Recent Advances in Security and Privacy for Wireless Sensor Networks 2016
View this Special IssueResearch Article  Open Access
Zeyu Sun, Xiaofei Xing, Chuanfeng Li, Yalin Nie, Yangjie Cao, "A Novel Nonlinear Multitarget Degree Coverage Preservation Protocol in Wireless Sensor Networks", Journal of Sensors, vol. 2016, Article ID 3434961, 13 pages, 2016. https://doi.org/10.1155/2016/3434961
A Novel Nonlinear Multitarget Degree Coverage Preservation Protocol in Wireless Sensor Networks
Abstract
Due to the existence of a large number of redundant data in the process of covering multiple targets, the effective coverage of monitored region decreases, causing the network to consume more energy. To solve this problem, this paper proposes a multitarget degree coverage preservation protocol. Firstly, the affiliation between the sensor nodes and target nodes is established in the network model; meanwhile the method used to calculate the coverage expectation value of the monitored region is put forward; secondly, in the aspect of the network energy conversion, use scheduling mechanisms on the sensor nodes to balance the network energy and achieve different network coverage quality with energy conversion between different nodes. Finally, simulation results show that NMCP can improve the network lifetime by effectively reducing the number of active nodes to meet certain coverage requirements.
1. Introduction
With the rapid development of technology [1], wireless sensor network technology has developed exponentially [2, 3]. Wireless sensor network is a network system comprised of a large number of cheap sensor nodes that are randomly deployed and are selforganized [4–6]. A sensor node is characterized with such abilities as computation, perception, communication, storage, and control; the behavior characteristics of sensor nodes indicate that they are part of the network service system fusing the physical world and the information world, realizing collection, computation, communication, and control of data [7, 8]. In the engineering field, wireless sensor networks are widely used in many areas like military surveillance, transportation, health care, environmental monitoring, and rescue work and in other fields [9, 10]. The multilevel (degree) coverage is given, as an example, in Figure 1.
Two vital performance criteria that are required are coverage quality and energy management, which are also hot issues in the field of wireless sensor networks [11, 12]. Coverage as its name implies means effectively covering the target nodes instead of the global monitored region. The coverage quality not only affects the degree of concern to the target nodes directly, but also affects the entire network lifetime and QOS (Quality of Services) directly [13–15]. The degree coverage mode is used in the process of covering multitarget nodes. Generally, the sensor nodes are deployed in the monitored region randomly, and, because of this, a large number of sensor nodes may be located in the monitored region [16, 17], which will generate a large number of redundant nodes, interfering with the communication channel and also reducing the communication ability between nodes, thereby speeding up the network energy consumption.
2. Related Works
Coverage control technology is an important basic research issue and is one of the hotspots in the field of wireless sensor network, and coverage quality affects the network lifetime directly [18]. In recent years, many experts at home and abroad have carried out research on the coverage technology in wireless sensor network elaborately and profoundly as it was developed and widely used. Reference [19] proposed the artificial bee colony algorithm and particle swarm algorithm deploying the nodes in the whole monitored network and optimized the global coverage with both the intelligent algorithms in the coverage optimization phase, ultimately finishing the complete coverage over the monitored area. In terms of energy consumption, node energy conversion was scheduled with heuristic node scheduling algorithm, thereby improving the network lifetime. Literature [20] proposed a method to construct connectivity coverage protocol. The protocol defined the ratio between network coverage quality, network connectivity, and the performance indexes of the network infrastructure parameters, as well as constructing the SCA (Scheduling Control Algorithm) to meet the need of ensuring the whole network connectivity with minimum number of nodes in the problemsolving process, ultimately achieving the goal of network energy consumption balancing. Literature [21] put forward a kind of effective coverage area hole repair algorithm based on Voronoi. On the premise of certain coverage quality, this algorithm improved the coverage rate by increasing working nodes to coverage hole; in the meantime, it found the proper location information for mending, guaranteeing the whole network connectivity; by researching the Voronoi diagram, literature [22] also completed covering the monitored region, finding the solution to disc location of sensor nodes formed by the geometric variation parameters in the Voronoi diagram with related geometric theory. Literature [23] introduced local parameter and formed local coverage with the idea of partial coverage optimization and then, after a series of calculations with , achieved global coverage optimization. The algorithms above can effectively cover the monitored region to some extent. However, the three algorithms have some problems in common: they all need large amount of calculation, the algorithms are highly complex, and they have poor scalability in a wireless sensor network. Literature [24, 25] proposed methods to calculate coverage rate in different monitored domain by effectively computing target nodes in monitored region, using different angle of sector formed by the sensor node and destination node. The above four algorithms have good feasibility and stability, as well as high network scalability; but their network models are too idealistic in the process of research: literature [22, 23] employed static target nodes as the research object; literature [25] did not consider the degree coverage situation of the moving related target nodes. Literature [26] put forward an energy efficient multitarget covering algorithm based on linear rule. The algorithm utilized a clustered structure system to solve the problem of multitarget covering. It presented an optimal solution to covering the target node in a linear fashion by calculating the coverage ability of the sensors and their remaining energy. Literature [27] proposed a coverage algorithm based on event driven mechanism. In this algorithm, the coverage and expectations of the nodes were calculated using the probability model, and then the calculation result was optimized to achieve optimal coverage on target nodes. Although these two algorithms can achieve the goal of optimal coverage on targets nodes and prolong the network lifetime, the requirement conditions for covering are quite strict. Furthermore, the algorithm is highly complex in itself. In order to cover the monitored region more effectively, based on the study in literature [24, 25], we present a nonlinear multiobjective coverage protocol (NMCP) which is given in this paper. This protocol can effectively calculate the coverage expectation value of the sensor nodes for the moving target nodes. In terms of energy, we compare the energy consumption under the multilateral connection and unilateral connection based on global network nodes energy analysis; namely, the energy cost in multipoint transmission is not higher than singlenode energy consumption. In terms of energy conversion, it was completed between nodes with selfscheduling mechanism, thereby prolonging the lifetime of the entire network. At last, this paper gives the comparison process between NMCP algorithm and other algorithms in simulation experiments, which show that the NMCP algorithm is more effective and steadier.
