- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Recently Accepted Articles ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Subscription Information ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 718297, 12 pages
An Efficient Data Evacuation Strategy for Sensor Networks in Postdisaster Applications
1School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan 611731, China
2School of Computer Engineering, Nanyang Technological University, Singapore 639798
Received 10 October 2012; Accepted 26 November 2012
Academic Editor: Nianbo Liu
Copyright © 2013 Ming Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Disasters often result in a tremendous cost to our society. Previously, wireless sensor networks have been proposed to provide information for decision making in postdisaster relief operations. The existing WSN solutions for postdisaster operations normally assume that the deployed sensor network can tolerate the damage caused by disasters and maintain its connectivity and coverage, even though a significant portion of nodes have been physically destroyed. Inspired by the “blackbox” technique, we propose that preserving “the last snapshot” of the whole network and transferring those data to a safe zone would be the most logical approach to provide necessary information for rescuing lives and control damages. In this paper, we introduce data evacuation (DE), an original idea that takes advantage of the survival time of the WSN, that is, the gap from the time when the disaster hits and the time when the WSN is paralyzed, to transmit critical data to sensor nodes in the safe zone. Numerical investigations reveal the effectiveness of our proposed DE algorithm.
While disasters could result in a tremendous cost to our society, access to environment information in the affected area, such as, damage level and life signals, has been proven crucial for relief operations. Hundreds of disasters in various scales, including earthquakes, flooding, tornadoes, oil spilling, and mining accidents, happen around the world each year. Not only do they bring in huge economic lost by destroying assets, but also they can take lives in large quantities. According to a disaster statistic report , the average number of people affected by disasters is more than two hundred million per year from 1991 to 2005, and thousands of them lost their lives. When disasters hit, relief operations often focus on saving lives and reducing property damages. Given the chaos in the affected areas, effective relief operations highly depend on timely access to environment information. For example, the life vitals of survivors would be extremely helpful for rescue workers to determine where to dig a tunnel to the spot. Previously, wireless sensor networks [2–4] have been proposed to gather useful information in disasters such as earthquake, volcano eruption, and mining accidents.
However, even with sensor networks, gathering crucial information in postdisaster relief operations turns out unpredictably challenging. When a disaster strikes, the communication facilities, power units, and roads will usually be destroyed, which, along with some concomitant accidents, for example, building collapse, fires, and gas explosions, and so forth, may disrupt the normal functionalities of sensor networks. For example, sensor nodes could be damaged in the event of a fire and communication channels are thus disconnected. Previous researches [5–10] tend to overlook at this possibility and thus result in relief solutions that are inherently impractical. As a result, the decision-making process could be paralyzed with incomplete information.
In this paper, inspired by the “blackbox” solution in flight industry, we propose data evacuation (DE): an original idea which utilizes the surviving time interval of sensor nodes, namely, the duration in which WSNs still function after the disaster, to transmit vital data to the sensor nodes in the safe zone. Our idea relies on the following observation. It is quite possible that the buildings or local resources do not get damaged or destroyed at the beginning of most disasters. As a result, the deployed sensor network can keep working for a while before it becomes completely paralyzed. This grace period can be used to transit vital data gathered by the WSN.
Our proposed data evacuation works under extreme situations, thus requiring different design metrics from normal wireless sensor networks. From an engineering perspective, one would like to gather as much information as possible, preferably within short period as much as possible. The former metric corresponds to the evacuation ratio, defined as the amount of successfully rescued information in respect to the whole amount of information gathered by the network; the latter corresponds to the evacuation time, defined as the amount of time spent in rescuing all the information. However, as with any engineering design problem, these two metrics are competing with each other. Since maximizing evacuation ratio and minimizing evacuation time cannot be achieved simultaneously in any design of DE, it is our responsibility to judicially balance a tradeoff between the two metrics in a realistic solution of DE.
