Optimization Of Connectivity In WSN Using Fuzzy Logic

3y ago
38 Views
2 Downloads
2.23 MB
46 Pages
Last View : 2d ago
Last Download : 3m ago
Upload by : Anton Mixon
Transcription

Optimization of Connectivity inWSN using Fuzzy LogicLu Peng, Shannon Tao and Vivian YangTable of ContentsIntroduction . 2Theoretical bases and literature review . 3Hypothesis . 7Methodology. 7Generate/collect data . 7How to solve problem . 7Algorithm . 8Language . 11Tool . 11Generate output . 12Test against hypothesis. 12Implementation . 13Code (see attachment) . 13Design document and flow chart . 13Data analysis . 14Output generation: . 14Case 1 with fairly large improvement . 14Case 2 with a small improvement . 21Case 3 with no improvement . 27Fuzzy logic control has a positive impact on WSN packet transmission. 33Fuzzy logic control has a positive impact on WSN energy utilization . 36Conclusion . 38Recommendation for Future Studies. 38Bibliography . 39Appendix . 43

IntroductionWireless sensor network (WSN)[1][2] is a promising technology nowadays. It is used innumerous applications, such as forest monitoring, disaster management, space exploration,factory automation, secure installation, border protection, battlefield surveillance, etc., and is thebasis of future network “Internet of Things” (IoT)[3]. A WSN is composed of spatially scatteredsensor nodes over a certain region to monitor a certain number of tasks. The sensor nodes arepositioned near to the target they are monitoring. The sensors correspond with one or morecentral positions, normally called base station or a sink. The more modern networks are bidirectional, also enabling control of sensor activity. A distinct sensor node contains a logic unit, aprocess unit to execute computations, a radio unit to unite nodes to the system and a batterypower unit. Due to lack of regular power source of sensor nodes, energy preservation become themajor difference between WSN and other wireless networks, and draw most attention inalgorithms and protocols development.A great challenge in this new field is achieving a global coordinated objective while usingonly local information [4]–[17]. Maintaining connectivity has become one of the most importantand challenging task in WSN control [18]–[29]. When designing, deploying and exploiting aWSN, it is desired to maximize the number of nodes that are able to transmit or receive data to orfrom the base station (BS), considering the BS as an element in the network acting as a gatewaybetween the WSN and any other data networks. Unfortunately, the number of connected nodes ina WSN (nodes that are able to send or receive data to or from the BS) would decrease over timeas nodes relaying messages crash or fail due to hardware failures, battery discharge, softwarebugs and so forth.There are several approaches and strategies that will minimize such risks and will improvethe WSN connectivity. Most of them are high resource consuming as nodes are checking theiravailability of reaching a BS from time to time. The network is flooded with control messagesthat impact negatively on the performance and the energy efficiency of all the nodes in the path.One of the approaches provides a better trade-off between the network connectivity and theresource consumption, which will be adopted in our project as a starting point, on top of which afuzzy logic based connectivity control will be carried out to further improve the performance. In

order to better understand the effect of fuzzy logic function on this issue, different functions willbe implemented and compared, and the one with the best result will be shown to guide futuredirection in the field.Theoretical bases and literature reviewCooperative control of multi-agent systems is a very active research area of control theory. Inthe past few years problems such as flocking, consensus, coverage and pattern formation havebeen studied. The study is generally focused on the development of distributed control laws inorder to reach a global objective [1]–[7]. One interesting problem recently analyzed regards theconnectivity maintenance of the distance-dependent graph of the network. In such a graph, knownalso as R-disk graph [7], there is an edge between two nodes if their Euclidean distance is lessthan or equal to a pre specified number R. In such a graph, known also as R-disk graph [30], thereis an edge between two nodes if their Euclidean distance is less than or equal to a pre specifiednumber R. The difficulty in connectivity maintenance stems from the fact that connectivity is aninherently global property and a complicated function of the motion of the nodes. Other attemptsto model changes in topology, such as [31], ignore the dependence of switching on motion.Several attempts have been made in the wireless networking literature to follow local rules thatguarantee connectivity. One example is the “sector rule” which guarantees connectivity of the Rdisk graph on the plane if each agent has at least one neighbor in every sector of 120 degrees [32].Another interesting solution to the connectivity problem is given by the circumcenter algorithm,which increases gradually the degree of each agent and constraints the motion of the agents toavoid the lost of previously present connections [30]. Many authors in the control theoryliterature have also made progress on this problem [33]–[36].The strategy in our project aims at keeping constant the node degree (ND) of a node, itsnumber of neighbors. The node degree depends on the WSN deployment (regular, random, etc.),the area to be covered and the number of nodes. So, the desired node degree will be calculated forthe specific WSN to be deployed and that value will become the target of the self-adaptive system.The average degree should not be too large because a large degree typically implies that a nodehas to communicate with other distant nodes directly. This increases interference and collision,

