Literature DB >> 26703616

Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks.

Yali Zeng1, Li Xu2, Zhide Chen3.   

Abstract

As wireless sensor network (WSN) is often deployed in a hostile environment, nodes in the networks are prone to large-scale failures, resulting in the network not working normally. In this case, an effective restoration scheme is needed to restore the faulty network timely. Most of existing restoration schemes consider more about the number of deployed nodes or fault tolerance alone, but fail to take into account the fact that network coverage and topology quality are also important to a network. To address this issue, we present two algorithms named Full 2-Connectivity Restoration Algorithm (F2CRA) and Partial 3-Connectivity Restoration Algorithm (P3CRA), which restore a faulty WSN in different aspects. F2CRA constructs the fan-shaped topology structure to reduce the number of deployed nodes, while P3CRA constructs the dual-ring topology structure to improve the fault tolerance of the network. F2CRA is suitable when the restoration cost is given the priority, and P3CRA is suitable when the network quality is considered first. Compared with other algorithms, these two algorithms ensure that the network has stronger fault-tolerant function, larger coverage area and better balanced load after the restoration.

Entities:  

Keywords:  connectivity restoration; fault tolerance; wireless sensor networks

Year:  2015        PMID: 26703616      PMCID: PMC4732036          DOI: 10.3390/s16010003

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Wireless sensor networks (WSNs) are known for their wide use in industry, military, and environmental monitoring applications [1]. They are usually deployed in harsh environments, where nodes are subjected to failures and the networks are easy to be partitioned into disjoint segments. Therefore, fault tolerance becomes a critical issue for WSNs and numerous restoration algorithms are proposed [2,3,4,5,6] to address this issue. In order to achieve fault tolerance when restoring a faulty WSN, one approach is to deploy additional relay nodes to provide k (k > 1) vertex-disjoint paths (hereinafter referred to as k-connectivity) between every pair of network nodes (segments and relay nodes). In this way, the restored network can survive the failure of fewer than k nodes, which is more practical for WSNs. In this paper, we adopt this approach to repair the faulty network which is divided into many segments. However, deploying additional relay nodes for network restoration brings us two conflicting requirements: On the one hand, it needs to spend some money to purchase the equipment. In order to save the cost, it is required to place as few nodes as possible to repair the faulty network. On the other hand, as a wireless sensor network is easy to fail, the network after the restoration is required to be with fault-tolerant function so that it can resist the attack and damage in the future. The network, which is constructed by using as few nodes as possible, may not be fault-tolerant, but the network with fault-tolerant function needs to deploy more relay nodes and costs more money. Hence, these two requirements are contradictory. In addition, as for a network, network coverage and topology quality are also important to a network. Therefore, when designing the restoration scheme, we should consider not only the cost and network fault tolerance, but also the other aspects. Only in this way can the network after the restoration be more practical.

1.1. Our Contributions

In this paper, we comprehensively consider the restoration cost, fault tolerance, network coverage and topology quality. We seek to use fewer nodes to establish a network with fault-tolerant function under the premise of multiple segments that are unable to communicate with each other. Meanwhile, except for the restoration cost and fault tolerance, we also consider the network coverage, the quality of topology and others in this paper, so as to ensure that the network can not only has better fault tolerance, but also has stronger robustness and higher coverage after the restoration. Certainly, these performances are not considered fully in the existing literature. The algorithms we propose in this paper are summarized as follows: Full 2-Connectivity Restoration Algorithm (F2CRA) provides two vertex-disjoint paths between every pair of network nodes. This algorithm is suitable when the cost is considered first. Partial 3-Connectivity Restoration Algorithm (P3CRA) provides three vertex-disjoint paths between every pair of segments and at least two vertex-disjoint paths between every pair of relay nodes. This algorithm is suitable when the fault tolerance, network coverage and topology quality are considered first.

1.2. Paper Organization

The remainder of this paper is organized as follows. Section 2 reviews some related works. Section 3 proposes the system model and preliminaries. Our algorithms are introduced in Section 4. Section 5 and Section 6 conduct the theory and simulation analysis for our algorithms, respectively. Finally, we conclude this paper in Section 7.