In this research, we first reveal a mathematical structure of our problem, and then our main focus turns to develop and evaluate scalable distributed algorithms for our proposed DE strategy. If one would trace the path of each bit of data transits in the network, this problem can be modeled as a non-linear programming problem with multiple minimums in its support. Rather than seeking the analytical solution for such a formulation, we take a pragmatic approach to design distributed protocols to route the vital data to safe zones in an affected region. We will propose two distributed data-rescuing protocols, namely, a gradient-based (GRAD-DE) one and a gravitation-based (GRAV-DE) one. The former is related to Newton’s method  for non-linear programming and the latter is related to Newton’s law of physics . In addition, we will evaluate their efficacy under the aforementioned design metrics with extensive simulation. Evaluation shows the significant effectiveness of DE strategies for postdisaster applications. The major contributions of this works are as follows.(i)To the best of our knowledge, we are the first to propose the idea of data evacuation for postdisaster applications. The basic operation of DE is to send sensitive data from the whole network to the nodes in the safe zone; in that case, the relief efforts of rescue group will benefit a lot from the reproduction of “the last shot” of the monitoring region based on the saved sensitive data. (ii)Building the mathematical structure of our problem, we propose two distributed data-rescuing algorithms. Our algorithms are mathematic avatars of Newton’s method on non-linear optimization and Newton’s law of physics. (iii)Extensive simulation has been conducted to verify the efficacy of GRAD-DE and GRAV-DE and illustrate the fundamental tradeoff between the two design metrics: evacuation time and evacuation ratio.
The remainder of this paper is organized as follows. Section 2 discusses the related work. Section 3 gives the definitions and assumptions about disaster scenario and network model. Section 4 presents the detailed design of GRAD-DE and GRAV-DE, followed by their evaluations in Section 5. Section 6 concludes the paper.
2. Related Work
One of the critical tasks for postdisaster relief is to collect urgent information quickly and safely to rescue lives and control damages. There have been a lot of research works on data collection with wireless sensor networks. However, research on vital data collection in disaster circumstances has been rare.
Some previous research employ wireless sensor network to gather useful data in a hostile environment like earthquake or volcano [2–5]. Suzuki et al. present a high-density earthquake monitoring system in . The raw data about earthquake is gathered by a sink node and can be used for further analysis after earthquake. But the collected data is just about earthquake rather than survivors. To estimate the individual damage in personal area, a WSN system is proposed in  to provide useful information to predict the individual damage, which is not accurate to serve for rescuing. In , Cayirci and Coplu presents a wireless sensor network (i.e., SENDROM), in which nodes are randomly deployed before disaster occurs, for disaster relief operations management. In postdisaster relief, rescue teams use mobile central nodes to gather information such as survivor’s location by querying the sensor nodes.
To collect data more efficiently, some works have studied hybrid networks for data collection in disaster situations [6–8]. These systems employ cellular systems (or wires systems) and sensor networks in parallel to achieve a superior performance, such as, high speed, high capacity, and wide area coverage. A hybrid network model in  collects damage assessment information from a large number of nodes, and its connectivity is maintained by an alternative route in the event of disasters. Fujiwara et al. employ a hybrid of sensor and cellular networks in . They present a data collection system to detect damage in a disaster and to transmit the data to an emergency operation center. It applies the network scheme to a versatile data collection system using sensor networks for damage assessment and for victim detection beneath the rubble of collapsed buildings. However, in the hybrid network, the cellular network could be paralyzed by disasters quickly or congested by the sudden high load even if it survives so that the data collection system breaks down.
Among these works, they did not consider the possibility that some base stations of cellular networks or the sensor nodes might be collapsed or unreachable during or after disasters. In , authors presented a data collection framework which employs Ad hoc Relay Stations (ARSs). It can convey data from the collapsed area by sending them to the nearest ARSs. However, it is built on cellular networks, which would be destroyed immediately during disasters. Li and Liu present SASA , a Structure-Aware Self-Adaptive wireless sensor network, for underground monitoring in coal mines. By regulating the mesh sensor network deployment and formulating a collaborative mechanism based on the regular beacon strategy, SASA is able to rapidly detect structural variations caused by underground collapses. The collapse holes can be located and outlined and the data can be transferred outside of the collapsed region. However, the stationary mesh network could be ruined and become unreliable when a collapse occurs.
To the best of our knowledge, this paper is the first one that considers a wireless sensor network under stress and evacuates the critical data to the safe zone for postdisaster relief operations.
3. System Models and Problem Description
3.1. Network Model
In this paper, we assume that sensor nodes are randomly uniformly deployed in an square area , and the communication radius of sensor node is . The network can be modeled as an undirected graph , where is the set of sensor nodes in the network, is the number of sensor nodes, and is the set of links between sensor nodes in the network. For any two nodes and , if , and are neighbors and there is a link between them. For any node , its neighbor node set is .
In the event of a disaster, the capability of sensor nodes is assumed to be as follows.(i)It can sense some meaningful event around. For example, sensor node can sense human vital signs through sound, infrared rays, temperature, image, and vibration sensors.(ii)Sensor node can sense and measure the surrounding physical intensity (like the intensity of earthquake shock, temperature and smoke density in the fire, gas density before gas explosion, etc.) variation caused by a disaster.(iii)Sensor node can rank itself as safe, critical, or dangerous, according to a predefined algorithm using the physical intensity variation it senses as inputs.
