On The Planning of Wireless Sensor Networks Energy Efficient Clustering
On The Planning of Wireless Sensor Networks Energy Efficient Clustering
1 INTRODUCTION
W
IRELESS sensor networks (WSNs) consist of a large
number of limited capability (power and processing)
MicroElectroMechanical Systems (MEMS) capable of mea-
suring and reporting physical variables related to their
environment. In surveillance applications, sensors are
deployed in a certain field to detect and report events like
presence, movement, or intrusion in the monitored area [1].
As depicted in Fig. 1, data collected by sensors are
transmitted to a special node equipped with higher energy
and processing capabilities called processing node (PN)
or sink [1]. The PN collects, filters, and compiles data sent
by sensors in order to extract useful information. Due to
their energy constraints, wireless sensors usually have a
limited transmission range, making multihop data routing
toward the PN more energy efficient than direct transmis-
sion (one hop). Energy conservation in WSN is critical and
has been addressed by substantial research [2], [3].
Generally, energy conservation is dealt with on five
different levels [1], [2]:
1. efficient scheduling of sensor states to alternate
between sleep and active modes;
2. energy-efficient routing, clustering, and data aggre-
gation;
3. efficient control of transmission power to ensure an
optimal trade-off between energy consumption and
connectivity;
4. data compression (source coding) to reduce the
amount of uselessly transmitted data;
5. efficient channel access and packet retransmission
protocols on the Data Link Layer.
The scope of this paper includes both the first and the
second levels. We address the global problem of maximiz-
ing network lifetime under the joint clustering, routing, and
coverage constraint. We consider a sensor network that is
deployed in a certain area to monitor some given events.
When the network is dense, sensing ranges of neighbor
sensors usually overlap. This means that when an event
occurs at a point 1 of , it will be detected and reported by
all the sensors whose sensing range encompasses 1. This
redundant transmission results in useless energy consump-
tion. To save network energy and increase its lifetime, we
propose to switch on only a subset of sensors that covers
while all other sensors are turned off. Fig. 2 depicts an
example of full-covering sensor set. On the other hand,
clustering has been proven energy efficient in WSN [4], [5],
[6]. In cluster-based WSN, sensors are organized in clusters
each having one sensor promoted as CH. All non-CH nodes
transmit their data to their CH, which routes it to the remote
PN. Clustering can provide for substantial energy saving
[4], [5], [6], [7] since only CH sensors are involved in routing
and relaying data. Moreover, clustering alleviates band-
width, enables its reuse, and can, thus, increase system
capacity [8]. Besides, the fact that only the CH is transmit-
ting information out of the cluster helps avoid collisions
between the sensors inside the cluster and helps avoid the
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 8, AUGUST 2009 1077
. The authors are with the Department of Computer Engineering, Ecole
Polytechnique of Montreal, C.P. 6079, Succursale Centre-Ville, Montreal,
QC H3C 3A7, Canada. E-mail: {ali.chamam, samuel.pierre}@polymtl.ca.
Manuscript received 26 June 2008; revised 20 Nov. 2008; accepted 9 Dec.
2008; published online 6 Jan. 2009.
For information on obtaining reprints of this article, please send e-mail to:
[email protected], and reference IEEECS Log Number TMC-2008-06-0251.
Digital Object Identifier no. 10.1109/TMC.2009.16.
1536-1233/09/$25.00 2009 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
uncovered hole problem [9]. However, since CHs consume
more energy in aggregating and routing data, it is
important to have an energy-efficient mechanism for CHs
election and rotation [8], [10]. In flat networks, sensors route
data to the PN through their peer sensors using one of the
many routing protocols proposed in the literature [4]. In
contrast, in clustered networks, CHs transmit aggregated
data to the PN, either directly (one hop) [10] or in multihop
[11]. For the sake of minimizing energy consumption,
both optimal number and optimal placement of CHs have
to be sought.
