- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 591809, 8 pages
Data Storage Scheme Supporting for Multidimensional Query
College of Computer Science and Technology, Zhejiang University of Technology, Zhejiang 310023, China
Received 20 December 2012; Revised 17 March 2013; Accepted 7 April 2013
Academic Editor: Tai-hoon Kim
Copyright © 2013 Keji Mao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The query and storage of data is very important in wireless sensor networks (WSN). It is mainly used to solve how to effectively manage the distributed data in the monitored area with extremely limited resources. Recent advances in technology have made the number of the sensing modules in one sensor develop from single to multiple. The existing storage scheme for one-dimensional data is not suitable for the multidimensional data or costs too much energy. We proposed a kind of data storage scheme supporting multidimensional query inspired by K-D tree. The scheme can effectively store the high-dimensional similar data to the same piece of two-dimensional area. It can quickly fix the storage area of the event by analyzing the query condition and then fetch back the query result. Meanwhile the scheme has a certain degree of robustness to packet loss and node failure. Finally the experiment on the platform of Matlab showed that our scheme has some advantages compared with the existing methods.
A wireless sensor network is composed of a large number of sensor nodes deployed in the monitored area and these nodes communicate through wireless waves. The basic function of WSN is accessing the information. The user can get the information of objects through these nodes and can even control some of them .
As the basic component of WSN, a sensor node usually consists of several modules, just like sensing module, processing module, communication module, and power module . Earlier sensor node is simple and usually includes only one sensor, such as temperature sensor or humidity sensor. It gets only one numerical value when it detected events and these events are called one-dimensional events. The queries for these events are called one-dimensional query. Recent advances in technology have made the number of sensor of the sensing model develops from single sensor to multiple sensors and the sensing model can get several numerical values at the same time, such as temperature, humidity, light, and pressure. When it detects an event, it gets a value like temperature, humidity, light, pressure and these events are called multidimensional events. According to the number of dimensions and the range size of query, multidimensional query can be divided into multidimensional exact match point query, multidimensional partial match point query, multidimensional exact match range query, and multidimensional partial match range query .
Multidimensional events emerge with the development of technology. The existing data storage schemes are designed for the one-dimensional event and these schemes cannot be used for multidimensional event, or it costs too much energy in multidimensional event query. Limited energy is an important feature of WSN and the life time of the whole network is an important indicator of its performance; meanwhile the long-time stable running is also a significant security for the usage in reality. So how to design a data storage scheme to support the multidimensional query, which can avoid amount of useless queries, reduce the response time, save the energy of the nodes, and extend the life of the network, is faced by all scholars.
The existing schemes supporting for multidimensional query include DIM  and Pool . DIM is the first algorithm used to solve the problem. It stores the event by using the code of the event and resolves the query into many subqueries and gets the result, respectively. Pool addresses some weakness of DIM such as hot spot and scalability problems and further proposes a storage scheme to group index nodes together as a data pool to preserve the neighborhood property of nearby multidimensional data; however, their group mechanism is only based on the greatest and the second greatest attribute values, which has not been proved to be efficient enough for high-dimensional data processing. The literature  proposed a secure and reliable data distribution scheme in unattended WSNs. Work  proposed an energy-efficient query algorithm to query the top- value of sensed data. MDCS is a multiresolution data compression and storage strategy . Work  proposed a bouncing-track-based data storage and discovery scheme in WSN. The literature  proposed a secure and reliable data distribution scheme in WSN.
The existing storage schemes supporting multidimensional query mainly give solutions from the theoretical point, but there are still many shortcomings. Hot spots: the storage node and the nodes nearby may quickly become the hot spots because of excessive communication. Scalability problem: as the number of sensor nodes in the system increases, the amount of message exchanges among sensors increases too fast. Query costs too much: the cost is too high in the present schemes. Hard to implement: most of the existing schemes require the accurate division of the network to ensure a grid only has only one or a few nodes and this is hard to carry out in real .
Faced with the emergence of the multidimensional events and flaws of the existing data storage schemes, we propose a new method inspired by K-D tree. It can solve the flaws in some degree, effectively reduce the energy cost, and extend the life of the network.