3. Network Model and Coverage Quality
To study the wireless sensor network coverage problem better, as well as facilitate studying the NMCP algorithm, in this paper, we make the following assumptions:(1)Each sensor node has certain perception ability, and their perception range and communication range are both circles.(2)The perception range of a sensor node is far shorter than side length of the monitored region.(3)Initially, all sensor nodes have the same energy and are clock synchronized.(4)The location information of sensor nodes can be obtained with GPS.(5)A sensor node’s perception radius is subject to normal distribution.
3.1. Basic Definitions
Definition 1 (target coverage). In the twodimensional plane, each target node is covered by at least one sensor node, which is called the target coverage.
Definition 2 (degree coverage). In a monitored region, if each target node is covered by sensor nodes, it is called degree coverage.
Definition 3 (network lifetime). The time span from when a network begins running to when none target node is covered by the sensor nodes is called the network lifetime.
Definition 4 (coverage quality). In the twodimensional plane, the ratio of the total perception area of all sensor nodes to the monitored region is known as coverage quality.
3.2. Coverage Quality
Theorem 5. Suppose each sensor node’s coverage rate is . Let in degree coverage, and m, n are the moving frequency of sensor nodes, the occurrence probability of which is , and the conditional probability is , where .
Proof. Let be the number the node moves in the first round; let Y be that of the second round. According to the question, the target node is covered by sensor nodes in the mth time during the first round and is covered twice in the th time, with the remaining times not covered, during the second round.
Therefore, the sensor node probability isThe joint probability of both rounds isAccording to multiplication formula of probability, we getThe process to prove is complete.
Theorem 6. If the coverage rate of each sensor node is p, then the coverage rate at any point in a twodimensional plane is .
Proof. We will use mathematical induction in the proof. In the twodimensional plane, any sensor node is not independent, so, according to the probability theory, when , we haveWhen , the joint coverage isSubstitute formula (5) into formula (4); we haveWhen , by formula (6), we getThe process to prove is complete.
Corollary 7. In the twodimensional plane, suppose the sensor node coverage rate is p, and is the maximum value of the continuous coverage number of a sensor node. Until the moving target node is covered, the sensor node coverage expectation is .
Proof. In the twodimensional plane, suppose the frequency a target node moves by is . Because is the maximum value of the continuous coverage number of a sensor node, the possible value range of is . When , and is satisfied, namely, in the first times, the moving target node is not covered by the sensor nodes; we can get the distribution density function of according to probability theory:Namely,Suppose , ; then ; multiplying both sides of the equation by , we getNamely, Substitute into formula (9); we haveAfter the sensor nodes cover the monitored region during time span , they will inevitably have some energy consumptions, which results in the change in their coverage areas. In order to improve effective coverage on the target nodes concerned, in the process where sensor nodes consume energy, the total monitored region can be effectively covered, or all the concerned target nodes are effectively covered, as long as the sequence collection of the coverage areas of sensor nodes is not less than the total monitored area after their energy is consumed.
Theorem 8. In the twodimensional plane, suppose the fitting function of a sensor node energy consumption is ; the coverage area is after the energy attenuation, where ; then the bounded closed region formed is able to cover the entire monitored region; namely, .
