Next Article in Journal
Support Vector Machine Optimized by Genetic Algorithm for Data Analysis of Near-Infrared Spectroscopy Sensors
Previous Article in Journal
Methodology for Simulating 5G and GNSS High-Accuracy Positioning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Practical Data-Gathering Algorithm for Lossy Wireless Sensor Networks Employing Distributed Data Storage and Compressive Sensing

National Digital Switching System Engineering and Technological R&D Center, Zhengzhou 450002, China
*
Author to whom correspondence should be addressed.
Submission received: 8 August 2018 / Revised: 18 September 2018 / Accepted: 20 September 2018 / Published: 24 September 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
Reliability and energy efficiency are two key considerations when designing a compressive sensing (CS)-based data-gathering scheme. Most researchers assume there is no packets loss, thus, they focus only on reducing the energy consumption in wireless sensor networks (WSNs) while setting reliability concerns aside. To balance the performance–energy trade-off in lossy WSNs, a distributed data storage (DDS) and gathering scheme based on CS (CS-DDSG) is introduced, which combines CS and DDS. CS-DDSG utilizes broadcast properties to resist the impact of packet loss rates. Neighboring nodes receive packets with process constraints imposed to decrease the volume of both transmissions and receptions. The mobile sink randomly queries nodes and constructs a measurement matrix based on received data with the purpose of avoiding measuring the lossy nodes. Additionally, we demonstrate how this measurement matrix satisfies the restricted isometry property. To analyze the efficiency of the proposed scheme, an expression that reflects the total number of transmissions and receptions is formulated via random geometric graph theory. Simulation results indicate that our scheme achieves high precision for unreliable links and reduces the number of transmissions, receptions and fusions. Thus, our proposed CS-DDSG approach effectively balances energy consumption and reconstruction accuracy.

1. Introduction

As the perceptual layer of the Internet of Things (IoT) [1,2], wireless sensor networks (WSNs) [3] are widely deployed for purposes such as environment monitoring [4], industry automation [5] and military reconnaissance [6]. WSNs consist of many sensors and play a key role in sensing and gathering data from the surrounding environment. Because of harsh environments and energy-limited nodes, there are two key considerations in WSNs design: reliability and energy efficiency. In addition, nodes that are closer to the sink require more forwarding tasks than others, resulting in higher energy consumption as well as a reduction in the lifetime of the entire network.
Compressive sensing (CS) theory [7,8] provides a new method for reducing communication energy consumption. CS points out that, for the compressible signals in WSNs, a small collection of linear projections is sufficient to achieve near-perfect reconstruction, which reduces energy consumption and prolongs network lifetime. Thus, a considerable amount of research has been conducted concerning ways to utilize CS to gather data in WSNs. The CS-based data-gathering schemes in [9,10,11] obtained the member node readings utilizing fixed routing, in which ordinary nodes forward compressed data to the static sink node through multi-hops. Lou et al. [9] and Lou et al. [10] combined CS and routing protocols to reduce the number of transmissions. In [11,12,13,14,15], the use of sparse measurement matrix is investigated to reduce the number of nodes involved in data gathering. Introducing CS effectively reduces the energy required for communication and distributes energy consumption loads more evenly. However, if a parent node (which holds a combination of child node readings) loses its packet, then all the information from the child nodes is also lost. Hence, unreliable links have a serious impact on data gathering and make it difficult to reliable gather data reliably through a centralized sink node. Additionally, Kong et al. [16] reported that unreliable links are widespread in WSNs, where the average packet loss rate is 40–50%. Thus, assuming completely reliable links is unfeasible and oversimplifies the problem.
To resolve this problem, distributed data storage (DDS) [17,18,19] is proposed to enable reliable data gathering by employing redundancy. In contrast to a centralized sink, a mobile sink collects data from a small subset of the total nodes to recover all the data. It is worth mentioning that DDS effectively reduces the impact of packet loss on data gathering because there is no static routing, although few researchers have focused on this advantage. However, DDS requires a large number of transmission tasks to ensure sufficient redundancy, which is potentially catastrophic for nodes with energy limitations. Thus, it is imperative to investigate effective ways to apply DDS for data gathering with the dual purposes of resisting packet loss and reducing the number of transmissions.
To address this problem, many studies have been carried out on this topic. In [20,21,22], CS is combined with DDS to exploit the advantages of both technologies. The goal of Talari et al. [20] was to reduce the number of transmissions by exploiting the spatial correlations of nodes based on CS with the broadcast properties of wireless channels. In this scheme, the nodes store received data and broadcast the data with a given probability. The performance of data reconstruction was further improved in [21]. Yang et al. [21] found that the number of receptions was higher than the number of transmissions. Hence, Yang et al. [21] focused on reducing the total number of both transmissions and receptions simultaneously. In [22], both the spatial and temporal correlations of nodes are exploited to reduce the number of transmissions. All the above studies take advantage of broadcast routing and consider how to reduce the transmission energy cost. However, compared with fixed routing, such as tree routing and cluster routing, broadcasting data consumes more reception energy because neighboring nodes receive broadcast data whether they need it or not. For example, in [20,21,22], the neighboring nodes first receive the broadcasting data and then determine whether to merge the data based on certain conditions. Consequently, broadcasting data consumes large amount of reception energy, although the received data are rarely merged. Furthermore, none of these studies consider the problem of packet loss; instead, they make the unrealistic assumption that the wireless links are completely reliable.
Tackling the abovementioned consideration, two challenges must be resolved. The first involves how to effectively reduce the quantity of data disseminated (transmissions and receptions), especially the number of receptions rather than the number of fusions. The second problem is related to reducing the impact of lossy links (namely, the packet loss rate) on data reconstruction. To solve these two challenges, a distributed data storage and gathering algorithm based on compressive sensing (CS-DDSG) is proposed utilizing CS and DDS. Relying on collected data, the mobile sink generates a sparse measurement matrix aimed at reducing communication energy consumption. Furthermore, it is proven that the measurement matrix satisfies the restricted isometry property (RIP) [23]. Based on random geometric graph theory, an expression of the total number of transmissions and receptions is formulated to analyze the energy consumption of CS-DDSG.
The reminder of this paper is organized as follows. In Section 2, we commence by reviewing the CS theory and introduce the network model. In Section 3, we present the proposed CS-DDSG algorithm, describe the formulation of the measurement matrix and provide a proof that this matrix can satisfy RIP. Based on the proposed scheme, we formulate the expression of the total number of transmissions and receptions in Section 4. We present our simulations and their results and investigate the performance of CS-DDSC in Section 5. Finally, concluding remarks are provided in Section 6.

2. Preliminaries and Network Model

In this section, we introduce CS theory and then describe the network model and our motivation.

