations (8) and (10), we have

Pr{Dk>Dmax}=eθk(1θkTlnE[eθkτktTBklog2(1+pk(i)hk(i)lktN0Bk)])Dmax=e1TlnE[eθkτktTBklog2(1+pk(i)hk(i)lktN0Bk)]Dmax. (14)

It is easily verified that the LVP of SNk decreases as θk increases, which completes the proof of Theorem 2.  ☐

Based on Theorem 2, smaller θk can guarantee lower LVP performance for a SN. However, as mentioned before, smaller θk results in smaller effective capacity, which further decreases the sustained source rate for a SN. Hence, a trade-off between the LVP performance and the sustained source rate should be taken into account. In detail, for an arbitrary cooperative node SNa with data rate requirement λa, according to constraint C4 in Problem P1 and Equation (8), we can obtain the optimal θa by solving the following equation:

f1(θa)=1θaTlnE[eθaτatTBalog2(1+pa(i)ha(i)latN0Ba)]λa. (15)

As λa is fixed and Ca(θa) decreases with θa, f1(θa) is a decreasing function θa. Consequently, Equation (15) can be solved by the resorting bisection searching approach, which is summarized in the following. Note that, for a fixed calculation precision εθ, the calculation complexity of Algorithm 1 holds as O(log2(1εθ)).

Algorithm 1 Find optimal θa*
1: Input:λa, θamin=0 and θamax=1, precision εθ
2: Output:θa*
3: Compute f1(θamin), f1(θamax) by Equation (15).
4: while(f1(θamin)f1(θamax)<0&&(θamaxθamin)>εθ)do
5:  Set middle point θamid=(θamin+θamax)(θamin+θamax)22.
6:  Compute f1(θamid) by Equation (15).
7: if (f1(θamid)>0) then
8:   θamin=θamid.
9: else
10:   θamax=θamid.
11: end if
12:  Compute f1(θamin), f1(θamax) by Equation (15).
13: end while
14: θa*=(θamin+θamax)/2.
15: END

According to Equation (11), problem P1 is a min-max problem. Hence, the relationship among the LVP of each SN should be addressed. The following theorem illustrates how to balance the LVP of each SN to obtain the optimal task allocation when system time allocation is given.

Theorem 3.

When optimal task allocation is obtained as {λ1,...,λK}, then, for m,n{1,2,,K}(mn), there always holds:

Pr{Dn>Dmax}=Pr{Dm>Dmax}.

Proof. 

We prove Theorem 3 with a contradiction approach. Assume that, when optimal task allocation is obtained, there still exist the maximum LVP Pr{Dm>Dmax} for SNm and the minimum LVP Pr{Dn>Dmax} for SNn, where m,n{1,2,,K} and Pr{Dm>Dmax}>Pr{Dn>Dmax}, i.e., the assumed optimal task allocation solution is obtained under Pr{Dm>Dmax}. In this case, the corresponding source rate for such two nodes are denoted by λm and λn, respectively. In addition, the corresponding latency exponents for SNm and SNn at this time are denoted by θm and θn, respectively. According to Theorem 2, there holds θm<θn. As the effective capacity decreases with the latency exponent, we have λm>λn.

Let λm=λmΔλ, λn=λn+Δλ. We have θm<θm and θn>θn. Furthermore, when Δλ0+, the constraint conditions in P1 are still satisfied. According to Theorem 2, we can obtain that

Pr{Dm>Dmax}>Pr{Dm>Dmax}>Pr{Dn>Dmax}>Pr{Dn>Dmax}.

Hence, the network LVP can be further reduced to Pr{Dm>Dmax}, which brings the contradiction. Therefore, when optimal task allocation is obtained, the LVP of each SN should be equal to each other, which completes the proof.  ☐

In order to quickly ascertain the task allocation for each SN, the following corollary is given.

Corollary 1.

When the source rate of a SN is allocated as λa, the source rate for the other nodes SNk can be obtained by solving the following equation:

ΔPr(a)=ΔPr(k), (16)

where

ΔPr(k)=E[eθkτktTBklog2(1+pk(i)hk(i)lktN0Bk)]. (17)

Note that ΔPr(k) is related to θk; hence, we can construct a function as follows:

f2(θk)=E[eθkτktTBklog2(1+pk(i)hk(i)lktN0Bk)]ΔPr(a). (18)

It is easily verified that f2(θk) is a decreasing function of θk. Hence, the solution θk* of f2(θk)=0 can be obtained by a bisection search approach. Furthermore, the corresponding source rate λk* can be calculated by λk*=C(θk*). The method for task allocation is summarized in Algorithm 2. The computation complexity of Algorithm 2 holds as O((K1)log2(1εθ)).