Proof. Take a bounded closed region sequence , which covers the whole monitored region. Suppose . Because the energy attenuation function is nonnegative, the integral sequence is increasing; suppose the limit is as follows: Therefore, we just need to provewhere factor is a finite set of numbers. For any , formula (13) shows that there is a number ; when , formula (15) is always satisfied:Suppose there is , when , . Therefore, according to the nonnegative and formula (15), we know thatFor each fixed , on the other hand, there must be a number which tends to infinity; suppose the number is , and ; then by formula (15) we getNamely, when , we getTherefore, formula (14) is satisfied.
Now, let ; for any , formula (13) shows that there is andAnd because there is , when , is always satisfied, so we haveThe process to prove is complete.
4. NMCP Protocol
4.1. Energy Conversion
For a sensor node, the energy consumption mainly happens in the sensing module and the communication module. When collecting bits data, the energy consumption of sensing module and the communication module is as follows:
The energy consumption model for receiver module iswhere bits are the fixed length of data transmitted, represents the communication Euclidean distance between sensor nodes, and represents the threshold or proportional quantity of the communication distance between sensor nodes. When the communication distance between sensor nodes is less than , the energy attenuation index value is 2; otherwise it is 4.
Definition 9 (optimum subset). Let be the set of wireless sensor network’s sensor nodes; is called an optimum subset where is a subset of sensor nodes, namely, , and all the sensor nodes in cover target set entirely.
Definition 10 (energy property). is the initial energy collection of sensor nodes; follows normal distributions, where denotes the initial energy of sensor node .
Definition 11 (the maximum distortion). On the premise that certain coverage rate is met, the maximum distortion is is the estimated Euclidean distance between a sensor node and the target node, while is the average measured distance, Euclidean distance, between the sensor node and the target node.
Theorem 12. The communication distance between nodes is less than or equal to half the difference between variance and the distortion.
Proof. Suppose the measured distance at the target node is , the data information used contains the measured data, and when multitarget nodes are measured, the average of measured values follows normal distribution. The energy collection set of presetenergy sensor nodes is . Then the Euclidean distance between communication nodes is as follows:Let be the set of sensor nodes which collects information, and let be the complementary set of H; the sensor node nearest to the target node in is used to calculate the measured distance which is then used to estimate a signal data in . Therefore, the estimated signal value at the target node point is ; namely,According to formulas (23) and (24), we haveSubstitute formula (23) into formula (26); we haveThe process to prove is complete.
Theorem 13. In initial state, when transmitting bit data, the energy consumed in multilateral transmission is more than that consumed in unilateral transmission.
Proof. Suppose the current working node has a set of neighbour nodes named Z, in which each node corresponds to neighbour . For convenience, the calculations start with 3, which denotes the number of neighbours in the collection, when . We will prove that using mathematical induction, as shown in Figure 2.
Let A be the source node, let D be the convergence node, let B, C be the neighbour nodes, and let O be the disk centre; the network stores lbit data of any sequence, which is going to be sent from source A to convergence node D. Two kinds of circumstances are discussed as follows.
The First Case: From A to D Directly. According to formula (21), the energy dissipations are as follows when source node A sends out data:The Second Case: From A to B, Then From B to D. We prove that with mathematical induction: when , from node A to node B, the energy consumption model of the transmitting module in node A is The energy consumed by node B to receive the information isSo far, the total energy consumption of nodes on the path ABD isIn their initial state, the nodes work with the same amount of energy and are independent from each other. The basic properties of triangle show thatNamely, when , node energy consumption in multilateral data transmission is lower than that in unilateral data transmission, so when , the inequality is satisfied.
First, take the path from A to B, then B to C, and C to D (ABCD), as an example to prove, and then add to . Because , is an obtuse angle. Conclusion can be drawn with cosine theorem as: ; namely, , when . The adjacent neighbour nodes can be combined into an obtuse triangle, in which the square of the length of the side opposite to the acute angle is less than the sum of the squares of the lengths of the sides of the obtuse angles. After times of superposition calculation, we eventually get ; namely, The process to prove is complete.
Energy consumed in multilateral transmission is not higher than the energy dissipation in unilateral transmission in a multiple hops path in wireless sensor network [28–30]. But practically, it is always hard to implement the single hop transmission between the source node and the convergence node due to the limited communication radius of nodes, obstacles, and the variation of environment.