2.1. Compressed Sensing

In WSNs, assume that N sensor readings are denoted by X = ( x 1 , , x N ) T , where x i , i [ 1 , N ] denotes the reading of node i with K -sparse representation at a basis Ψ N × N :
X = Ψ θ ,  
where θ N is a coefficient vector corresponding to the sparse basis Ψ . X is K -sparse and compressive if the vector θ has at most K ( K N ) nonzero coefficients or ( N K ) smallest coefficients can be ignored.
We assume the measurement matrix is Φ M × N and is uncorrelated with the basis Ψ , then the CS measurements of X can be expressed as follows:
Y = Φ X = Φ Ψ θ = Θ θ ,  
where M N and Θ = Φ Ψ is a sensing matrix. The original signal X can be reconstructed with an overwhelming probability from M measurements by l 1 -norm minimization as follows:
min : X ^ = min X 1    s . t . : Y = Φ X ,
where X ^ denotes the reconstructed sparse signal of X .
To reconstruct X , two factors must be considered: (1) X is compressive at Ψ ; and (2) Φ must satisfy the RIP with M c k lg ( N / k ) . Therefore, K -sparse X satisfies the following condition:
( 1 ε ) θ 2 2 Φ θ 2 2 ( 1 + ε ) θ 2 2 ,  
where c , ε ( 0 , 1 ) , while Φ satisfies RIP with the parameter ε .

2.2. Network Model

We consider a single-sink WSN consisting of N battery-powered sensors. The sensors are deployed in a square area with a boundary length of 1. We assume all nodes have an identical transmission radius of r t , and that any two nodes can communicate with each other if their Euclidian distance d satisfies d r t . To guarantee the network connectivity, r t should also satisfy the following condition [24]:
r t 2 > S In ( N ) / ( π N ) ,  
where S denotes the deployment area and S = 1 × 1 . Let X N × 1 = ( x 1 , , x N ) T denotes the N node readings. Since the readings are spatiotemporally correlative with each other, X can be compressed on an orthogonal basis Ψ = ( ϕ i , j ) N × N . The fast Fourier transform (FFT) orthonormal basis is adopted as the sparse representation basis in this paper. Let Φ = ( φ i , j ) M × N denote the measurement matrix. The measurement vector Y M × 1 can be computed with Equation (2). Furthermore, we introduce the expression of Φ in Section 3. Thus, the CS-DDSG network model coincides with the CS model.
In addition, we define the normalized mean absolute error (NMAE) metric to evaluate the accuracy of reconstruction accuracy:
NMAE = X ^ X 2 X 2 = n = 1 N ( x ^ n x n ) 2 n = 1 N x n 2 ,  
Equation (6) shows that the smaller the NMAE is, the better performance the algorithm can achieve.

2.3. Motivation

In this subsection, we investigate the impact of packet loss on the CS recovery performance relying on the fixed routing. Figure 1 presents the performance of the CDG [9] algorithm with cluster topology in unreliable links. In this scheme, there are 100 nodes and the member nodes forward the packets to the cluster head via a one-hop route. When the packet loss rate is 10%, the recovery accuracy is worse than the accuracy in the ideal link. Furthermore, increasing the measurements cannot improve the algorithm’s performance. For M = 50 measurements, Figure 2 indicates that the accuracy declines with the increase of packet loss rate.
We consider one of the clusters containing N 1 nodes. For the CDG algorithm with fixed routing, the cluster head receives the data vector X N 1 × 1 = ( x 1 , , x i , , x N 1 ) T in reliable links. The measurements Y can be represented as
Y = ( y 1 y 2 y M ) = ( ϕ 11 ϕ 1 N 1 ϕ M 1 ϕ M N 1 ) ( x 1 x i x N 1 ) .  
If the packet of node i is missing due to unreliable links, then its cluster head will receive X N 1 × 1 = ( x 1 , , x i , , x N 1 ) T and the measurement Y can be represented as
Y = ( y 1 y 2 y M ) = ( ϕ 11 ϕ 1 N 1 ϕ M 1 ϕ M N 1 ) ( x 1 x i x N 1 ) .  
According to Equations (7) and (8), one missing packet affects every element y i of the measurement vector. Thus, the sink recovers all the data X using Y and Φ , which leads to an imprecise or invalid reconstruction. Furthermore, the accuracy is even worse under tree-based routing. This deficiency occurs because if one packet of a parent node is missing, then all the information from its child nodes is lost too. Additionally, simply increasing the number of measurements or the number of retransmissions does not help much in improving the recovery accuracy. Therefore, the CS-based algorithm is sensitive to packet loss. In the next section, we investigate how to resist unreliable links, while using fewer transmissions and receptions by utilizing broadcasting properties.

3. Proposed CS-DDSG Scheme

3.1. Procedures of CS-DDSG

Based on the network model, we propose CS-DDSG to avoid packet loss and reduce the total number of transmissions and receptions, as presented in Figure 3. The procedures involved in CS-DDSG are detailed below.
Stage 1. Initialization. The proposed scheme requires precise time to help nodes to cooperate with each other. Assuming the network is synchronized and slotted based on Reference Broadcast Synchronization (RBS) [25], which can achieve the goal of high accuracy and energy-efficiency. At the beginning of data gathering, each node senses a data x i and generates a coefficient φ i = 1 . Then, each node i forms an initial packet, denoted by S ( i ) which defines has two components:
S ( i ) = { S ( i ) . id = [ i ] S ( i ) . data = x i .  
The component S ( i ) . id stores the node ID of nodes and S ( i ) . data stores the readings.
Stage 2. Broadcasting. After a fixed and long enough period of time for synchronization and initialization, N s , ( N s < N ) nodes are randomly selected as source nodes with a probability p 1 in this stage. The source nodes broadcast their own packets and do not receive any packets. If an ordinary node m ( m [ 1 , N ] ) is located with the communication range of the source node n ( n [ 1 , N ] ) and has not received a packet before, then node m receives the data broadcasted by node n and updates its packet as follows:
S ( m ) = { S ( m ) . id = [ m , n ] S ( m ) . data = x m + x n .  
If node m has already received any other broadcast data, then this node stops receiving data; in other words, each node receives only one broadcast packet.
Stage 3. Forwarding. In the following, only the receiving nodes from Stage 2 continue to broadcast their updated packets to neighboring nodes with the probability p 2 . Similarly, the neighboring nodes around the forwarding nodes will receive a packet only if they have not received any prior packets. These new receiving nodes broadcast their updated packets as described above. Actually, the Stage 2 and Stage 3 could start simultaneously. Nodes get the packets of source nodes in Stage 2 and then decide whether to broadcast immediately. Thus, the neighboring nodes of those forwarding nodes could update their packets relying on the packets of source nodes or forwarding nodes. Finally, the forwarding operation will stop until there are no new reception nodes. Because of the reception condition and the small probability p 2 , in practice, the forwarding process stops after repeating only a few times, which is analyzed in Section 5 in detail.
Stage 4. Visiting. The mobile sink starts the visiting phase after a fixed and sufficiently long period, which can be preset according to the number of nodes N . M nodes are randomly queried by the mobile sink to extract the corresponding information, i.e., the measurement vector Y and the measurement matrix Φ . Finally, the entire network’s readings X can be reconstructed from Y and Φ based on Equation (3). The entire pseudocode of CS-DDSG is presented in Algorithms 1 and 2.
Algorithm 1 The CS-DDSG algorithm
Input:
 The probability of selecting source nodes: P1;
 The probability of forwarding: P2;
 The number of measurements: M;
Output:
 Measurement vector: y;
 Measurement matrix: Φ;
Stage 1:
1: for i = 1:N
2: S(i).id = [i];
3: S(i).data = xi;
4: end for
Stage 2:
5: Nodes select themselves with the probability p1 and broadcast their packets;
6: N2 = 0;
7: for i = 1:N·p1
8: for j = 1:N
9: if node i receives the broadcasting data from node j
10: S(j).id = [j,i];
11: S(j).data = xj + xi;
12: N2 = N2 + 1;
13: end if
14: end for
15: end for
Stage 3:
16: The receiving nodes in Stage 2 forward their update packets with probability p2.
17: N3 = N2p2;
18: for loop = 1:max
19: if N3 ≤ 1
20: break
21: end if
22: if node j forwards its packets
23: for i = 1: N
24: if node i has not received a packet and hears node j
25: S(i).id = [i,j];
26: S(i).data = xi + xj;
27: N3 = N3 + 1;
28: end if
29: end for
30: end if
31: The reception nodes in the stage 3 forwarding their packets with probability p2.
32: end for
Stage 4:
33: The mobile sink queries M nodes to generate Φ and Y .
34: Φ = zeros (M, N)
35: if node ik are queried
36: Ωk = S(ik).id;
37: Φ(k, Ωk) = 1;
38: end if
39: Return Φ and Y.
Algorithm 2 CS Reconstruction
Input:
 Measurement vector: y;
 Measurement matrix: Φ;
Output:
 Reconstructed vector: X ^
1: Sink creates Y and BDM Φ based on yi and Φi;
2: θ ^ = arg min ||θ||1 s.t. Y = ΦΨθ;
3: X ^ = Ψ θ ^