and would waste energy. The average degree should not be too small either because that tends toincrease the overall network energy consumption as longer paths have to be taken. So we believethe average node degree is an important performance metric for multihop wireless networktopology. Intuitively, if a node has a higher degree (indicates more neighbors), it is more likelythat there are at least one path for it to transmit data to the destination. If all nodes are randomlyand uniformly deployed, the probabilistic approach to analyze the relation between the nodedegree and the network connectivity is fully described in [37].The self-adaptive system presented here aims to control the communication range of eachnode to manage its degree, in order to recover the link when its neighbors fail. Whenever a node’sneighbor fails, the communication range of that node is increased to replace the failing neighbor.Therefore the node’s energy consumption is likely to increase. If the desired node degree, whosevalue is estimated before the nodes deployment as mentioned above, is kept constant all the time,the battery might become exhausted too short. Thus, the desired node degree has to be adjusted inrun time taking into account the battery level and the desired lifetime of autonomous nodes. Notethat directly changing communication range usually is not feasible, instead the transmissionpower is the parameter can be controlled in real sensor nodes. In this paper, we employed thetransmission power model in the literature [38], in which the transmission power is linearfunction of square of the communication range.The basic idea of the control system is that if the node degree is higher than the expectednode degree, then the communication range has to be decreased; if the node degree is lower thanthe expected node degree, then the communication range has to be increased. The desired nodedegree will depend on the energy of the node. How fast and how long the communication rangechanges, is decided by the controller, e.g. fuzzy logic based controller.First we need to understand what exactly is fuzzy logic. Fuzzy logic is a form of many-valuedlogic which deals with reasoning that is approximate rather than fixed and exact. Fuzzy logic hastwo different meanings. In a narrow sense, fuzzy logic is a logical system, which is an extensionof multivalued logic. However, in a wider sense fuzzy logic (FL) is almost synonymous with thetheory of fuzzy sets, a theory which relates to classes of objects with unsharp boundaries in whichmembership is a matter of degree. In this perspective, fuzzy logic in its narrow sense is a branch

of FL. Even in its more narrow definition, fuzzy logic differs both in concept and substance fromtraditional multi valued logical systems[39].Another basic concept in FL, which plays a central role in most of its applications, is that of afuzzy if-then rule or, simply, fuzzy rule. Although rule-based systems have a long history of usein Artificial Intelligence (AI), what is missing in such systems is a mechanism for dealing withfuzzy consequents and fuzzy antecedents. In fuzzy logic, this mechanism is provided by thecalculus of fuzzy rules. The calculus of fuzzy rules serves as a basis for what might be called theFuzzy Dependency and Command Language (FDCL). Although FDCL is not used explicitly inthe toolbox, it is effectively one of its principal constituents. In most of the applications of fuzzylogic, a fuzzy logic solution is, in reality, a translation of a human solution into FDCL.First fuzzy logic composed of Membership Functions(MF) which is a curve that defines howeach point in the input space is mapped to a membership value (or degrees of membership)between 0 and 1. For example, when we define somebody is tall, we don’t have a clear boundarybetween above which height is considered tall. We only have a rough idea of the definition of tall.In this case we can only use curve instead of linear lines to represent the tallness. As described inFig 1 and 2, it’s obviously more sensible to define tall in the curve format. When someone is 5 ft9 inches, we can say he is tall to the degree of 0.7. And we can map these values accordingly onto the curve function.Figure1. Linear function to define tallness

Figure2. curve to define tallnessThe second component of fuzzy logic is the If-Then rules. Fuzzy sets and fuzzy operators arethe subjects and verbs of fuzzy logic. These if-then rule statements are used to formulate theconditional statements that comprise fuzzy logic.The simple format of fuzzy if-then rule is : if x is A then y is B.where A and B are linguistic values defined by fuzzy sets on the ranges X and Y. Taken ourprevious example on the tallness, we can define a if-then rule as “If a man is 5 ft. 9 inches, thenhe is tall with a degree of 0.7. In general, the input to an if-then rule is the current value for theinput variable and the output is an entire fuzzy set[40] .The last component is the fuzzy inference. Fuzzy inference is the process of formulating themapping from a given input to an output using fuzzy logic[41] . The mapping then provides abasis from which decisions can be made, or patterns discerned. The process of fuzzy inferenceinvolves all of the pieces that are described in Membership Functions, Logical Operations, and IfThen rules. We take the inputs and determine the degree to which they belong to each of theappropriate fuzzy sets via membership functions. The output is a fuzzy degree of membership inthe qualifying linguistic set which always are the intervals between 0 and 1.We also need to