In a cluster-based monitoring sensor network, any
energy-efficient sensor scheduling mechanism has to
guarantee a certain area coverage rate. Besides, the
connectivity of every sensor to a CH has to be ensured at
any time. Furthermore, for data to be routed from any CH
to the PN, all CHs have to belong to a single connected
graph. Hence, for sensors states allocation to be optimal,
coverage, connectivity of sensors to CHs, and routing have
to be taken into account within the same global planning
process. When coverage and connectivity are dealt with
separately, the obtained configuration may not be optimal.
For example, an optimal covering subset of sensors can fail
to guarantee network connectivity because some nodes are
switched off or the optimally designated CHs may belong
to the set of switched-off sensors.
Many papers addressed separately energy-efficient rout-
ing [4], clustering [5], [6], and area coverage [2], [12], [13],
[14]. Many other works [15], [16] addressed the integrated
problem of maintaining area coverage and network con-
nectivity but only on flat networks and did not take
advantage of the potential energy saving and ease of
manageability of cluster-based networks [1], [6], [7]. To the
best of our knowledge, the problem of maximizing sensor
network lifetime under the integrated constraint of cluster-
ing, coverage, and routing has not been addressed within
the same global optimization process. In this paper, we
address the optimal planning of cluster-based WSN under
the joint routing and coverage constraint. In our architec-
ture, any sensor can be active, switched off, or upraised as
CH, and only CHs can route data. We seek an optimal
allocation of states to sensors, which maximizes network
lifetime, while ensuring simultaneously full area coverage,
connectivity of every sensor to a CH, and connectivity of the
overlay network composed of CHs.
This paper is organized as follows: In the next section,
we present some related work. In Section 3, we outline our
problem and enumerate our assumptions. In Section 4, we
mathematically formulate our problem as an Integer Linear
Programming (ILP) model. In Section 5, we present our
resolution method based on a Tabu search algorithm. In
Section 6, we discuss our simulation results. Finally,
Section 7 concludes this paper and points out some
future directions.
2 RELATED WORK
The problemof maintaining both area coverage and network
connectivity under energy constraint in WSN has been
extensively addressed in the literature and many protocols
were proposed to alternate sensor states between active and
sleep in order to maximize network lifetime. For example,
Xing et al. [15] provide a geometric analysis of the relation-
ship between coverage and connectivity, and propose the
Coverage Configuration Protocol (CCP) that dynamically
configures the network to guarantee different degrees of
coverage depending on the application requirements. In
CCP, every node decides its state (Active or Sleep) based on
the coverage degree of the intersection points of its sensing
circle with those of its neighbors. When coupled with any
connectivity maintenance protocol, CCP offers connectivity
and 1-coverage. Lu et al. [17] present Scalable Coverage
Maintenance (SCOM), a localized coverage maintenance
algorithmwhere sensors use the same redundancy eligibility
rule as in [15] to decide whether to turn on or turn off. SCOM
implements, for each sensor, a back-off timer proportional to
its residual energy. The back-off timer allows sensors with
lower residual energies to decide about their states before
sensors with more energy, making them more likely to turn
off than the other sensors, if they find themselves redundant.
Chamam and Pierre [18] propose a centralized heuristic
which dynamically calculates a near-optimal subset of
sensors that guarantees a predefined coverage rate while
ensuring network connectivity when the transmission range
is greater than or equal to twice the sensing range. Yan et al.
[16] propose to schedule sensors activities (Active/Sleep) so
that every point in a grid-monitored area is covered at any
time. Neighbor sensors exchange a random reference time
T
ic)
within cyclic rounds of constant duration T and decide
to be active for a certain time duration within T. The round
period T is equally shared among all the neighbor sensors
that cover a common grid. Even though the proposed
schedule balances consumed energy over neighbor nodes, it
does not take into account the residual energy of sensors
1078 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 8, AUGUST 2009
Fig. 1. Multihop routing of collected data.