3.2. Selection of Parameters

In this subsection, we investigate the values of the parameters r t and p 2 . We consider a network with N = 400 nodes, which are randomly deployed over an area of size S = 1 × 1 in this paper. As described in Section 2, to ensure the network connectivity, r t must satisfy the condition in Equation (5). Thus, r t > 0.069 ; we set r t = 0.075 .
In Stage 3 of CS-DDSG, nodes forward their updated packets with a probability p 2 and all neighboring nodes can receive this data. For the sake of an appropriate p 2 that reduces the number of transmissions N t and increases the proportion of reception nodes P r simultaneously, we simulate N r and P r versus p 2 by setting p 1 = 0.2 and r t = 0.075 as shown Figure 4, where all normal nodes stop receiving any data after merging one packet. As Figure 4 shows, as p 2 increases, the values of N t and P r both increase. Furthermore, P r increases almost linearly with p 2 . Thus, when p 2 = 0.32 , 98% nodes receive a broadcast packet. Moreover, as p 2 increase beyond 0.32, N r increases less, while P r increases sharply. Therefore, the appropriate value for p 2 is 0.32, because that value provides a balanced trade-off between the number of transmissions and the percentage of receiving nodes.

3.3. Measurement Matrix Formulation

In this subsection, we present the formulation procedure for the measurement matrix. As we introduced above, in Stage 4, after the mobile sink queries the M nodes, which are denoted by ( n i 1 , n i 2 , n i k , n i M ) , i 1 < i 2 < < i M , i k [ 1 , N ] , the measurement matrix Φ is constructed based on the M packets. Suppose Ω k is the index of node ID and its definition is expressed as follows:
Ω k = S ( n i k ) . id .  
Initially, Φ is an all-zero M × N matrix, then Φ is formulated at this step which is given by Equation (12):
Φ ( k , j ) = { 1 ,    j = Ω k 0 ,    o t h e r w i s e .  
For example, assume there are five nodes in the network (i.e., N = 5 ). If the mobile sink queries two nodes (i.e., M = 2 ), then Φ can initially be expressed as follows:
Φ 2 × 5 = ( 0 0 0 0 0 0 0 0 0 0 ) .  
Suppose that nodes 2 and 4 are selected by the sink, and their packets components are as follows:
S ( 2 ) . id = [ 2 , 5 ] S ( 4 ) . id = [ 1 , 4 ] ,
then φ 1 , 2 = φ 1 , 5 = 1 and φ 2 , 1 = φ 2 , 4 = 1 . Finally, the matrix Φ becomes:
Φ 2 × 5 = ( 0 1 0 0 1 1 0 0 1 0 ) .  
Moreover, the measurement vector Y is expressed as follows:
Y = ( S ( 2 ) . d a t a , S ( 4 ) . d a t a ) T .  
Obviously, Φ is a sparse matrix, whose sparsity degree is influenced by p , p 1 and p 2 . Furthermore, Equation (12) indicates that Φ is constructed by relying on the gathered data, which precludes the need to measure lost data. Thus, Y is not influenced by lost packets at all. Therefore, CS-DDSG is resistant to the packet loss rate.

3.4. Does the Measurement Matrices Satisfy RIP?

The structure of measurement matrix Φ is random and relies on the receiving nodes. Thus, CS-DDSG avoids measuring the lost nodes and avoids the packet loss. The question is: Does Φ obey RIP to utilize the CS theory? Unfortunately, it is an NP-hard problem to prove the RIP property of a matrix. However, Yang et al. [21] reported that recovery performance can be guaranteed with high probability when the rows of the measurement matrix are linearly independent. We investigate this proposition below.
The rows of Φ are linearly dependent when one of the following two situations occurs.
Case 1.
Any row φ k can be expressed as a linear combination of other rows.
Proof. 
The measurement coefficient is 1; thus, if φ k can be expressed as a linear combination of rows φ k 1 , , φ k q , q = 2 , , N 1 , they satisfy the following:
φ k = φ k 1 + + φ k q .  
Suppose I k = { j | φ k , j 0 } and I k i = { j | φ k i , j 0 } ; if the condition of Equation (17) is satisfied, then I k = i = 1 q I k i and we can obtain
| I k | > | I k i | , i [ 1 , q ] ,  
where | · | denotes the number of elements in the set. Thus, Equation (17) can be satisfied when one of the following two situations occurs. The first situation would occur if node k were to receive packets from nodes k 1 , , k q and merge their packets. However, this situation contradicts the reception condition under which each node receives one packet. Thus, the condition of Equation (17) cannot occur.
The second situation would occurs when node k 2 receives a packet from node k 1 and node k 3 receives a packet from node k 2 . It follows that node k q receives a packet from node k q 1 . Finally, node k receives the packet from node k q . According to the condition in Equation (10), I k q satisfies the following:
I k q = { k q } ( i = 1 q 1 I k i ) .  
After node k updates its packet, I k satisfies:
I k = { k } I k q .  
Obviously, k I k but k I k q . Thus, I k = { k } ( i = 1 q I k i ) and Equation (17) is false.
Consequently, it can be concluded that no rows can be linearly expressed by other rows.  □
Case 2.
Any two rows φ i and φ j are linearly dependent.
Proof. 
φ i and φ j are linearly dependent if and only if they are precisely the same. However, according to the reception condition, each node receives only one packet and merges with its own unique packet. Therefore, although node i and node j may receive the same broadcasting packet from a common neighboring node, their packets will still be different. Therefore, none of the rows are linearly dependent.  □
In conclusion, the rows of the measurement matrix Φ are linearly independent; consequently, in CS-SSDG, X can be reconstructed from Y with a very high probability.