2. Related Work

WSNs are prone to failures due to the hostile environments where they are deployed. How to recover a faulty WSN is an important issue that has attracted numerous researches. We summarize some existing restoration algorithms in Table 1. In the connected relay node placement problem, the aim is to ensure the network is connected (k = 1) [7,8,9,10,11,12,13], while in the survivable relay node placement problem, the aim is to ensure k-connectivity (k > 1) [2,3,4,5,6,14,15,16,17,18]. k-connectivity can be either full or partial [19]. Full k-connectivity implies that k node-disjoint paths exist between every pair of nodes, while partial fault-tolerance requires k-connectivity between original nodes (segments) only.
Table 1

Relay placement algorithms.

AlgorithmskDeployment LocationsFault-ToleranceNetwork Types
Lloyd [9]k = 1UnconstrainedNoHomogeneous
Li [10]k = 1UnconstrainedNoHeterogeneous
Bhattacharya [13]k = 1ConstrainedNoHomogeneous
Yang [11]k = 1, 2ConstrainedFullHierarchical
Hao [2]k > 1UnconstrainedPartialHierarchical
Zhang [3]k = 2UnconstrainedFullHierarchical
Han [4]k > 1UnconstrainedFull, PartialHeterogeneous
Senel [5]k = 2UnconstrainedFullHomogeneous
Our algorithmsk = 2, 3UnconstrainedFull, PartialHomogeneous
Relay placement algorithms. In connectivity problems, most algorithms restore a faulty network by finding the minimum spanning tree or Steiner tree. Lin and Xue [7] show that the STP-MSP problem is NP-hard. They also show that the approximation obtained from the minimum spanning tree has a worst-case performance ratio at most 5, while Chen et al. [8] point out that this approximation has a performance ratio exactly 4. Chen et al. also present a new polynomial-time approximation with a performance ratio at most 3. Yang et al. [11] study two-tiered constrained relay node placement problems and propose polynomial time approximation algorithms with O(1)-approximation ratios. Lloyd et al. [9] study two versions of relay node placement problems, but the same objective of these two versions is to deploy the minimum number of relay nodes. Li et al. [10] also has the same objective as [9], but they study the placement problem in a heterogeneous WSN. Although easy to implement, these algorithms are usually not efficient when a failure occurs in the network. In survivable problems, most algorithms aim to construct a fault-tolerant network topology in a WSN. Hao and Tang et al. [2,14] study a fault-tolerant relay node placement problem in a two-tiered network, while Zhang et al. [3] study the problem in both single and two tiered networks. Smith et al. [2] is further extended to cover k-connectivity in heterogeneous wireless sensor networks in [4] where sensor nodes possess different transmission radii. The same as [4], Misra et al. [15] study the placement problem in heterogeneous wireless sensor networks, but [15] studies a constrained version in which relay nodes can only be placed at a set of candidate locations. As many algorithms do in connectivity problem, many restoration algorithms in survivable problem also try to place fewest number of relay nodes in a WSN like [6,16,17]. In a word, most of the aforementioned algorithms try to place minimum relay nodes in a WSN. However, none of them take network quality into account which is also crucial in terms of application-level performance. Therefore, Senel and Lee et al. [5,18] opt to reestablish connectivity using the least number of relays while ensuring a certain quality in the formed topology. However, their algorithms produce many overlapped areas and cannot be practical in multiple node failures caused by aftermath. To address these issues, we jointly consider establishing fault-tolerant connectivity and providing large coverage area which has not been studied.