2. Design of Data Storage Scheme Supporting for Multidimensional Query
2.1. K-D Tree Introduction
K-D tree  is a data structure that can effectively store multidimensional data. K represents the dimensionality of the search space; K-D tree is evolved from the binary tree. The difference is that each layer represents a dimension and you can use the value of each dimension as a splitter to make decisions. The top layer node is chosen from any of the dimensions. The second layer is divided by another dimension. When the value of depth of the tree is larger than the value of dimensions, you can reuse these dimensions.
The advantage of the K-D tree is that the data are classified according to the value of each dimension. The closer the value of each dimensional data the more probable the data may be classified together, this idea can be directly applied to multidimensional queries in WSN. In the progress of designing the data storage supporting multidimensional querying, first, you should map the data in high-dimensional space to two-dimensional space and maintain the local nature . Second, you can reuse the dimension to split the data into smaller range. So you can give a more accurate position in querying. Third, you can split the area according to each value, and this value also can be applied to the division of monitoring area in WSN.
The basic idea of data storage is as follows: suppose the dimension of monitored event is ; first, we construct a binary tree of depth of , . Each layer of the tree is corresponded to each dimension of the event. When , each layer of the tree is divided according to 0.5. When , 0.25 and 0.75 are used as the splitter values. At last all data are stored in leaf nodes.
2.2. Data Storage Mechanism
2.2.1. Mapping an Event to a Storage Area
Suppose the wireless sensor nodes are uniformly distributed in the monitoring area, and nodes can communicate through the exchange of information. All nodes know their coordinates in the area. When the node detects an event, it will get a set of data elements about the event. We use to represent the -dimensional event: , in which each attribute value has normalized. For the query issued by the user, we use to represent , ; in which and , respectively, represent the minimum and maximum attributes of .
First, we construct a virtual binary tree before mapping the event to the storage area, then we divide the storage area and insert event on the basis of the binary tree. The key point is how to fix the depth of the tree, because it will decide the number of storage area. Assume the depth of the tree is and the dimension of event is . To each dimension of events for a comparison, the depth needs to fix the condition: . For the maximum value about , we assume nodes in each partitioned grid will receive the data in all directions and have the same probability. In order to store data with the best balanced manner, we set a storage node in each direction, so the grid should have at least 8 nodes. Assume the number of nodes in the network is , so the number of grid is at most and the maximum depth of the tree is . Therefore, the depth of the tree should meet the condition: . The value of can be flexibly selected according to the size of monitoring area.
When the depth of the tree is determined, the network monitoring area is divided into storage area. When the event is generated in the network, it should be stored into appropriate storage area. First, we should encode the event. For event , we assign a -bit binary string. For every bit , changes from 1 to ; if , this bit is encoded as 0; if , this bit is encoded as 1. When changes from to , if , this bit is encoded as 0; if , this bit is encoded as 1. This work stops until the -bit numbers are all assigned. At last, the event is encoded into .
In , the odd bit divides the area symmetry in left and right. Left is 0 and right is 1. The event bit divides the area into above and below. Above is 0 and below is 1. So each binary string at last determines a storage area. This storage area is defined by the lower left coordinates and upper right coordinates .
Suppose ; we first calculate the lower bound on the -axis as follows:
We get the lower bound of -axis as follows:
Therefore we define a matrix as follows:
We can calculate as follow:
After getting the lower bound of the storage area, we need to find the upper bound and . We first make XOR operation on :
Then we calculate :
At last we calculate the real upper bound :
Finally the storage area is defined by and : .
2.2.2. Routing an Event to a Storage Area
After getting the storage area of an event, we need to route the event to this area to store. The progress is as follows: the node that detected the event first compares its geographic coordinate with the coordinate of storage area. If the node’s coordinate falls in the range of storage area’s coordinate, the node will store the event locally. Otherwise, the node will attempt to route the event to the corresponding storage area with GPSR (GPSR: Greedy Perimeter Stateless Routing for Wireless Networks).
GPSR is a geographic routing protocol, the benefit of which is that it can route the packet to the destination with greedy manner after known coordinate of the source node and destination node . In addition to the protocol’s own information, the package also carried the coordinate of the storage area. The packet format is as follows:
and represent the coordinate of the center of . They are the destination address of GPSR. In the routing progress, every node will compare its own coordinate with them. When a node meets the condition of , that means the event has been routed to the storage area. The next step is selecting a node to store the event. In order to ensure load balancing, the selection of storage nodes needs to meet certain conditions.