4. Formulating the Expression of the Total Number of Transmissions and Receptions

Compared with the mainstream algorithms [15,20,21], the proposed scheme CS-DDSG reduces the number of transmissions and receptions rather than the number of fusions. In this section, we formulate the total number of transmissions N T t o t and receptions N R t o t based on the random geometric graph (RGG) mode [26] and the torus convention [27] to investigate the efficiency in reducing N T t o t and N R t o t .
According to Section 3, N T t o t and N R t o t can be expressed as follows:
N T t o t = N t П + N t Ш = N s + q = 1 N f N t q N R t o t = N r П + N r Ш = N r П + q = 1 N f N r q ,
where N t П and N r П denote the number of transmitting and reception nodes in Stage 2, respectively. N t Ш and N r Ш denote the number of transmitting and receiving nodes in Stage 3, respectively. Similarly, N t q and N r q represent the number of transmitting and receiving nodes in the q th forwarding of Stage 3, respectively. N f denotes the number of forwarding iterations. In Stage 2, N s nodes are selected to broadcast, thus N t П = N s . Because the receiving nodes in Stage 3 forward their packet with the probability p 2 , N r q 1 and N t q satisfy the following:
N t q = N r q 1 · p 2 .  
When N t q * = N r q * 1 · p 2 0 , no node forwards packets and the forwarding process is completed. Thus, N f = q * 1 , N t Ш = q = 1 N f N t q , N r Ш = q = 1 N f N r q . Additionally, N r 0 = N r П and N t 0 = N s . Next, we formulate the expression of N r П , N t q and N r q .

4.1. Formulating N r П

Proposition 1.
The number of receptions in Stage 2 N r П is:
N r П = N s N π r t 2 C N s 2 π 2 N r t 4 .  
Proof. 
According to the procedures of Stage 2, N r П equals the number of neighboring nodes around all the source nodes N s , n e i minus the number of nodes N r 2 located in the overlapping communication region of the two sources nodes. This relation occurs because each node receives just one packet and the number of receptions for those nodes is counted twice, thus N r П can be represented as follows:
N r П = N s , n e i N r 2 .  
The average number of neighboring nodes for all source nodes N s , n e i is expressed as follows:
N s , n e i = N s N π r t 2 S = N s N π r t 2 .  
In Figure 5, the red circle denotes the communication region and S 2 represents the shaded area jointly covered by the two source nodes. A and B are two intersections. When the distance between two source nodes d ( O , O ) satisfies 0 < d ( O , O ) 2 r t , N r 2 exists. Thus, the probability p L of an existing communication between the two nodes is expressed as follows:
p L = p { d ( O , O ) 2 r t } = π ( 2 r t ) 2 S = 4 π r t 2 .  
In the N s source nodes, an average of N L nodes pairs satisfy the condition in Equation (26) (i.e., N L source nodes pairs can communicate with each other). The expressions for N L and N r 2 are, respectively, as follows:
N L = C N s 2 · p L = C N s 2 · 4 π r t 2 .  
N r 2 = N L × N × S ¯ 2 S .  
Because the nodes are uniformly distributed and 0 < d ( O , O ) 2 r t , the probability p { d x } is equal to
F 1 ( x ) = p { d x } = π x 2 π ( 2 r t ) 2 = x 2 4 r t 2 .  
Thus, the probability density function (PDF) f 1 ( x ) is
f 1 ( x ) = F 1 ( x ) = x 2 r t .  
In this case, the area S 2 / 2 equals the area of sector OAB minus the area of triangle OAB:
S 2 = 2 ( r t 2 2 × 2 arccos d 2 r t 1 2 × d 2 × 2 r t 2 d 2 4 )      = 2 r t 2 arccos d 2 r t d 2 4 r t 2 d 2 .
Thus, the expected area of S 2 is calculated as follows:
S ¯ 2 = 0 2 r t S 2 f 1 ( x ) d x = 0 2 r t ( 2 r t 2 arccos x 2 r t x 2 4 r t 2 x 2 ) x 2 r t 2 d x = π 4 r t 2 .  
Combining Equations (27), (28) and (32), N r 2 can be formulated as:
N r 2 = N L × N × S ¯ 2 S = C N s 2 · 4 π r t 2 · N · π 4 r t 2 = C N s 2 π 2 N r t 4 .  
Finally, we substitute Equations (25) and (33) into Equation (24), to obtain the representation of N r П :
N r П = N s N π r t 2 C N s 2 π 2 N r t 4 .  

4.2. Formulating N r q

Figure 6 shows the forwarding procedure of Stage 3, where n t q denotes the transmitting node in the q th forwarding; its communication range is represented by the black circle. Node n t q 1 broadcasts its packet in the ( q 1 ) th forwarding process. Because of the reception conditions, the nodes located in area S 3 can receive the forwarded packet broadcast by n t q . Let N r 1 q denotes the number of receiving nodes in area S 3 .
Besides, there are two situations should be considered:
  • Case 1: As presented in Figure 7, there are two broadcasting nodes n t 1 q 1 and n t 2 q 1 in the ( q 1 ) th forwarding, while their communication ranges are represented by the two red circles. This case can be divided into two situations via the distance d ( n t 1 q 1 , n t 2 q 1 ) : (a) 0 < d ( n t 1 q 1 , n t 2 q 1 ) < r t ; and (b) r t < d ( n t 1 q 1 , n t 2 q 1 ) < 2 r t . Taking the first situation as an example, if node n t q is located in the black area S 4 , the nodes in the shadow area S 5 can receive packets from nodes n t q or n t 2 q 1 , thus the number of receptions of those nodes is counted twice, and that value should be subtracted from N r 1 q . Suppose that the number of receiving nodes in areas such as S 5 is N r 2 q and that the number in areas such as S 7 is N r 3 q .
  • Case 2: Similarly, there are two transmitting nodes n t 1 q and n t 2 q in the q th forwarding, whose communication ranges are represented by two black circles in Figure 8. This case can be divided into two situations via the distance d ( n t 1 q , n t q 1 ) : (a) 0 < d ( n t 1 q , n t q 1 ) < r t ; and (b) r t < d ( n t 1 q , n t q 1 ) < 2 r t . Taking the first situation as an example, when node n t 2 q is distributed in the black area S 8 , the nodes located in shadow area S 9 receive one of the packets broadcasted by node n r 1 q or n r 2 q . Thus, the number of receptions for those nodes is counted twice, which should be subtracted from N r 1 q . Suppose that the number of reception nodes in areas such as S 9 is N r 4 q and the number in areas such as S 10 is N r 5 q .
In conclusion, the number of receptions N r q for Stage 3 in the q t h forwarding can be expressed as follows:
N r q = N r 1 q N r 2 q N r 3 q N r 4 q N r 5 q .  
Next, we formulate the expression of N r 1 q , N r 2 q , N r 3 q , N r 4 q and N r 5 q .

4.2.1. Calculating N r 1 q

As shown in Figure 6, the nodes in shadow area S 3 would receive the packet. Thus, N r 1 q is calculated as follows:
N r 1 q = N t q × N × S ¯ 3 S .  
In the above formula, S ¯ 3 can be expressed as follows:
S ¯ 3 = π r t 2 S ¯ 2 .  
Because the nodes are uniformly distributed and 0 < d ( O , O ) r t , the probability p { d x } equals
F 2 ( x ) = p { d x } = π x 2 π r t 2 = x 2 r t 2 .  
Thus, the PDF f 2 ( x ) is
f 2 ( x ) = F 2 ( x ) = 2 x r t 2 .  
Combining Equations (31), (37) and (39), we obtain
S ¯ 2 = 0 r t ( 2 r t 2 arccos x 2 r t x 2 4 r t 2 x 2 ) 2 x r t 2 d x = ( π 3 4 ) r t 2 .  
S ¯ 3 = π r t 2 S ¯ 2 = π r t 2 ( π 3 3 4 ) r t 2 = 3 3 4 r t 2 .  
Thus, we obtain
N r 1 q = N t q N 3 3 4 r t 2 .  