3. System Model and Preliminaries

3.1. System Model

WSN is often deployed in the hostile environment, and sometimes it may suffer from the large-scale damage, resulting in the entire network being divided into multiple segments which cannot communicate with each other. In this paper, the problem we consider is how to repair the faulty WSN composed of multiple segments. As mentioned above, our scheme is to deploy relay nodes between each segment, but this scheme brings us two contradictory requirements: One is to minimize the number of nodes, and the other is to construct a fault-tolerant network. If the segments are regarded as a node, the set of these nodes is defined as and the set of the deployed relay nodes is defined as , then our problem can be transformed into the following. Given a set of nodes (segments) on a plane with a random distribution, the nodes in the set cannot communicate with each other. After the set of relay nodes being added on the plane for the restoration, all the nodes can communicate with each other. It requires that (1) the number of relay nodes is minimized; and (2) the network is fault-tolerance after the restoration. Minimum Convex Hull: Given a set of nodes on a plane with a random distribution, the minimal convex polygon which contains all the points is called minimum convex hull ( Inner Convex Hull: In this paper, when the minimum convex hull is found, in order to ensure the network has fault tolerance after the restoration, the other convex hull is built inside the minimum convex hull. This convex hull is called inner convex hull (Figure 1b).
Figure 1

(a) Minimum convex hull; and (b) Inner convex hull.

(a) Minimum convex hull; and (b) Inner convex hull. Corner Point of Convex Hull: The points to make up convex hull are called corner points. In outer convex hull, corner points are the isolated segments, while in inner convex hull, corner points are relay nodes.

3.2. Preliminaries

The notations used in this paper are as follows (Table 2).
Table 2

Notations.

Notation Description
OCHOuter Convex Hull
ICHInner convex hull
CPCorner point
OCenter of OCH
RRadius of relay node
PSet of relay nodes
SSet of n segments, S={s1,s2,,sn}. The corresponding coordinate set of these n segments is {(x1,y1),(x2,y2),,(xn,yn)}.
Notations.

4. Algorithms

This section illustrates two proposed algorithms in detail.

4.1. Full 2-Connectivity Restoration Algorithm

Many schemes place too many relay nodes for improving network fault tolerance performance, but other performances like network coverage and topology quality have not been optimized. To address this issue, we propose a new restoration algorithm named Full 2-Connectivity Restoration Algorithm (F2CRA). This algorithm aims to deploy the minimum number of relay nodes to form a full 2-vertex connected network. Meanwhile, the restored network has a larger coverage area and a more balanced load than other schemes. The flow chart of F2CRA is shown in Figure 2.
Figure 2

Flow chart of Full 2-Connectivity Restoration Algorithm.

The steps of F2CRA are as follows (Algorithms 1): Given the scattered segments set on the plane, in Step 1 the minimum convex hull composed of these segments is found by the method of Graham scan algorithm. The time complexity of Graham scan algorithm is . By calculating the length from CPs to the center of OCH, in Step 2, we obtain the number of nodes and the accurate deployment position between each CP and . Step 2 enables the nodes on ICH to form 3-connectivity, and Steps 3 and 4 enable the remaining segments on the plane to form 2-connectivity. Steps 2–4 make the network topology have the fan-shaped structure after the restoration. Compared with other algorithms, the network topology with such structure has better fault tolerance, larger coverage and more balanced load. The time complexity from Step 2 to Step 4 is ; therefore, the time complexity of F2CRA algorithm is . Flow chart of Full 2-Connectivity Restoration Algorithm.

4.2. Partial 3-Connectivity Restoration Algorithm

F2CRA uses fewer nodes to establish a network topology with fault tolerance. Therefore, F2CRA is suitable for the case when the number of available relay nodes is small. When the number of available nodes is sufficient, we can extend F2CRA, so that the network topology can have the stronger fault tolerance after the restoration. Here, we propose an improved algorithm Partial 3-Connectivity Restoration Algorithm (P3CRA). P3CRA is similar to F2CRA, but the network restored by P3CRA will have partial 3-connectivity structure. Partial 3-connectivity means that after the restoration, all the segments have 3-connectivity at least, and the deployed relay nodes have 2-connectivity at least. The network restored by P3CRA has larger coverage and better fault tolerance than that by F2CRA. However, P3CRA needs to deploy more nodes; therefore, P3CRA is suitable when the network quality is taken into consideration first, and F2CRA is suitable when the cost is in consideration. P3CRA flow chart is shown in Figure 3.
Figure 3

Flow chart of Partial 3-Connectivity Restoration Algorithm.