We do not assume the existence of a sink node that gathers all the data and routes to the relief center. When a serious disaster occurs, original communication infrastructure may be destroyed; even if some of them survive, they usually cannot provide effective service for disaster relief applications. In our approach, data evacuation is accomplished by collaborative efforts of every sensor node in the network to route the critical information to a few safe zones in the affected region.
3.2. Disaster Model
In this subsection, summarizing a set of common characteristics in most disasters, we construct a simplified disaster model, as follows.
Definition 1 (devastating event). We use a Quaternion to represent a devastating event , where is the centre point of the zone where the devastating event occurs, given by the coordinate ; is the intensity of the devastating event; is the attenuation coefficient of disaster propagation; is the region that the devastating event affects.
Definition 2 (disaster). Disaster is a set of devastating events and could be denoted by .
Let us look at an example. When a coal-mine accident (disaster) occurs, it probably consists of several gas explosions and water leak accidents, each of which corresponds to a devastating event. Each devastating event could be described by four elements: the position of event occurrence, the intensity of this event, the attenuation coefficient of this event, and the region affected by this event. The intensity is the highest in the centre point of a devastating event and weakens as it gets further away from the center point. Usually reflects the change of in the region where disaster affects. There is no common attenuation coefficient for disasters. For simplicity, we assume a linear attenuation coefficient denoted as . Under the impact of , a devastating event can be depicted as a subarea of which the intensity is linearly descending from a centre point. As an example, Figure 1 illustrates a typical intensity distribution of a disaster with four devastating events, and the intensity is collected by sensors in the affected region. The centers of the four devastating events are (15, 25), (25, 40), (55, 85), and (85, 60). It can be seen that the intensity function has multiple sets of minimum points in its support (i.e., the affected region).
In this paper, according to the data that the sensor nodes collect, we define an algorithm to classify the state of the sensor node into three categories: safe, critical, and dangerous. Let be the intensity that the node senses; , are two thresholds which are predefined according to the disaster scene. Then, we have Let , , and represent the set of safe nodes, critical nodes, and dangerous nodes, respectively.
When a disaster occurs in a certain place, the disaster usually only affects a limited area near the center, and similar disaster damage often shares the same zone. According to this, the three sets , , and will have their own zones geographically, and since, after a disaster happens, there exists a short period of time when the sensor nodes collect the intensity data and rank themselves, the disaster area will be divided into several zones, which could be safe, or critical, or dangerous.
Definition 3 (zone). The sensor nodes in a zone has the same rank level, and they are connected. Consider the zone to be a connected subgraph is a positive integer and it represents the total number of zones in the whole area. For arbitrary two zones , , there are , and . According to the rank level of each zone, we call it safe zone, or critical zone, or dangerous zone.
Figure 2 gives a vertical view for the disaster shown in Figure 1. Without the loss of generality, we adopt a normalized threshold of 0.5 for nonsafe zone in this paper and the threshold can be any value that manifests the physical meaning of a specific disaster (e.g., the Richter magnitude in earthquakes). In Figure 2, most area is covered by dangerous zone and critical zone (, ), due to the devastating event’s influence, and only a small area is covered by safe zone ().
Sensor nodes in different ranks have varying surviving time, resulting in different roles in our data evacuation strategy. Sensor nodes in the dangerous zone have the shortest life time, only several seconds or dozens of seconds. Sensor nodes in the critical zone live longer, usually minutes or hours, because of less damage the devastating event causes in this zone, but the continuous damage will make the sensor nodes in critical zone ultimately destroyed. Sensor nodes in safe zone can live much longer, usually hours or days or longer, because of the long distance from the dangerous zone and the least damage the devastating event causes, so the sensor nodes in this zone are suitable to store valuable data for assisting personnel rescue and disaster analysis.
In our scheme, if one follows a piece of information, it normally traverses from dangerous zones, with possible route via critical zones, to two alternative destinies. It either arrives at some safe zone, or is trapped in dangerous/critical zones (lost in the end). For the former case, we adopt a definition for the path through which the information traverses, as follows.
Definition 4 (effective evacuation path). If a path , and and such link , , and do not exist in path , then is the effective evacuation path.