2.2.3. Load Balance in the Storage Area
After the event has been routed to the storage area, we need to select a node to store the event. There are many methods. In this scheme we operate like this: we select the node along the direction of the event coming from and closest to the center of the area to store as Figure 1 shows. Suppose the lower left coordinate of is , the upper right coordinate of is , and the middle coordinate of is ; then the storage node should meet the following condition: and .
The storage capacity of every node in the network is limited. We set a threshold to node’s memory load. When the capacity of the node reaches the threshold, the node cannot receive events. In the progress of selecting storage nodes, the node will be skipped. By using this method, every node will have the opportunity to store events.
2.3. Data Query Mechanism
The query processing mechanism contains two parts: query resolving and retrieval route. The design of the query resolving is determining a set of relevant range spaces which can provide answers to the query. The retrieval route is fetching match events to the query from set space.
2.3.1. Query Resolving
Multidimensional queries include point queries and range queries. Point querying is identical to inserting an event, but range querying includes multidimensional exact match range querying and multidimensional partial match range querying. It is related to more storage areas, so you need to resolve the query conditions first. The following parts, respectively, described their solutions.
(1) Query Resolving Mechanism for Exact Match Range Queries
We represent the event in the network with , when the user sends a query like and it satisfies , . We call the query as exact match range querying. How to split the query is as follows: if the depth of the binary tree is identical to the number of dimensions, then we check ’s th attribute whether contains the value 0.5. If it contains, then we divide the in two subqueries. If the depth is larger, then the query will be divided into smaller ranges. For example, if you send a query and the depth of the binary tree is 4, you will get four subqueries after resolving:
The binary strings of the four subqueries are 0101, 0100, 1101, and 1100 and they, respectively, correspond with four storage areas in the network. 0101 and 0100, 1101 and 1100 are different with the last bit. We can certify their storage areas are adjacent. So if sub-queries are just different with the last bit, we can combine the two sub-queries into one query and get rid of the last bit. In this example, the combined binary strings are 101 and 110. The benefit of the mechanism is reducing the number of routing path from four to two to save the power energy.
(2) Query Resolving Mechanism for Partial Match Range Queries
Assume that is a three-dimensional partial match range query. The value of the three-dimensional can be anything. That means there are more results satisfing the condition and the searching area for the query will be extended. For this kind of queries, we can reset the range of each unspecified attribute as , then the query became , then we can use the resolving method of exact match range queries.
2.3.2. Retrieval Route
Routing queries is similar to inserting an event. You can get several sub-queries after resolving and combining these queries. And every binary string of the sub-queries corresponds to a storage area. By using GPSR routing protocol, these sub-queries will route to their corresponding storage areas. Upon receiving the sub-query, a node would flood the sub-query to nodes in the same space. The nodes answer the sub-query with matching events values. The retrieved qualifying events are sent back to the user through the same path.
3. Simulation and Analysis
3.1. Experiment Parameters and Performance Evaluation Factors
We make the simulation on the platform of Matlab and compare our scheme to DIM and Pool. Because the exact point query is simple, it is hard to show the differences of each algorithm. We choose range query as the comparison object. The experiment parameters are the same as those in DIM and Pool.
(1) Sensor Nodes Setting
In the experiment, we uniformly place sensor nodes in the entire field. The number of sensor nodes varies from 300 to 1800. Each node has a radio range of 40 m and has on average 20 nodes within its nominal radio range. Every node’s storage capacity is 20 events.
(2) Events Setting
In the experiment, each sensor node on average generates three events and each event has four dimensions. If there are nodes in the network, the total events are 3.
(3) Exact Match Query Setting
We employ the four query size distributions which are also used in DIM and Pool to emulate the range sizes specified in a query for the fair comparison. They are uniform in width, bounded width, algebraic width, and exponential width. Here we briefly describe the concepts of these size distributions. Two parameters mp and rs are used to generate attribute value range of a query. mp stands for the midpoint of an attribute value range in a query and rs stands for its range size. When mp and rs of a value range are given, the range can be represented as . We uniformly select mp with for all queries; rs on the other hand is different in different size distribution.