Flow chart of Partial 3-Connectivity Restoration Algorithm. The steps of P3CRA are as follows (Algorithms 2): The first two steps are consistent in F2CRA algorithm and P3CRA algorithm, but in Step 3, P3CRA algorithm directly deploys nodes along the edge of OCH. At that time, all CPs (segments) on OCH form 3-connectivity. In Step 4, all segments on the plane eventually form 3-connectivity. Like F2CRA algorithm, the time complexity of P3CRA algorithm is also . To summarize, the network topology repaired by F2CRA algorithm has 2-connectivity. As it needs fewer nodes, this algorithm is suitable when the cost is considered first. Compared with F2CRA algorithm, P3CRA algorithm needs to deploy more nodes. Due to the stronger fault tolerance, larger coverage and more balanced load, P3CRA algorithm is applicable when the performance of network is considered first.

5. Algorithm Analysis

It is known that the coordinates of CPs and the center coordinate of OCH are and , respectively, and the value of communication radius of relay nodes is . Assume that nodes are deployed every distance . When the CP coordinate of ICH is (,), the restoration algorithm will use the minimum number of relay nodes. As shown in Figure 4, we assume the coordinates of point , , and are , , and , respectively. Here point and point represent the different CPs of OCH, and point represents the center of OCH. Our algorithm deploys relay nodes from the CPs ( and ) to the central point (). As the values of and are fixed, to minimize the nodes, it requires the total length of and to be the shortest, that is, the total length of and is the longest. Consequently, the problem is transformed into: Seeking the coordinate values of point and when the total length of and is the longest.
Figure 4

Diagram of triangle.

Diagram of triangle. Set , the lengths of , and are , and , respectively. , , , , are unknown. When is equal to , reaches the maximum value, which means the total length of and is the longest. The detailed argument is relegated to the Appendix. When , by trigonometric function, we have: Assume the coordinate of point is , then: As is on line , then we have: By Equations (2) and (3), we have: If , then: Otherwise: is similar to , and the method to get the coordinate of is similar to that of . That is, when the coordinates of and are, respectively, and , the total length of and is the longest, the total length of and is the shortest, and the number of nodes is the least. To summarize, the number of the nodes can be the least when the CP coordinate of ICH is .

6. Algorithm Comparison and Simulation Analysis

6.1. Algorithm Comparison

Figure 5a is the distribution of segments before the restoration, where there is no mutual communication between the isolated segments. Figure 5b is the diagram of network topology structure which is restored by 2C-SpiderWeb algorithm. From Figure 5b, we can see that this network topology has a large overlapping coverage. Because of this, the network has high average degree after the restoration. However, in this case, high average degree do not represent the network has better fault tolerance. If the localized fault occurs near the CP of OCH, such as the fire, the network restored by 2C-SpiderWeb may be divided into several segments again with high probability. Therefore, although the network has 2-connectivity after the restoration by 2C-SpiderWeb, it does not have good fault tolerance.
Figure 5

(a) The distribution of segments before the restoration; (b) 2C-SpiderWeb; (c) F2CRA; and (d) P3CRA.

(a) The distribution of segments before the restoration; (b) 2C-SpiderWeb; (c) F2CRA; and (d) P3CRA. Figure 5c,d are, respectively, the graphs of network topology structure of F2CRA and P3CRA after the restoration. From Figure 5c, we can see that all the network nodes after the restoration have at least 2-connevtivity. With such topology structure, the network can continue to run stably when one node fails. From Figure 4d, we can see that the network topology structure formed by P3CRA has larger coverage and better fault tolerance than others’. When the localized fault occurs, both F2CRA and P3CRA can maintain the stability of the network, and the network is not easy to be divided into many segments again.