3.3. Problem Formulation and Its Mathematical Structure
The end goal of our proposed data-rescuing strategy is to route the critical data sensed in the dangerous zone and critical zone to the safe zone for disaster relief and disaster analysis. The process of data evacuation can be expressed like this: for every sensitive data in any sensor node , data evacuation is to find an effective path and transmit the data to the safe zone. Any solution in this domain should have at least two desirable features. First, it should route as much information as possible. Second, data evacuation should be fast; otherwise the sensor nodes in the dangerous zone and critical zone could lose their data, or the sensor nodes in the effective evacuation path could be inactive.
As a manifest of the aforementioned features, we will focus on the following two performance metrics: (a) evacuation time: the time to complete the data evacuation process and (b) evacuation ratio: the percentage of whole sensitive data preserved in safe zone after finishing the data evacuation process. Data evacuation should be quick; otherwise the sensor nodes in the dangerous zone and critical zone could be damaged. As a result, some effective evacuation paths could fail to send the sensitive data to the safe zone. The data evacuation protocols need to guarantee that the amount of preserved sensitive data can provide enough useful information for postdisaster applications.
This formulation renders itself an elegant mathematical polymorphism. For each piece of information, it should strive to follow a path to any safe zone as fast as possible. If one considers the disaster intensity map as a two-dimensional function and any safe zone as a set of points with a minimum value, the data evacuation problem is equivalent to a non-linear programming problem with multiple (usually unknown) minimums in its support. This structural polymorphism with non-linear optimization will inspire the development of two efficient data-rescuing algorithms, both of which will be elaborated in the next section and are distributed in nature.
4. Data Evacuation Protocols
In this section, we present two alternatives DE protocols, each of which is a greedy algorithm seeking to optimize one design metric. The first protocol routes the critical information through effective evacuation paths following the highest gradient in the disaster intensity map, and thus denoted as GRAD-DE. The second protocol routes the critical information by effective evacuation paths leading to the closest safe zone with the largest storage capacity. Intuitively, the information is attracted by the gravitation (proximity and capacity) of the safe zone, and thus the protocol is denoted as GRAV-DE. The GRAD-DE protocol performs better in minimizing the evacuation time, while the GRAV-DE protocol excels in maximizing the evacuation ratio.
4.1. GRAD-DE Protocol
4.1.1. Detailed Design of GRAD-DE Protocol
The GRAD-DE protocol stems from the Newton’s method (gradient based) for non-linear programming problems. One of the potential issues with Newton’s method is that it could converge to local minimums. In our protocol, we allow a few steps to route the information to nodes with higher intensity, so that the critical message will not be trapped. Here is how the protocol works.
First, each sensor node obtains the intensity and the rank level of all its neighbors through a round of hello-message exchange. In the event of any disaster, a sensor node first senses the intensity of devastating event and determines its rank level based on the predefined and . After that, it will broadcast a hello message, including its sensed intensity and self-determined rank level, to all neighbors.
Second, as water always flows downwards, in the GRAD-DE protocol, each sensor node forwards the sensitive data sensed locally or received from other nodes to its neighbor with the minimum sensed intensity. Obviously, in most cases, it is reasonable to send the sensitive data to the node with lower sensed intensity because it is the most logic step toward the safe zone (also suggested by the Newton’s method). In order to avoid collision and reduce the communication cost, we adopt a single-copy forwarding strategy in the design.
This simple gradient-based forwarding strategy, however, could result in data trapped in stressed zones. For example, if a disaster consists of several devastating events, the sensed intensity () of nodes in a certain region could be lower than the sensed intensity of any other nodes that surround this region. In this situation, the sensitive data of surrounding nodes may be forwarded to the “Highland Basin” as shown in Figure 3, and all sensitive data in this region will be trapped.
In order to avoid this problem (equivalently, the local minimums in non-linear programming problems), the GRAD-DE algorithm consists of three correction steps as follows.
Step 1. Upon receiving all the hello messages from its neighbors, each node marks itself if its intensity is lower than that of any other neighbor and broadcasts a warning message to prevent all its neighbors from sending sensitive data to it.
Step 2. When a node receives a warning message, if its all neighbors with smaller intensity have send warning messages to it, it will mark itself and broadcast a warning message to inform that it cannot play a relay role in an effective path. Otherwise, it just drops the received warning message.
Step 3. When a node has sensitive data to forward, it will check whether it has been marked. (a) If yes, it will send the sensitive data to the unmarked neighboring node with the lowest intensity. If it cannot find any unmarked neighboring node, it will send the sensitive data to the neighboring node with the highest intensity, with the hope that the data will escape from the trapped region from the trapped region as soon as possible. (b) If not, it means that this node is not located in a “Highland Basin” region, so the sensitive data can be sent to the unmarked neighboring node with the lowest intensity.