4.2.2. Calculating N r 2 q

Next, we formulate the expression of N r 2 q . As presented in Figure 7a, the value of N r 2 q is the number of receive node in area S 5 , thus we have
N r 2 q = C N t q 1 2 × p L × N t q × S ¯ 4 π r t 2 × N × S ¯ 5 S ,  
where S ¯ 4 denotes the expected area of the black region, S ¯ 5 denotes the expected area of the shadow region, and p L denotes the probability that the distance between two nodes satisfies 0 d ( O , O ) r t . Thus, we have the following:
p L = p { d ( O , O ) r t } = π r t 2 S = π r t 2 .  
As shown in Figure 7a, the area S 4 equals twice the area of region ACD minus the half intersection area of circle A and B, i.e., S ¯ 2 / 2 , plus the half intersection area of circle O and O , i.e., S ¯ 2 / 2 . The area of region ACD equals to the area of sector ACD plus the area of sector OAC minus the area of triangle OCA; thus,
S A C D = π r t 2 × π 3 + arcsin ( d 2 r t ) 2 π + π r t 2 × π 3 2 π 1 2 × r t × 3 r t 2 = r t 2 2 [ π 3 + arcsin ( d 2 r t ) ] + π 6 r t 2 3 4 r t 2 .  
S 4 = S A C D S ¯ 2 2 + S ¯ 2 2 = r t 2 2 [ π 3 + arcsin ( d 2 r t ) ] + π 6 r t 2 3 4 r t 2 S ¯ 2 2 + S ¯ 2 2 .  
Combining Equations (39) and (46), we obtain
S ¯ 4 = 0 r t 2 × [ r t 2 2 ( π 3 + arcsin x 2 r t ) + π r t 2 6 3 r t 2 4 ] f 2 ( x ) d x π r t 2 8 + 1 2 ( π 3 3 4 ) r t 2      = π r t 2 2 π r t 2 8 + 1 2 ( π 3 3 4 ) r t 2 = 7 π r t 2 8 3 3 r t 2 8 ,
where 2 0 r t x arcsin x 2 r t d x = ( 3 2 π 6 ) r t 2 . According to the method in [28], we can get the approximate value of S ¯ 5 , i.e., S ¯ 5 S 5 , max = π r t 2 / 6 . Finally, combining Equations (43), (44) and (47), we obtain
N r 2 q = C N t q 1 2 N N t q 6 ( 7 π 8 3 3 8 ) .  

4.2.3. Calculating N r 3 q

The expression of N r 3 q is similar to that of N r 2 q :
N r 3 q = C N t q 1 2 × p L × N t q × S ¯ 6 π r t 2 × N × S ¯ 7 S ,  
As shown in Figure 7b, because r t d ( O , O ) 2 r t , S ¯ 6 is calculated as follows:
S ¯ 6 = 2 S A C D = r t 2 r t 2 × [ r t 2 2 ( π 3 + arcsin x 2 r t ) + π r t 2 6 3 r t 2 4 ] f 1 ( x ) d x      = r t 2 r t π 3 x d x + 1 2 r 2 r x arcsin x 2 r t d x 3 4 r 2 r x d x      = ( 13 π 24 3 2 ) r t 2 ,
where 1 2 r 2 r x arcsin x 2 r t d x = π 24 r t 2 3 8 r t 2 , and S 7 is expressed as
S ¯ 7 = S ¯ 2 S ¯ 12 ,  
where S ¯ 12 is the intersection area of circle O and circle O when r t d ( O , O ) 2 r t , thus
S ¯ 12 = r t 2 r t ( 2 r t 2 arccos x 2 r t x 4 r t 2 x 2 2 ) x 2 r t 2 d x = 3 3 r t 2 16 ,  
and
S ¯ 7 = S ¯ 2 S ¯ 12 = ( π 4 3 3 16 ) r t 2 .  
Combining Equations (49), (50) and (53), we obtain
N r 3 q = C N t q 1 2 4 r t 2 N N t q π ( 13 24 3 2 π ) ( π 4 3 3 16 ) .  

4.2.4. Calculating N r 4 q and N r 5 q

As illustrated in Figure 8, the two black circles denote the communication range of two transmitting nodes, n t 1 q and n t 2 q , in the q forwarding. The red circle denotes the communication range of transmission node n t q 1 in the q 1 forwarding. The calculation of N r 4 q and N r 5 q is similar to that of N r 2 q and N r 3 q :
N r 4 q = C N t q 1 C N t q 1 1 p L × C N t q 1 1 S ¯ 8 π r t 2 × N S ¯ 9 S ,  
N r 5 q = C N t q 1 C N t q 1 1 p L × C N t q 1 1 S ¯ 10 π r t 2 × N S ¯ 11 S ,  
where S 8 and S 10 denote the area of the black region and S 9 and S 11 denote the area of the shadow region. Compared with Figure 7 and Figure 8, we have the following:
{ S ¯ 8 = S ¯ 4 , S ¯ 9 = S ¯ 5 S ¯ 10 = S ¯ 6 , S ¯ 11 = S ¯ 7 .  
Thus, the expressions of N r 4 q and N r 5 q are:
N r 4 q = N t q N t q 1 π N r t 4 ( N t q 1 ) 6 ( 7 π 8 3 3 8 )  
N r 5 q = 4 N t q N t q 1 N π r t 4 ( N t q 1 ) ( 13 24 3 2 π ) ( π 4 3 3 16 )  
In conclusion, by combining Equations (35), (42), (48), (54), (58) and (59), we can obtain the expression of N r q :
N r q = N t q N 3 3 4 r t 2 C N t q 1 2 N N t q 6 ( 7 π 8 3 3 8 ) C N t q 1 2 4 r t 2 N N t q π ( 13 24 3 2 π ) ( π 4 3 3 16 )          N t q N t q 1 π N r t 4 ( N t q 1 ) 6 ( 7 π 8 3 3 8 ) 4 N t q N t q 1 N π r t 4 ( N t q 1 ) ( 13 24 3 2 π ) ( π 4 3 3 16 ) .