Fig. 2. A full-covering sensor set.
when calculating the activation time period of every node,
which makes nodes with less residual energy more prone to
expiration. However, all the works cited above do not
address cluster-based architectures. Cluster formation is
typically based on the energy reserve of sensors and sensors
proximity to the cluster head [5], [6]. Energy-efficient
cluster-based routing algorithms for WSN have been widely
addressed in literature [4]. For instance, Low-Energy
Adaptive Clustering Hierarchy (LEACH) [10], one of the
most popular hierarchical routing algorithms for WSN,
proposes to form clusters of sensor nodes based on the
received signal strength and use local cluster heads as
routers to the sink. This saves energy since the transmissions
will only be operated by cluster heads rather than all sensor
nodes. Even though LEACH is completely distributed, it
uses single-hop communication between cluster heads and
the sink, which is energy consuming and not applicable to
networks deployed in large regions. Power-Efficient GAth-
ering in Sensor Information Systems (PEGASIS) [19] and its
variant Hierarchical-PEGASIS are two improvements of
LEACH. Rather than forming multiple clusters, PEGASIS
forms chains of sensor nodes so that each node transmits to
and receives from a neighbor and only one node is selected
from that chain to transmit to the PN. But still, communica-
tion between the elected CH and the PN is made in one hop,
which is not suitable for large networks. Energy-efficient
sensor state scheduling mechanisms in cluster-based WSN
also raised much interest in the research community. For
example, Yao and Giannakis [8] proposed a scheduling
algorithm for the one-level-clustered WSN, where sensors
have different data sequence lengths to transmit within a
period of time T. The authors propose an Inverse-Log
algorithm that finds, for every sensor, a set of optimal
time allocations that minimizes the dissipated energy of the
whole network over the period T. However, all sensors
are activated during the time period T and no coverage
constraint is considered. Besides temporal scheduling, other
publications propose a spatial scheduling scheme based on
the selective activation of sensors to maximize network
lifetime [2], [20], [21]. Tian and Georganas [21] propose a
localized algorithm that finds an optimal subset of sensors
ensuring full area coverage or, if not possible, the least
uncovered points. If the whole range covered by a sensor is
covered by a subset of its neighbors, then the sensor decides
to turn off. A random back-off time ensures that two nodes
do not make the decision to turn off at the same time. When
implemented over LEACH [10], the protocol proposed in
[21] shows some energy saving. However, this protocol is
not optimal because of the uncontrolled coverage redun-
dancy due to the random aspect of switch on/off of sensors.
In [20], sensors sensing ranges follow a certain distribution
derived from the channel characteristics and the log-normal
path loss. An event occurring outside a certain range is still
detected with a corresponding probability. The cumulative
detection probabilities are shown to increase the mean area
coverage which obviously decreases the number of sensors
activated within the covering subset, thus reducing the
consumed energy. However, the proposed algorithm is not
optimal because it only takes into account each sensors
range and not its residual energy making nodes with very
little residual energies prone to expiration. Hwang et al. [9]
propose a cluster-based coverage-preserved node schedul-
ing scheme. This mechanism assumes a dense network and
assigns states (Active, Sleep, Cluster head) to sensors in a
distributed and self-organized manner. The algorithm starts
by dividing sensors into clusters and defines, for each
cluster, a number of sponsor sensor sets that may be turned
on simultaneously. Only one among the computed sponsor
sets is elected to be turned on until it completely runs out of
energy. Even though Hwang et al. [9] provide an efficient
coverage and clustering mechanism, they assume that
sensed data are routed to the sink in one hop, which may
be energy intensive for the relay nodes.
3 PROBLEM STATEMENT AND ASSUMPTIONS
In this paper, we consider a WSN deployed in an area to
monitor certain critical activities or events. As shown in [3],
for the case of Rockwells WINS seismic sensors, a sensors
radio can be in one of the following four activity modes,
characterized by their respective power consumptions:
Transmit (0.38-0.7 W), Receive (0.36 W), Idle (0.34 W), and
Sleep (0.03 W). We note that when sensors are transmitting,
receiving, or idle, they have roughly the same energy
consumption and can then be associated to a same state,
Active, in which the sensors radio is switched on.