Algorithm 2 Task allocation scheme
1: Input:ΔPr(a), precision εθ, θkmin=0 and θkmax=1
2: Output:λk*,(k={1,2,3,,K}&&k!=a)
3: for(k={1,2,3,,K}&&k!=a)do
4:  Compute f2(θkmin), f2(θkmax) by Equation (18).
5: while (f2(θkmin)f2(θkmax)<0&&(θkmaxθkmin)>εθ) do
6:   Set middle point θkmid=(θkmin+θkmax)(θkmin+θkmax)22.
7:   Compute f2(θkmid) by Equation (18).
8:   if (f2(θkmid)>0) then
9:   θkmin=θkmid.
10:   else
11:    θkmax=θkmid.
12:   end if
13:   Compute f2(θkmin), f2(θkmax) by Equation (18).
14: end while
15: θk*=(θkmin+θkmax)/2.
16:  Compute λk* by C4 in Equation (11).
17: end for
18: END

According to Theorems 2 and 3, λk and θk can be obtained when system time allocation is given. In the subsequence, a optimal system time allocation condition is given.

Theorem 4.

To guarantee the minimum network LVP, the system time should be used up for energy harvesting and data transmission in each time block, i.e.,

τh+τt=1. (19)

Proof. 

Assume that {τh*,τt*} can guarantee the minimum LVP with τh*+τt*<T. Accordingly, we can construct another time allocation solution {τ˜h,τ˜t} which satisfying τ˜h=τh*+Δτh>τh* and τ˜t=τt*, where Δτh=1(τh*+τt*), i.e., τ˜h+τ˜t=1. In this case, the LVP is denoted by Pr. It is easy to verify that {τ˜h,τ˜t} still satisfies all the constraints of problem P1, so it is a feasible solution. Additionally, when τ˜h>τh*, each cooperative SN can harvest more energy, which implies that higher transmission power can be provided in the DT process. Hence, the effective capacity of SNs can be enhanced, which further reduces the network LVP. As a result, there is a contradiction and the system time should be used up for each time block.  ☐

Based on a similar idea of Theorem 4, we can also prove that, in order to guarantee the minimum LVP with τh*+τt*<T, there holds:

λ=λ1+λ2++λK.

In all, problem P1 can be transferred to problem P2 as follows:

minλ,τh,τtPr{Dk>Dmax},k{1,2,,K}s.t.C1:λ1+λ2++λK=λC2:pk(i)pkmax,iC3:τh+τt=1C4:λk=Ck(θk)C5:Pr{Dk>Dmax}=Pr{Da>Dmax} (20)

In Algorithms 1 and 2, task allocation for one node, i.e., SNa is needed. Hence, we can fixed the system allocation and find out λa firstly. Note that Pr{Da>Dmax} is monotonically decreasing with λa and Ca(θa) is monotonically decreasing with θa, and there is a unique solution of λ for problem P2. Hence, the bisection search approach can be applied again. Furthermore, as the statistical channel information is different among all the SNs, according to Equation (8), an SN with poorer channel information guarantees lower effective capacity, which leads to a lower sustained source rate. In order to reduce the computation complexity of task allocation, we can choose the node with poorest statistical channel information as SNa. In this case, the upper bound of the bisection search can be just λK. The following algorithm summarizes how to find out λa. It is easily verified that the computation complexity of Algorithm 3 lies in O(Klog2(λελ)log2(1εθ)).