4.3. The Formulation of N T t o t and N R t o t

Theorem 1.
Assume that all N sensor nodes are deployed randomly and uniformly in a distributed WSNs with a boundary length of 1, and each node has a transmission range of r t . If we gather data based on CS-DDSG scheme, then N T t o t and N R t o t are, respectively, expressed as follows:
N T t o t = N s + q = 1 N f N t q ,  
N R t o t = N s N π r t 2 C N s 2 π 2 N r t 4 + q = 1 N f N t q N 3 3 4 r t 2 q = 1 N f C N t q 1 2 N N t q 6 ( 7 π 8 3 3 8 ) q = 1 N f C N t q 1 2 4 r t 2 N N t q π ( 13 24 3 2 π ) ( π 4 3 3 16 ) q = 1 N f N t q N t q 1 π N r t 4 ( N t q 1 ) 6 ( 7 π 8 3 3 8 ) q = 1 N f 4 N t q N t q 1 N π r t 4 ( N t q 1 ) ( 13 24 3 2 π ) ( π 4 3 3 16 ) ,
where N r 0 = N r П , N t 0 = N s , N t q = N r q 1 × p 1 and N f = q * 1 , where q * satisfies N t q * = N r q * 1 × p 1 0 . The expression for N r П is given in Equation (34).
Proof. 
As presented in the above derivation, we can obviously obtain Equation (61) based on Equation (21) and the correlative description in Stage 2 of CS-DDSG. Furthermore, by combining Equations (21), (34) and (60), we can obtain the expression of Equation (62).  □

5. Performance Evaluation and Analysis

To evaluate the effectiveness of CS-DDSG, we ran simulations in MATLAB 2012b. The simulation parameters were set as shown in Table 1. Furthermore, we adopted the FFT orthonormal basis and the orthogonal matching pursuit (OMP) method for the reconstruction algorithm. We used the real sensor readings extracted from the GreenOrbs [29] system.
In this paper, we present the performance comparations of CS-DDSG, Compressive Sensing Data storage (CStorage) [20], Improved CStorage (ICStorage) [21], Compressed Network Coding based Distributed data Storage (CNCDS) [21] and Direct Cluster-Based Compressive Sensing Data Collection (DCCS) [15] on unreliable links. These first four schemes all combine DDS and CS to gather data. CStorage, ICStorage and CNCDS are concerned with reducing the number of transmission and fusions. In CStorage, intermediate nodes receive the broadcasting packets when they first receive, and then, they forward the received packet with a given probability. The intermediate nodes in ICStorage forward their own readings rather than the received source nodes readings. In the CNCDS scheme, the intermediate nodes receive broadcast packets only if the receiving node does not share any node IDs with the corresponding transmitting node. We also analyze the numbers of transmissions, receptions and fusions involved in the first four algorithms. DCCS combines CS and cluster topology to reduce the total power consumption with no consideration of packet loss rate. All member nodes gather data and transmit to cluster heads, where the CS measurements and measurement matrices are generated and send to sink directly. Additionally, we discuss the impact of packet loss rate, the number of measurements and the proportion of source nodes on the performance of CS-DDSG. The simulation results shown are the average values from 1000 runs.
First, we evaluate the performance on unreliable links when p 1 = 0.3 , M = 50 , as shown in Figure 9. It can be seen that: (1) As p increases, the reconstruction accuracy of all the algorithms decreases in Figure 9a. When p 0.6 , the NMAEs of the four algorithms are stable and increase gradually, which indicates that CS-DDSG is effective at resisting the packet loss. Although the packet loss rate impacts the nodes receiving broadcasting packets, the sink still gathers enough packets to recover the data. In addition, the sink constructs the measurement matrix based on received packets, which avoids the need to measure the lost nodes and reduces the impact of unreliable links on measurement vector Y . However, the performance of DCCS is poor with an increase in p . Sink cannot find the lossy nodes and still reconstructs data based on the original measurement matrices. Thus, DCCS is sensitive to p . (2) CS-DDSG outperforms the other algorithms. This improved performance occurs because in CS-DDSG, nodes receive only one packet which is broadcasted by its neighbor nodes in CS-DDSG. Thus, the measurement vectors have the characteristic of strong spatial correlation, which is utilized by CS to recover the data. However, in the other algorithms, nodes would fuse packets from distant nodes as long as the receipt condition is satisfied, which leads to a weak spatial correlation of measurement vectors. Thus, CS-DDSG outperforms the other algorithms.
We present the total number of transmissions, receptions and fusions of the four algorithms in Figure 10 when p = 0.3 and p 1 = 0.15 . CS-DDSG requires fewer transmissions, receptions and fusions than do the CNCDS, CStorage and ICStorage schemes. This is because nodes in CS-DDSG receive packets only the first time and broadcast their packets with the probability p 2 , after which then they do not receive any data. However, for CNCDS, CStorage and ICStorage, nodes continue to receive packets as long as the reception condition is satisfied. CStorage and ICStorage in particular focus on reducing the number of transmissions. Moreover, compared with CNCDS, CStorage and ICStorage, CS-DDSG scheme reduces N T t o t by up to 23.9%, 42.5% and 67.8%, respectively, and reduces N R t o t by up to 73.8%, 80.2% and 89.9%, respectively.
Furthermore, we investigate the fusion proportion of the total number of receptions. As presented in Figure 11, only 41% of the receiving nodes in CNCDS merge the received packets; the authors consider that only 41% of nodes lose energy. In fact, 59% of the receiving nodes also consume energy because they would receive the broadcast packet first and then determine whether the condition of CNCDS are satisfied; the received packets will be merged only if they satisfy the condition. Thus, energy is consumed even when the received packets are not fused. However, the number of receptions in [21] is the same as the number of fusions, which is less counted. Similarly, 46% and 48% of the receiving reception nodes in CStorage and ICStorage merge the packets, respectively. In CS-DDSG, all received nodes are fused and no redundancy occurs because the nodes receive packets only once. Thus, the energy consumption of CS-DDSG receiving nodes is much smaller than that of the other algorithms. In conclusion, CS-DDSG effectively reduces both the number of transmissions and receptions.
Figure 12 presents the number of fusions and receiving nodes during each forwarding round when p 1 = 0.15 . The forwarding process of CS-DDSG repeats five times, until no node remains to accept the broadcast packets, while CNCDS, CStorage and ICStorage repeat six, nine and twelve times, respectively. The network employing CS-DDSG has the fastest convergence and characteristics of efficiency due to the strictest reception conditions. Moreover, most of the data fusion occurs during Stage 2, and subsequently the number of fusions rapidly decreases in Stage 3 except in ICStorage.
In Figure 13, we investigate the recovery performance of the algorithms when p 1 = 0.3 and the number of measurements M , which is queried by the mobile sink, ranges from 15 to 150. It can be observed that, with an increase in M , the recovery accuracy of ICStorage, CStorage, CNCDS and CS-DDSG are improved and equivalent, while the performance of CS-DDSG becomes slightly better when M 100 . This improvement occurs because the more information that is gathered, the better is the reconstruction accuracy. According to Equation (12), the sink constructs measurement matrix Φ based on the packets fused by the forwarding nodes. The forwarding nodes of CS-DDSG receive only one packet, and the Φ is sparser than that in the others algorithms. Consequently, less information is gathered and fewer nodes contribute to data recovery for CS-DDSG. However, with an increase in M , more information is gathered and the gaps separating the four algorithms decrease. When M > 100 , CS-DDSG outperforms the four DDS-based algorithms due to the strong spatial correlation of the measurement vector. Moreover, the reconstruction accuracy of DCCS is the best when M is large enough and there is no packet loss. All nodes in DCCS participate in gathering data and DCCS adopts dense measurement matrix in clusters. Thus, more information is gathered. In addition, performance tends to be stable as M increases.
Figure 14 shows the performance of CS-DDSG under different packet loss ratios p and probabilities p 1 when M = 40 . As p increases, the value of NMAE remains stable, i.e., N M A E 0 . 014 . This result indicates that CS-DDSG effectively resists the packet loss and maintains high reconstruction accuracy even when unreliable links exist. Additionally, its accuracy is not influenced by p 1 due to the very sparse measurement matrix.
Finally, we investigate how the proportion of source nodes p 1 impact the recovery accuracy in Figure 15. The simulation results show the following: (1) When p 1 = 0.4 , the value of NMAE decreases as M increases because more nodes participate in data reconstruction as M increases. (2) When M is fixed, CS-DDSG performance is improved and the trend of NMAE values is very close to the value of p 1 , varying from 0 to 0.6. This effect occurs because, when there are more source nodes, more nodes will receive broadcast packets before the sink obtains data. Hence, the amount of information used for reconstruction increases. However, due to the reception condition, the measurement matrix Φ is sparse. Thus, information is increasingly limited. As a result, the trends of the NMAE values are close to the different value of p 1 .