4.1.2. Pros and Cons of GRAD-DE Algorithm
In this subsection, we will discuss the advantages and disadvantages of the GRAD-DE protocol, respectively.
On one hand, the GRAD-DE protocol comes with a few desirable characteristics. First, the control-message overhead for the GRAD-DE protocol is limited and upper bounded by two times of the total number of sensor nodes. In most cases, each node broadcasts a one-hop hello message to all its neighbors. Only when a “Highland Basin” problem appears will the nodes in this region broadcast an extra one-hop warning message to prevent sensitive data being transmitted to this region. As a result, even in the worst case, the number of control messages sent by one node is 2. Second, the GRAD-DE protocol does not rely on detailed information of the network topology. Specifically, each node simply sends sensitive data to its neighbor with the minimum intensity. As a result, the evacuation time will not be too long since we do not incur additional delay in topology discovery. Third, the GRAD-DE protocol is a scalable and distributed algorithm for data rescuing under stress, with some resemblance to the famous Newton’s method in non-linear programming domain.
On the other hand, the GRAD-DE protocol has several drawbacks. For example, any effective evacuation path is predetermined by the intensity distribution in the affected region. If a relay node is damaged by devastating events, sensitive data transmission cannot be adapted to a new path. Although such an issue can be avoided by periodically sending hello messages, the control-message overhead would increase. Collision is another issue, which is caused by no topology control for the GRAD-DE protocol and cannot be solved thoroughly by relying on the IEEE 802.15.4 MAC protocol. Adjusting the time interval for data sending could be a way to avoid collisions; however, such a strategy would pay the penalty of prolonging evacuation time. Buffer overflow is also a problem for the GRAD-DE protocol. As shown in Figure 4 where , , and are three safe zones, the number of member nodes of these three safe zones are 2, 11, and 3, respectively. Unfortunately, the GRAD-DE protocol does not provide any information about safe zones, such as the number of safe zones and the storage capacity of safe zones. As a result of the blind data forwarding, Figure 4 illustrates that too many nodes blindly send their sensitive data to and , although the storage capacity of these two zones is limited.
4.2. GRAV-DE Protocol
4.2.1. General Principle
The GRAV-DE protocol is proposed to avoid the buffer overflow problem in the GRAD-DE protocol, which happens because each sensor node blindly forwards its data to a random safe zone. Indeed, we believe that the protocol would better off if the data is forwarded to the closest safe zone with the maximum storage capacity. Such a principle is similar to Newton’s theory of gravitation. Intuitively, the movement of every single sensitive message to a certain safe zone can be regarded as it is attracted by the safe zone and moves to this zone along the direction of gravitational force between them if this gravitational force is bigger than that of any other force caused by different safe zones. As a result of this parallelism, one can see a natural mapping between concepts in data evacuation and those in physics, as summarized in Table 1, where denotes the th sensitive message of node , and denotes the storage size of certain safe zone .
The key for the GRAV-DE protocol is for each node in dangerous or critical zones to discover the information and distribution of safe zones, and then it can make a decision to send their sensitive data to an appropriate zone. For this object, the GRAV-DE protocol follows a three-step procedure.(1)Safe zone organization: in our design, each connected component or isolated node with maximum sensed intensity can be seen as a safe zone.(2)Safe-zone/evacuation-path broadcast: after safe zones have been identified, they will advertise their existence by broadcasting announcement messages to all nodes in critical or dangerous zones. (3)Evacuation path decision: nodes under stressed zones can determine the effective evacuation path for data evacuation, similar to the Newton's law of gravitation.
In next three subsections, we investigate the detailed implementation for the three steps in our proposed GRAV-DE protocol.
4.2.2. Safe Zone Organization
In this phase, the major task is to identify all connected components with the maximum sensed intensity . Each component will be organized as a cluster with one head, and the head node has the knowledge of the storage size of its cluster. This problem exhibits a strong resemblance to the gossip problem in .
Leveraging the rich set of results from the gossip protocols, we propose the following distributed algorithm for safe zone organization. At the initiation phase, each node with sets its ID as its component ID and broadcasts it to its all neighbors. Upon receiving other component IDs broadcasted by its neighbors, it will set its component ID to the minimum of its ID and all of its neighbors. Finally, the component ID of every node in the same connected subgraph will converge to a fixed ID. Algorithm 1 illustrates the safe zone organizing algorithm. The convergence and the correctness of this algorithm is omitted in this paper due to space limitation.