NMCP algorithm takes the network running time round number as the basic unit, each round containing two aspects, namely, coverage control information and the stable state information of nodes. In working stage, the working nodes remain on, and all redundant nodes are off so as to save the network energy. At stable stage, each node has five kinds of running state, which are judge, compete, wait, start, and sleep states [31–33]. Judge state: at the beginning of each time round, nodes are in the state of judgment. When redundant judging condition of a node is satisfied, the node enters sleep state; otherwise, if the condition is not satisfied, it enters the compete state; compete state: a node which succeeds on the startup of a competition may convert into the state of working, whereas the unsuccessful nodes enter the state of wait; wait state: those nodes failed in the competition to enter wait state, and when they successfully receive the onduty message from their neighbours during initiating, they update the message of their own locally and then enter judge state. Start state: when a node wins in the competition, it enters the start state. By calculating the node coverage, whether the nodes which perception regions are in start states satisfy the requirements for coverage is determined. If not satisfied, it sends onduty message for schedule and then enters judge state; sleep state: while the redundant judging conditions are satisfied, the node enters sleep state to reduce its energy consumption and enters judge state in the unit time round. When the density of nodes is too large in a monitored region, the vast majority of the nodes in the region will satisfy the redundant node judgment conditions. At the moment, all those nodes will enter sleep states. Although this state can reduce the node energy consumption, there are still some deficiencies; the reason for this is that once perceiving neighbour nodes enter sleep state, there will be large coverage blind area in monitored region; therefore the coverage quality is decreased [34–37]. In order to avoid such kind of situation, NMCP algorithm uses a mechanism that once a node enters sleep state, it wakes up its neighbour nodes immediately and converts them into wait states. The aim is to reduce the density of working nodes first, namely, select a node as a candidate working node directly; the other nodes not selected enter sleep states directly and then schedules in the candidate working nodes [38]. Each candidate working node elects itself with a probability of , whereas those nodes which are not chosen directly enter sleep state and then work as candidate nodes in the redundant nodes. Each candidate node elects itself to enter the prework state, whereas those candidate nodes which are not elected enter presleep state. The state transition between the five states in the covering control phase is as shown in Figure 3.
4.2. The Basic Idea of NMCP Algorithm
Based on the idea in literature [10] by means of clustering theory, this algorithm divides the coverage region in the monitored region into several clusters, each head node of a cluster being in charge of and controlling the member nodes in its cluster. At the initial stage of the network operation, the cluster members send “degree Coverage” message to their cluster head node first, while the cluster header maintains a linked list CL which receives the messages which are composed of the sensor node ID and such properties as its perception range and energy attenuation. After one or more cycles, the cluster header will collect all the cluster members information, then sort the list according to the size of the residual energy of nodes, as well as assigning to weight the first few nodes in the front of the list; after that, it scans every item in the linked list and marks the sensor nodes which are capable of covering the target node. Finally, the cluster header sends “kNotice” messages to those marked member nodes which are responsible for covering the target node. The cluster head node sends onduty messages to the member nodes and neighbour nodes to awaken those members nodes to enter waiting state and notify the neighbour cluster head nodes of the monitored information of the target. Based on the above information, the weighting of member nodes participating in the monitoring is calculated. If its weighting is greater than the set threshold, the node would enter into active state and monitor any moving target within its sensing range. Active nodes around the target will form an initial dynamic cover group. Member nodes will send an information packet to the cluster head node. The data packet contains information as time stamp, node ID, and distance between the nodes and the target. As there may be more than one cluster head node in NMCP, for the convenience of management, one of the cluster head nodes will be selected as managing node and is responsible for the information fusion and data management. Because the target node is moving in the monitoring area, the initial NMCP may not meet the requirements of target monitoring. Therefore, dynamic reconstruction is needed according to the position of the target. Reconstruction process is completed by members updating management and head node reselecting. When the target moves to a new grid, new cluster head node and member nodes that meet the requirements of the threshold weighting joint to the original NMCP, and the newly jointed cluster head node is elected as the leader node. Nodes within the original NMCP that cannot meet the monitoring requirements will quit the NMCP. If the original managing node happens to be a quitting node, at this time, the original managing node needs to send information of target location and member’s nodes to the new managing node. When the target moves away from the original location, the cluster head node will broadcast messages to its member nodes to enter into sleep state to save power consumption.
4.3. NMCP Algorithm Description
Step 1. Calculate the perception intensity of cluster members.
Step 2. The cluster member nodes send “kCoverage” to the cluster header node. After one or more time units, the header node receives the message from cluster members.
Step 3. The cluster head node establishes a linked list and stores the information collected in it and then sorts the list according to the amount of energy in the sensor nodes; at the same time it assigns weights to those nodes which have higher energy.
Step 4. Find qualified sensor nodes, and mark them.
Step 5. If the target node is in the state of kcoverage, the cluster header will traverse the list to turn off those sensor nodes which have weaker perception ability.
Step 6. After the traverse, the cluster header node schedules the optimal subset to finish covering the target node; otherwise, go to Step 2.
4.4. Algorithm Code
See Algorithm 1.

4.5. The NMCP Algorithm Complexity Analysis
In the analysis of NMCP algorithm, n represents the number of sensor nodes; m is equal to the number of edges connecting any two sensor nodes. and are the minimum and maximum coverage value of the monitoring area, respectively. means the increment of coverage after each covering process. Set and ; and are constant coefficient. Assume that, at the initial stage, the coverage rate of sensor node is , and at time , the transition probability of a sensor node is greater than which also means the minimum probability of sensor node’s coverage is . Set at time ; the coverage of a sensor node is
When , the time complexity of NMCP algorithm is , as follows:
Since is the sum of harmonic series of first terms, let ; then ; that is,
5. System Evaluation
In order to verify the effectiveness and the stability of algorithm NMCP, we use MATLAB7.0 as the simulation platform for experiment and analysis. With the comparison experiment between NMCP and [26, 27, 34], we give the performance comparison in different evaluation systems. The simulation parameters are as shown in Table 1.

The comparison simulation experiments between algorithms NMCP in this paper and ETCA in [26], ECAPM in [34], and EPDM in [27] are carried out under the same network scale, with different network lifetime, target node scale, number of sensor nodes, network run time, and coverage rate, as shown in Figures 4–7.
Figure 4 shows the comparison simulation diagram of algorithms NMCP, ETCA, and ECAPM in the aspect of network lifetime. In this figure, the three algorithms have similar lifetime at the initial phase, while as time passes by, the ETCA algorithm and ECAPM algorithm rise relatively slower which mainly lies in the fact that ETCA algorithm and ECAPM algorithm monitor the whole network in centralized manner, thus converting the scheduling mechanism between sensor nodes in a linear fashion, which consumes more energy, whereas the NMCP algorithm in this paper mainly finishes the covering process over the monitored region in a fashion of seeking in the linked list and finding the optimal node set. With the same number of sensor nodes, the NMCP algorithm requires longer network run time. Take an example of iterating 200 times, the network lifetime is prolonged by 16.33% and 19.75% averagely compared with the algorithm ETCA.
Figure 5 reflects the different number of target nodes and the corresponding network lifetime variation curve. When the network begins running, the number of sensor nodes is 348, and the number of target nodes is 10. With the increase of network running time and target nodes number, the network lifetime using the three algorithms is all in equilibrium state. When , both the ETCA algorithm and the ECAPM algorithm show slight fluctuations relative to the NMCP algorithm. With the same number of target nodes, the average running time of the network using NMCP algorithm is 7.12%, 9.06% higher than that using the ETCA algorithm.
Figure 6 shows the run time comparison curves of the three algorithms. As can be seen from Figure 4, the run time of NMCP algorithm is less than that of the EPDM or ECAPM algorithm. The main reason is that, using clustered structure, the NMCP algorithm has higher speed than EPCM or ECAPM algorithm when seeking nodes which meet the requirements for covering the sensor node, which reduces the difficulty in the coverage problem. Although the EPDM algorithm also uses clustering technique, it uses centralized covering strategy in the process of switching energy between nodes by traversing all the sensor nodes in the node set before the optimal covering subset is determined.
To simulate the coverage rate, we carried out the comparison experiments between the algorithm in this paper and EPDM and ECAPM, with the monitored region id set to m^{2}. As shown in Figure 5, the coverage rate of the three algorithms increases along with the increase in the number of sensor nodes. When the coverage rate reaches 99.9%, the complete coverage over the target node is taken on as finished. When the active nodes number is 50 and , the coverage rate of NMCP algorithm is 71%, while the active nodes numbers of the EPDM algorithm and ECAPM algorithm are 64% and 65%, respectively. When the coverage rate is 99.9%, the active nodes number of NMCP algorithm is 296, whereas the other two algorithms’ coverage rates are 91% and 88%, respectively, when the active nodes number is 296. Therefore, on average, the NMCP algorithm in this paper can increase the coverage rate by 10.31% and 12.47% comparing to EPDM and ECAPM algorithm, respectively.
Experiment 1. Comparison experiments between the NMCP algorithm, ETCA algorithm, and LP_MLCEH protocol [36] are carried out about prolonging the network lifetime; the experimental data are the average of 200 times simulation data, as shown from Figures 8–10.
The second group of comparison experiments are carried out between NMCP algorithm, ETCA algorithm, and LP_MLCEH protocol in relation to the network lifetime in different monitored region. In the experiments, we give K different values and change network scale by changing the number of nodes randomly deployed in monitored region. For smaller monitored region, the number of the randomly deployed nodes is initiated at 20, which is also used as the unit to increase gradually. The simulation diagram shows that the lifetime of wireless sensor network rises in a linear upward trend with the increase of the number of sensor nodes. The main reason is that the members in the node set cover the target node in turn with nodes scheduling mechanisms; therefore the network life cycle is prolonged. In the same network environment, NMCP algorithm prolongs the network lifetime by 13.71% and 16.52% than ETCA algorithm and LP_MLCEH protocol on average; for a larger monitored network, the number of the randomly deployed nodes is initiated to 50, which is also used as the unit to increase gradually. The simulation diagram also shows that the lifetime of wireless sensor network rises with the increase of the number of sensor nodes. Furthermore, its rising trend exceeds that of smaller monitored region. Compared to ETCA algorithm and LP_MLCEH protocol, the network lifetime is increased by 15.13% and 17.27% on average.
Experiment 2. The comparison experiments about prolonging the network lifetime are carried out between the NMCP algorithm, EPDM algorithm [28], and OSCC protocol [11]. Taking the as an example, the experimental data are the average of simulation data of 100 times, as shown from Figures 11–13.
In Figure 11, with the increase in the number of sensor nodes, the three algorithms demonstrate incremental change in coverage rate. When the coverage rate is 99.9%, and , the number of sensor nodes is 180; when , the number of sensor nodes is 147; when , and the number of the sensor nodes is 107, this algorithm reaches 99.9%, which means that the degree coverage is completed, whereas EPDM algorithm and OSCC algorithm cannot reach 100%, which suggests that the NMCP algorithm in this paper has higher coverage rate than the EPDM algorithm and the OSCC algorithm, verifying the effectiveness of the algorithm presented in this paper. In Figure 12, at the beginning of the program execution, the two algorithms have almost the same coverage rate, but as time passes by, both the two contrasted algorithms’ coverage rates decline. The main reason of that is the fact that in EPDM and OSCC algorithm the sensor nodes use uninterrupted covering method during network operation; namely, they cover the target nodes continuously in the monitored region until the node energy is exhausted. When , the three algorithms’ coverage rates drop quite obviously; its coverage is when , respectively, CPNMCP2 = 76.55%, CPNMCP3 = 85.91%, CPEPDM = 87.92%, CPOSCC = 94.24%, and CPNMCP4 = 98.01%. When , the coverage rate is higher than the average coverage rate of EPDM and OSCC algorithm, which shows that, with the same number of nodes, the coverage rate of NMCP algorithm is significantly higher than the other two algorithms, verifying the effectiveness of the algorithm proposed in this paper. Figure 13 shows the comparison curves of the working nodes number of the algorithm in this paper, the EPDM, and the OSCC algorithm on the premise of the same coverage rate. When the number of sensor nodes keeps between 140 and 180, the three algorithms have almost steady number of sensor nodes; when , nodes number required in the algorithm in this paper generally keeps in 144, 141, and 122, while the EPDM and OSCC algorithm generally keep the number of working nodes between 132 and 150. The reason mainly lies in the fact that the algorithm in this paper finishes covering the monitored region by calculating the coverage expectation values of nodes to obtain the set of neighbour nodes in the perception radiuses of local nodes, whereas the other two algorithms finish covering the monitored region in a continuous covering manner, depending on the number of nodes. Therefore, on average, the algorithm in the paper needs less working sensor nodes than the other two algorithms by 3.49%.
6. Conclusions
First, the coverage problems and the deficiencies in the wireless sensor network were analysed and, on basis of that, this paper put forward a nonlinear multiobjective degree coverage preservation protocol. Second, the network model is established based on the above analysis, and the dependency relationship between the sensor node and the destination node is given; then the coverage rate and expectation value of the sensor node in monitored region are then calculated and verified; in the meanwhile the process of resolving the coverage rate for any node that is covered by multisensor nodes in the twodimensional plane is dealt with. In terms of node energy, we have proved the relationship between the communication distance and the maximum distortion, as well as the implementation process of the NMCP protocol.
Finally, the effectiveness and feasibility of the NMCP protocol are verified by simulation experiments. Future work mainly focuses on how to achieve effective coverage on the boundary of monitored region and nonlinear coverage of irregular monitored region.
Competing Interests
The authors declare no competing interests.
Acknowledgments
The study is supported by Projects U1304603 and 61503174 supported by the National Natural Science Foundation of China; Projects 14B520099, 16A520063, and 17A520044 supported by Henan Province Education Department Natural Science Foundation; Projects 142102210471, 162102210113, and 162102410051 supported by Natural Science and Technology Research of Foundation Project of Henan Province Department of Science; Projects 1201430560 supported by Guangzhou Education Bureau Science Foundation; Projects 2016A030313540 supported by Guangzhou Education Bureau Science Foundation.
References
 T. M. Chiwewe and G. P. Hancke, “A distributed topology control technique for low interference and energy efficiency in wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 8, no. 1, pp. 11–19, 2012. View at: Publisher Site  Google Scholar
 Z. Y. Sun, H. Li, and H. Chen, “Optimization coverage of wireless sensor networks based on energy saving,” International Journal of Future Generation Communication and Networking, vol. 7, no. 4, pp. 35–48, 2014. View at: Google Scholar
 B. Wang, K. C. Chua, V. Srinivasan, and W. Wang, “Information coverage in randomly deployed wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 6, no. 8, pp. 2994–3004, 2007. View at: Publisher Site  Google Scholar
 H. M. Ammari and S. K. Das, “Critical density for coverage and connectivity in threedimensional wireless sensor networks using continuum percolation,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 6, pp. 872–885, 2009. View at: Publisher Site  Google Scholar
 Y. Yoon and Y.H. Kim, “An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks,” IEEE Transactions on Cybernetics, vol. 43, no. 5, pp. 1473–1483, 2013. View at: Publisher Site  Google Scholar
 L. Liu, X. Zhang, and H. Ma, “Percolation theorybased exposurepath prevention for wireless sensor networks coverage in internet of things,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3625–3636, 2013. View at: Publisher Site  Google Scholar
 T. M. Chiwewe and G. P. Hancke, “A distributed topology control technique for low interference and energy efficiency in wireless sensor networks,” IEEE Transactions on Industrial Informatics, vol. 8, no. 1, pp. 11–19, 2012. View at: Publisher Site  Google Scholar
 K. Derr and M. Manic, “Wireless sensor network configurationpart II: adaptive coverage for decentralized algorithms,” IEEE Transactions on Industrial Informatics, vol. 9, no. 3, pp. 1728–1738, 2013. View at: Publisher Site  Google Scholar
 C.H. Tsai and Y.C. Tseng, “A pathconnectedcluster wireless sensor network and its formation, addressing, and routing protocols,” IEEE Sensors Journal, vol. 12, no. 6, pp. 2135–2144, 2012. View at: Publisher Site  Google Scholar
 X. Tang and J. Xu, “Optimizing lifetime for continuous data aggregation with precision guarantees in wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 16, no. 4, pp. 904–917, 2008. View at: Publisher Site  Google Scholar
 Z. Sun, W. Wu, H. Wang, H. Chen, and W. Wei, “An optimized strategy coverage control algorithm for WSN,” International Journal of Distributed Sensor Networks, vol. 10, no. 7, Article ID 976307, 2014. View at: Publisher Site  Google Scholar
 R. V. Sampangi and S. Sampalli, “Butterfly encryption scheme for resourceconstrained wireless networks,” Sensors, vol. 15, no. 9, pp. 23145–23167, 2015. View at: Publisher Site  Google Scholar
 I. M. Santos, M. A. Dota, and C. E. Cugnasca, “Dynamic definition of the sampling rate of data in Wireless Sensor Network with Adaptive Automata,” IEEE Latin America Transactions, vol. 9, no. 6, pp. 963–968, 2011. View at: Publisher Site  Google Scholar
 L. Zhang, D. Li, H. Zhu, and L. Cui, “OPEN: an optimisation scheme of Nnode coverage in wireless sensor networks,” IET Wireless Sensor Systems, vol. 2, no. 1, pp. 40–51, 2012. View at: Publisher Site  Google Scholar
 X. H. Xu, X. Y. Li, X. F. Mao, S. J. Tang, and S. G. Wang, “A delayefficient algorithm for data aggregation in multihop wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 163–175, 2011. View at: Publisher Site  Google Scholar
 Y. Xiao, H. Chen, K. Wu et al., “Coverage and detection of a randomized scheduling algorithm in wireless sensor networks,” IEEE Transactions on Computers, vol. 59, no. 4, pp. 507–521, 2010. View at: Publisher Site  Google Scholar  MathSciNet
 P. K. Sahoo and W. X. Liao, “HORA: a distributed coverage hole repair algorithm for wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 14, no. 7, pp. 1397–1410, 2015. View at: Publisher Site  Google Scholar
 A. Adulyasas, Z. Sun, and N. Wang, “Connected coverage optimization for sensor scheduling in wireless sensor networks,” IEEE Sensors Journal, vol. 15, no. 7, pp. 3877–3892, 2015. View at: Publisher Site  Google Scholar
 F. Z. Meng, H. Z. Wang, and H. He, “Connected coverage protocol using cooperative sensing model for wireless sensor network,” Acta Elecronica Sinca, vol. 29, no. 4, pp. 772–779, 2011. View at: Google Scholar
 J.W. Lin and Y.T. Chen, “Improving the coverage of randomized scheduling in wireless sensor networks,” IEEE Transactions on Wireless Communications, vol. 7, no. 12, pp. 4807–4812, 2008. View at: Publisher Site  Google Scholar