6. Conclusions

In this paper, the data gathering problem is investigated in lossy WSNs using the simple but efficient proposed CS-DDSG algorithm that combines CS theory and DDS. Compared with other correlative and mainstream strategies, CS-DDSG balances the energy consumption and reconstruction performance effectively. In our proposed algorithm, nodes are selected to be source nodes with the probability p 1 to broadcast their packets. The neighboring nodes around the source nodes receive the broadcasting nodes and update their own packets, which are broadcasted with the probability p 2 . Then, all receiving nodes forward their updated packets with the probability p 2 . The process will be repeated a few times until there are no receiving nodes. Each receiving node receives only one packet. In this way, the numbers of transmissions and fusions are reduced, and the CS reconstruction accuracy is guaranteed. Moreover, the expression of the total number of transmissions and receptions is formulated via RGG. The simulation results and analysis validate that CS-DDSG outperforms the other algorithms in unreliable links.
In addition, we investigate how the measurements M , the packet loss p and the probability p 1 influence the performance of CS-DDSG. In future research, we plan to explore the possibility of temporal correlations of node readings. Another potential extension of this work is to more strictly demonstrate that the measurement matrix satisfies the RIP.

Author Contributions

Conceptualization, O.L. and G.L.; Methodology, C.Z. and M.L.; Software, G.L. and M.L.; Writing—Original Draft Preparation, C.Z.; Project Administration, G.L.; and Funding Acquisition, G.L. and O.L.

Funding

This work was supported in part by the National Science and Technology Major Projects of China under grant No. 2016zx03001010 and National Natural Science Foundation of China No. 61601516.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

WSNsWireless Sensor Networks
CSCompressive Sensing
IoTInternet of Things
RIPRestricted Isometry Property
FFTFast Fourier Transform
OMPOrthogonal Matching Pursuit
DDSDistribute Data Storage
NMAENormalized Mean Absolute Error
RGGRandom Geometric Graph
PDFProbability Density Function