Algorithm 3 Find optimal λa*
1: Input:τh, p0, N0, W, gk, hk, πk, vk, γk, Dmax, K, T, λ, λamin=0 and λamax=λK, precision ελ.
2: Output:λa*
3: Compute λamid=λamax+λamin2.
4: Apply Algorithm 1 to find out θmin.
5: Apply Algorithm 2 to find out λmid.
6: while|λmidλ|>ελdo
7: if λmidλ>0 then
8:   λamax=λamid.
9: else
10:   λamin=λamid.
11: end if
12: λamid=λamax+λamin2.
13:  Apply Algorithm 1 to find out θmin.
14:  Apply Algorithm 2 to find out λmid.
15: end while
16: λa*=(λamin+λamax)/2.
17: END

According to Constraint 4 of problem P2, the optimal system time can be further obtained through one-dimensional search. Therefore, problem P2 can be solved. The procedure for solving the P2 is summarized in Algorithm 4. In all, the computation complexity of the proposed joint task and resource allocation scheme holds as O(Kετlog2(λελ)log2(1εθ)).

Algorithm 4 System time allocation scheme
1: Input:Dmax, precision ετ
2: Output:τh*, τt*, minPr{D>Dmax}
3: for all τh do
4:   switch TD mode do
5:    case: TDMA
6:       τkt=(1τh)/K.
7:       Bk=W.
8:    case: FDMA
9:       τkt=1τh.
10:       Bk=W/K.
11:   end switch
12: Apply Algorithm 3 to find out optimal λa for τh.
13: Compute Pr{D>Dmax} according to Equation (10) and Constraint 4 of problem P2.
14: end for
15: Find out minPr{D>Dmax} and the corresponding τh*, τt*.
16: END

In summary, a schematic diagram is presented to introduce our proposed scheme and the relationships between different algorithms, as depicted in Figure 3.

Figure 3.

Figure 3

The schematic diagram of the overall scheme.

6. Numerical Results

In this section, numerical results are presented and discussed. If not otherwise highlighted, the various involved parameters and the adopted analysis scenarios are as follows. The transmission power of the PS is set to p0=40 dBm (i.e., 10 W). The length of each time block is set to T = 10 ms. The total bandwidth of the network is set to Btot=20 MHz. The power spectral density of the background noise N0=130 dBm/Hz. The data rate and the latency requirements of the application are set to λ=2 Mbps and Dmax=100 ms, respectively. The number of the SNs is set to K=5. For any 1kK, the energy harvesting parameters are set as πk=0.01 mW, νk=47.083×103 and γk=0.0029 mW [31]. In addition, the channel gain due to small-scaling fading between each node and PS and that between each node and BS are both assumed to follow Rayleigh distribution with mean 1. The distance between each node and the PS and that between each node and the BS are all set to ρk=10 m. Additionally, the path loss is assumed to be lkh=lkt=ρk2 with 30 dB power attenuation at a reference distance of 1 m. More intuitively, the fixed parameters are listed in Table 1.

Table 1.

Parameter settings.

Parameters Value
the transmission power of the PS (p0) 40 dBm (10 W)
the length of each time block (T) 10 ms
the total bandwidth (Btot) 20 MHz
the power spectral density of the noise (N0) −130 dBm/Hz
the application data rate requirement (λ) 2 Mbps
the application latency requirement (Dmax) 100 ms
the number of the SNs (K) 2–10
the maximum energy conversion rate (πk) 0.01 mW
the circuit sensitivity (νk) 47.083×103
the current leakage (γk) 0.0029 mW
the mean of Rayleigh distribution 1
the path loss between PS and SNk in 1m (lkh) 30 dB
the path loss between SNk and BS in 1m (lkt) 30 dB
precision ετ 0.01
precision ελ 103 bps
precision εθ 107

According to Algorithms 1–4, the precision of analytical results as well as the computation complexity of the proposed resource allocation scheme both depend on the precision parameters ετ, ελ, and εθ. Specifically, the lower values ετ, ελ, and εθ hold, the higher precision can be guaranteed for the analytical results. However, the computation complexity of the proposed scheme will increase. Hence, we first determine appropriate parameters for the subsequent numerical analysis. Figure 4 depicts the impacts of precision parameters on the network LVP. Note that, when we aim to find out the appropriate value for one type of the precision parameter, we set the other two types of precision parameters to a sufficiently low value (e.g., ελ=1 bps). It is observed that the analytical results can be convergent for each type of precision parameter. According to Figure 4, we set the precision parameters as ετ=0.01, ελ=1 bps and εθ=107, respectively. Based on such configuration, a good trade-off between the analytical precision and the computation complexity can be achieved.

Figure 4.

Figure 4

Impact of precision parameters on the numerical results.

