Next Article in Journal
Recent Advances in the Computational Discovery of Transcription Factor Binding Sites
Next Article in Special Issue
Simulation of EO-1 Hyperion Data from ALI Multispectral Data Based on the Spectral Reconstruction Approach
Previous Article in Journal
Multi-Band Spectral Subtraction Method for Electrolarynx Speech Enhancement
Previous Article in Special Issue
A Review of Closed-Loop Algorithms for Glycemic Control in the Treatment of Type 1 Diabetes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Mathematical Programming Techniques for Sensor Networks

1
Department of Industrial and Systems Engineering, University of Florida, Gainesville, FL 32611-6595, United States
2
University of Florida Research and Engineering Education Facility (UF-REEF), Department of Industrial and Systems Engineering, 1350 N Poquito Road, Shalimar, FL 32579, United States
*
Author to whom correspondence should be addressed.
Algorithms 2009, 2(1), 565-581; https://doi.org/10.3390/a2010565
Submission received: 31 October 2008 / Revised: 2 March 2009 / Accepted: 2 March 2009 / Published: 17 March 2009
(This article belongs to the Special Issue Sensor Algorithms)

Abstract

:
This paper presents a survey describing recent developments in the area of mathematical programming techniques for various types of sensor network applications. We discuss mathematical programming formulations associated with these applications, as well as methods for solving the corresponding problems. We also address some of the challenges arising in this area, including both conceptual and computational aspects.

1. Introduction

The area of sensor networks research has recently gained a great deal of attention [1,2,3,4,5,6,7,8,9,10]. Various sensors are used in both civilian and military tasks. Sensing devices can be deployed in either static or dynamic settings, where the positions of each sensor can be permanent or dynamically changing (such as in the case of sensors installed on air vehicles). Multiple sensor systems are commonly represented as networks, since besides collecting important information, sensing devices can transmit and exchange information via wireless communication between sensor nodes. Therefore, network (graph) structures are convenient and informative in terms of efficient representation of the structure and properties thereof. To analyze and optimize the performance of sensor networks, mathematical programming techniques are extensively used.
The purpose of this paper is to give a brief review of some of the recent developments in mathematical programming as applied to sensor network research. Various types of optimization problems can be formulated and solved in this context [9,11,12]. Moreover, the pursued tasks can vary from optimizing the network performance to network interdiction, where the goal is to disrupt enemy networks by interfering with communication network integrity. We will outline the formulations and briefly describe the solution methods used to tackle these problems.
In many cases, the identified optimization problems are challenging from the computational viewpoint. In particular, the theoretical computational complexity of many of these problems was proven to be NP-hard. Therefore, efficient algorithms need to be developed to ensure that the near-optimal solutions are found quickly. This is essential to ensure that the decisions regarding efficient operations of sensor networks could be made in a real-time mode, which can be crucial in many applications. Moreover, the uncertain factors that commonly arise in real-world situations also need to be incorporated in the mathematical programming problems, which makes them even more challenging to formulate and solve. In this paper, we will address some of the challenges arising in this area.
In particular, we will describe several important classes of problems that have recently been addressed in the literature. We will start the discussion with the description of recent promising developments in the area of sensor network localization, which allow identifying global positions of all the nodes in a network using limited and sometimes noisy information. It turns out that semidefinite programming techniques can be efficiently used to tackle these problems. Next, we will discuss the problems of single and multiple sensor scheduling for area surveillance, including the setups under uncertainty. We will also address the issues of wireless communication network connectivity and integrity, as well as network interdiction problems.

2. Sensor Network Localization

The wide range of sensors applications reveal different requirements to the network topology identification [13,14,15,16]. For example network parameters can be influenced by land surface, transmission characteristics, energy consumption policy, etc. Ad hoc and dynamic networks also require identification of node coordinates. Such problems are intensively studied in the literature. Utilizing mathematical programming techniques often allows to find efficient solutions.

2.1. Positioning Using Angle of Arrival

In many cases, practical situations require one to be aware of a sensor’s physical coordinates. Installing GPS receivers in every sensor is not always optimal from the cost-related and other perspectives. Typically, only a few nodes (seed nodes, landmarks, etc) of the network are equipped with GPS and know their physical location. The rest of the nodes can only communicate with other nodes and determine relative location characteristics such as distance, angles, etc. Various localization techniques are used to obtain location of all the sensors in the network. The following method assumes that the network consists of two types of nodes: usual and more capable nodes - which knows its position. Niculescu and Nath propose a method by which nodes in an ad hoc network collaborate in finding their position and orientation, assuming that a small part of the network has a position capability. Also, every node in the network has a capability to determine the angle of the arriving signal (AOA).
Each node in the network has one fixed main axis (which may not be the same for different nodes) and the node is able to measure all angles against this axis (Figure 1).
Figure 1. Nodes with AOA capability.
Figure 1. Nodes with AOA capability.
Algorithms 02 00565 g001
Every node in an ad hoc network can only communicate with its immediate neighbors within the radio range, and its neighbors may not always be landmarks, i.e., the nodes that know their position. Niculescu Nath propose in [17] a method to forward orientation in such way, that the nodes which are not in direct contact with landmarks can determine its orientation with respect to the landmarks. Orientation means bearing, radial, or both. Bearing is an angle measurement with respect to another object. A radial is the angle under which the object is seen from another point. The authors examine two algorithms: Distance Vector Bearing (DV-Bearing), which allows each node to get a bearing to landmark, and DV-Radial, which allows a node to get a bearing and radial to a landmark. The propagation in both algorithms works the following way: nodes adjacent to landmarks determine their bearing/radial directly from landmark and send to the network the information about their position. The method of computing node’s bearing and radial at each step is shown in Figure 2.
DV-Bearing algorithm works the following way. Nodes A, B, and C are neighbors and they can communicate with each other. Suppose that the node A needs to find its bearing to node L, which is not within radio range of node A but within radio range of nodes B and C. Since A, B, and C can locate each other than the node A can determine all the angles in triangles A B C and B C L . But that would allow to calculate the angle L A C and consequently the bearing of A to L, which is equal to c + L A C . Once node A knows three bearings to landmarks, which are not at the same line, then it can calculate its own location by triangulation.
The DV-Radial algorithm works the same way but with only one difference that node A needs to know not only bearings of nodes B and C to node L, but also the radials of B and C from L. The knowledge of radials improves accuracy of the algorithm. When all angles are measured against the same direction (for example, when compass is available) then these two methods become identical.
Figure 2. Node A computes its bearing to L using information from B and C
Figure 2. Node A computes its bearing to L using information from B and C
Algorithms 02 00565 g002

2.2. Semidefinite Programming (SDP) for Sensor Network Localization

The section considers localization problem when information on distances for anchor nodes and unknown sensors nodes are given. Suppose we consider localization problem on the plane. We have m known points a k I R 2 , k = 1 , . . . , m and n unknown nodes x j I R 2 , j = 1 , . . . , n . Let us consider three sets of node pairs N e , N l , N u . For pairs in N e we know exact distances d k j between a k and x j and d i j ^ between x i and x j . N l is a set of pairs with known lower bounds r ̲ k j and r ̲ i j . Finally, N u is a set of upper bounds r ¯ k j and r ¯ i j . Naturally our goal is to minimize estimation error which immediately lead us to the following non-convex optimization problem
min ( i , j ) N e , i < j | x i x j 2 d ^ i j 2 | + ( k , j ) N e | a k x j 2 d k j 2 | + ( i , j ) N l , i < j ( x i x j 2 r ̲ i j 2 ) + ( k , j ) N l ( a k x j 2 r ̲ k j 2 ) + ( i , j ) N u , i < j ( x i x j 2 r ¯ i j 2 ) + + ( k , j ) N u ( a k x j 2 r ¯ k j 2 ) + ,
where ( u ) and ( u ) + are defined as
( u ) = max { 0 , u } ( u ) + = max { 0 , u } .
The norm of vector x is defined as x = x T x . In [18,19] the authors study semidefinite relaxations of the problem.
The formulated problem can be rewritten by introducing matrix notation and slack variables as
min ( i , j ) N e , i < j ( α i j + + α i j ) + ( k , j ) N e , ( α k j + + α k j ) + ( i , j ) N l , i < j β i j + ( k , j ) N l β k j + ( i , j ) N u , i < j β i j + + ( k , j ) N u β i j + s . t . s i j T Y e i j d i j 2 = α i j + α i j , i , j N e , i < j , ( a k ; e j ) T I X X T Y ( a k ; e j ) ( d ^ k j ) 2 = α k j + α k j , k , j N e , e i j T Y e i j ( d i j ) 2 β i j , i , j N l , i < j ( a k ; e j ) T I X X T Y ( a k ; e j ) ( r ̲ k j ) 2 β k j , k , j N l , e i j T Y e i j ( d i j ) 2 β i j , i , j N l , i < j ( a k ; e j ) T I X X T Y ( a k ; e j ) ( r ̲ k j ) 2 β k j , k , j N l , α i j + , α i j , α k j + , α k j , β i j + , β i j , β k j + , β k j 0 , Y = X T X .
Here X = [ x 1 , x 2 , , x n ] is a 2 × n matrix. In order to cope with nonconvexity equality, Y = X T X is replaced with Y X T X or equivalently
Z : = I X X T I 0 .
The last relation leads to a standard SDP formulation:
min ( i , j ) N e , i < j ( α i j + + α i j ) + ( k , j ) N e , ( α k j + + α k j ) + ( i , j ) N l , i < j β i j + ( k , j ) N l β k j + ( i , j ) N u , i < j β i j + + ( k , j ) N u β i j + s . t . ( 1 ; 0 ; 0 ) T Z ( 1 ; 0 ; 0 ) = 1 , ( 0 ; 1 ; 0 ) T Z ( 0 ; 1 ; 0 ) = 1 , ( 1 ; 1 ; 0 ) T Z ( 1 ; 1 ; 0 ) = 2 , ( 0 ; e i j ) T Z ( 0 ; e i j ) α i j + + α i j = ( d ^ i j ) 2 , i , j N e , i < j , ( a k ; e j ) T Z ( a k ; e j ) α k j + + α k j = ( d ^ k j ) 2 , k , j N e , ( 0 ; e i j ) T Z ( 0 ; e i j ) + β i j ( r ̲ i j ) 2 , i , j N l , i < j , ( a k ; e j ) T Z ( a k e j ) + β k j ( r ̲ k j ) 2 , k , j N l , ( 0 ; e i j ) T Z ( 0 ; e i j ) β + i j ( r ¯ i j ) 2 , i , j N u , i < j , ( a k ; e j ) T Z ( a k e j ) β k j + ( r ¯ k j ) 2 , k , j N u , α i j + , α i j , α k j + , α k j , β i j + , β i j , β k j + , β k j 0 , Z 0 .
Papers [18,19] provide a criterion of solution existence and uniqueness, as well as statistical interpretation of the formulation in case when distance values are random values with normally distributed measurement errors. The SDP problems are solved using interior point algorithms. The numerical experiments results demonstrate the efficiency of the proposed approach.

3. Sensor Scheduling

Surveillance is an important task that can be effectively performed by an intelligent network of sensors. For example, satellites can be equipped with cameras to monitor Earth surface for different events, such as forest fire, border crossing or enemy hostile activity. Another example is traffic monitoring at the roads and intersections. Many scientific publications have recently appeared in the literature due to increasing interest to the problem of finding optimal schedule for sensors [20,21,22,23,24,25]. Most common technological and budget constraint is a low number of sensors to monitor all the objects of interest simultaneously. Thus, finding the schedule that reduces potential loss of limited observations is a task of high importance. This section provides a review of recently developed optimization based methods for building optimal schedule of sensor surveillance.

3.1. Single Sensor Scheduling

The simplest case is to model one sensor that observes a group of sites at discrete time points. Some physical systems require virtually zero time for changing a site being observed. For example, the time of a camera refocusing, which is installed on a satellite, is negligibly small. This assumption leads to the model proposed by Yavuz and Jeffcoat in [26].
Assume that we need to observe n sites during T time periods. During every period a sensor is allowed to watch only at one of n sites. The scheduling decision can be modeled using binary variables x i , t
x i , t = 1 , if  i -th site is observed at time  t , 0 , otherwise ,
t is a discrete variable and t = 1 , 2 , . . . , T . If a site i is not observed for some period of time, it leads to the penalty that is proportional to the time of not observing this site. This penalty can be modeled using another group of decision variables. Let y i , t denotes the time of last visiting site i before time moment t. Let us note that variables x i , t completely determine values of y i , t . Fixed penalty a i and variable penalty b i t are associated with site i at time moment t. Thus, the penalty at time t associated with site i is
a i ( 1 x i , t ) + b i , t ( t y i , t ) .
[26] suggests minimizing maximum loss over all sites and time intervals. Thus the objective function is defined as max i , t { a i + b i , t ( t y i , t ) } . This objective function can be linearized and consequently the problem looks as following
min C
s . t . C a i ( 1 x i , t ) + b i , t ( t y i , t ) , i = 1 , , n , t = 1 , , T ,
i = 1 n x i , t 1 , t = 1 , , T ,
0 y i , t y i , t 1 t x i , t , i = 1 , , n , t = 1 , , T ,
t x i , t y i , t t , i = 1 , , n , t = 1 , , T ,
y i , 0 = 0 , i = 1 , , n ,
x i , t { 0 , 1 } , i = 1 , , n , t = 1 , , T ,
y i , t I R , i = 1 , , n , t = 0 , , T .
Constraints (6) ensure that the sensor visits only one site at a time. Constraints (7) -(8 ) set the dependence y i , t on x i , t . That is y i , t is set to t if and only if the sensor is observing site i at time t otherwise y i , t = y i , t 1 .
Single Sensor Scheduling problem is NP-hard [27] therefore various greedy heuristics have been proposed. The idea behind greedy algorithm is simple. At time t = 1 we find the site with the smallest penalty then at next time period we find another site with the smallest penalty. This sequence is repeated for all T time intervals. Thus the complexity of suggested approach is O ( n T ) . Yavuz and Jeffcoat has also suggested the “look ahead” modification of greedy heuristic which takes more computational time but computational experiment demonstrate that the solution is improved compared to the initial simple greedy optimization.

3.2. Stochastic approach

The stochastic nature of scheduling surveillance reduces the predictability of sensors behavior and therefore plays an important role for military tasks. Here we assume that sites are chosen randomly based on probability p i j of transition from i-th to j-th site . Then sensor scheduling can be considered as a Markov chain stochastic process and characterized by steady state probabilities π i .
The goal of stochastic approach is finding such steady state probabilities that minimize maximum loss. Let r i be the visit period of site i. Then the penalty of information loss at site i is a i + ( r i 1 ) b i , t at time t. Let us consider a sufficiently small planning horizon with time-invariant site dynamics, this allows us to reduce b i , t to b i and denote this approach as static. Visiting site i for every r i > 0 periods is equal to spending π i = 1 / r i of the sensor’s time at the site i. The optimal schedule is achieved when i π i = 1 ; i.e., all the available time is utilized. Also, sensor never stays at any site for two consecutive periods of time. Thus r i 2 (or π i 0 . 5 ) should be satisfied for each site. Then the non-linear model for obtaining optimal stationary probabilities is formulated as
min max i { a i + 1 π i 1 b i }
s . t . i = 1 n π i = 1 ,
π i 0 . 5 , i = 1 , , n
π i R , i = 1 , , n
 
A heuristic is proposed to solve this nonlinear continuous problem. Utilizing constraints (14), the authors define a lower bound on the objective function value with
C L = max i { a i + b i } .
Then, we set
C = max i { a i + 1 π 1 b i } = C L
and calculate
r i = ( C a i ) / b i + 1
and
π i = 1 / r i
for all i. Note that π i = 0 . 5 for the sites with a i + b i = C and π i < 0 . 5 for the remaining constraints. If the determined probabilities add up to one then the optimal solution is found, and the procedure terminates. If the sum of probabilities is less than one, then one can shift some π-s up to make i π i = 1 . In the case when i π i > 1 the found C is infeasible and we can apply iterative procedures (such as bisection) to find C such that i π i = 1 .
The static approach minimizes average penalty that is determined by steady probabilities and, thus, does not address the cases of long lasting absence at a site. Taking into account the fact that some random outcomes may result in extremely long penalties it is reasonable to increase the probabilities of visiting the sites that were visited long time ago. On the other hand, the probability of observing the sites, which were recently visited, should be decreased. Recall that y i , t represents the last time when the site i was visited by the time t. The probability of visiting a site must depend on the difference t y i , t , thus it will increase probability of visiting overdue sites.
To create a preference for visiting site i at time t the following adjustment factors are proposed
q i , t = π i · t y i , t r i k
It is bigger than one for overdue sites and less than one for the sites that have been visited within their expected visiting periods. The parameter k is a user-defined parameter, which determines the weight of the adjustment factor. The probabilities of visiting each site at specific time point t are based on previous history and can be computed as p i = q i / Q , where Q = i = 1 n q i .
Finally, a hybrid method was proposed based on a combination of greedy algorithm and the stochastic method, discussed above. The first step calculates the penalty of not visiting site i: c i = a i + b i , t ( t y i , t ) . Next step calculates preference values to visit each site: q i = c i c m a x k , where c m a x = max i { c i } . And then the probabilities of visit are equal to: p i = q i / Q , where Q = i = 1 n q i .

3.3. Multiple Sensors Scheduling Using Percentile Type Constraints

Boyko et al have proposed to reformulate problem (4) -(11) for the case of m sensors [28].
min max i , t { a i + b i , t ( t y i , t ) }
s . t . i = 1 n x i , t m , t = 1 , , T ,
0 y i , t y i , t 1 t x i , t , i = 1 , , n , t = 1 , , T ,
t x i , t y i , t t , i = 1 , , n , t = 1 , , T ,
y i , 0 = 0 , i = 1 , , n ,
x i , t { 0 , 1 } , i = 1 , , n , t = 1 , , T ,
y i , t I R , i = 1 , , n , t = 0 , , T .
For every site i and every time point t we can calculate penalty associated with the last time a sensor visited this site a i + b i , t ( t y i , t ) . Let us pick ( 1 α ) % of worst cases among these n × T penalty values. Then, instead of minimizing maximum loss we can minimize the the average taken over this ( 1 α ) % percent of worst penalty values. Despite the fact that this formulation is deterministic it is equivalent to computing ( 1 α ) Conditional Value-at Risk (CVaR) for a set of random outcomes having equal probabilities p i , t = 1 n T .
CVaR [29,30] is closely related to a well-known quantitative risk measure referred to as Value-at-Risk (VaR). By definition with respect to a specified probability level ( 1 α ) (in many applications the value of ( 1 α ) is set rather high, e.g. 95%), the α-VaR is the lowest amount ζ such that with probability ( 1 α ) , the loss will not exceed ζ, whereas for continuous distributin the α-CVaR is the conditional expectation of losses above that amount ζ. As it can be seen, CVaR is a more conservative risk measure than VaR, which means that minimizing or restricting CVaR in optimization problems provides more robust solutions with respect to the risk of high losses (see figure 3).
Figure 3. Graphical representation of VaR and CVaR.
Figure 3. Graphical representation of VaR and CVaR.
Algorithms 02 00565 g003
The reader can find the formal definition of CVaR for various distribution cases in [29,30]. Rockafellar and Uryasev [31,32] showed that minimizing CVaR-type objective function of linear argument can be reduced to LP. In the sensors scheduling problem the loss function is introduced as
L ( x , y , i , t ) = a i + b i , t ( t y i , t ) .
Thus the initial multiple sensors scheduling problem can be considered as the CVaR-based formulation
min x , y CVaR α L ( x , y , i , t ) )
s . t .            
constraints  ( 18 ) ( 23 ) ,
ζ I R .        
Even though the parameters i and t of the loss function (24) are deterministic by nature, the stochastic framework was applied to this model in order to compute a percentile-type measure.
The parameters that quantify fixed and variable information losses are in many cases uncertain by nature. The following mathematical programming formulations allow quantifying and restricting the risks of worst-case losses associated with the aforementioned uncertain parameters. It is made by utilizing quantitative risk measures that allow one to control the robustness of the optimal solutions. Assuming that a i and b i , t are random values we can formulate stochastic program utilizing the notion of CVaR.
min x , y , ζ CVaR α a i s ( 1 x i , t ) + b i , t s ( t y i , t ) s . t . constraints  ( 18 ) ( 23 ) .
Here we use S scenarios ( a i s and b i , t s , s = 1 , , S ) sampled from the distribution of penalty coefficients.
The mixed integer linear formulation was solved by ILOG CPLEX. The problems were also reformulated in terms of cardinality constraints and solved by AOrDa Portfolio Safeguard software package. Both solver find a good quality approximate solutions for large size problems.

4. Communication Network Interdiction

An important issue in military applications is to neutralize the communication in the sensors network of the enemy. This problem is known as jamming or eavesdropping a wireless communication network. This section introduces optimization formulations that allow to place jamming devices delivering maximal harm to the adverse sensors network. We start from a deterministic case when node locations are known.
The goal of jamming is to find a set of locations for placing jamming devices that suppresses the functionality of the network. Assume that n jamming devices are used to jam m communicating sensors. The assumption is made that the sensors and jammers can be located on a fixed set of locations V. The jamming effectiveness of device j is calculated as
d : ( V × V ) I R ,
where d is a decreasing function of the distance from the jamming device to the node being jammed.
The cumulative level of jamming energy received at node i is defined as
Q i : = j = 1 n d i j ,
where n is the number of jamming devices. Then, jamming problem can be formulated as the minimization of the number of jamming devices placed, subject to a set of covering constraints:
min n s . t . Q i C i , i = 1 , 2 , , m .
Seeking the optimal placement coordinates ( x j , y j ) , j = 1 , 2 , , n for jamming devices given the coordinates ( X i , Y i ) , i = 1 , 2 , , m leads to non-convex formulations for most functions d. Thus, integer programming models for the problem are proposed.
A fixed set N = { 1 , 2 , , n } of possible locations for the jamming devices and the set of communication nodes are introduced by Commander et al in [33]. Define the decision variable x j as
x j = 1 ,  if a jamming device is installed at location  j , 0 ,  otherwise .
Then we have the optimal network covering formulation given as
min j = 1 n c j x j
s . t .
j = 1 n d i j x j C i , i = 1 , 2 , , m ,
x j { 0 , 1 } , j = 1 , 2 , , n ,
Here the objective is to minimize the cost of jamming devices used while achieving some minimum level of coverage at each node. If c j = 1 then the number of jammers is minimized.
If the goal is to suppress sensors communications we can minimize jamming cost with respect to the required level of connectivity index. Communication between nodes i and j is assumed to be destroyed if at least one of the nodes is jammed. Further, let y i j : = 1 if there exists a path from node i to node j in the jammed network and let z i = 1 be an indicator that i-th node is jammed. This can be formulated as
min j = 1 n c j x j
s . t .
j = 1 j i m y i j L , i M ,
M ( 1 z i ) > S i C i M z i , i M ,
y i j  is consistent with the network and  z i
x j { 0 , 1 } , j N ,
z i { 0 , 1 } , i M ,
y i j { 0 , 1 } , i , j M ,
where S i : = j = 1 n d i j x j denote the cumulative level of jamming at node i, M I R is some large constant. This problem can be formulated as a mixed integer linear problem and justification is provided in [33].
Finally, Commander et al provide percentile-based formulation for deterministic jamming problems. Suppose it is determined that jamming some fraction α ( 0 , 1 ) of the nodes is sufficient for effectively dismantling the network. This can be accomplished by the inclusion of α-VaR constraints in the original model. Let y : M { 0 , 1 } be an indicator whether node i is jammed ( y i = 1 ).
Then to find the minimum number of jamming devices that will allow covering α · 100 % of the network nodes with prescribed levels of jamming C i , we must solve the following integer program
min j = 1 n c j x j
s . t .
i = 1 m y i α m ,
j = 1 n d i j x j C i y i , i = 1 , 2 , , m ,
x j { 0 , 1 } , j = 1 , 2 , , n ,
y i { 0 , 1 } , i = 1 , 2 , , m .
The α-CVaR optimization model for network covering can be formulated as a mixed integer linear program using a standard linearization framework:
min j = 1 n c j x j
s . t .
ζ + 1 ( 1 α ) m i = 1 m max C min j = 1 n x j d i j ζ , 0 0 ,
ζ R ,
x j { 0 , 1 } .
The VaR and CVaR models can also be written for connectivity suppression models in the similar fashion. We refer the reader to [33] for details.
The deterministic formulations of the wireless network jamming problem are extended in [34] to tackle the stochastic jamming problem formulations using percentile type constraints. These formulations consider the case when the exact topology of the network to be jammed is not known, but we know the distribution of network parameters.
Since the exact locations of the network nodes are unknown, it is assumed that a set of intelligence data has been collected and from that a set S of the most likely scenarios have been compiled. Scenario s S contains both the node locations { ( ξ 1 s , η 1 s ) , ( ξ 2 s , η 2 s ) , , ( ξ m s , η m s ) } and the set of jamming thresholds { C 1 s , C 2 s , , C m s } . For each scenario s S , the set M s = { 1 , 2 , , m s } needs to be jammed. Taking into account all the scenarios we can write a mathematical program for node covering problem:
min k = 1 n c k x k ,
s . t .
k = 1 n d i k s x k C i s , i = 1 , 2 , , m s , s = 1 , 2 , , S ,
x k { 0 , 1 } , k = 1 , 2 , , n ,
It is unlikely to find the solution that can provide effective jamming strategy for all scenarios. Therefore, the notion of percentile-based risk measures can be utilized to develop formulations of the robust jamming problems incorporating these risk constraints. The robust node covering problem with Value-at-Risk constraints can be formulated as
min k = 1 n c k x k ,
s . t .
k = 1 n d i k s x k C i s ρ i s , s S , i M s ,
i = 1 m s ρ i s α m s , s S ,
x k { 0 , 1 } , k N ,
ρ i s { 0 , 1 } , s S , i M s ,
The loss function can be considered as the difference between the energy required to jam network node i, namely C i s , and the cumulative amount of energy received at node i due to x over each scenario. With this the robust node covering problem with CVaR constraints is formulated as follows.
min k = 1 n c k x k ,
s . t .
ζ s + 1 ( 1 α ) m s
i = 1 m s max C m i n s k = 1 n d i k s x k ζ s , 0 0 , s S ,
x k { 0 , 1 } , k N ,
ζ s R , s S .
The CVaR constraint (59) implies that for the ( 1 α ) · 100 % of the worst (least) covered nodes, the average value of f ( x ) is less than or equal to 0.
Numerical experiments demonstrate that problems of moderate size can be solved by ILOG CPLEX. Finding effective heuristics and approximations for sensors network jamming problems of large dimensions is an interesting and important research direction.