4.2.3. Safe-Zone/Evacuation-Path Broadcast
The next logical step is for each sensor node to obtain an evacuation path to all valid safe zones. Intuitively, this problem is equivalent to finding the set of the shortest paths from each sensor node in stressed zones to the list of safe zones. A rich set of research existed for this problem [16–18], among which the famous Dijkstra’s algorithm  inspires us the following distributed implementation for the evacuation-path broadcast protocol.
The protocol works as follows. After the safe-zone organizing phase is completed, the head node will broadcast an announcement message, including its unique component ID, its storage size, and hops with initial value 0, to all nodes in critical or dangerous zones. When a node receives an announcement message, it will check whether it receives a message from the same safe zone. If yes, it will compare the value of hops in this new message with that of former messages and record the announcement message with lower value and the forwarding neighbor; otherwise, it will record the message and the forwarding neighbor. After this step, it will rebroadcast its own record of safe zones. At last, every node in danger area will have the knowledge of evacuation paths to all safe zones.
4.2.4. Evacuation Path Decision
This step addresses how each node should choose its evacuation path to one of the safe zones, by adopting a similar criterion as in the Newton’s theory of gravitation. When a node with receives announcement messages from all safe zones , the gravitational force between one sensitive message and can be calculated using the following equation: where is a constant called the universal gravitation constant; denotes the storage size of , and denotes the hops from to the corresponding border node of . It then chooses the safe zone with maximum gravitational force as the destination for sensitive data evacuation of . Note that there are other possible decision criteria, as long as it generates an index increasing with higher storage capacity and decreasing with longer distance. In our research, we focus on one representative criterion, derived from Newton’s law of physics, but it is not necessarily optimal.
Notice that the location of head could affect the performance of the GRAV-DE protocol significantly. For example, as illustrated in Figure 5, the sensitive data of node can choose an evacuation path from path 1 or path 2 to evacuate its sensitive data to a safe zone. If the head node is the destination of an effective evacuation path, the distances of to and are 4 and 2 hops, respectively, and our criterion indicates that the sensitive data of will be transmitted to although the mass of is 2.5 times the mass of . A corrective measure we can apply is for the border nodes in a safe zone to reincarnate itself as the head one of its associated safe zone. In the same situation as in Figure 5, if we allow , a border node, to be the destination of an evacuation path, the critical information will be transmitted along path 2.
5. Numerical Studies via Simulations
In our numerical study of data-evacuation strategies, we have implemented GRAD-DE and GRAV-DE protocols on an ns-2.33 simulation platform. We compare the performance of GRAD-DE and GRAV-DE protocols to a simple flooding approach in terms of evacuation ratio and evacuation time. In addition, we analyze the impacts of experimental parameters on the two proposed protocols.
5.1. Simulation Setup
In our simulations, the network size varies from 100 nodes to 900 nodes, and the area of monitoring region varies from to . All sensor nodes have the same communication radius. Due to the limited bandwidth and the weakness of the collision avoidance mechanism of IEEE 802.15.4 MAC protocol, the sensitive message evacuation velocity of each sensor is assumed to follow a Poisson process with an average arriving interval of 1.5 s. To simulate the influence of disasters, we divide the whole network area into small rectangles and put a devastating event in every small rectangle. The location of each devastating event is randomly chosen in the corresponding small rectangle. For simplicity, we presume that the intensity of the centre place of any devastating event is a real number between [0.8,1]. For any point in network, the intensity of caused can be calculated according to where dist denotes the Euclidean distance between and ; is the longer side of the small rectangles.
5.2. Impact of the Number of Sensitive Messages
We first look at the performance of our proposed algorithms, with a rising number of sensitive data messages ranging from 1 to 10, for two network topologies (100 nodes, m2 and 600 nodes, m2). As a benchmark, we have also included a simple flooding protocol in our simulation.