 Y. S. Li, C. H. Vu, C. Y. Ai, G. T. Chen, and Y. Zhao, “Transforming complete coverage algorithms to partial coverage algorithms for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 4, pp. 695–703, 2011. View at: Publisher Site  Google Scholar
 C.J. Zhao, H.R. Wu, Q. Liu, and L. Zhu, “Optimization strategy on coverage control in wireless sensor network based on Voronoi,” Journal on Communications, vol. 34, no. 9, pp. 115–122, 2013. View at: Publisher Site  Google Scholar
 S. Mini, S. K. Udgata, and S. L. Sabat, “Sensor deployment and scheduling for target coverage problem in wireless sensor networks,” IEEE Sensors Journal, vol. 14, no. 3, pp. 636–644, 2014. View at: Publisher Site  Google Scholar
 H. Mahboubi, K. Moezzi, A. G. Aghdam, K. SayrafianPour, and V. Marbukh, “Distributed deployment algorithms for improved coverage in a network of wireless mobile sensors,” IEEE Transactions on Industrial Informatics, vol. 10, no. 1, pp. 163–175, 2014. View at: Publisher Site  Google Scholar
 Y.C. Tseng, P.Y. Chen, and W.T. Chen, “kangle object coverage problem in a wireless sensor network,” IEEE Sensors Journal, vol. 12, no. 12, pp. 3408–3416, 2012. View at: Publisher Site  Google Scholar
 Z. B. Wang, J. L. Liao, Q. Cao, H. R. Qi, and Z. Wang, “Achieving kbarrier coverage in hybrid directional sensor networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 7, pp. 1443–1455, 2014. View at: Publisher Site  Google Scholar
 X. F. Xing, G. J. Wang, and J. Li, “Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming,” Wireless Communications and Mobile Computing, vol. 14, no. 14, pp. 1397–1408, 2014. View at: Publisher Site  Google Scholar
 Z. Y. Sun, W. G. Wu, H. Z. Wang, H. Chen, and X. F. Xing, “A novel coverage algorithm based on eventprobabilitydriven mechanism in wireless sensor network,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, article 58, pp. 1–17, 2014. View at: Publisher Site  Google Scholar
 J. Zhu and B. Wang, “Sensor placement algorithms for confident information coverage in wireless sensor networks,” in Proceedings of the 23rd International Conference on Computer Communication and Networks (ICCCN '14), pp. 1–4, Shanghai, China, August 2014. View at: Publisher Site  Google Scholar
 C. L. Yang and K.W. Chin, “On complete targets coverage and connectivity in energy harvesting wireless sensor networks,” in Proceedings of the 22nd International Conference on Telecommunications (ICT '15), pp. 391–397, IEEE, Sydney, Australia, April 2015. View at: Publisher Site  Google Scholar
 H. P. Gupta, S. V. Rao, and T. Venkatesh, “Sleep scheduling for partial coverage in heterogeneous wireless sensor networks,” in Proceedings of the 5th International Conference on Communication Systems and Networks (COMSNETS '13), pp. 1–10, Bangalore, India, January 2013. View at: Publisher Site  Google Scholar
 T. M. Cheng and A. V. Savkin, “A distributed selfdeployment algorithm for the coverage of mobile wireless sensor networks,” IEEE Communications Letters, vol. 13, no. 11, pp. 877–879, 2009. View at: Publisher Site  Google Scholar
 C. Yang and K.W. Chin, “A novel distributed algorithm for complete targets coverage in energy harvesting wireless sensor networks,” in Proceedings of the 1st IEEE International Conference on Communications (ICC '14), pp. 361–366, Sydney, Australia, June 2014. View at: Publisher Site  Google Scholar
 Z. Y. Sun, H. Z. Wang, W. G. Wu, and X. F. Xing, “ECAPM: an enhanced coverage algorithm in wireless sensor network based on probability model,” International Journal of Distributed Sensor Networks, vol. 11, no. 6, Article ID 203502, pp. 1–11, 2015. View at: Publisher Site  Google Scholar
 F. Yan, A. Vergne, P. Martins, and L. Decreusefond, “Homologybased distributed coverage hole detection in wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 23, no. 6, pp. 1705–1718, 2015. View at: Publisher Site  Google Scholar
 M. Imran, N. Haider, and M. Alnuem, “Efficient movement control actor relocation for honing connected coverage in wireless sensor and actor networks,” in Proceedings of the IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops '12), pp. 710–717, IEEE, Clearwater, Fla, USA, October 2012. View at: Publisher Site  Google Scholar
 D. C. Harrison, K. G. Winston, and R. K. Rayudu, “Coverage preservation in energy harvesting wireless sensor networks for rare events,” in Proceedings of the IEEE 40th Conference on Local Computer Networks (LCN '15), pp. 181–184, Clearwater Beach, Fla, USA, October 2015. View at: Publisher Site  Google Scholar
 T. Shu and M. Krunz, “Coveragetime optimization for clustered wireless sensor networks: a powerbalancing approach,” IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 202–215, 2010. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2016 Zeyu Sun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.