5. Conclusion

In this paper, we presented a brief outline of problems and challenges arising in the important and exciting area of mathematical programming techniques for sensor network applications. Clearly, the research in this area is far from complete, and a lot of extensions and generalizations of the presented models can be developed. Overall, the main challenges arising in this area are associated with efficiently incorporating the uncertainties in the mathematical programming formulations and dealing with the computational intractability of the corresponding stochastic and robust optimization problems. However, there are promising developments in this field, including computationally efficient heuristic algorithms and software packages for solving these problems. Therefore, the area of sensor networks and mathematical programming techniques associated with it has a clear potential from both theoretical and practical perspectives.

References and Notes

  1. Hollick, M.; Martinovic, I.; Krop, T.; Rimac, I. A survey on dependable routing in sensor net-works, ad hoc networks, and cellular networks. In EUROMICRO ’04: Proceedings of the 30th EUROMICRO Conference, pages 495–502, Washington, DC, USA; 2004. IEEE Computer Society. [Google Scholar]
  2. Yuan, Y.; Yang, Z.; Chen, M.; He, J. A survey on information processing technologies in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 2006, 1(3), 103–109. [Google Scholar] [CrossRef]
  3. Kuorilehto, M.; Hännikäinen, M.; Hämäläinen, T. D. A survey of application distribution in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2005, 5(5), 774–788. [Google Scholar] [CrossRef]
  4. Abbasi, A. A.; Younis, M. A survey on clustering algorithms for wireless sensor networks. Comput. Commun. 2007, 30(14-15), 2826–2841. [Google Scholar] [CrossRef]
  5. Akyildiz, I. F.; Melodia, T.; Chowdhury, K. R. A survey on wireless multimedia sensor networks. Comput. Netw. 2007, 51(4), 921–960. [Google Scholar] [CrossRef]
  6. Yick, J.; Mukherjee, B.; Ghosal, D. Wireless sensor network survey. Comput. Netw. 2008, 52(12), 2292–2330. [Google Scholar] [CrossRef]
  7. Li, Y.; Thai, M. T. (Eds.) W. W. Wireless Sensor Networks and Applications. Springer, 2007.
  8. Pardalos, P.; Ye, Y.; V. Boginski, C. C. e. (Eds.) Sensors: Theory, Algorithms, and Applications; Springer; to appear in 2009.
  9. Yan, T.; Gu, Y.; He, T.; Stankovic, J. A. Design and optimization of distributed sensing coverage in wireless sensor networks. Trans. on Embedded Computing Sys. 2008, 7(3), 1–40. [Google Scholar] [CrossRef]
  10. Ferentinos, K. P.; Tsiligiridis, T. A. Adaptive design optimization of wireless sensor networks using genetic algorithms. Comput. Netw. 2007, 51(4), 1031–1051. [Google Scholar] [CrossRef]
  11. Buczak, A. L.; Wang, H. H.; Darabi, H.; Jafari, M. A. Genetic algorithm convergence study for sensor network optimization. Inf. Sci. Inf. Comput. Sci. 2001, 133(3-4), 267–282. [Google Scholar] [CrossRef]
  12. Venkatesh, S.; Buehrer, R. M. A linear programming approach to nlos error mitigation in sensor networks. In IPSN ’06: Proceedings of the 5th international conference on Information processing in sensor networks, pages 301–308, New York, NY, USA; 2006. ACM. [Google Scholar]
  13. Wu, K.; Liu, C.; Pan, J.; Huang, D. Robust range-free localization in wireless sensor networks. Mob. Netw. Appl. 2007, 12(5), 392–405. [Google Scholar] [CrossRef]
  14. Wang, C.; Xiao, L. Sensor localization in concave environments. ACM Trans. Sen. Netw. 2008, 4(1), 1–31. [Google Scholar] [CrossRef]
  15. Koutsonikolas, D.; Das, S. M.; Hu, Y. C. Path planning of mobile landmarks for localization in wireless sensor networks. Comput. Commun. 2007, 30(13), 2577–2592. [Google Scholar] [CrossRef]
  16. Rudafshani, M.; Datta, S. Localization in wireless sensor networks. In IPSN ’07: Proceedings of the 6th international conference on Information processing in sensor networks, pages 51–60, New York, NY, USA; 2007. ACM. [Google Scholar]
  17. Niculescu, D.; Nath, B. Ad hoc positioning system (aps) using aoa. In The 28th Conference on Computer Communications, pages 1734–1743; IEEE, 2003. [Google Scholar]