Simulation results are summarized in Figure 6, which verifies our intuitions. First, we notice that the GRAV-DE protocol reaches a higher evacuation ratio, which outperforms both the GRAD-DE protocol and the flooding protocol. Specifically, the evacuation ratio for the GRAV-DE protocol is stabilized over 0.8, even in the worst case, as the number of message varies from 1 to 10. The reason why the evacuation ratio of the GRAD-DE protocol is low is because too many messages could be forwarded to safe zones with smaller storage space. Second, the flooding algorithm has a higher evacuation ratio than the GRAD-DE protocol when the number of messages needed to be evacuated is very small. However, the evacuation ratio of the flooding approach drastically decreases and is lower than that of the GRAD-DE protocol as the number of messages increases. This observation can be traced back to two effects of the flooding algorithm. First, the chance of wireless collision is higher when flooding a lot of messages into the network; second, the storage space in safe zones will be occupied by replicated message soon. Third, as expected, the GRAV-DE protocol has a higher evacuation time than other two protocols, because it has to pay some time penalty in the two phases of safe-zone organization and evacuation-path broadcast.
5.3. Impact of the Number of Devastating Events
For simulating the different destruction degrees of disaster, we set a different number of devastating events on the network. Specifically, we randomly pick out from small rectangles and set a devastating event into each of the small rectangle(s), where .
From Figure 7, we see that both the GRAV-DE protocol and the GRAD-DE protocol obtain high evacuation ratio when the number of devastating events is small. As the number of devastating events increases, the evacuation ratio for the GRAD-DE protocol decreases faster than that of the GRAV-DE protocol. As a result, we argue that the GRAV-DE protocol should be considered for efficient data evacuation in grievous disasters. We also notice that the increment of the number of devastating events brings about an increasing number of data messages need to be evacuated, and thus the completion time of data evacuation goes up slightly.
5.4. Impact of Communication Radius
The network connectivity is related to the communication radius of sensor nodes. In this subsection, we characterize the performance of the GRAV-DE algorithm and the GRAD-DE algorithm under different communication radius.
As shown in Figure 8, our proposed algorithms experience different performance trends as the communication radius increases. For the GRAD-DE algorithm the evacuation ratio increase monotonically as network connectivity improves. For the GRAV-DE algorithm the evacuation ratio first increases and then decreases as the communication radius increases. The main reason is that the rising communication radius increases the chance of wireless collision at the phase of organizing safe zones, which in turn results in a partial loss of the information of safe zones. From Figure 8, the evacuation time of both of the two proposed schemes descends slightly with the larger communication radius, since the average hop number from the node under stress to safe zones decreases.
5.5. Impact of Nodes’ Survival Time
The performance of our proposed algorithm highly depends on the survival time of sensor nodes. In different types of disasters, nodes have different survival time in dangerous and critical zones. To evaluate the impact of nodes’ survival time on the data evacuation performance, we vary the lifetime of nodes in dangerous and critical zones from 10 s to 40 s. The results are shown in Figure 9.
When the nodes’ survival time in dangerous and critical zones is too short, a large number of data messages cannot be evacuated to safe zones timely, so that both the GRAV-DE protocol and the GRAD-DE protocol have very low evacuation ratios. With the rising survival time, the data evacuation performance of both of the two schemes clearly improves. Because the evacuation time of the GRAD-DE protocol is much shorter than that of the GRAV-DE protocol, the evacuation ratio of the GRAD-DE protocol does not go up any more after the node’s survival time reaches 25 s, whereas the evacuation ratio of the GRAV-DE protocol increases till the node’s survival time rises to 40 s. As far as the evacuation time is concerned, the longer survival time of nodes in dangerous and critical zones means the larger number of data messages needed to be evacuated. Therefore, the evacuation time of both of the two schemes gently goes up as the nodes’ survival time increases.
5.6. Blancing Raito-Time Tradeoff
As verified in Sections 5.2–5.5, the tradeoff between the evacuation ratio and the evacuation time can be balanced by judicially applying either the GRAD-DE algorithm or the GRAV-DE algorithm. The GRAD-DE algorithm outperforms the GRAV-DE algorithm in minimizing the evacuation time, while the GRAV-DE algorithm dwarfs the GRAD-DE algorithm in maximizing the evacuation ratio.
In this paper, motivated by the serious damages incurred by a few recent disasters around the globe, we have investigated on how to apply wireless sensor networks for postdisaster relief operations in a more realistic situation, where the sensor nodes could be paralyzed by the devastating events. Rather than relying on the sensor network for information gathering for a long time, we believe that a more relevant strategy would be to exploit the survival time of sensor nodes for transmitting critical information, for example, a snapshot of the affected region before the network is destroyed (similar to what blackbox preserves in flight accident), to safe zones in affected regions.