References

  1. Jesús, R.M.; José-Fernán, M.; Pedro, C.; Lourdes, L. Combining wireless sensor networks and semantic middleware for an internet of things-based sportsman/woman monitoring application. Sensors 2013, 13, 1787–1835. [Google Scholar]
  2. Atzori, L.; Iera, A.; Morabito, G. The internet of things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
  3. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  4. Wu, M.; Tan, L.; Xiong, N. Data prediction, compression, and recovery in clustered wireless sensor networks for environmental monitoring applications. Inf. Sci. 2016, 329, 800–818. [Google Scholar] [CrossRef]
  5. Zhou, M.; Fortino, G.; Shen, W.; Jobin, M.J.; Bhattacharyya, R. Guest editorial: Special section on advances and applications of internet of things for smart automated systems. IEEE Trans. Autom. Sci. Eng. 2016, 13, 1225–1229. [Google Scholar] [CrossRef]
  6. Đurišić, M.P.; Tafa, Z.; Dimić, G.; Milutinović, V. A survey of military applications of wireless sensor networks. In Proceedings of the Mediterranean Conference on Embedded Computing (MECO), Bar, Montenegro, 19–21 June 2012; pp. 196–199. [Google Scholar]
  7. Donoho, D.L. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
  8. Baraniuk, R. Compressive sensing. IEEE Signal Process. Mag. 2007, 56, 4–5. [Google Scholar]
  9. Luo, C.; Wu, F.; Sun, J.; Chen, C.W. Compressive Data Gathering for Large-scale Wireless Sensor Networks. In Proceedings of the International Conference on Mobile Computing and Networking, Beijing, China, 20–25 September 2009; pp. 145–156. [Google Scholar]
  10. Luo, J.; Xiang, L.; Rosenberg, C. Does Compressed Sensing Improve the Throughput of Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Communications, New York, NY, USA, 23–27 May 2010; pp. 1–6. [Google Scholar]
  11. Wang, W.; Garofalakis, M.; Ramchandran, K. Distributed Sparse Random Projections for Refinable Approximation. In Proceedings of the International Symposium on Information Processing in Sensor Networks, Cambridge, MA, USA, 25–27 April 2007; pp. 331–339. [Google Scholar]
  12. Wu, X.; Xiong, Y.; Yang, P.; Wan, S.; Huang, W. Sparsest random scheduling for compressive data gathering in wireless sensor networks. IEEE Trans. Wirel. Commun. 2014, 13, 5867–5877. [Google Scholar]
  13. Han, L.Y.; Eftekhari, A.; Wakin, M.B.; Rozell, C.J. The Restricted Isometry Property for Block Diagonal Matrices. In Proceedings of the Information Sciences and Systems, Baltimore, MD, USA, 23–25 March 2011; pp. 1–31. [Google Scholar]
  14. Leinonen, M.; Codreanu, M.; Juntti, M. Sequential compressed sensing with progressive signal reconstruction in wireless sensor networks. IEEE Trans. Wirel. Commun. 2015, 14, 1622–1635. [Google Scholar] [CrossRef]
  15. Nguyen, M.T.; Teague, K.A.; Rahnavard, N. CCS: Energy-efficient data collection in clustered wireless sensor networks utilizing block-wise compressive sensing. Comput. Netw. 2016, 106, 171–185. [Google Scholar] [CrossRef] [Green Version]
  16. Kong, L.; Xia, M.; Liu, X.Y.; Wu, M.Y.; Liu, X. Data Loss and Reconstruction in Sensor Networks. In Proceedings of the IEEE INFOCOM, Turin, Italy, 14–19 April 2013; pp. 1654–1662. [Google Scholar]
  17. Kong, Z.; Aly, S.; Soljanin, E. Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE J. Sel. Areas Commun. 2010, 28, 261–267. [Google Scholar]
  18. Zeng, R.; Jiang, Y.; Lin, C.; Fan, Y.; Shen, X. A distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1819–1830. [Google Scholar] [CrossRef]
  19. Ren, Y.; Oleshchuk, V.; Li, F.Y. A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs. In Proceedings of the IEEE Global Telecommuncations Conference, Miami, FL, USA, 6–10 December 2010; pp. 1–6. [Google Scholar]
  20. Talari, A.; Rahnavard, N. CStorage: Distributed Data Storage in Wireless Sensor Networks Employing Compressive Sensing. In Proceedings of the IEEE GLOBECOM, Kathmandu, Nepal, 5–9 December 2011; pp. 1–5. [Google Scholar]
  21. Yang, X.; Tao, X.F.; Dutkiewicz, E.; Huang, X.J.; Guo, Y.J.; Cui, Q.M. Energy-efficient distributed data storage for wireless sensor networks based on compressed sensing and network coding. IEEE Trans. Wirel. Commun. 2013, 12, 5087–5099. [Google Scholar] [CrossRef]
  22. Gong, B.; Cheng, P.; Chen, Z.; Ning, L.; Gui, L.; Hoog, F.D. Spatiotemporal compressive network coding for energy-efficient distributed data storage in wireless sensor networks. IEEE Commun. Lett. 2015, 19, 803–806. [Google Scholar] [CrossRef]
  23. Candes, E.J.; Tao, T. Decoding by linear programming. IEEE Trans. Inf. Theory 2005, 51, 4203–4215. [Google Scholar] [CrossRef] [Green Version]
  24. Gupta, P.; Kumar, P.R. Critical Power for Asymptotic Connectivity in Wireless Networks. In Proceedings of the IEEE Conference Decision and Control, Tampa, FL, USA, 16–18 December 1998; pp. 1106–1110. [Google Scholar]
  25. Elson, J.; Girod, L.; Estrin, D. Fine-grained network time synchronization using Reference broadcasts. SIGOPS Oper. Syst. Rev. 2002, 36, 147–163. [Google Scholar] [CrossRef]
  26. Penrose, M. Random Geometric Graphs, 5th ed.; Oxford University Press: Oxford, UK, 2004; pp. 90–102. ISBN 9780198506263. [Google Scholar]
  27. Hall, P. Introduction to the Theory of Coverage Process; John Wiley and Sons: Hoboken, NJ, USA, 1988; pp. 26–39. ISBN 9781584350675. [Google Scholar]
  28. Yu, C.W. Computing subgraph probability of random geometric graphs with applications in quantitative analysis of ad hoc networks. IEEE J. Sel. Areas Commun. 2009, 27, 1056–1065. [Google Scholar]
  29. Mo, L.; He, Y.; Liu, Y.; Zhao, J.; Tang, S.J.; Li, X.Y.; Dai, G. Canopy Closure Estimates with Greenorbs: Sustainable Sensing in the Forest. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys 7), Berkeley, CA, USA, 4–6 November 2009; pp. 99–112. [Google Scholar]
Figure 1. Performance of CDG with ideal link and lossy link.
Figure 1. Performance of CDG with ideal link and lossy link.
Sensors 18 03221 g001
Figure 2. The relationship between the packet loss rate and the NMAE.
Figure 2. The relationship between the packet loss rate and the NMAE.
Sensors 18 03221 g002
Figure 3. Flow chart of CS-DDSG.
Figure 3. Flow chart of CS-DDSG.
Sensors 18 03221 g003
Figure 4. The impact of forwarding probability on the number of transmitting and receiving nodes.
Figure 4. The impact of forwarding probability on the number of transmitting and receiving nodes.
Sensors 18 03221 g004
Figure 5. Diagram of two communication nodes: (a) r t < d ( O , O ) 2 r t ; and (b) 0 < d ( O , O ) r t .
Figure 5. Diagram of two communication nodes: (a) r t < d ( O , O ) 2 r t ; and (b) 0 < d ( O , O ) r t .
Sensors 18 03221 g005
Figure 6. Diagram of forwarding packets.
Figure 6. Diagram of forwarding packets.
Sensors 18 03221 g006
Figure 7. The diagram of Case 1: (a) 0 < d ( n t 1 q 1 , n t 2 q 1 ) < r t ; and (b) r t < d ( n t 1 q 1 , n t 2 q 1 ) < 2 r t .
Figure 7. The diagram of Case 1: (a) 0 < d ( n t 1 q 1 , n t 2 q 1 ) < r t ; and (b) r t < d ( n t 1 q 1 , n t 2 q 1 ) < 2 r t .
Sensors 18 03221 g007
Figure 8. The diagram of Case 2: (a) 0 < d ( n t 1 q 1 , n t 2 q 1 ) < r t ; and (b) r t < d ( n t 1 q 1 , n t 2 q 1 ) < 2 r t .
Figure 8. The diagram of Case 2: (a) 0 < d ( n t 1 q 1 , n t 2 q 1 ) < r t ; and (b) r t < d ( n t 1 q 1 , n t 2 q 1 ) < 2 r t .
Sensors 18 03221 g008
Figure 9. Performance of the different algorithms in unreliable links: (a) DDS-based algorithms; and (b) comparison between DDS-based algorithms and cluster-based algorithm.
Figure 9. Performance of the different algorithms in unreliable links: (a) DDS-based algorithms; and (b) comparison between DDS-based algorithms and cluster-based algorithm.
Sensors 18 03221 g009
Figure 10. The total number of transmissions, receptions and fusions in Stages 2 and 3.
Figure 10. The total number of transmissions, receptions and fusions in Stages 2 and 3.
Sensors 18 03221 g010
Figure 11. The fusion proportion of the total number of receptions.
Figure 11. The fusion proportion of the total number of receptions.
Sensors 18 03221 g011
Figure 12. The number of fusions and receiving nodes during the forwarding process: (a) CS-DDSG; (b) CNCDS; (c) CStorage; and (d) ICStorage.
Figure 12. The number of fusions and receiving nodes during the forwarding process: (a) CS-DDSG; (b) CNCDS; (c) CStorage; and (d) ICStorage.
Sensors 18 03221 g012
Figure 13. Performance of the algorithms when p 1 = 0.3 .
Figure 13. Performance of the algorithms when p 1 = 0.3 .
Sensors 18 03221 g013
Figure 14. Performance of CS-DDSG with different p 1 and p .
Figure 14. Performance of CS-DDSG with different p 1 and p .
Sensors 18 03221 g014
Figure 15. Performance of CS-DDSG with different value of p 1 and M .
Figure 15. Performance of CS-DDSG with different value of p 1 and M .
Sensors 18 03221 g015
Table 1. Default Simulation Parameters.
Table 1. Default Simulation Parameters.
ParametersValue
N The total number of sensors400
a Boundary length1
p 2 The probability of forwarding in Stage 30.32
r t Communication radius0.075

Share and Cite

MDPI and ACS Style

Zhang, C.; Li, O.; Liu, G.; Li, M. A Practical Data-Gathering Algorithm for Lossy Wireless Sensor Networks Employing Distributed Data Storage and Compressive Sensing. Sensors 2018, 18, 3221. https://0-doi-org.brum.beds.ac.uk/10.3390/s18103221

AMA Style

Zhang C, Li O, Liu G, Li M. A Practical Data-Gathering Algorithm for Lossy Wireless Sensor Networks Employing Distributed Data Storage and Compressive Sensing. Sensors. 2018; 18(10):3221. https://0-doi-org.brum.beds.ac.uk/10.3390/s18103221

Chicago/Turabian Style

Zhang, Ce, Ou Li, Guangyi Liu, and Mingxuan Li. 2018. "A Practical Data-Gathering Algorithm for Lossy Wireless Sensor Networks Employing Distributed Data Storage and Compressive Sensing" Sensors 18, no. 10: 3221. https://0-doi-org.brum.beds.ac.uk/10.3390/s18103221

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop