## Robust Control, Optimization, and Applications to Markovian Jumping Systems

View this Special IssueResearch Article | Open Access

# Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks

**Academic Editor:**Shuping He

#### Abstract

Wireless sensor networks (WSN) are becoming increasingly promising in practice. As the predeployment design and optimization are usually unpractical in random deployment scenarios, the global optimum of the WSN’s performance is achievable only if the topology dependent self-organizing process acquires the overview of the WSN, in which the boundary is the most important. The idea of this paper comes from the fact that contours only break on the geometrical boundary and the WSN are discrete sampling systems of real environments. By simulating a diffusion process in discrete form, the end point of semi-contours suggests the boundary nodes of a WSN. The simulation cases show the algorithm is well worked in WSN with average degree higher than 10. The boundary recognition could be very valuable for other algorithms dedicated to optimize the overall performance of WSN.

#### 1. Introduction

There are some areas where we have interests in what is happening, but environments are hostile for a man or too costly to sending a man for the duty. Wireless sensor networks (WSN), which are usually at low cost and self-organized, are appropriate for those tasks [1, 2].

Some existed algorithms assume that the sensor fields are convex in shape [3, 4]. However, such assumption is not always fulfilled. The situation of a particular interested area is often unknown. It is quite possible that the area contains some regions with poor accessibility, such as unforeseen obstacles and/or holes [5]. Thus, applying those protocols may lead to a degraded performance or suffer a failure result. Thus, recognizing the geometry of the field should be the first step of organizing WSN, which is deployed in an unknown field, to try to achieve better performances. Plotting the boundary is the most basic measure to describe a geometric shape and probably the best one. In this paper, we study the problem of revealing the global geometric feature of the sensor field, in particular, recognizing the sensor nodes on the boundary.

Our viewpoint is to regard the WSN as a discrete sampling of the geometric environment. This is inspired by the fact that the WSN are used for providing intense monitoring of the environment. So, the boundaries of the sensor field usually represent the physical boundary of the underlying environments, such as walls of buildings and changes of topography. More importantly, newly appeared boundaries, which means a majority of local sensors are off duty due to destruction or power deficient, could be an indicator of emergency. For example, a wild fire in forest damages all sensors in fire line and also creates new boundary in the sensor field. An inner boundary is also an important indicator of the unhealthiness of the network, such as insufficient connectivity and coverage, revealing the locations where additional sensor nodes are required.

Furthermore, bottleneck recognition [6, 7], which is vital for precise schedule over WSN, requires boundary information. And, in coverage problem, the coverage intensity near the network boundary attracts a lot of research interest [8, 9]. So, boundary recognition provides useful information for other WSN applications.

#### 2. Previous Works and Assumptions

It is always easy to find the boundary when an overview is offered. For example, in Figure 1, the white area represents the field and the dots represent the sensor nodes. The task should be easy if we can have a glance at one of these pictures, because the overview is provided for human brain. However, in WSN, such centralized process of acquiring the overview needs lots of communications to collect all connection information in the whole networks. The cost of doing so in WSN is extremely high in both energy and time. So, decentralized algorithm or distributed ones are required.

**(a)**

**(b)**

**(c)**

There are some distributed algorithms trying to recognize the boundary in the literature. They can be classified into three categories by their basic ideas: geometric-based algorithms, statistical algorithms, and topological-based algorithms.

The geometric-based algorithms assume that a node of WSN realizes the exact locations of itself and the nodes in its neighborhood. Fang proposed the algorithm based on the fact that a data packet can only get stuck in a node at boundary in a geographical forwarding [10, 11]. So some boundary nodes are identified. Repeating the process of such geographical forwarding starting from different beacon nodes eventually discovers almost the complete boundary cycles. The idea is nice and clear. However, the information of location depends on locating algorithm or locating device such as GPS system. Locating algorithm certainly consumes some energy and the locating error may lead to boundary error. While the locating device is usually an energy hunger. And more, sweeping over the whole network again and again consumes lots of energy. So, the geometric based algorithm recognizes the boundary at a high cost.

The information of nodes’ location definitely benefits the boundary recognition. However, the boundary recognition is also needed in the WSN which do not have the ability of locating. So statistical algorithms and topological based algorithms are developed for such WSN.

Statistical algorithm assumes that the nodes are uniformly randomly deployed in sensor field. Fekete proposed an algorithm with such assumption [12]. The idea is inspired by the law of large number. According to the law, the average of the results obtained from a large number of trials should be close to the expected value and will tend to become closer as more trials are performed. In his algorithm, the deployment of other nodes is regarded as a “trial,” and the ratio of neighboring area and the whole sensing area is regarded as “expected value.” So, if lots of nodes are deployed, the number of neighbor nodes should be “total trials” × “expected value.” Thus, a node should have a number of neighbors that is close to the average degree (the average number of neighboring nodes in the whole network), unless it is on a boundary. This is because the neighboring area of a boundary node is much smaller than an interior node. The algorithm does not require any location information and gets good result in WSN with high average degree. However, the requirement of density is unrealistic: the average degree should be close or over 100 [13]. In practice, the network is often so sparse that the number of “trials” is not big enough to make the results close to “expected value.”

Topological based algorithms assume that a node knows only which other nodes are connected directly [14–18]. This assumption is similar to that in this paper; especially we are inspired by Funke’s approach [17]. In this method, a group of beacons are randomly selected first. Then, after flooding, all nodes in WSN are given a “distant,” which is the hop count to the nearest beacon. In this way, there are many iso-contours of “distant” in the WSN. Finally, the nodes where the iso-contours break are marked as boundary nodes. The simulation of the algorithm shows that some interior nodes are faultily identified. This is because the value of “distant” is measured in integer; randomness of deployment may cause the “distant” of a particular node vary from to or . Such phenomenon in WSN makes it possible that interior node is faultily identified, especially in sparse networks. Wang proposed another topological based algorithm [13]. It is reported that the complete sequences of boundary nodes are identified. However, this method can only be used in the scenario that the WSN have topology holes in them. The algorithm does not find any boundary nodes in WSN which is simply connected (without holes). Furthermore, if there are some nodes faultily recognized already (this is never avoided completely), the final process, which connects distributed boundary nodes to a sequence in order to decrease the missing identification, could be a disaster as faulty identification increases massively. In a recent paper, [18] proposes another topological algorithm, which achieves good hole detection result. But its complexity is higher than the algorithm proposed in this paper.

This paper proposes a distributed algorithm for recognizing the boundary of WSN, using only direct connection information. We do not assume that any location information, distance information, or angular information is collected.

This paper is based on the following assumptions:(1)the nodes in WSN are provided with limited computation ability, energy, and memory;(2)the communication range of a node is much greater than sensing range; so, the average degree is reasonable if the sensing field is well covered;(3)the nodes are uniformly randomly deployed in the sensing field;(4)the nodes are deployed in a closed area;(5)the sensing data are not required; that is, the algorithm does not require any positioning information about the nodes.

The basic idea of this paper comes from an intense observation of a gas diffusion process in a closed space. We are motivated by the fact that some features of concentration field suggest the boundary of a closed space and then realize that the boundary of WSN can be recognized by simulating similar process.

#### 3. An Observation of Mass Diffusion

##### 3.1. The Process of Mass Diffusion

Consider the following scenario. Bounded space is filled with inactive gas. For some reasons, another type inactive gas is generated at constant rate at , which are inside the space . As time goes, gas gradually spreads everywhere in the space. This process is a typical diffusion process. Let us observe that the concentration of gas varies from time and position intensely in this process: Equation (1) is continuous and two-order differentiable mathematically.

Fick’s first law relates the diffusive flux to the concentration under the assumption of steady state. It postulates that the flux goes from regions of high concentration to regions of low concentration, with a magnitude that is proportional to the concentration gradient (spatial derivative):
where is the diffusion flux [mol·m^{−2}·s^{−1}]. measures the amount of substance that flows through a small area during a small time interval. is the diffusion coefficient or diffusivity in dimensions [m^{2}·s^{−1}]. is the concentration gradient [mol·m^{−4}].

Equation (2) is the differential form of Fick’s first law, which shows how diffusive flux behaves locally. By integrating (2) over an infinitesimal surface , the integral form of Fick’s fist law is derived:
where is the amount of substance transferred per unit time [mol·s^{−1}] and is an oriented surface area element [m^{2}]. The direction is to the outward normal of the element.

Equation (3) describes how substance transfers through a surface.

If the surface is a non-self-intersecting continuous closed surface as shown in Figure 2, Jordan-Brouwer separation theorem asserts that the surface divides the object (a 3-dimensional bounded closed domain) into an “interior” region , bounded by surface , and an “exterior” region , which consists of all other parts, so that any continuous path ends in different regions intersects somewhere. Hence, all substance exchange between interior region and exterior flows through .

The net amount of substance that flows into in a small time interval can be derived from (3) by integrating over :

In the scenario we are observing, there are a group of sources , which generate gas at constant rate:

Thus, the net gain of gas in in time interval is the sum of the gas that is generated in and that flows into :

Meanwhile, the net gain of gas should also be described by integrating the concentration change over time and space:

By the law of mass conservation, (6) equals (7) for any space and time interval : where is the Laplace operator.

##### 3.2. Analysis in Mathematics

Considering the case introduced above, there is not any gas in at the very beginning:

And, as the space is bounded, gas does not spread outside . Thus, at the boundary of space where is the outward normal of .

For the differential equation (8), initial condition and boundary condition are given as (9) and (10). So, there is a unique solution for any time and any spot in . Therefore, we can simulate the diffusion process discussed above and determine the concentration value everywhere at any time.

In previous works, the boundary of the space is always known. How about if the boundary exists but we do not know where it is? Shall we find the boundary by observing the concentration field?

Given time , there is a concentration distribution of in . Denote , , and , where is nonextreme concentration value. So, , , and are all nonempty sets. is an iso-contour of concentration value . and are two sets of points where concentration values are less or more than .

There is at least one point on any path connecting and .

*Proof. *Let and . Let , such that , , and the restriction of to is injective. That is, is a non-self-intersecting continuous curved line segment which ends with and . Assume, if possible, , such that .

If so, for all , . As and is a continuous function on , is a continuous function about on . and ; by the intermediate value theorem, such that , contradicting for all , .

Therefore, for all , such that .

Consequently, iso-contour never breaks in ; otherwise, there should have been paths connecting and . Therefore, iso-contour either is closed surface or breaks on the boundary of space . That is, . In particular, if is a 2D space, iso-contour either is closed curve or ends on the boundary of . Thus, “ is the endpoint of an iso-contour.” “ is on the boundary of .”

The result is encouraging. However, we should notice that “ is on the boundary of .” “ is the endpoint of an iso-contour.”

In a map with contour, it is possible that contour is a tangent curve to the boundary of the map at somewhere, as the arrow points to in Figure 3. In this case, the union of end points of all contour is almost equal to the complete boundary of , missing very few isolated points. But in the worst case, the contour is a tangent curve to the boundary everywhere. Here is an example. The space is circle or sphere in shape, and the source of gas is exactly at the center. In this case, the outmost iso-contour meets the boundary exactly as shown in Figure 4.

Although the worst case happens in small probability, we should and can avoid it by generating another type of inactive gas at different position and observing the iso-contour of . This way, the worst case is avoided and the difference between and is even smaller. More generally, if there are types of inactive gas generating in space at different positions, the union of end points of all iso-contours and all types is almost equal to the boundary of :

#### 4. Simulation of Diffusion in WSN for Boundary Recognition

##### 4.1. Discrete Form of Diffusion

A space is uniformly divided into subspaces. , , . As is uniformly divided, denote as joint area of adjacent subspace, as distance between them, and as volume of a subspace. Consider the diffusion process in subspace , which is surrounded by , (see Figure 5).

Similar to (3), the net gain from adjacent subspace by diffusion is

And the change of concentration is due to diffusion in adjacent subspace and the source effect: where

So,

Let as average concentration of ’s adjacent subspace and . If , then and

The concentration of after time interval is a weighted average of current concentration of and its surroundings, plus a positive constant if there is source of gas in it.

##### 4.2. Simulating Diffusion in WSN

In a WSN application, a lot of sensor nodes are deployed in a sensing area. Our viewpoint is to regard the WSN as a discrete sampling of the environment. Every sensor node is a sample of local area. So, we virtually start a simulation of multigas diffusion process.

Assuming that types of gas are spreading in the area, the local concentration of them at sensor node is . The nodes that can communicate directly with represent the adjacent subspace. Randomly, select groups of nodes as diffusion source of types of gas.

At the very beginning, for all , . Then the diffusion process starts.

At time , sensor node broadcasts its current concentration vector . Its 1-hop neighbors will receive this data package. Meanwhile, receives the data packages from its neighbors . Applying (16) and when , where

if is selected as source of the th type of gas. if is not source of any type.

##### 4.3. Semi-Iso-Contours and Their End Points

After repeating several times, the diffusion process spreads virtual gas everywhere in the sensor field. Figure 6(a) shows the concentration distribution of one type of gas in a sensor field. Then, we can draw semi-iso-contours. The reason why we call it semi-iso-contour rather than iso-contour is that there are seldom absolute equalities in such discrete sampling system. Therefore, approximately equality is employed instead. The criteria we used for approximately equality in 1-hop neighbors are that if and only if . Figure 6(b) shows semi-iso-contours in the sensor field. And Figure 6(c) displays all end points of semi-iso-contours.

**(a)**

**(b)**

**(c)**

The end points of semi-iso-contours roughly show the boundary of the sensor field in Figure 6(c). But, there are both some faulty recognitions and miss recognitions. This is because the WSN are a discrete sampling system rather than a continuous physical system. To increase the quality of boundary recognition, we shall use information from other types of gas. In our simulation, ; that is, 10 types of virtual gas are spreading simultaneously. Figure 7 show semi-iso-contours and their end points of the other 9 types of virtual gas.

**(a)**

**(b)**

**(c)**

**(d)**

**(e)**

##### 4.4. Final Results of Boundary Recognition

Reading Figure 7, we can conclude that the inner nodes are much less probable to be the end points of semi-iso-contours than the boundary nodes. So, if a node is an end point of semi-iso-contour for multiple times in different types of virtual gas, it is very possible that it is located at the boundary of the WSN. When we pick all nodes that are end points at least 3 times out of 10, the boundary recognition is shown in Figure 8.

##### 4.5. Complexity Analysis

Our approach for boundary recognition consists of 3 steps as follows:(1)simulating the process of diffusion;(2)drawing semi-iso-contours;(3)determining whether to be an end point or not.

The 1st step repeats multiple times of communication in neighborhood and calculation. In each repeat, every node should communicate with all its 1-hop neighbors and update dimensional vector to . This is in time, where is the number of 1-hop neighbors. The process should repeat times in order to guarantee that all nodes are affected by virtual diffusion, where is the maximum hop counts between 2 nodes in the sensor field. is decided by the range of the sensor field and the communication range of sensor nodes, which is constant after deployment. So the time complexity for the first step is .

The 2nd step requires a comparison in neighborhood. That is in time.

The 3rd step requires a count over types. That is in time.

So, the overall complexity in time is .

In all three steps, the nodes record current concentration value of adjacent nodes and itself. All historical data are discarded. So the overall complexity in memory is .

A recent paper proposes a topological based algorithm [18], which achieves good hole detection result. In this paper, Dijkstra’s shortest path algorithm is used to construct manifold, so the total complexity is at least , where is the number of all sensors in the field. In comparison, the algorithm we proposed is much less complex.

#### 5. Case Study

The algorithm discussed above is applied in different sensor fields. The results are shown in Figure 9.

In all these cases, the nodes that are recognized as boundary nodes generally cover the geometrical boundary of the sensor fields. A few inner nodes, which are at least 1-hop range away from actual geometrical boundary, are faultily identified. Table 1 is a statistic of faulty recognition.

It is predictable that the result of boundary recognition is better if the average degree is higher, because when , the discrete sampling system tends to continuous system. In the other hand, the sparseness of WSN challenges the algorithm proposed in this paper. The result in a same area as case (a) in Figure 9 with lower average degree is shown in Figure 10. And the relation between faulty rate and average degree is shown in Figure 11 faulty rate versus average degree.

**(a)**

**(b)**

When faulty rate increases up to 5% or higher (Figure 10(b)), the recognition result is worthless. Thus, the algorithm proposed in this paper should be only applied in the WSN with average degree higher than 10. Funke tests the algorithm in sparse WSN [17]. The testing area is a circle hole in square. The comparison shown in Figure 12 indicates that the result of our algorithm at average degree of 10 is comparable with Funke’s result at average of 18 and is much better than Funke’s result at average degree of 10.

**(a)**

**(b)**

**(c)**

**(d)**

**(e)**

**(f)**

#### 6. Conclusion

In this paper, a distributed algorithm for boundary recognition in WSN is proposed. The idea comes from the facts that iso-contours only break on the geometrical boundary and the WSN is a discrete sampling system of real environment. Then, we virtually start a diffusion process to create concentration gradient field in WSN, and finally the nodes that are often identified as end points of semi-iso-contours are regarded as boundary nodes. The simulation results show that the algorithm works well for the WSN with average degree over 10. Further, as diffusion in 3D space is well studied, our algorithm is potentially to be improved to recognize boundary of a 3D WSN, which is also a hot research topic [8, 20].

#### Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

#### Acknowledgment

Research for this work was supported by the Fundamental Research Funds for the Central Universities (JUSRP1027 and JUSRP51407B).