Figure 5 depicts the relationship between network LVP and energy harvesting proportion under different data rate requirements. It is found that the network LVP first decreases with τh and then increases after reaching a certain valve, which implies that there is an optimal energy harvesting time solution for any case. The reason is that, when τh is small, the cooperative SNs need more energy to support their transmissions. Hence, the network LVP is improved as τh increases. However, when τh is large enough, increasing τh leads to shorter time to transmit data, which degrades the network LVP. In addition, the network LVP increases with application data rate requirements, since a higher source data rate is needed for each SN. In particular, when λ is small enough, it is verified that a wireless link can also guarantee an ultra-high reliable transmission for time-sensitive application—while, for the optimal energy harvesting time proportion and the application data rate requirement, we find that there is a linear relationship between them. This phenomenon is verified by the subfigure of Figure 5. The observation can help us to quickly choose the optimal energy harvesting time for other applications, which further reduces the complexity of the proposed scheme.

Figure 5.

Figure 5

The relationship between network LVP and energy harvesting proportion under different data rate requirements.

Figure 6 depicts relationship between network LVP and energy harvesting proportion under different positions of SNs. For the SNs with heterogeneous positions, the distance between them and the PS and that between them and the BS are both set to {8,9,10,11,12} m, which guarantees the average distance as 10 m. It is observed that optimal system time configuration also exists when the positions of the SNs are different. Interestingly, when the application data rate is fixed, the optimal energy harvesting time proportion under the scenario with heterogeneous node positions is equal to that under the scenario with identical node positions. Another insightful phenomenon is observed in which the network LVP with heterogeneous node positions outperforms that with identical node positions when other conditions are fixed. This implies that a node closer to the PS and BS can sustain a higher source data rate and guarantees higher performance gain compared with the performance degradation brought by the further SN.

Figure 6.

Figure 6

The relationship between network LVP and energy harvesting proportion under different positions of SNs.

In Figure 7, we compare the LVP performance of the proposed scheme with two baseline schemes. In the scheme of proportional task allocation, the sensing data rate of a task is determined according to the channel capacity of a sensor node; it holds there as

λk=E[Rk(i)]a=1KE[Ra(i)]λ. (21)

Figure 7.

Figure 7

Performance comparison between the proposed scheme and the baseline schemes.

The intuition of such scheme is that the higher data rate is allocated to the node with a better channel state. In the scheme of equal task allocation, the sensing data rate is allocated to each node equally. In addition, the system configuration is the same as Figure 6. It is observed that the proposed scheme guarantees the lowest LVP while the performance of the scheme of equal task allocation is much worse than that of the other two schemes. Moreover, the optimal energy harvesting time is different under those three schemes. Therefore, the effectiveness of the proposed scheme is validated.

The impact of the number of SNs on the network LVP and the energy harvesting proportion is depicted in Figure 8. When other conditions are identical, more cooperative SNs can guarantee lower network LVP. The reason is that each node needs to support a lower source rate when the number of SNs increases. In addition, we also observe that the optimal energy harvesting time proportion τh increases with the number of SNs. This is because the source data rate requirement of each node decreases with the number of SNs. As a result, less time is needed by each SN to transmit data, which naturally leaves more time to harvest energy. Moreover, we are also interested in the relationship between the optimal τh and the number of SNs. The subfigure shows that they follow an approximately linear relationship. Such observation can bring a useful guideline to determine how much time should be allocated to harvest energy when the number of nodes varies.

Figure 8.

Figure 8

The relationship between network LVP and energy harvesting proportion under a different number of SNs.

Figure 9 illustrates the relationship between network LVP and application latency requirement. It is found that the network LVP decreases as Dmax increases under when the application data rate requirement and the number of SNs are fixed. This is because that larger Dmax means a looser performance requirement needed to be guaranteed by the network. Hence, the network LVP can be improved as shown in Equation (10).

Figure 9.

Figure 9

The relationship between network LVP and latency requirements.

Figure 10 depicts the minimum number requirements of nodes under different application latency requirements. It is observed that the minimum number of requirements of SNs increases as the application latency requirement becomes tighter. With the analysis in this paper, the network operator can flexibly determine the number of SNs to serve an application in terms of data rate and latency requirements.

Figure 10.

Figure 10

The minimum number requirements of nodes under different application latency requirements.