In this context, we formulate the data-evacuation problem with two competing design metrics: the evacuation ratio and the evacuation time. The former captures the amount of information rescued and the latter captures the time incurred in data rescue. Mathematically, this problem is similar to a non-linear programming problem with multiple minimums in its support. This structural parallelism inspired two alternative data-rescuing algorithms, both of which manifest some kind of principle derived by Newton. The GRAD-DE algorithm, named after its gradient-based approach, provides a superior time performance, but suffers from a throughput perspective, whiles the GRAV-DE algorithm, named after its resemblance to the law of gravitation, exhibits a higher throughput, but only takes much longer to rescue critical data. Our numerical study verifies the tradeoff between these two metrics. It is the field engineers’ responsibility to judicially apply either algorithm in a realistic situation to rescue lives and/or control damages.
For future research, a direct extension of this work would be to compare different criteria to decide which evacuation paths to take. Another possible topic would be to make it possible to multiply evacuation paths for each sensor node and evaluate the associated tradeoff between the evacuation time and the evacuation ratio.
This work is supported by National Science Foundation under Grant numbers 61170256, 61103226, 60903158, 61173172, 61003229, and 61103227 and the Fundamental Research Funds for the Central Universities under Grant number ZYGX2010J074.
- M. Suzuki, S. Saruwatari, N. Kurata, and H. Morikawa, “A high-density earthquake monitoring system using wireless sensor betworks,” in Proceedings of the 5th International Conference on Embedded Networked Sensor Systems (SenSys '07), pp. 373–374, Sydney, Australia, November 2007.
- H. Miura, Y. Shimazaki, N. Matusa, F. Uchio, K. Tsukada, and H. Taki, “Ubiquitous earthquake observation system using wireless sensor devices,” in Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems (KES '08), vol. 5179 of Lecture Notes in Computer Science, 2008.
- G. Werner-Allen, K. Lorincz, M. Welsh et al., “Deploying a wireless sensor network on an active volcano,” IEEE Internet Computing, vol. 10, no. 2, pp. 18–25, 2006.
- E. Cayirci and T. Coplu, “SENDROM: sensor networks for disaster relief operations management,” Wireless Networks, vol. 13, no. 3, pp. 409–423, 2007.
- W. Yang and Y. Huang, “Wireless sensor network based coal mine wireless and integrated security monitoring information system,” in Proceedings of the 6th International Conference on Networking (ICN '07), April 2007.
- Y. Yamao, T. Otsu, A. Fujiwara, H. Murata, and S. Yoshida, “Multi-hop radio access cellular concept for fourth-generation mobile communications system,” in Proceedings of the 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '02), pp. 59–63, Lisbon, Portugal, September 2002.
- H. Wu, C. Qiao, S. De, and O. Tonguz, “Integrated cellular and ad hoc relaying systems: iCAR,” IEEE Journal on Selected Areas in Communications, vol. 19, no. 10, pp. 2105–2115, 2001.
- T. Fujiwara, S. Nakayama, N. Iida, and T. Watanabe, “A wireless network scheme enhanced with ad-hoc networking for emergency communications,” in Proceedings of the 3rd IASTED International Conference on Wireless and Optical Communications, pp. 604–609, Banff, Canada, July 2003.
- T. Fujiwara, H. Makie, and T. Watanabe, “A framework for data collection system with sensor networks in disaster circumstances,” in Proceedings of the International Workshop on Wireless Ad-Hoc Networks, pp. 94–98, June 2004.
- D. G. Luenberger and Y. Ye, Linear and Nonlinear Programming, Springer, 2008.
- I. Newton, The Principia: Mathematical Principles of Natural Philosophy, University of California Press, 1999.
- S. Suman and M. Mitsuji, “A Framework for data collection and wireless sensor network protocol for disaster management,” in Proceedings of the Communication Technology (ICCT '06), November 2006.
- M. Li and Y. Liu, “Underground coal mine monitoring with wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 5, no. 2, article 10, 2009.
- N. J. T. Bailey, The Mathematical Theory of Epidemics, Griffen Press, 1957.
- B. V. Cherkassky, A. V. Goldberg, and T. Radzik, “Shortest paths algorithms: theory and experimental evaluation,” Mathematical Programming B, vol. 73, no. 2, pp. 129–174, 1996.
- T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, and All-Pairs Shortest Paths, Introduction to Algorithms, MIT Press, Cambridge, Mass, USA, 2nd edition, 2009.
- D. Z. Chen, Developing Algorithms and Software for Geometric Path Planning Problems, ACM Computing Surveys, 1996.
- E. W. Dijkstra, “A note on two problems in connexion with graphs,” Numerische Mathematik, vol. 1, no. 1, pp. 269–271, 1959.