For a uniform range size distribution, the range size for each dimension is uniformly distributed in . To generate such queries, we uniformly select rs within the range . For the bounded uniform distribution the range size on each dimension of a query is uniformly distributed in a predefined . In all the experiments, the bound is set to be 0.5. Thus, to generate queries with bounded uniform size distribution, rs is uniformly selected within . In an algebraic distribution, most queries have a small range on each dimension. rs is more likely to be selected within . Finally, for the exponential distribution, all queries have a small range size on all the dimensions. More specifically, the range size on each dimension is uniformly distributed over .
(4) Partial Match Query Setting
A partial match query occurs when one or more attribute value ranges are unspecified. In that case, we will consider those unspecified ranges as the entire value range . For convenience in discussion, we refer to an -partial match query as a query with specified value ranges. For a four-dimensional partial match query, can be 1 or 2 or 3. When , that represents the value of one dimension is not specified. For a four-dimensional query, that could be any one. If the unspecified value range is th attribute in the -dimensional query, we can use to represent it. The reason of having the distinction of the partial match query is that the performance is strongly dependent on which attribute in the query has an unspecified value range. It performs quite differently if the unspecified range occurs at different attribute.
The performance metrics employed in the experiments are the same as those used in DIM and Pool. They are average insertion cost, average query delivery cost, and the number of hot spot.
Average Insertion Cost
It measures the average number of messages required to insert an event into the network.
Average Query Delivery Cost
It measures the average number of messages required to route a query message to all the relevant nodes in the network.
Number of Hot Spot
In order to achieve load-balancing effect, we set a threshold to every node. Once the number of stored events reaches the threshold, it changed into a host spot.
3.2. Analysis of Simulation
3.2.1. Average Insertion Cost
Configured with the above parameters, we investigated the average insertion cost under different size of network. The result is as shown in Figure 2.
We can find that there is no difference between these three approaches. This is not surprising since the insertion of an event is simply routing a data packet from one sensor node to another, and all the three approaches use the GPSR. We can also find that Pool and our algorithm are a slightly better than the DIM, as in the routing progress there is no clear coordinate of the destination node. It routes the data package to the destination step by step by comparison of the coding, which sent more packages than the other two methods.
3.2.2. Average Query Delivery Cost
(1) Comparisons on Exact Match Queries
We can observe some interesting facts from the four figures.
First, all the figures reveal that the range size of a query strongly affects the performance of the three approaches. For instance, all the approaches cost much less in exponential size distribution than in uniform size distribution. This is mainly because data are stored according to splitters like 0.5 and 0.25. The smaller the range size is, the easier a query gets the result. A query therefore has to visit a large amount of storage areas in order to acquire all the answers in uniform size distribution.
Second, the performance result reveals that our algorithm is scalable than Pool, and Pool is scalable than DIM. In DIM all sensors are treated as index nodes. The network needs to construct a huge structure of tree first and that definitely leads to the flood of messages. In Pool the number of pool will not change when the size of network turned larger. A package needs to visit more nodes to get to the destination. In our method the size of the tree is adjustable. We can control the size of flooding area by changing the depth of the tree.
(2) Comparisons on Partial Match Queries
The result in Figure 7 shows that the more dimensions in a query with an unspecified range, the higher the query processing cost would be incurred. The reason is that the more unspecified ranges are, the more index nodes would be accessed which incurs a higher cost. In addition, in the same dimension with unspecified range, DIM costs much more, because it randomly sends the message and the message may route to some unrelated nodes. In one-dimensional partial query, the effect of our method is the same as Pool. The reason is the flooding area becomes large when the number of unspecified range is high. But our method performs better than Pool when the number of unspecified range changed small. The reason is Pool is always searching in the fixed area but ours has changed.
In partial match queries, the location of unspecified dimensions can be changed when its amount is fixed. Figure 8 shows the result of a three-dimensional query.
We can see from Figure 8 that the change of the location of unspecified dimension does not have too much influence to the three methods and Pool is the most stable one. In Pool, the storage area is stable and the number is fixed. The change of the location of unspecified dimension just influences the length from sink to the storage area, but the change in DIM and our scheme can affect the amount and position of the storage area. We can see in Figure 8 that the number of messages is a fluctuating state.
3.2.3. Comparisons on Hot Spot
A good algorithm should have a good mechanism to load balancing. All of the three algorithms have this kind of mechanism. We fixed the size of the network as 900 sensor nodes. Every node sends three packages and the threshold is 20 packages. The result is shown in Figure 9.