Additionally, we are interested in the relationship between the network LVP and energy efficiency since energy efficiency is also an important performance metric in WSNs. More specifically, as the SNs can only be powered by the power station, the network energy efficiency can be defined as

ee=λTp0τhTB=λp0τhBtot. (22)

As depicted in Figure 11, the network LVP is positively related to the network energy efficiency when λ is fixed. The reason is that higher energy efficiency requires lower transmission power of the power station, which degrades the network latency performance. Hence, it is necessary to balance the requirements of network LVP and energy efficiency. In addition to the network LVP (as shown in Figure 9), the network energy efficiency can be improved through increasing the number of SNs when the total network resources are fixed. Hence, multiplexing gain is validated under the proposed scheme.

Figure 11.

Figure 11

Relationship between latency violation probability and energy efficiency.

7. Discussion

From the numerical results and analysis, the relationship between the LVP and the energy harvesting time configuration is revealed. In addition, the impacts of application rate requirement, the delay requirement, and the number of the SNs on such relationship are depicted. To be specific, the optimal energy harvesting time linearly or nearly linearly varies with the application rate requirement and the number of the SNs. The higher application requirement or the smaller number of SNs is, the less time is allocated to the SNs to harvesting RF energy. The reason is that the SNs need more time to transmit data if the traffic load on them are heavier. According to the linear phenomenon observed in this paper, optimal energy harvesting time can be determined quickly. Therefore, the analysis can be applied to the practical wireless powered virtualized sensor networks to perform resource allocations.

Additionally, the proposed scheme can guarantee low LVP without strict resource requirements, which confirms its ability for a reliability guarantee. Particularly, while comparing with the proportional task allocation scheme and the equal task allocation scheme, the proposed scheme lowers the latency violation probability to 11.6 times and 4600 times, respectively. This is because the proposed scheme takes the heterogeneous transmission ability of each SN into account. As a result, the task rate allocated to each SN can achieve our aim that the minimum individual latency violation provability is minimized. Moreover, as discussed before, the computation complexity of the proposed scheme is O(Kετlog2(λελ)log2(1εθ)). Therefore, the complexity increases linearly with the number of SNs and increases logarithmically with the accuracy requirement, which is controllable in practical networks.

8. Conclusions

In this paper, a stochastic latency guarantee strategy was studied in the wireless powered virtualized sensor network. A cooperative sensing framework was constructed, and a joint task and resource optimization problem was formulated. In addition, the network latency violation probability under the FDMA mode and that under the TDMA mode were proved to be identical. In addition, a bisection searching approach was proposed to find out the optimal task allocation and a one-dimensional searching scheme was proposed to find out the optimal energy harvesting time. Moreover, the proposed scheme was evaluated under different scenarios. The analysis in this paper sheds new insights on task and resource management, which can help the network operator to guarantee the application requirements in terms of data rate and latency flexibly.

Author Contributions

This work was a collaborative development by all authors. Specifically, conceptualization, A.Z. and Z.L.; Methodology, A.Z., Z.L., and H.Z. Software, Z.L., H.Z., and X.L. Validation, R.W. and A.Z. Formal analysis, A.Z. and Z.L. Investigation, H.Z. and X.L. Writing original draft preparation, A.Z. Writing review and editing, R.W. and Z.L. Funding acquisition, R.W. and Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation of China under grants 61901078, 61771082 and 61871062, and in part by the Program for Innovation Team Building at the Institutions of Higher Education in Chongqing under grant CXTDX201601020, and in part by the Science and Technology Research Program of Chongqing Municipal Education Commission under grants KJQN202000626 and KJQN201900609.