#### References

- I. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and actor networks: research challenges,”
*Ad Hoc Networks*, vol. 2, no. 4, pp. 351–367, 2004. View at: Publisher Site | Google Scholar - I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,”
*Computer Networks*, vol. 38, no. 4, pp. 393–422, 2002. View at: Publisher Site | Google Scholar - L. Lazos and R. Poovendran, “Stochastic coverage in heterogeneous sensor networks,”
*ACM Transactions on Sensor Networks*, vol. 2, no. 3, pp. 325–358, 2006. View at: Publisher Site | Google Scholar - X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” in
*Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03)*, pp. 28–39, November 2003. View at: Google Scholar - N. Ahmed, S. S. Kanhere, and S. Jha, “The holes problem in wireless sensor networks: a survey,”
*ACM SIGMOBILE Mobile Computing and Communications Review*, vol. 9, no. 2, pp. 4–18, 2005. View at: Google Scholar - D. Gu, N. G. Chunyue Song, and Z. Song, “Bottleneck recognition by virtual temperature field in wireless sensor networks,”
*Ad-Hoc and Sensor Wireless Networks*, vol. 15, no. 2–4, pp. 127–150, 2012. View at: Google Scholar - D. Gu and Z. Song, “Segment and organize irregular shaped sensor networks by importing a virtual scalar field,” in
*Proceedings of the IET International Conference on Wireless Sensor Network (IET-WSN '10)*, pp. 227–232, November 2010. View at: Publisher Site | Google Scholar - M. Li, Z. Li, and A. V. Vasilakos, “A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues,”
*Proceedings of the IEEE*, vol. 101, no. 12, pp. 2538–2557, 2013. View at: Publisher Site | Google Scholar - M. Peng, Y. Xiao, H. Chen, Q. Hao, A. V. Vasilakos, and J. Wu, “Sensor distribution on coverage in sensor networks,” in
*Quality, Reliability, Security and Robustness in Heterogeneous Networks*, pp. 328–344, Springer, 2012. View at: Google Scholar - Q. Fang, J. Gao, and L. J. Guibas, “Locating and bypassing routing holes in sensor networks,” in
*Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)*, pp. 2458–2468, March 2004. View at: Google Scholar - Q. Fang, J. Gao, L. J. Guibas, V. De Silva, and L. Zhang, “Glider: gradient landmark-based distributed routing for sensor networks,” in
*Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05)*, pp. 339–350, March 2005. View at: Google Scholar - S. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann, “Neighborhood-based topology recognition in sensor networks,” in
*Algorithmic Aspects of Wireless Sensor Networks*, S. Nikoletseas and J. Rolim, Eds., pp. 123–136, Springer, Berlin, Germany, 2004. View at: Google Scholar - Y. Wang, J. Gao, and J. S. B. Mitchell, “Boundary recognition in sensor networks by topological methods,” in
*Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06)*, pp. 122–133, September 2006. View at: Google Scholar - A. Kröller, S. P. Fekete, D. Pfisterer, and S. Fischer, “Deterministic boundary recognition and topology extraction for large sensor networks,” in
*Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms*, pp. 1000–1009, January 2006. View at: Google Scholar | MathSciNet - R. Ghrist and A. Muhammad, “Coverage and hole-detection in sensor networks via homology,” in
*Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05)*, pp. 254–260, April 2005. View at: Publisher Site | Google Scholar - O. Saukh, R. Sauter, M. Gauger, and P. J. Marrón, “On Boundary recognition without location information in wireless sensor networks,”
*ACM Transactions on Sensor Networks*, vol. 6, no. 3, article 20, 2010. View at: Publisher Site | Google Scholar - S. Funke, “Topological hole detection in wireless sensor networks and its applications,” in
*Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '05)*, pp. 44–53, 2005. View at: Google Scholar - W. Wei, X.-L. Yang, P.-Y. Shen, and B. Zhou, “Holes detection in anisotropic sensornets: topological methods,”
*International Journal of Distributed Sensor Networks*, vol. 2012, Article ID 135054, 9 pages, 2012. View at: Publisher Site | Google Scholar - Cntr-Map-1, 2008, http://en.wikipedia.org/wiki/File:Cntr-map-1.jpg.
- H. Zhou, H. Wu, and M. Jin, “A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks,” in
*Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12)*, pp. 1602–1610, March 2012. View at: Publisher Site | Google Scholar

#### Copyright

Copyright © 2014 De Gu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.