We can find that DIM performs worse than Pool, and Pool performs worse than our scheme. In scheme, every node chose a backup node. When it reaches the threshold, the backup node starts to replace it and store data. An event is corresponding to a range and a range is corresponding to a node. So an event directly figures a storage node. In this case, the storage node will soon reach the threshold. In Pool, the storage area is determined by both the events’ greatest and the second greatest attribute values. This in some extent divides the similar high-dimensional events again and ensures the storage nodes do not grow too fast. In our scheme, storage area relies on the binary string of the events. The storage node is chosen from the direction of event and it is closest to the center of the storage area. The similar high-dimensional events coming from different directions may store at different nodes. This is the mechanism to load balancing in our scheme. Figure 9 also shows that this method can indeed slow down the production of the number of hot spots.
Data storage and query is an important aspect of data management in WSN. A good storage scheme can give the convenience for the query, save the energy for the network, and greatly extend the network lifetime. For the emergence of multidimensional events, scholars have proposed some ways to ensure the effectiveness of energy. The data storage scheme in this paper is inspired by K-D tree. It first calculates the storage area by encoding the events, then it routes the package to there. The selection of the storage node is related to the direction of the event. In a storage area, there can be different storage nodes and this in some extent ensures the load balancing in the network. The scheme supports multidimensional query through resolving, encoding, and combing the query. In addition, for the integrity of the algorithm the scheme has robustness to package loss and node failure. Finally, we made experiment on the platform of Matlab. The result shows the scheme has much advantage than DIM and is slightly better than Pool, but the complexity and robustness of the scheme are better than both of them.
This work is supported by the National Natural Science Foundation of China under Grant no: 61104095, the Natural science Foundation of Zhejiang Province under Grant nos: LY12F02036; Y1110915, the Science and Technology Research Project of Zhejiang Province under Grant nos: 2011C21014; 2012C33085; 2012C33073.
- D. Culler, D. Estrin, and M. Srivastava, “Overview of sensor networks,” Computer, vol. 37, no. 8, pp. 41–49, 2004.
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002.
- R. Gummadi, X. Li, R. Govindan, C. Shahabi, and W. Hong, “Energy-efficient data organization and query processing in sensor networks,” in Proceedings of the 21st International Conference on Data Engineering (ICDE '05), pp. 157–158, New York, NY, USA, April 2005.
- X. Li, Y. J. Kim, R. Govindan, and W. Hong, “Multi-dimensional range queries in sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), pp. 63–75, Los Angels, Calif, USA, November 2003.
- Y. C. Chung, I. F. Su, and C. Lee, “Supporting multi-dimensional range query for sensor networs,” in Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS '07), pp. 35–44, Toronto, ON, Canda, June 2007.
- Y. Ren, V. Oleshchuk, and F. Y. Li, “A scheme for secure and reliable distributed data storage in unattended WSNs,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), Miami, Fla, USA, December 2010.
- W. H. Liao and C. H. Huang, “An efficient data storage scheme for top-k query in wireless sensor networks,” in Proceedings of the IEEE Network Operations and Management Symposium (NOMS '12), pp. 554–557, Maui, HI, USA, April 2012.
- Z. Ning, S. Shi, J. Li, et al., “Multi-resolution data storage method for region query in sensor network,” Journal of Computer Research and Development, vol. 49, no. 3, pp. 589–597, 2012.
- Z. Li, N. Xiao, and F. Chu, “A bouncing-track based data storage and discovery scheme in large scale sensor networks,” Journal of Computer Research and Development, vol. 47, no. 11, pp. 1911–1918., 2010.
- Y. Ren, V. A. Oleshchuk, and F. Y. Li, “Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs,” Computer Communications, 2012.
- Z. Tao, Z. Gao, and Z. Lu, “Two new push-pull balanced data dissemination algorithms for large-scale wireless sensor networks,” Journal of Computer Research and Development, vol. 45, no. 7, pp. 1115–1125, 2008.
- J. L. Bentley, “Multi-dimensional binary search trees used for associative searching,” Communications of the ACM, vol. 18, no. 9, pp. 509–517, 1975.
- L. Xie, L. Chen, D. Chen, and L. Xie, “A decentralized storage scheme for multi-dimensional range queries over sensor networks,” in Proceedings of the 15th International Conference on Parallel and Distributed Systems (ICPADS '09), pp. 166–173, Shenzhen, China, December 2009.
- B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 243–254, August 2000.