Moreover, in this paper, we consider a cluster-based
topology in which CHs route the data they receive from the
non-CH sensors of their cluster to the PN through an
overlay network solely composed of CHs. CH election and
cluster formation are very important issues that deeply
affect network lifetime of WSN and different approaches
exist to implement these stages. For example, it is possible
to use a fixed distribution of the sensor nodes and CHs, or
use a dynamic algorithm for CH election. If CHs were
chosen a priori and fixed throughout the system lifetime,
they would quickly exhaust all their energy making them
no longer operational. In this work, we propose to
dynamically designate the set of CHs according to their
residual energies, their distance to their neighboring non-
CH active nodes, and their position within the graph
formed by CHs. As depicted in Fig. 3, we will consider,
without loss of generality, that each sensor can be in one of
the three states: Sleep, Active, and Cluster Head (CH) having,
respectively, power consumptions 1
o|ccj
, 1
cti.c
, and 1
CH
per time unit, where 1
o|ccj
( 1
cti.c
< 1
CH
.
To control energy dissipation of the sensors that perform
data relaying, we restrict the routing task to CHs. For this,
there must exist a route from any CH to the PN. The most
straightforward solution for that is to have a connected
graph linking all the CHs. In our problem modeling, we
propose that any admissible configuration must exhibit a
spanning tree connecting all CHs, as shown in Fig. 4. This
CHAMAM AND PIERRE: ON THE PLANNING OF WIRELESS SENSOR NETWORKS: ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT... 1079
Fig. 3. Sensor states.
makes the overlay network formed by the CHs sufficient to
route data from any sensor toward the PN. The spanning
tree construction is explained in the next section.
On the other hand, we assume that all sensors have the
same sensing range 1
:
and that their detection model
follows a binary probability function, also called Disk model
[2], [15], in which an cti.c sensor i detects any event that
occurs within its sensing range 1
:
with the same probability
1
d
1, whatever the distance from the event is. And any
event occurring outside 1
:
is not detected by i. Let us note
that this binary probability sensing model is a simplified
representation of a sensors detection probability and it
does not necessarily reflect the received signal loss model
on a real wireless channel. In fact, on a real wireless
channel, because of signal fading and interference, events
occurring far away from a sensor are less likely to be
detected than events occurring close to it. In other words, an
event occurring outside a sensors range is still detected
with a certain probability which decreases when the
distance to the sensor increases. Many papers in the
literature addressed probabilistic coverage in wireless
sensor networks [20], [22] and proposed coverage protocols
based on this model. However, to simplify the representa-
tion of the sensing model, substantial work in the literature
[2], [15], [23] make the assumption of disk model. In this
paper, we also make this simplifying assumption but we
will show later that our optimization model and our
proposed heuristic can be easily adapted to handle
probabilistic coverage.
Definition 1. A set of sensors o
c
is a covering set of area if and
only if 8 point 1 2 . 9 i 2 o
c
such as i covers 1.
In critical surveillance applications, it is important to
guarantee that the monitored area is fully covered by
sensors at every instant of the network lifetime. Hence, in
our problem, the optimal network configuration must
. contain a full-covering set of active sensors;
. contain a set of CHs so that every sensor is
connected to a CH;
. ensure that all CHs belong to a spanning tree over
which data will be routed toward the PN.
Our objective is to find the network-lifetime-optimal
allocation of sensors states (Active, Sleep, CH) that meets
these three conditions. Before modeling our problem, we
make the following assumptions:
1. Each sensor has a unique ID, known to the PN and
to the sensor itself.
2. The position of each sensor is fixed and known to the
PN. The location information can be obtained either
through a Global Positioning System (GPS), as
assumed in [2] (but this technique is still expensive
due to the high cost of placing a GPS on each sensor),
or using one of the many GPS-free localization
techniques proposed in the literature [24], [25], [26].
However, in this paper, we do not specifically
address any localization technique and assume that,
whatever the localization technique used, sensors
location information is available at the PN.
3. Active sensors capture events occurring in their
sensing range and transmit data associated with
these events straightaway, without any buffering,
because sensors are usually not equipped with large
(and costly) buffers.
4. All sensors have the same sensing range 1
:
and the
same transmission range 1
t
. All CHs have the
same transmission range 1
CH
t
1
t
.
5. Only the CHs can perform data routing. Routing
over the overlay network composed of CHs can be
performed using one of the energy-efficient routing
protocols for WSN proposed in the literature [4].
However, we do not address any specific routing
protocol, we only guarantee the existence of a
routing topology.
6. Each sensor has an initial energy 1
0
. The PN has no
energy limitation. Besides, we assume that, when a
sensor is cti.c, it has a constant energy dissipation
during a unit of time, no matter how the events
distribution is.
7. The network is dense enough so that when all the
sensors are Active, the monitored area is fully
covered. Besides, we assume that the graph repre-
senting the sensor network is connected (two sensors
being connected when they are within the transmis-
sion range of each other).
8. Network lifetime is defined as the time separating
the instant the network starts operating and the
instant at which the network cannot be covered
anymore because of the expiration of some nodes.
9. We assume ideal MAC layer conditions, i.e., perfect
transmission of data on a node-to-node wireless link.
10. We assume that sensors have ideal sensing capabil-
ities, i.e., inside the sensing range, the quality of
sensing does not depend on the distance from
the sensor.
4 PROBLEM MODELING
Our problem consists in finding the optimal allocation of
states to sensors, which maximizes network lifetime under
the integrated constraint of coverage, clustering, and
routing. We call this problem OPT-ALL-RCC. To maximize
network lifetime, we need a trade-off between total energy
consumption and energy balancing among sensors. For
example, to ensure area coverage, we would prefer to
activate more sensors having higher residual energy (and
consuming a higher total energy) than few sensors having
little residual energy (consuming less total energy but more
prone to expiration). On the other hand, any admissible
1080 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 8, AUGUST 2009
Fig. 4. Overlay network composed of the selected cluster heads.
solution of our model has to ensure full coverage of the
monitored area and the existence of a spanning tree
connecting all CHs. To model this problem, we first define
the following sets and constants:
. Let o f1..`g be the set of sensors.
. Let C f1..`g be the set of cells composing the
monitored area.
. Let 8 i 1..joj. 8 , 1..joj. 8 c 1..jCj,
d
i,
1 if sensor i can reach sensor , in one hop
0 else.
1
i,
1 if CH i can reach CH , in one hop
0 else.
,
ic
1 if sensor i covers cell c
0 else.
Y
i
1 if sensor i is a CH
0 else.
7
i,
1 if sensor i is connected to CH ,
0 else.
\
i,
1 if CH i is connected to CH , within
a spanning tree
0 else.
8
>
<
>
:
To balance energy consumption among nodes, we
choose to minimize an objective function that is a linear
combination of sensors scores. The score of a sensor i is
defined by
ocoici 1oq 1
1d
i
1i
i
.
where
1d
i
1
cti.c
if sensor i is cti.c but not CH
1
CH
if sensor i is CH
1
o|ccj
% 0 else.
8
<
:
As shown in Fig. 5, the logarithmic nature of this
score function will tend to accentuate the importance of the
residual energy when the latter is small and will give more
importance to the dissipated energy when the residual
energy is high enough. In other words, when the residual
energy is low, sensors will be selected essentially according
to their residual energies, favoring the activation of sensors
having relatively high residual energy and when the
residual energy is relatively high, the optimal solution will
tend to activate as less sensors as possible. Thus, we can
model our problem by the following optimization system:
Minimize:
X
joj
i1
Y
i
.1oq 1
1
CH
1i
i
A
i
Y
i
.1oq 1
1
cti.c
1i
i
. 1a
Subject to:
8 c 1..jCj.
X
joj
i1
A
i
.,
ic
! 1. 1b
8 i 1..joj. Y
i
A
i
. 1c
X
joj
i1
Y
i
.d
i0
! 1. 1d
8 i 1..joj. 8 , 1..joj. , 6 i. 7
i,
A
i
Y
i
. 1e
8 i 1..joj. 8 , 1..joj. , 6 i. 7
i,
Y
,
. 1f
8 i 1..joj. 8 , 1..joj. , 6 i. 7
i,
d
i,
. 1g
8 i 1..joj.
X
joj
,1
,6i
7
i,
Y
i
A
i
. 1h
8 , 1..joj.
X
joj
i1
,6i
7
i,
`
ior
. 1i
8 i 1..joj. 8 , 1..joj. , 6 i. \
i,
Y
i
. 1j
8 i 1..joj. 8 , 1..joj. , 6 i. \
i,
Y
,
. 1k
8 i 1..joj. 8 , 1..joj. , 6 i. \
i,
1
i,
. 1l
8 H o. 8 : 2 H.
X
,2H
X
/2H
/,
\
,/
X
i2H
Y
i
!
Y
:
. 1m
X
,2joj
X
/2o
/,
\
,/
X
,2o
Y
,
1. 1n
X. Y 2 f0. 1g
joj
. Z. W2 f0. 1g
joj
2
. 1o
The expression of the objective function (1a) aims at
balancing the energy consumption over the network. Equa-
tions (1b)-(1o) are the model constraints. Constraint (1b)
CHAMAM AND PIERRE: ON THE PLANNING OF WIRELESS SENSOR NETWORKS: ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT... 1081
Fig. 5. Shape of the score function.
guarantees a full coverage of the monitored area such that
every elementary cell is covered by at least one Active sensor.
Let us note here that this coverage constraint is valid under
the assumption of binary probability (disk) sensing model,
where every cell is either covered by a sensor (if it is located
inside its sensing range) or not covered at all (if it is outside
that sensing range). With probabilistic coverage, the cover-
age constraint must ensure that every cell is covered up to a
certain predefined coverage rate. Hence, the constraint (1b)
should be replaced with
8 c 1..jCj. 1io/ c i: co.cicd ! co. iotc. 2
where co. iotc is a predefined threshold coverage rate. Let
1 f1
ic
g be a coverage probability matrix known a priori,
where 1
ic
probability that sensor i covers cell c. Then, (2)
is equivalent to
8 c 1..jCj. 1
Y
i1..joj
1 A
i
.1
ic
! co. iot. 3
Once linearized, the new coverage constraint (3) will
replace constraint (1b) in the above model to have it handle
probabilistic coverage.
The rest of our constraints are as follows: constraint (1b)
ensures that there exists at least a CH located one hop away
from the PN. Constraints (1e)-(1h) ensure that every Active
and non-CH sensor is connected to at least one CH within
its range. Constraint (1i) gives an upper bound on clusters
sizes. Equations (1j)-(1n) describe the routing constraint
ensuring that the overlay network composed of CHs is
connected, and hence, there exists a tree-like partial
subgraph. Equations (1o) are the integrality constraints.
To ensure that a spanning tree connecting all the CHs exists
in any solution, constraints (1m) and (1n) require the
enumeration of all the subsets of o. Even though these
constraints represent the theoretical conditions to have a
spanning tree in any graph (no cycles and a connected
graph), they quickly result in a combinatorial explosion of
the number of constraints due to the exponentially increas-
ing number of subsets of o. To circumvent this problem, we
will proceed differently: we represent the routing constraint
of our problem as a multiflow routing problem. We
consider that a virtual flow has to be routed from any CH
to, at least, one CH which is one hop from the sink. Indeed,
the optimal graph configuration that allows a flow to be
routed between any pair of nodes of a connected graph
where links have infinite capacity is the minimal-cost
spanning tree. To model this virtual flow routing problem,
we define a binary variable representing the use of the
wireless link |/ to convey a flow i. ,, where i. ,. /, and | are
CHs and i. , are, respectively, the source and destination of
the flow. Let
8 i. ,. /. | 2 f1..jojg. i 6 ,. / 6 |.
\
/|
i,
1 if flow i. , passes through the link /|
0 else.
4
The following constraints ensure that the network
contains a spanning tree connecting all CHs:
8 i 1..joj. 8 , 1..joj. , 6 i. 8 / 1..joj.
P
|2o
|6/
\
/|
i,
P
|2o
|6/
\
|/
i,
0. if / 6 i and / 6 ,.
Y
i
.Y
,
. if / i.
Y
i
.Y
,
. if / ,.
8
<
:
5a
8 i 1..joj. 8 , 1..joj. , 6 i. 8 / 1..joj.
8 | 1..joj. \
/|
i,
Y
i
.
5b
8 i 1..joj. 8 , 1..joj. , 6 i. 8 / 1..joj.
8 | 1..joj. / 6 |. \
/|
i,
Y
,
.
5c
8 i 1..joj. 8 , 1..joj. , 6 i. 8 / 1..joj.
8 | 1..joj. | 6 /. \
/|
i,
Y
/
.
5d
8 i 1..joj. 8 , 1..joj. , 6 i. 8 / 1..joj.
8 | 1..joj. | 6 /. \
/|
i,
Y
|
.
5e
8 i 1..joj. 8 , 1..joj. , 6 i. 8 / 1..joj.
8 | 1..joj. | 6 /. \
/|
i,
1
/|
.
5f
V 2 f0. 1g
joj
4
. Y 2 f0. 1g
joj
. 5g
Equation (5a) is the flow constraint ensuring that a feasible
path exists between any pair of CHs to convey an
elementary unit of flow. Remaining constraints (5b)-(5e)
limit the relevance of this virtual flow problem to the
overlay network. Constraint (5f) ensures that CHs / and |
are neighbors for a flow to pass on the link /|. Finally, (5g)
are the integrality constraints. In (5a), we have a nonlinear
term that we need to linearize. For this, we define
8 i 1..joj. 8 , 1..joj. l
i,
Y
i
.Y
,
. 6a
To have a logical equivalence between l
i,
and A
i
.Y
,
, we
add the following constraints:
8 i 1..joj. 8 , 1..joj. l
i,
Y
i
. 6b
8 i 1..joj. 8 , 1..joj. l
i,
Y
,
. 6c
8 i 1..joj. 8 , 1..joj. l
i,
! Y
i
Y
,
1. 6d
Taking into account the virtual-flow-related constraints
(5a)-(5f) and the linearized constraints (6a)-(6d), we end up
with a linearized model of OPT-ALL-RCC.
Proposition 1. OPT-ALL-RCC is NP-Complete.
Proof. To prove the NP-Completeness of OPT-ALL-RCC, we
will derive a polynomial reduction to the set covering
problem which is known to be NP-Complete [27]. For
this, we propose to define an instance 1 of the set
covering problem, build an instance 1 of OPT-ALL-RCC,
and then show that any algorithm that resolves 1 is able
to resolve 1.
Any instance 1 of the set covering problem is defined
by a set of nodes, a set of node subsets, and a cost for
each node subset. Let o f:
1
..:
`
g be a set of ` sensors
(nodes) and J fo
1
..o
`
g be a set of ` node subsets
1082 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 8, AUGUST 2009
(o
,
o. , 1..`) such that 8 , 1..`. o
,
is built from
the empty set as follows:
. The node :
,
is inserted into o
,
.
. All nodes :
i
2 o f:
,
g that are one-hop neigh-
bors of :
,
(i.e., d
:,:i
1) are added to o
,
.
For each , 1..`, we define the cost of subset o
,
by
c, 1oq1 1
CH
,1i
,
. The instance 1 being defined,
let us consider the instance 1 of OPT-ALL-RCC, with the
following input:
. `
ior
= Infinity.
. Each cell of the monitored area is covered by one
and only one sensor.
. The residual energy of nodes :
i
2 o is equal to
1
0
1
CH
1
cti.c
.
. The transmission power of a CH is such that any
potential CHs can reach each other, that is,
8 ,. i 2 f1..`g. , 6 i, if :
,
and :
i
are elected
CH, then 1
:,:i
1.
Since each sensor covers a single cell, any admissible
solution will have all its sensors turned on to satisfy the
full coverage constraint. We clearly see that any algo-
rithm that is able to resolve the above instance 1 of OPT-
ALL-RCC can resolve any instance 1 of the set covering
problem. Indeed, for every sensor :
/
1 / `, desig-
nated as cluster head in the solution of 1, o
/
is a member
of the minimum-cost covering set. Such a reduction
proves that OPT-ALL-RCC is NP-Complete. tu
5 PROPOSED HEURISTIC
As the considered problem is NP-Complete, we propose
a Tabu search heuristic, called TABU-RCC, to tackle
to exponentially increasing processing time of the
exact solution. TABU-RCC will be run by the PN to find a
near-optimal sensor state configuration. As shown in
Algorithm 1, TABU-RCC starts with an admissible solution
and iteratively performs movements that consist in chan-
ging the state of one sensor at a time. The best solution
found after the predefined number of iterations is trans-
posed on sensors to form the new network configuration.
The network will operate with this configuration for a
predefined period T during which residual energies of
active nodes and CHs will decrease, then TABU-RCC is run
again to find a new configuration based on the new values
of residual energies. This new configuration will be kept for
another period T and so forth. The periodic execution of
TABU-RCC by the PN requires sensors-related information
(e.g., residual energies) to be transmitted periodically to the
PN (upstream communication) and the newly computed
sensor states to be transmitted to the sensors (downstream
communication). In our architecture, sensor-related data
will be collected exactly in the same manner as the sensed
data, i.e., using the cluster-based hierarchical structure of
the network. Active sensors that have data to report will
send it to the PN via their respective CHs. They will append
the value of their respective residual energies to the data
packets they are sending. When they have no data to send,
they will synchronize their energy information with the PN
periodically. As for the turned-off sensors, their energy
consumption is constant and very low, and can therefore be
estimated by the PN whenever needed, as long as they are
idle. As far as state assignment to sensors is concerned, the
PN will broadcast a notification message holding associa-
tions between sensors and their newly computed states
(Sensor ID, Sensor State). Only those sensors whose state has
changed will have an entry in the notification message
while all other sensors will keep their ongoing state. The
notification message will be routed to the sensors via their
respective CHs.
Algorithm 1: TABU-RCC: Tabu search algorithm of CH
election under routing and coverage constraints
. Initial solution: the Tabu algorithm starts with a
configuration where all sensors are activated as cluster
heads. This configuration is obviously admissible;
. Admissible configuration: a configuration o is defined
by the states of its sensors (o|ccj, cti.c, or CH). Only
feasible configurations (i.e., satisfying model
constraints (1b) to (1i)) are considered;
. Score function: a configuration is evaluated using the
score function given by (1a);
. Neighborhood investigation: a search movement
` < i. n. . consists in changing the state (Sleep,
Active, or CH) of a single sensor i from state n to
state . such that the model constraints (1b) to (1i) are
satisfied;
. Aspiration criterion: Tabu movements are allowed
when the score of the resulting configuration is lower
than the score of the best solution :