aggregate all outputs in order to make decisions based on the results. Aggregation is the processby which the fuzzy sets that represent the outputs of each rule are combined into a single fuzzyset. Lastly is the defuzzify process. The input for the defuzzification process is a fuzzy set (theaggregate output fuzzy set) and the output is a single number which is the result we want toderive from the fuzzy inference process.HypothesisThere are several approaches and strategies that will minimize the risks of message delayingfails, and thus improve WSN connectivity. However most of them will require high powerconsumption since each node is actively checking others’ availability of reaching the BS. We aimto tackle both problems of poor connectivity and also to save power by using the fuzzy logiccontroller on each node to monitor the node’s own parameters, without flooding WSN withmonitoring messages. We use control loops based on fuzzy logic to enable each node to adjustautomatically the communication range according to a desired node degree and residual energy.MethodologyGenerate/collect dataa. The base station is positioned at the center of the 100 * 100 areab. Generate 30 random sensor nodes in the area and initialize every node with a randomcommunication range within a given range (10 to 30).c. Other strategies to initialize the network: 1). deploy the nodes semi-randomly by fixingeach node within a certain area; 2). initialize the communication range with a constantd. In each cycle, update the status of every node and then transmit a packet from each nodeto base station(success or fail) and countHow to solve problem

AlgorithmThe algorithm contains three loops: main loop, primary loop, secondary loop (Figure1)i.Main loop: update the whole system Update the status of every node Calculate the paths from sensor nodes to base station (undirected and weighted graph) Monitor the packet transmission from sensor nodes to base station Do analysis of the whole system and display and update the result.Figure 1. Flow chart of fuzzy-logic based control systemii. Primary loop: update each node of its communication rangeInputs: current energy level and node degree of a node, and a set of predefinedparameters including:initial value of the communication range ( ̅̅̅̅̅𝐶𝑅0 ); desired value of the̅̅̅̅); critical energy levelnode degree when the battery has a critical energy level (𝑁𝐷̅̅̅̅̅̅̅̅̅̅̅̅̅̅(𝐸𝑐𝑟 ); communication range variation rate (Δcr); node degree variation rate (Δnd);minimum and maximum value of the communication range (CRmin and CRmax). Loop: input modification and normalization, and fuzzy-logic based function ofdecision making

(1) Membership functions: for comparison, two configurations, trapezoidaltriangle mixed shape (Figure 2) and triangle-shape (Figure 3) are used toevaluate the normalized changes (e) of node degree0,𝑡𝑟𝑖𝑎𝑛𝑔𝑙𝑒 𝑠ℎ𝑎𝑝𝑒𝜇(𝑥) 𝑥 𝑎; 𝑥 𝑐𝑥 𝑎,𝑏 𝑎𝑎 𝑥 𝑏𝑐 𝑥,𝑐 𝑏𝑏 𝑥 𝑐{0,𝑥 𝑎; 𝑥 𝑑𝑥 𝑎,𝑏 𝑎𝑡𝑟𝑎𝑝𝑒𝑧𝑜𝑖𝑑𝑎𝑙 𝑠ℎ𝑎𝑝𝑒𝜇(𝑥) 1,𝑑 𝑥{𝑑 𝑐 ,𝑎 𝑥 𝑏𝑏 𝑥 𝑐𝑐 𝑥 𝑑(2) Input space is partitioned in three regions: negative values(NV), zerovalues(ZV) and positive values(PV), and their corresponding output variable(u) is:𝑓𝑁𝐶 1, 𝑢 regio𝑒 𝑁𝑉𝑓𝑁𝐶 0,𝑒 𝑍𝑉{ 𝑓𝑁𝐶 1,𝑒 𝑃𝑉MFabcdboundariesNV𝜇𝑁𝑉 (𝑒)-4-2-0.50𝑒 0ZV𝜇𝑍𝑉 (𝑒)-0.500.5PV𝜇𝑃𝑉 (𝑒)00.52n 0.5 𝑒 0.54𝑒 0Table 1. Parameters of membership functions with mixed shape

1.210.80.60.40.20NVµ(e)-1ZV-0.5PV00.51e1eFigure 2. Membership functions of trapezoidal-triangle mixed shaperegioMFabcboundariesNV𝜇𝑁𝑉 (𝑒)-2-10𝑒 0ZV𝜇𝑍𝑉 (𝑒)-101 1 𝑒 1PV𝜇𝑃𝑉 (𝑒)012𝑒 0nTable 2. Parameters of membership functions with triangle shape1.210.80.60.40.20ZVNVµ(e)-1-0.50PV0.5Figure 3. Membership functions of triangle shape