6.2. Simulation Analysis

In this part, we will make a comparison among Hamilton Path algorithm, 2C-SpiderWeb algorithm, F2CRA and P3CRA from the four aspects: the number of nodes (Figure 6), total coverage of nodes (Figure 7), average coverage of each node (Figure 8) and average degree (Figure 9), so as to verify the feasibility and superiority of the proposed algorithm. In this simulation, the segments are distributed on the 2D plane of 1000 × 1000 m2 randomly. Besides, the node communication range in Figure 6a, Figure 7a, Figure 8a and Figure 9a is fixed with the value of 50 m, and the number of segments in Figure 6b, Figure 7b, Figure 8b and Figure 9b is fixed at 8.
Figure 6

(a) Relay Nodes vs. Segments; and (b) Relay Nodes vs. Communication Radius.

Figure 7

(a) Coverage Area vs. Segments; and (b) Coverage Area vs. Communication Radius.

Figure 8

(a) The Average Coverage of Each Node vs. Segments; and (b) The Average Coverage of Each Node vs. Communication Radius.

Figure 9

(a) Average Degree vs. Segments; and (b) Average Degree vs. Communication Radius.

6.2.1. The Number of Relay Nodes

From Figure 6a, we can see that when the communication radius of nodes is fixed, the number of nodes used in these four algorithms will increase with the growth of the number of segments. The more segments and the longer the total path length of the segments are, the more nodes that need to be deployed; therefore, more nodes will be used totally. It can be seen from the figure that no matter how many segments the network being divided, the nodes used in F2CRA is fewer than those in 2C-SpiderWeb algorithm, but more than those in Hamilton Path algorithm. This is determined by different topology structure of various algorithms. As P3CRA has partial 3-connectivity, the number of nodes used in this algorithm is higher than that in the other three algorithms. From Figure 6b, we can see that the number of segments being fixed, the relay nodes used in these four algorithms are reduced with the increase of the communication radius. This is because the number of nodes is determined by the communication range of nodes when the position of segments and the distance between the segments are fixed. When the node radius is enlarged, the number of nodes between the segments is less and then the total number of nodes will be less. From Figure 6b, we can see that no matter how the radius of nodes changes, the number of nodes in P3CRA is larger than that of the other three algorithms. In addition, with the increase of the node radius, the number of nodes used in F2CRA will be more close to that in 2C-SpiderWeb algorithm. This is because the network topology formed by 2C-SpiderWeb algorithm is more similar to the one formed by F2CRA when the node radius is enlarged. As a result, the number of nodes used in these two algorithms is close. (a) Relay Nodes vs. Segments; and (b) Relay Nodes vs. Communication Radius.

6.2.2. Total Coverage

From Figure 7, we can see that with the increase of the number of segments and the communication radius of nodes, the total coverage of these four algorithms increases. The coverage area of F2CRA is larger than that of 2C-SpiderWeb algorithm and Hamilton Path algorithm, while the coverage area of P3CRA is much larger than other three algorithms’. Although 2C-SpiderWeb algorithm has more nodes than F2CRA, the coverage area of F2CRA is always larger than that of 2C-SpiderWeb algorithm, no matter how the number of segments or the communication radius of nodes changes. From Figure 5, we can know that compared with 2C-SpiderWeb algorithm, F2CRA has a smaller overlapping area. Therefore, no matter how the number of segments or the communication radius of nodes changes, F2CRA has larger coverage area than 2C-SpiderWeb algorithm. Similarly, P3CRA uses more nodes and has smaller coverage area than F2CRA. Hence, no matter how the number of segments or the communication radius of nodes changes, P3CRA has larger coverage area than other algorithms. (a) Coverage Area vs. Segments; and (b) Coverage Area vs. Communication Radius.

6.2.3. Average Coverage

From Figure 8a, we can see that the average coverage of F2CRA is basically the same with that of P3CRA, less than that of each node by Hamilton Path algorithm, but more than that of 2C-SpiderWeb algorithm. From Figure 5, we can visually know that 2C-SpiderWeb algorithm has a large overlapping area. Because of the large overlapping area, the actual coverage area of network topology formed by 2C-SpiderWeb algorithm becomes small. As a result, the average coverage area of each node becomes small. Compared with other three algorithms, the network topology formed by Hamilton Path algorithm has the smallest network coverage area. Consequently, the average coverage area of each node of Hamilton Path algorithm is the largest. (a) The Average Coverage of Each Node vs. Segments; and (b) The Average Coverage of Each Node vs. Communication Radius. From Figure 8b, we can see that the average coverage area of each node will increase with the growth of the communication radius. When the position of segments is fixed, the nodes deployed between the segments depend on the communication radius of nodes. The larger the communication radius is, the smaller the number of nodes will be, but the larger the communication radius is, the larger the coverage area will be, so is the average coverage of all the nodes.

6.2.4. Average Degree

From Figure 9a, we can see that the average degrees of both F2CRA and P3CR are lower than that of 2C-SpiderWeb algorithm because 2C-SpiderWeb algorithm has larger coverage overlap, and the nodes in the overlapping part have larger degree. Therefore, the average degree of this algorithm is greater than that of the other three algorithms. Moreover, the topology of Hamilton Path algorithm can be regarded as a ring, where the degree of the node is nearly 2. As some nodes overlap between them, the final average degree is slightly larger than 2. The average degrees of the two algorithms we proposed are between 2C-SpiderWeb algorithm’s and Hamilton Path algorithm’s, the reason of which can be seen clearly from the algorithm topology diagram. Compared with 2C-SpiderWeb algorithm, the two algorithms we proposed have a smaller overlapping coverage; while compared with Hamilton Path algorithm, they have a larger overlapping coverage. Hence, the final average degrees of the two algorithms we proposed are between 2C-SpiderWeb algorithm’s and Hamilton Path algorithm’s. Moreover, from Figure 9a, we can see that the average degree of P3CRA is slightly lower than that of F2CRA. The reason is that compared with F2CRA, the network topology formed by P3CRA has the smaller overlapping area; therefore, the average degree of P3CRA is slightly lower than that of F2CRA. The case in Figure 9b is similar with that in Figure 8a, but from Figure 9b, we can see that the average degree increases with the increase of the communication radius. When the deployment location of the node is determined, the larger the communication radius of the node is, the larger the overlapping area between the nodes will be. As a result, the average degree will be larger. (a) Average Degree vs. Segments; and (b) Average Degree vs. Communication Radius.

7. Conclusions

Due to the deployment environment, WSN is prone to large-scale failure; therefore, the effective algorithm is needed for timely recovery so that the network can run normally and stably. In this paper, we propose two fault restoration algorithms, respectively, solving the WSN fault restoration problem from different points. F2CRA is suitable when cost is considered first; and P3CRA is suitable when the performances of the network are considered first. Compared with other algorithms, these two algorithms ensure that the network has the stronger fault-tolerant function, larger coverage area and more balanced load after the restoration. In future work, we plan to consider other factors of deployment environment in our algorithms, such as obstacles and rough terrain, so that the proposed algorithms can be more in line with the actual situation.
  1 in total

1.  Development and integration of a solar powered unmanned aerial vehicle and a wireless sensor network to monitor greenhouse gases.

Authors:  Alexander Malaver; Nunzio Motta; Peter Corke; Felipe Gonzalez
Journal:  Sensors (Basel)       Date:  2015-02-11       Impact factor: 3.576

  1 in total
  3 in total

1.  An Autonomous Connectivity Restoration Algorithm Based on Finite State Machine for Wireless Sensor-Actor Networks.

Authors:  Ying Zhang; Jun Wang; Guan Hao
Journal:  Sensors (Basel)       Date:  2018-01-08       Impact factor: 3.576

2.  Connectivity Restoration in Wireless Sensor Networks via Space Network Coding.

Authors:  Alfred Uwitonze; Jiaqing Huang; Yuanqing Ye; Wenqing Cheng
Journal:  Sensors (Basel)       Date:  2017-04-20       Impact factor: 3.576

3.  Design of Event-Triggered Fault-Tolerant Control for Stochastic Systems with Time-Delays.

Authors:  Yi Gao; YunJi Li; Li Peng; Junyu Liu
Journal:  Sensors (Basel)       Date:  2018-06-13       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.