Conflicts of Interest

The authors declare no conflict of interest. The funding institutions had no role in designing the study; in collecting, analyzing, and interpreting the data; in writing the manuscript; or in the decision to publish the results.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Hamdan S., Ayyash M., Almajali S. Edge-Computing Architectures for Internet of Things Applications: A Survey. Sensors. 2020;20:6441. doi: 10.3390/s20226441. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Wang R., Liu H., Wang H., Yang Q., Wu D. Distributed Security Architecture Based on Blockchain for Connected Health: Architecture, Challenges and Approaches. IEEE Wirel. Commun. 2019;26:30–36. doi: 10.1109/MWC.001.1900108. [DOI] [Google Scholar]
  • 3.Ghori M.R., Wan T.-C., Sodhy G.C. Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols. Sensors. 2020;20:3590. doi: 10.3390/s20123590. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Wu D., Han X., Yang Z., Wang R. Exploiting Transfer Learning for Emotion Recognition under Cloud-Edge-Client Collaborations. IEEE J. Sel. Areas Commun. 2020 doi: 10.1109/JSAC.2020.3020677. [DOI] [Google Scholar]
  • 5.Khan I., Belqasmi F., Glitho R., Crespi N., Morrow M., Polakos P. Wireless Sensor Network Virtualization: A survey. IEEE Commun. Surv. Tutor. 2016;18:553–576. doi: 10.1109/COMST.2015.2412971. [DOI] [Google Scholar]
  • 6.Su J., Chen Y., Sheng Z., Huang Z., Liu A. From M-Ary Query to Bit Query: A New Strategy for Efficient Large-Scale RFID Identification. IEEE Trans. Commun. 2020;68:2381–2393. doi: 10.1109/TCOMM.2020.2968438. [DOI] [Google Scholar]
  • 7.Krikidis I. Average Age of Information in Wireless Powered Sensor Networks. IEEE Wirel. Commun. Lett. 2019;8:628–631. doi: 10.1109/LWC.2018.2890605. [DOI] [Google Scholar]
  • 8.Zhang H., Guo Y., Zhong Z., Wu W. Cooperative Integration of RF Energy Harvesting and Dedicated WPT for Wireless Sensor Networks. IEEE Microw. Wirel. Components Lett. 2019;29:291–293. doi: 10.1109/LMWC.2019.2902047. [DOI] [Google Scholar]
  • 9.Guo M., Li L., Guan Q. Energy-Efficient and Delay-Guaranteed Workload Allocation in IoT-Edge-Cloud Computing Systems. IEEE Access. 2019;7:78685–78697. doi: 10.1109/ACCESS.2019.2922992. [DOI] [Google Scholar]
  • 10.Alaslani M., Nawab F., Shihada B. Blockchain in IoT Systems: End-to-End Delay Evaluation. IEEE Internet Things J. 2019;6:8332–8344. doi: 10.1109/JIOT.2019.2917226. [DOI] [Google Scholar]
  • 11.Nkomo M., Hancke G.P., Abu-Mahfouz A.M., Sinha S., Onumanyi A.J. Overlay Virtualized Wireless Sensor Networks for Application in Industrial Internet of Things: A Review. Sensors. 2018;18:3215. doi: 10.3390/s18103215. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 12.Haque I., Nurujjaman M., Harms J., Abu-Ghazaleh N. SDSense: An Agile and Flexible SDN-Based Framework for Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2019;68:1866–1876. doi: 10.1109/TVT.2018.2888622. [DOI] [Google Scholar]
  • 13.Gul O., Demirekler M. Asymptotically Throughput Optimal Scheduling for Energy Harvesting Wireless Sensor Networks. IEEE Access. 2018;6:45004–45020. doi: 10.1109/ACCESS.2018.2865451. [DOI] [Google Scholar]
  • 14.Misra S., Chakraborty S. QoS-Aware Dispersed Dynamic Mapping of Virtual Sensors in Sensor-Cloud. IEEE Trans. Serv. Comput. 2019 doi: 10.1109/TSC.2019.2917447. [DOI] [Google Scholar]
  • 15.Raee M., Naboulsi D., Glitho R. Energy Efficient Task Assignment in Virtualized Wireless Sensor Networks; Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC); Natal, Brazil. 25–28 June 2018; pp. 976–979. [Google Scholar]