Outputs: normalized communication range variation factor which can be used tocalculate the updated communication range and update energy level after packettransmissioniii.Secondary loop: update the desired node degree of each node using its battery level.Same fuzzy-logic membership functions as the primary loop are used.LanguageWe will implement the program in Java. The simulation and data analysis will bevisualized using Java GUI tools.ToolJFreeChart (http://www.jfree.org/jfreechart/)

Generate outputa. Draw the nodes network connected graph against time (cycle number) to display thechange in connectivity of the network.b. Draw the shortest distance path from each sensor node to the based station to visualizethe packet transmission in each cycle.c. Plot the total remaining energy of the system against time(cycle number)d. Record the total number of packets received at based stationTest against hypothesisa. Compare the network connection in each cycle and show the dynamic change of theconnected sensor network and the packet transmission paths.b. Compare the number of packets received at based station of fuzzy-logic based systemwith that of static non-fuzzy system to show the advantages of fuzzy-logic controlledsystemc. Compare numbers of packets transmitted using different fuzzy-logic functions to showthe choice of fuzzy-logic functions can affect the performance of sensor networkd. Compare the changes of total network energy between fuzzy-logic based and staticsystems to show the different energy consumption footprints in these two types ofsystems

ImplementationCode (see attachment)Design document and flow charta. Generation of a list of nodes including a based station node and 30 random sensors nodes.The newly generated list is saved to a txt file so that the same input data can be used forsimulations with and without fuzzy logic as well as different fuzzy-logic configurations.b. To start the simulation, a list of nodes is either generated at will or imported from a txtfile, followed by the generation of the starting sensor network graph.c. Before simulation, options for configurations can be selected: fuzzy-logic or non-fuzzylogic, fuzzy-logic configuration 1 or 2

d. In the main loop, at most 30 cycles of simulations are performed. In each cycle, the statusof each node (communic

Fuzzy logic has two different meanings. In a narrow sense, fuzzy logic is a logical system, which is an extension of multivalued logic. However, in a wider sense fuzzy logic (FL) is almost synonymous with the theory of fuzzy sets, a theory which relates to classes of objects with unsharp boundaries in which membership is a matter of degree. In .

Related Documents:

Jul 03, 2020 · In wireless sensor networks for the Internet of Things (WSN-IoT), the topology deviates very frequently because of the node mobility. The topology maintenance overhead is high in flat-based WSN-IoTs. WSN clustering is suggested to not only reduce the message overhead in WSN-IoT but also c

Long o in Accented Syllables: TRG 90-91; WSN 135-138 Long u in Accented Syllables: TRG 92-93; WSN 139-142 Short and Long e in Accented Syllables: TRG 94-95; WSN 143-146 b) Use knowledge of homophones. Homophones: TRG 38-39; WSN 31-34; WTWL The Not-So-Scary Scarecrow c) Decode regular multisyllabic words. Sy

A Wireless Sensor Network (WSN) is composed of . Routing Challenges in Wireless Networks Some Routing Algorithms Challenges are: Broadcast nature of wireless medium . on several issues: Choosing forwarding candidates Prioritization Problem Tanyar Pooyeh, WSN, 11.10.2013 17 .

University of Crete, Computer Science Department 5 Lecture 1: Introduction to WSN and CS-541 course Lecture 2: Protocol stacks, and wireless networks prerequisites. Lecture 3: Network standards for Personal and Body-area networks Lecture 4: Signal processing prerequisites. Lecture 5: Signal Sampling for WSN Lecture 6: Radio Duty Cycling in WSN

Since the eld { also referred to as black-box optimization, gradient-free optimization, optimization without derivatives, simulation-based optimization and zeroth-order optimization { is now far too expansive for a single survey, we focus on methods for local optimization of continuous-valued, single-objective problems.

Wireless Sensor Networks (WSN) are used to monitor and control various domestic and industrial automations. Emerging Internet-of-Things (IoT) devices makes it possible to develop cost effective wireless sensor nodes with internet connectivity. The combination of IoT and WSN are moving towards edge technology.

Structure topology optimization design is a complex multi-standard, multi-disciplinary optimization theory, which can be divided into three category Sizing optimization, Shape optimization and material selection, Topology optimization according to the structura

An approach for the combined topology, shape and sizing optimization of profile cross-sections is the method of Graph and Heuristic Based Topology Optimization (GHT) [4], which separates the optimization problem into an outer optimization loop for the topology modification and an inner optimization loo