  18. Biswas, P.; Ye, Y. Semidefinite programming for ad hoc wireless sensor network localization. In IPSN ’04: Proceedings of the 3rd international symposium on Information processing in sensor networks, pages 46–54, New York, NY, USA; 2004. ACM. [Google Scholar]
  19. So, A. M.-C.; Ye, Y. Theory of semidefinite programming for sensor network localization. Math. Program. 2007, 109(2), 367–384. [Google Scholar] [CrossRef]
  20. Pemberton, J. C.; Flavius Galiber, I. A constraint-based approach to satellite scheduling. In DIMACS workshop on on Constraint programming and large scale discrete optimization, pages 101–114, Boston, MA, USA; 2001. American Mathematical Society. [Google Scholar]
  21. Chhetri, A. S.; Morrell, D.; Papandreou-Suppappola, A. Nonmyopic sensor scheduling and its efficient implementation for target tracking applications. EURASIP J. Appl. Signal Process. 2006, 2006, 9–9. [Google Scholar] [CrossRef]
  22. Jeong, J.; Sharafkandi, S.; Du, D. H. C. Energy-aware scheduling with quality of surveillance guarantee in wireless sensor networks. In DIWANS ’06: Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks, pages 55–64, New York, NY, USA; 2006. ACM. [Google Scholar]
  23. Wu, K.; Gao, Y.; Li, F.; Xiao, Y. Lightweight deployment-aware scheduling for wireless sensor networks. Mob. Netw. Appl. 2005, 10(6), 837–852. [Google Scholar] [CrossRef]
  24. Singh, S. S.; Kantas, N.; Vo, B.-N.; Doucet, A.; Evans, R. J. Simulation-based optimal sensor scheduling with application to observer trajectory planning. Automatica 2007, 43(5), 817–830. [Google Scholar] [CrossRef]
  25. Klappenecker, A.; Lee, H.; Welch, J. L. Scheduling sensors by tilinglattices. In PODC ’08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, pages 437–437, New York, NY, USA; 2008. ACM. [Google Scholar]
  26. Yavuz, M.; Jeffcoat, D. Single sensor scheduling for multi-site surveillance. Technical report, Air Force Research Laboratory. 2007. [Google Scholar]
  27. Yavuz, M.; Jeffcoat, D. An analysis and solution of the sensor scheduling problem. In Advances in Cooperative Control and Optimization; volume 369, pp. 167–177. Springer, 2007. [Google Scholar]
  28. Boyko, N.; Turko, T.; Boginski, V.; Jeffcoat, D.; Uryasev, S.; Pardalos, P.; Zrazhevsky, G. Ro- bust multi-sensor scheduling for multi-site surveillance. Journal of Combinatorial Optimization, submitted.
  29. Rockafellar, R.; Uryasev, S. Conditional value-at-risk for general loss distributions. Journal of Banking and Finance 2002, 26, 1443–1471. [Google Scholar] [CrossRef]
  30. Sarykalin, S.; Serraino, G.; Uryasev, S. Var vs cvar in risk management and optimization. INFORMS Tutorial 2008. [Google Scholar]
  31. Rockafellar, R.; Uryasev, S. Optimization of conditional value-at-risk. Journal of Risk 2000, 2, 21–42. [Google Scholar]
  32. Uryasev, S. Conditional value-at-risk: Optimization algorithms and applications. Financial Engineering News 2000, 14, 1–5. [Google Scholar]
  33. Commander, C.; Pardalos, P.; Ryabchenko, V.; Uryasev, S. The wireless network jamming problem. Journal of Combinatorial Optimization 2007, 14:4, 481–498. [Google Scholar] [CrossRef]
  34. Commander, C.; Pardalos, P.; Ryabchenko, V.; Sarykalin, S.; Turko, T.; Uryasev, S. Robust wireless network jamming problems. In Lecture Notes in Control and Information Sciences; Commander, C., Hirsch, M., Murphey, R., Pardalos, P., Eds.; Springer, 2008. [Google Scholar]

Share and Cite

MDPI and ACS Style

Sorokin, A.; Boyko, N.; Boginski, V.; Uryasev, S.; Pardalos, P.M. Mathematical Programming Techniques for Sensor Networks. Algorithms 2009, 2, 565-581. https://doi.org/10.3390/a2010565

AMA Style

Sorokin A, Boyko N, Boginski V, Uryasev S, Pardalos PM. Mathematical Programming Techniques for Sensor Networks. Algorithms. 2009; 2(1):565-581. https://doi.org/10.3390/a2010565

Chicago/Turabian Style

Sorokin, Alexey, Nikita Boyko, Vladimir Boginski, Stan Uryasev, and Panos M. Pardalos. 2009. "Mathematical Programming Techniques for Sensor Networks" Algorithms 2, no. 1: 565-581. https://doi.org/10.3390/a2010565

Article Metrics

Back to TopTop