  • 16.Zhou Y., Yu F.R., Chen J., Kuo Y. Robust Energy-Efficient Resource Allocation for IoT-Powered Cyber-Physical-Social Smart Systems With Virtualization. IEEE Internet Things J. 2019;6:2413–2426. doi: 10.1109/JIOT.2018.2869774. [DOI] [Google Scholar]
  • 17.Katona R., Cionca V., O’Shea D., Pesch D. Virtual Network Embedding for Wireless Sensor Networks Time Efficient QoS/QoI Aware Approach. IEEE Internet Things J. 2020 doi: 10.1109/JIOT.2020.3009834. [DOI] [Google Scholar]
  • 18.Choi K.W., Ginting L., Aziz A.A., Setiawan D., Park J.H., Hwang S.I., Kang D.S., Chung M.Y., Kim D.I. Toward Realization of Long-Range Wireless-Powered Sensor Networks. IEEE Wirel. Commun. 2019;26:184–192. doi: 10.1109/MWC.2019.1800475. [DOI] [Google Scholar]
  • 19.Guo S., Shi Y., Yang Y., Xiao B. Energy Efficiency Maximization in Mobile Wireless Energy Harvesting Sensor Networks. IEEE Trans. Mob. Comput. 2018;17:1524–1537. doi: 10.1109/TMC.2017.2773067. [DOI] [Google Scholar]
  • 20.Azarhava H., Musevi Niya J. Energy Efficient Resource Allocation in Wireless Energy Harvesting Sensor Networks. IEEE Wirel. Commun. Lett. 2020;9:1000–1003. doi: 10.1109/LWC.2020.2978049. [DOI] [Google Scholar]
  • 21.Gupta V., De S. Collaborative Multi-Sensing in Energy Harvesting Wireless Sensor Networks. IEEE Trans. Signal Inf. Process. Netw. 2020;6:426–441. doi: 10.1109/TSIPN.2020.2995502. [DOI] [Google Scholar]
  • 22.Chu Z., Zhou F., Zhu Z., Hu R.Q., Xiao P. Wireless Powered Sensor Networks for Internet of Things: Maximum Throughput and Optimal Power Allocation. IEEE Internet Things J. 2018;5:310–321. doi: 10.1109/JIOT.2017.2782367. [DOI] [Google Scholar]
  • 23.Anwar A.H., Seddik K.G., ElBatt T., Zahran A.H. Effective Capacity of Delay-Constrained Cognitive Radio Links Exploiting Primary Feedback. IEEE Trans. Veh. Technol. 2016;65:7334–7348. doi: 10.1109/TVT.2015.2493040. [DOI] [Google Scholar]
  • 24.Guo C., Liang L., Li G. Resource Allocation for Low-Latency Vehicular Communications: An Effective Capacity Perspective. IEEE J. Sel. Areas Commun. 2019;37:905–917. doi: 10.1109/JSAC.2019.2898743. [DOI] [Google Scholar]
  • 25.Gao Y., Cheng W., Zhang H., Li Z. Heterogeneous Statistical QoS Provisioning Over Wireless Powered Sensor Networks. IEEE Access. 2017;5:7910–7921. doi: 10.1109/ACCESS.2017.2694046. [DOI] [Google Scholar]
  • 26.Fidler M., Rizk A. A Guide to the Stochastic Network Calculus. IEEE Commun. Surv. Tutor. 2015;17:92–105. doi: 10.1109/COMST.2014.2337060. [DOI] [Google Scholar]
  • 27.Zoppi S., Van Bemten A., Gursu H.M., Vilgelm M., Guck J., Kellerer W. Achieving Hybrid Wired/Wireless Industrial Networks With WDetServ: Reliability-Based Scheduling for Delay Guarantees. IEEE Trans. Ind. Inform. 2018;37:2307–2319. doi: 10.1109/TII.2018.2803122. [DOI] [Google Scholar]
  • 28.Boshkovska E., Ng D., Zlatanov N., Koelpin A., Schober R. Robust Resource Allocation for MIMO Wireless Powered Communication Networks Based on a Non-Linear EH Model. IEEE Trans. Commun. 2017;65:1984–1999. doi: 10.1109/TCOMM.2017.2664860. [DOI] [Google Scholar]
  • 29.Morsi R., Boshkovska E., Ramadan E., Ng D., Schober R. On the Performance of Wireless Powered Communication with Non-Linear Energy Harvesting; Proceedings of the 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications; Sapporo, Japan. 3–6 July 2017; pp. 1–5. [Google Scholar]
  • 30.Wu D., Negi R. Effective Capacity: A Wireless Link Model for Support of Quality of Service. IEEE Trans. Wirel. Commun. 2003;2:630–643. [Google Scholar]
  • 31.Li Z., Jiang Y., Gao Y., Sang L., Yang D. On Buffer-Constrained Throughput of a Wireless-Powered Communication System. IEEE J. Sel. Areas Commun. 2019;37:283–297. doi: 10.1109/JSAC.2018.2872374. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES