Next Article in Journal
Study on Optimal Broadcast Ephemeris Parameters for GEO/IGSO Navigation Satellites
Next Article in Special Issue
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
Previous Article in Journal
Structural Design and Crawling Pattern Generator of a Planar Quadruped Robot for High-Payload Locomotion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios

1
INEGI/INESC-TEC—Faculty of Engineering, University of Porto (FEUP), 4200-465 Porto, Portugal
2
Departmnet of Technology, State University of Feira de Santana (DTEC/UEFS), Feira de Santana 44036-900, Brazil
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(22), 6542; https://doi.org/10.3390/s20226542
Submission received: 14 October 2020 / Revised: 3 November 2020 / Accepted: 13 November 2020 / Published: 16 November 2020
(This article belongs to the Special Issue Dependability of Wireless Sensor Networks)

Abstract

:
In critical industrial monitoring and control applications, dependability evaluation will be usually required. For wireless sensor networks deployed in industrial plants, dependability evaluation can provide valuable information, enabling proper preventive or contingency measures to assure their correct and safe operation. However, when employing sensor nodes equipped with cameras, visual coverage failures may have a deep impact on the perceived quality of industrial applications, besides the already expected impacts of hardware and connectivity failures. This article proposes a comprehensive mathematical model for dependability evaluation centered on the concept of Quality of Monitoring (QoM), processing availability, reliability and effective coverage parameters in a combined way. Practical evaluation issues are discussed and simulation results are presented to demonstrate how the proposed model can be applied in wireless industrial sensor networks when assessing and enhancing their dependability.

1. Introduction

Industrial applications have become more critical and complex over the past years, mainly due the intensification of processes automation and their distributed operation [1]. Many of those applications comprise one or more Wireless Visual Sensor Networks (WVSN), aiming at multi-sensory monitoring for tasks as quality inspection, surveillance and system guidance. Whatever is the nature of such sensors-based networks, their failures can be dangerous to people, lead to environmental damages or even result in economic losses, pushing WVSN applications to pursue a sufficient dependability level [2].
In general, the concept of dependability concerning scalar Wireless Sensor Networks (WSN) has addressed hardware and connectivity failures when modelling faulty conditions [3]. However, for a visual monitoring context, a new type of failure must be also considered, since the way cameras sense the environment is subject to a whole new group of errors and impairments [4]. In fact, visual coverage failures are resulted from total or partial lack of visual information retrieved from cameras, with different particularities depending on the way the environment is perceived. Therefore, when combining hardware, connectivity and coverage failures, more comprehensive dependability evaluations can be performed, potentially benefiting the management of critical sensing applications.
When assessing the dependability of wireless visual sensor networks in industrial environments, in a broader perspective, the concept of Quality of Monitoring (QoM) can be defined. The QoM refers to the capability of a network to perform the expected monitoring functions over a region of interest [5]. In other words, it is not only considered the amount of retrieved visual information when assessing quality, but also definition and sharpness parameters [6]. In practical means, any application may have a minimum expected level of QoM, changing the perception of coverage failures when evaluating dependability: a coverage failure will happen when an application fails to fulfill its expected minimum QoM level.
Several aspects can affect the normal operation of cameras. Common examples are dynamic external (outdoor) factors such as (high/low) luminosity, fog, rain, snow and dust. Particularly for indoor industrial areas, however, there will be two main causes of visual failures that will affect the retrieved visual data and, consequently, the achieved dependability of an application: (1) occlusion and (2) distance of view. Occlusion will be produced by some static or mobile obstacle, potentially reducing a camera’s Field of View (FoV) and indirectly impacting the overall monitoring quality. In a different way, the distance of view is associated to the sharpness of the retrieved visual data [7]. Both types of impairments may simultaneously affect visual sensor nodes and thus they will be modeled as the main causes for QoM degradation.
This article proposes a methodology to allow dependability evaluations of wireless visual sensor networks under the effect of different types of failures. For that, we integrate some previous contributions into a single unified mathematical model, incorporating new elements to better encompass the challenges of industrial monitoring applications. Actually, the proposed methodology comprises common hardware and networking failures associated to scalar sensors, as well as visual coverage failures generated by occlusion or low monitoring quality (modelled as the distance of view). Doing so, researchers acquire a unified model that comprehensively cover frequent but complex failure conditions in such scenarios. Additionally, extensive discussions about practical definitions of the model’s parameters are conducted in this article, addressing an important researching gap that has not been properly considered by the literature. For this purpose, an example of a paper mill application is considered for simulations (Iggesund Paperboard [8]), taking as reference the WirelessHART protocol to connect the sensors [9].
In fact, we have addressed some dependability issues for scalar and visual wireless sensor networks in previous works. In Reference [10], a formal methodology was proposed to model some aspects of hardware and networking failures, focused on scalar sensors. Then, in References [10,11], visual coverage failures were mathematically modelled and processed for dependability assessment, although no dependability evaluation was performed due to the lack of a proper method for this task. In this article, however, we leveraged the mathematical formulations in those work to achieve a more complete model based on different coverage failures that are considered at once. We provide adaptations in the methodology proposed in Reference [10] in order to incorporate this more complete model and consequently to evaluate WVSN in a more comprehensive way. The resulted model and the performed simulations are important contributions that enhance the knowledge in this field, significantly supporting new developments in industrial WSN.
Therefore, the expected contributions of this article can be summarized as follows:
  • Integrate different methodologies proposed in previous works, defining a comprehensive unified mathematical model to assess the dependability of wireless visual sensor networks, specially considering the particularities of sensors-based industrial applications;
  • Create a consistent reference for quality assessment in critical applications, associating the most relevant failure causes in visual monitoring, which has not been considered before by the literature;
  • Discuss how the parameters of the proposed mathematical model can be achieved in practical applications, potentially supporting more effective dependability evaluations;
  • Demonstrate a practical use of the proposed methodology considering realistic parameters, which can be easily replicated when evaluating other applications in industrial scenarios.
The remainder of the article is organized as follows. Section 2 presents related works regarding dependability evaluation and coverage failures in wireless visual sensor networks. Fundamental concepts for this work are presented in Section 3. The proposed methodology is described in Section 4, detailing the different evaluation phases. Section 5 presents and discusses important results considering a study case in an industrial scenario. Finally, the conclusions are stated in Section 6.

2. Related Works

This article addresses the effects of hardware, connectivity and visual coverage failures on dependability assessment in wireless visual sensor networks. Actually, visual coverage failures are highly impacting on this task, although poorly considered in previous works, specially when performing monitoring tasks associated to the coverage of a defined area. In fact, visual coverage failures are related to insufficient area coverage, which may be resulted from different causes such as incorrect deployment, occlusion and low monitoring quality due to visual effects. Nevertheless, hardware and connectivity (networking) failures may also significantly impact the systems’ dependability, demanding proper considering. This section presents some related works in those research areas, pointing out important references and development directions for the proposed model.

2.1. Occlusion and QoM when Considering Area Coverage

These are some important topics that have been considered in different ways when performing visual monitoring or when assessing monitoring quality.
References [12,13] addressed full-view area coverage in WVSN, aimed at the computing of the total area that is being covered by the sensors. For that, those works take into account the orientation of each point or region that is faced by the sensors. In these cases, the Quality of Monitoring is directly related with the facing angles.
The authors of References [14] also addressed area coverage, focused in the automatic determination of the number, position and pan-tilt-zoom setting of a set of cameras to maximize the coverage. In this process, the authors consider QoM by handling the distortion models that can affect the quality and usability of the acquired data.
For Shriwastav and Song [15], area coverage is considered in a different class of WVSN, the Unmanned Aerial Vehicle (UAV) networks. In this case, each UAV is equipped with a camera, being responsible to perform a persistent full coverage of the area. If eventually an UAV fails, it is considered “unrecoverable” and the network must be redeployed, adjusting position and loitering movements to keep the area covered. An important aspect is that the authors consider the loitering altitude constant in order to keep the coverage quality constant.
Although they consider QoM in area coverage, neither the works in References [12,13,14,15] actually compute a sensor node’s or network’s QoM. The work in Tao et al. [6] overcomes this issue by defining a weighted sensing quality, which is calculated over a predefined deployment scheme. In that case, it is discussed the importance of sensing area to establish QoM in a full area coverage scenario. However, several restrictions are imposed to the network regarding to the nodes’ position, orientation and viewing angle.
In Reference [5], QoM is addressed extrapolating several deployment constraints imposed in Reference [6], such as cameras’ position, orientation and viewing angle. New QoM-based metrics are proposed, allowing new researches related to optimization, comparison or exploitation of different quality aspects, such as redundancy and dependability.
Some papers also relate QoM with occlusion, which is commonly addressed as an aspect that reduces the coverage area. In Reference [16], authors do not address the overall area coverage quality, since they consider occlusion to determine a satisfactory sensing quality of a monitoring area, when a set of waypoints are chosen for taking picture of some objects. The proposed coverage technique is used to achieve energy efficiency by minimizing the maximum energy consumption among sensor nodes.
Still considering this overall scenario, Costa et al. [17] and Jesus et al. [11] address occlusion in a more significant way, proposing computation of area coverage under occlusion. The work in Costa et al. [17] proposed a model to compute occlusion caused by simplified static obstacles, which were modeled as 2D walls (lines). In that work, occlusion affected FoV overlapping and selection of redundant nodes, directly impacting on availability assessment. Authors in Jesus et al. [11] provide an enhanced occlusion approach, modelling the obstacles as mobile 2D rectangles, which are a better and reasonable approximation of real objects. The goal of that work was the selection of visual nodes based on effective viewed area to better perform existing optimization or quality assessment approaches.

2.2. Dependability Assessment

Quality of Monitoring and occlusion can negatively affect a system’s dependability, being important the using of a method to assess their impact. In case of distributed sensor-systems (Cyber-Physical Systems, Internet of Things (IoT), WSN), dependability assessment has been more seriously addressed in recent years, generally considering aspects involving hardware components of sensor/actuator nodes, network communication elements and network lifetime.
The work in Andrade and Nogueira [18] proposes a dependability evaluation approach based on stochastic Petri nets (SPN). That approach analyses disaster recovery solutions for IoT infrastructures, evaluating system reliability and availability, considering energy consumption and network communication.
In Reference [19], a methodology for automatic generation of analytical dependability models based on fault trees is proposed for industrial applications. That methodology is integrated with the SHARPE tool and evaluates the behavior of a scalar wireless sensor networks with regard to some attributes, such as reliability and availability. That methodology was later improved in References [10,20].
The authors of Reference [20] perform availability assessments in wireless visual sensor networks. That evaluation is associated to target monitoring, considering hardware, communication and coverage failures, which were modeled as “loss of view” over targets. However, the proposal presents some limitations, such as not considering the effects of routing protocols or ignoring different importance degrees of sensor nodes on network failure conditions generation.
The aforementioned limitations are circumvented in Reference [10], which considered different routing strategies in the context of area coverage monitoring. That way, it is possible to specify network failure conditions as a function of a coverage objective. However, none of these methodologies considered the effect of visual coverage failures by occlusion and loss of Quality of Monitoring.
Actually, although several papers have addressed issues such as visual occlusion, Quality of Monitoring and dependability assessment on WVSN, such issues have been considered separately. In a different way, this article integrates all those issues in a unified dependability evaluation model that has not been proposed before, to the best of our knowledge.
Table 1 summarizes the discussed related works in areas related to QoM, occlusion, WSN dependability evaluation and modelling of visual coverage failures.

3. Definitions and Basic Concepts

3.1. Area Coverage

The WVSN considered in this article is composed of a set of visual sensor nodes V S = v s 1 , v s 2 ,   . . . ,   v s n , which are deployed over a two-dimensional area A . Each camera may assume different values for their parameters, however, without loss of generality, we consider in this work that all visual sensors are identical and so they are configured with the same values [21]. Each sensor is expected to be equipped with a camera, having a viewing angle θ v s and an orientation α v s , as shown in Figure 1, where the camera is represented by the small red circle. Each camera also presents a sensing radius R s as the approximation of the distance between the nearest and farthest point that can be sharply sensed.
The field of view of any visual sensor is defined as the area of an isosceles triangle composed of three vertices, A, B and C (see Figure 1), being ( A x , A y ) the Cartesian coordinates of the sensor node. The coordinates of vertices B and C can be computed according to Equation (1) and the FoV of any visual sensor v s is the area of the triangle A B C , which can be computed using trigonometry, as expressed in Equation (2) [20].
B x = A x + R s cos α v s B y = A y + R s sin α v s C x = A x + R s cos α v s + θ v s mod 2 π C y = A y + R s sin α v s + θ v s mod 2 π
F o V v s = R s 2 · sin θ v s 2 .
The monitoring field A may be composed of one or more Monitoring Areas ( M A ), each one described as a rectangle defined by its origins ( x 1 , y 1 ), a width w, a height h and a rotation angle β , as shown in Figure 2. The coordinates of the other vertices of a M A (vertices 2, 3 and 4) can be computed as presented in Equation (3). A M A is the area of interest of a visual application and only visual information from this sub-region is relevant to the considered WVSN.
x 2 = x 1 + w . cos ( β ) , y 2 = y 1 + w . sin ( β ) x 3 = x 1 + h . sin ( β ) , y 3 = y 1 h . cos ( β ) x 4 = x 1 + h . sin ( β ) + w . cos ( β ) , y 4 = y 1 h . cos ( β ) + w . sin ( β ) .
A M A can be divided into smaller regions, called Monitoring Blocks ( M B ), each one defined as a rectangle represented by its origins ( x 1 s , y 1 s ), a width w s , a height h s , a centroid ( x c , y c ) and the same rotation angle β of the M A , as shown in Figure 2. The coordinates of the other vertices of a M B (vertices 2 s , 3 s and 4 s ) can be calculated similarly to Equation (3). Thus, a M A is composed of a grid of M B with size M × N. In this case, the “area coverage” problem can be indirectly approached as several “target coverage” problems, where each point ( x c , y c ) is a target with infinitesimal size. This is an important abstraction aimed at higher efficiency, while keeping the computational cost low, as it was discussed in Reference [22]. In that paper, the monitoring blocks approach for area calculation has been proven to be a good approximation in terms of accuracy, with low computational cost.
A single monitoring block m b is considered to be covered by a visual sensor node v s if its center ( x c , y c ) is within the polygon area of F o V v s . In this configuration, the area of a m b ( w s × h s ) is accounted to the total coverage area [22]. A covered M B is represented by notation m b F o V v s . This definition can be extended for a set of visual sensors V S according to Equation (4). The total area covered by V S is computed according to Equation (5), where m b j , l is a M B at the position ( j , l ) of the grid.
c o v e r m b , V S = 1 , if v s V S m b F o V v s 0 , otherwise
C A m b V S = w s · h s · j = 1 M l = 1 N c o v e r m b j , l , V S .

3.2. Quality of Monitoring

Quality of Monitoring is a generic term used to refer to the congruence between the expected and performed monitoring functions over a region of interest. In the case of a WVSN, QoM can be related to how good are the visual data definition and sharpness provided by a set of cameras for a region located on a certain distance d o v (distance of view). The farther is the monitored region from the camera, the lower is the level of details related to that region in captured images, and consequently, the lower should be the amount of visual information extracted from that region. The QoM modeling used as reference in this article was initially proposed in Reference [5], being summarized next.
A sensor node v s V S has its FoV divided into several disjoint sub-regions. In this article it is considered only three sub-regions ( F o V v s H , F o V v s M and F o V v s L ), which determine the visual levels with high, medium and low quality, respectively. The first level is defined by an isosceles triangle A F G with its high d o v H defined as the distance from vertex A to the end of F o V v s H . The second and third levels are defined by isosceles trapezoids ⬠ D E G F and ⬠ B C E D with highs equal to ( d o v M d o v H ) and ( d o v L d o v M ), respectively, as depicted in Figure 3. It is important to notice that the sensor FoV is not modified. It is only re-interpreted, being F o V v s = F o V v s H F o V v s M F o V v s L and F o V v s H F o V v s M F o V v s L = .
The distances d o v H , d o v M and d o v L can be computed according to Equation (6) and the proportion of d o v H and d o v M with respect to d o v L can be defined freely, considering the application requirements and camera’s constraints. The coordinates of vertices D, E, F and G can be computed similarly to Equation (1).
d o v L = R s . cos θ v s θ v s 2 2 d o v M = 3 3 / 4 4 d o v L d o v H = 2 2 / 4 4 d o v L .
The QoM can be assessed by the Area Quality Metric (AQM), which is computed considering that each monitoring block m b F o V v s receives a weight w l which is the weight of the FoV sub-region of v s where m b can be viewed, as expressed in Equation (7). The weight values for each visual level are assigned as w 1 = 1 for F o V v s H , w 2 = 0.5 for F o V v s M and w 3 = 0.25 for F o V v s L .
w l m b , v s = w 1 , if m b F o V v s H w 2 , if m b F o V v s M w 3 , if m b F o V v s L
If a monitoring block m b is redundantly covered by a visual sensor set V S , then the weight of m b is the maximum weight among the associated sensor, as expressed in Equation (8).
w max m b , V S = max w l m b , v s v s V S .
Figure 4 illustrates the mapping of monitoring quality of the M B covered by three visual sensors, including the overlapping considerations. The visual sensor v s 1 performs a normal monitoring, while the sensors v s 2 ans v s 3 have their FoV occluded by an obstacle. The occlusion scenario is addressed in Section 3.3. The M B marked with a green circle are in level 1 (highest quality), while the ones marked with a yellow star are in level 2 (medium quality) and the M B marked with a red square are in level 3 (lowest quality). Notice that there are some M B marked with more than one symbol: those M B are redundantly monitored by more than one visual sensor and its assigned weight is that one related to the highest quality.
The metric A Q M is presented in Equations (9) and (10). A Q M provides a global perspective of the quality of monitoring, indicating the percentage of the equivalent monitoring blocks related to the entire monitoring field. A Q M a b s is an intermediate metric that provides an absolute perspective of the quality of monitoring, indicating the equivalent quantity of monitoring blocks.
A Q M a b s ( V S ) = h s · w s · j = 1 M l = 1 N w max m b j , l , V S
A Q M ( V S ) = A Q M a b s ( V S ) h · w .

3.3. Occlusion

In this article, we take as reference the modeling of obstacles and the computation of occlusions as proposed in Reference [11]. The obstacles are considered being 2D rectangles, which is a reasonable simplification of real objects, providing a practical and yet effective mathematical model. An obstacle can be defined by its origins ( x 1 o b s , y 1 o b s ), a width w o b s , a height h o b s and an orientation angle β o b s . The remaining vertices can be computed similarly to Equation (3).
In order to compute the visual occlusion caused by an obstacle, the field of view of each visual sensor is processed against a set of obstacles, computing occlusion vertices, which are mostly resulted from the intersection of the obstacles’ edges with the visual sensors’ edges, resulting in convex or concave polygons for each visual sensor. This visual coverage area derived from an original FoV is defined as the Occluded FoV (OFoV). Hence, the computed area of each OFoV jointly with their associated QoM will be exploited to identify if a certain visual sensor is under a coverage failure. More details about how to compute the occlusion vertices and the OFoV can be found in Reference [11].
Figure 4 shows an example of OFoV from sensors v s 2 ans v s 3 . Obviously, an occlusion reduces the covered area and the quality of monitoring, which can configure a visual coverage failure, directly affecting a system’s dependability.

4. Proposed Methodology

The dependability assessment methodology proposed in this article is aimed at solving an important quality evaluation gap in critical applications that employ scalar and visual sensors to perform monitoring tasks. For that, we integrate and unify some previous methodologies [5,10,11], achieving a more complete mathematical solution for such scenarios. In this way, the proposed methodology for dependability evaluation considers different visual coverage failures, which occur when the required area coverage or quality of monitoring level are not fulfilled, either by an incorrect deployment or by occlusion.
The flowchart of the proposed evaluation methodology is presented in Figure 5 and depicts the methodology in four stages: coverage analysis, connectivity analysis, Fault Tree generation and dependability analysis. Backwards, the dependability analysis (the last stage) is performed in terms of its quantitative attributes (reliability and availability), as it is commonly addressed in the literature [23,24,25,26]. For this task, the SHARPE (Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool [27] is used to numerically compute a hierarchical model of a fault tree embedded with Markov chains. It is worthy to remark that it is an automated methodology, which means that, besides the input data at the initial stage of the methodology, no further interaction with the user is required for dependability assessment.
The hierarchical model is built in the previous stage of the methodology, the Fault Tree generation. For this, the proposed methodology assumes a network that is organized in a tree topology, rooted at the gateway node. This node manages the system monitoring application, receiving data from the other visual nodes. Therefore, a visual application will fail if the network is not capable to deliver the required visual information to the gateway. This can happen due to failures of network nodes that compose the Network Failure Condition (NFC), which is a logical expression that indicates which nodes or combination of nodes ( f c _ C o m b i ) must fail to lead to the application failure. The nodes participating in the NFC are called essential nodes.
The NFC is used to build a fault tree. In this case, an application failure is identified whether the NFC is assessed equals to true, which is equivalent to the TOP event of the fault tree be assessed equals to true. Figure 6 shows the gates of the fault tree structure considered in the methodology.
A combination of nodes (devices) fails if all paths ( f c _ P a t h i ) that connect the gateway to each node in the combination fail. A path fails if any link ( l k i ) or node ( f c _ D e v i ) in the path from the node to gateway fails. Finally, a node fails if its hardware ( h w ) fails or if its battery discharges ( b t ) [10]. The basic events l k i , h w and b t must be assigned to battery, hardware and link dependability functions (reliability or availability functions, according to the evaluation interest), resulting from the respective Markov chain evaluation, according to Figure 7. These Markov chains describe the component behavior through two states: U P (operational) and D O W N (failed). Transitions between these two Markov chain states are described by the failure ( λ h w , λ l k ) and repair rates ( μ h w , μ l k , μ b t ), respectively. In case of battery, the states B 0 , B 1 , , B n 1 represent progressive discharging states, the state B n represents a fully discharge battery and the transition rates λ b t k , k = 0 , , n 1 , are the battery discharge rates in function of the power consumption.
At the connectivity analysis step (the second stage in Figure 5), the paths from the nodes of NFC to the gateway are represented in the fault tree, and they are defined according to the routing strategy. For this, it is necessary to know the NFC of the considered network.
At this point, we extended our previous work presented in Reference [10]. In that work, the NFC was generated based on the covered area. However, as important as the amount of visual information, the quality of the gathered information is crucial for applications. Actually, both the amount and quality of this information can be jeopardized by occlusion, leading to a dependability decreasing.
That way, these coverage failures in the considered network have to be properly processed. In fact, coverage failures may happen in different ways and in different moments of the network lifetime. Nevertheless, in order to properly evaluate the dependability of the applications, the proposed methodology processes all coverage failures at once, achieving a final dependability perception. Therefore, the standard procedure is to sequentially compute all modelled coverage failures, first computing occlusions on all visual sensors and then processing the QoM associated to the Depth of View based on Occluded FoV (OFoV).
The computation of the OFoV will consider all static or moving obstacles that can produce some level of occlusion on the deployed visual sensors. For that, the formulations in Reference [11] can be leveraged to achieve a set of Occluded FoV for the considered network, reflecting the impacts of the obstacles along the time. Then, the QoM of that set of active visual sensors can be also processed based on the definitions in Reference [5], but now assuming that the FoV of any visual sensors may be not an isosceles triangle. In other words, two sequential layers of coverage failures will be computed for the visual sensors, and their resulted coverage on the monitored field will already reflect the impacts of both types of coverage failures. This general processing principle is depicted in Figure 8.
As an important remark in Figure 8, while a visual sensor may be not occluded by an obstacle, which may result in an OFoV similar to the original FoV, the QoM-aware FoV of that sensor will be always computed.
Based on the processing of these coverage failures, we define the NFC considering that the application will fail if a combination of nodes are not able to cover a minimum amount of covered area, a minimum quality of monitoring and also considering the minimum percentage of FoV of each visual sensor. For this last case, it is considered that, if a single sensor node cannot cover its minimum FoV, its camera is turned off, and the node operates as a relay node, that is, a node that only re-transmits messages, therefore consuming less power, saving battery, extending its lifetime, and so increasing the system dependability.
Initially, the methodology requires some supplementary data from the user in order to characterize the network and the application requirements. This information is related to network configuration (e.g., topology), visual coverage attributes, nodes, the evaluation process itself and specially the application requirements, which is the minimum visual coverage percentage ( C A m i n ), the minimum QoM ( A Q M m i n ) and the minimum FoV ( F o V m i n ).
The Algorithm 1 describes the redesigned NFC generation, when a combination of sensor nodes is included into the NFC expression if it provides the required area coverage and QoM (Line 33). Doing so, the dependability evaluation can be carried out considering the mathematical parameters of the scenario.
The Algorithm 1 starts computing the OFoV of each visual sensor according to Jesus et al. [11] (Line 2). Then, it is verified which monitoring blocks are covered by each visual sensor and their respective QoM. For this, the procedure i n p o l y g o n ( ) in Lines 6, 11–13 checks if the center of a m b is within of the OFoV of a visual sensor v s , and within of one of its quality level sub-regions F o V v s H , F o V v s M or F o V v s L , respectively. This procedure implements a Ray casting algorithm [28,29]. Notice that we first verify if a m b is within of the OFoV of v s (Line 6). This is important to not consider monitoring blocks in occluded areas. According to how a sensor v s covers a monitoring block m b , the functions w l m b , v s and c o v e r m b , v s are updated (Lines 14–25). This information is used to proper compute the overall coverage area C A m b V S and QoM A Q M V S provided by a subset of visual sensor V S V S (Lines 30–32). Finally, the NFC is updated if the sensors in this subset are able to fulfill the application requirements together, t h a t i s , if they cover an area greater or equal to C A m i n with QoM greater or equal to A Q M m i n (Lines 33–34).
Algorithm 1: NFC.
Sensors 20 06542 i001
Following all these steps, the dependability of any wireless visual sensor networks can be evaluated, potentially supporting in the designing, deployment and management of those networks. At this point, what is required is the proper setting of the evaluation parameters, which will be discussed in next section.

5. Practical Dependability Assessment

In this section it is presented the dependability assessment of an industrial application in order to show the applicability of the proposed methodology. Actually, for this task, the methodology parameters could be empirically set. However, in order to facilitate the usage of the methodology in real scenarios, some approaches are enhanced in relation of previous works, and employed to determine most of these parameters.
There are many possibilities to determine each parameter. Of course, each approach will be as accurate as the considered detailing level. In fact, we are not focused on strictly determining the parameters, but providing possible solutions when defining them. With a realistic parameters setting, we can more confidently evaluate the impact of visual coverage failures on the system dependability.
The proposed scenario used as case study is a merging of specifications of two real industrial shop floors into a single realistic model. This industrial scenario is similar to a paper mill proposed in Reference [8] (Iggesund Paperboard), which contains machinery such as boilers, mixing and storage tanks, conveyors and storage racks. We assume that the factory occupy an area A of 250 m ×   200 m, where the monitored area M A is 240 m ×   180 m. Over this M A are deployed 11 visual sensor nodes and one gateway node, according to the industrial wireless network presented in Reference [9], implementing a network topology according to the WirelessHART standard (one of the most adopted wireless communication protocol in industrial applications [30]). The visual nodes are oriented in a way to monitor regions of production more susceptible to failures, accidents and intrusion. Figure 9 shows the shop floor layout and Figure 10 presents the network topology. The percentage on the edges of the graph are the packet reception rates (PRR), which are link quality metrics that will be used to determine the link failure rates.
Next we show how to obtain the dependability methodology parameters from the component specifications. The interested reader is referred to Reference [10] for more details on the parameters meaning.

5.1. Experimental Parameter Settings

The methodology requires some data related to visual nodes, components failure and repair rates, network communication (topology, routing, radio range, etc.) and the application requirements. We assume that all the visual sensor nodes are composed of a camera FLIR BLACKFLY ® S BFS-U3-13Y3 and that they communicate through an IEEE 802.15.4 radio interface at 2.4 GHz, using a CC2420 antenna which can support WirelessHART setting [31]. Each node is powered by a typical battery of WirelessHART field devices, a lithium battery unit BU 191 [32] and they communicate based on flooding routing strategy.
We assume that the useful visual information from cameras can be retrieved of a distance not higher than 75 m from the camera, which implies in a sensing radius of R s = 75 m with the viewing angle of θ v s = 60 (an intermediate value and also the average viewing angle of several commercial cameras). Regarding the monitored area, its dimensions are w = 240 m and h = 180 m, divided into monitoring blocks with w s = h s = 2.15 m (approximately 9 % of the FoV [22]) and β = 0 . The position of each sensor node was generated according to Figure 10. The dependability parameters, according to the information available in References [32,33,34], were pessimistically set, with the hardware failure and repair rates λ h w = 2.2831 × 10 5 and μ h w = 0.0833 , respectively, considering the worst case scenario of the hardware components specifications. In this article, all failures, repair and discharging rates are measured by hour.
The battery has an initial capacity c 0 = 19 Ah rated by H = 1 h and a Peukert’s constant η = 1.1 . Considering that the average continuous discharge current needed to supply the sensor node (radio, camera, etc.) is about I = 150 mA, then the discharge rates of a 4-discharging stages of the battery model are λ b t 0 = 0.0225 , λ b t 1 = 0.0197 , λ b t 2 = 0.0187 and λ b t 3 = 0.0181 h. Once discharged, we consider that it takes 2 hours to repair (replace or recharge) the battery, so μ b t = 0.5 .
The estimation of the link rates is more complex since the link has a transient behavior, which means that a failed link will reestablish its connection after a while, without an external intervention. A link failure could be caused by an obstruction produced by an external object, shadowing, signal attenuation, multi-path fading, radio interference, background noise, an occupied channel or a data collision [35]. Due to several uncertainties or difficulties when modelling these aspects, usually resulted from a lack of sufficient data, we consider the fuzzy model approach presented in Reference [36] to estimate link failure rates based on link quality metrics. These metrics could be, for instance, packet reception rate, packet error rate (PER), link failure probability or time to link failure (TLF). They can be obtained by simulation [37], estimation [38] or by radio propagation models [39].
The approach proposed in Reference [36] expresses reliability data (failure probability) in a qualitative natural language and mathematically represented by a membership function of fuzzy numbers. That way, a defuzzification technique is needed to convert the membership function into a reliability score, and later into their corresponding fuzzy failure rates, which is a good approximation for probabilistic failure rates [36]. We use an area defuzzification technique (ADT), since it presented the best results in Reference [36].
Let f f = ( a , b , c , d ) be a fuzzy function, where a , b , c , d are the parameters of a trapezoidal membership function. The parameter f f can be converted to a crisp score by ADT (Equation (11)) and this score can be used to estimate the link failure rate associated to f f according to Equation (12). We use the PRR available in Reference [9] to define the values of the membership function of each link based on the fact that the higher is the PRR, the lower is the probability of the link to fail.
It is important to remark that, according to Purba et al. [36], the relation between the qualitative natural language of the failure probability and its mathematical representation through the membership function (defined by fuzzy function parameters a, b, c, d) must be stated by experts’ belief of the most expected value that a failure event may occur. That way, the association between these parameters was a relatively subjective choice of us, the authors, based on our familiarity, considerable training in and knowledge of this application field. The same was applied to the association between these parameters and the PRR.
Thereby, we consider that a PRR under 50 % indicates a down link (nonoperational link). The fuzzy function was proportionally generated over the range of 50–100% and the link failure rates ( λ l k ) were computed through Equations (11) and (12), according to Purba et al. [36]. These rates, as well as the other parameters of the fuzzy model approach, are shown in Table 2. Once a communication failure occurs, due to the transient nature of links, the connection from a node to the gateway node could be reestablished naturally, eventually, or by the re-routing or self-healing features of routing protocols, which lead us to consider in this scenario the link repair rate μ l k = 4, which means about 15 min to reestablish.
A D T = 18 a + b c d 2 1 × [ a + 2 b 2 c d × × 2 a + 2 b 2 + c + d 3 a + 2 c d 2 c 3 b + d 4 a b ]
λ l k = 10 1 A D T 1 A D T A D T A D T 1 1 / 3 3 × 2.301 , A D T 0 0 , A D T = 0 .

5.2. Dependability Evaluation

Once the dependability parameters are set, the application requirements need to be defined to assess the system dependability. In this case, it is necessary to define the minimum acceptable area coverage ( C A m b ) and quality of monitoring ( A Q M ), C A m i n and A Q M m i n , respectively. For this, based on the layout shown in Figure 9, we consider two obstacles on the monitoring area: a wall separating a management station to the chemical processes and a forklift that spends most part of time near to a conveyor belt to get the paperboard boxes. Figure 11 shows the network deployment, including the obstacles (blue rectangles) and the quality perspective of M A . Notice that the FoV of visual sensors v s 3 and v s 7 are partially occluded by the forklift and the FoV of visual sensors v s 4 and v s 5 are partially occluded by the wall. The coverage area is C A m b = 21 , 691 m 2 , which is approximately 50 % of total M A , and the quality of monitoring is approximately A Q M = 28 % . Since in this work it is not considered network redeployment, the maximum coverage area and the maximum quality of monitoring are those ones presented by the network deployment. This means that C A m i n 50 % and A Q M m i n 28 % , otherwise this network will not fulfill the application requirements.
In order to evaluate the impact of visual failures on dependability, first we perform the system availability assessment considering that A Q M m i n = 0 % , varying C A m i n from 0 % to the maximum value of the area able to be covered by the network deployment ( 50 % ). In this case, we intend to verify how large is the portion of area of the monitored field that the system can cover considering the proposed deployment. We can observe in Figure 12a that the system presents an acceptable availability (> 99 % ) for values of C A m i n from 0 % to 33 % .
Then, the same analysis is performed considering C A m i n = 0 % and varying A Q M m i n from 0 % to the maximum value of quality of the monitoring provided by the network deployment ( 28 % ). Here we intend to verify how well the monitoring field is covered considering the proposed deployment. We can observe in Figure 12b that the system presents an acceptable availability (> 99 % ) for values of A Q M m i n from 0 % to 28 % . This analysis implies that, if an application intends to implement the proposed deployment, it will have a considerably satisfactory availability if its requirements of coverage area and monitoring area are C A m i n 33 % and A Q M m i n 18 % , respectively.
Actually, dependability is assessed here in terms of availability. Notice that, in order to perform a system reliability evaluation, it is only necessary to disregard the repair activities, which means setting the repair rates μ h w , μ b t and μ l k equal to zero.
Next, we evaluate the system availability with the maximum values of C A m i n and A Q M m i n that guarantee 99 % of availability, which are C A m i n = 33 % and A Q M m i n = 18 % , and the maximum possible values, which are the coverage values of network deployment ( C A m i n = 50 % and A Q M m i n = 28 % ). With this, it is possible to verify, respectively, the maximum and minimum availability response which the system can present for the considered deployment. The Figure 13 shows the respective steady availability values, 88.66866 % and 99.00779 % .
If we consider that the nodes are supplied by a power line instead of a battery, we can re-evaluate the system dependability without the effect of batteries. This can be achieved by removing the battery Markov Chain from the model or simply by setting the battery discharge rates ( λ b t ) to zero, avoiding to change the fault tree model. In this case, the system availability increases to 99.97261 % and 99.67175 % , respectively, achieving expected results of a well formed WirelessHART network [40].
Finally, it is analyzed the impact of transforming sensors with low coverage ( O F o V v s < F o V m i n ) into relay sensors. Figure 14 shows an example where the sensor v s 7 is occluded and its OFoV is less than 5 % . In this case we consider that this sensor cannot provide enough visual information and then its camera is turned off to save battery, but the node keeps working re-transmitting messages. We analyze the worst case scenario, that is, the maximum possible values of C A m i n and A Q M m i n , which is the coverage values of network deployment ( C A m i n = 47 % and A Q M m i n = 26 % ). In this case, the application availability considering v s 7 as a visual sensor node is 89.56148 % . When the sensor is considered as a relay node, the assessed availability is 89.56149 % . This is a very small increase in terms of the absolute values, although, in terms of dependability, it is very significant, which shows that the proper management of power consumption turning some visual nodes into relay nodes compensates somehow the visual failure.

6. Conclusions

In this article, we proposed a comprehensive methodology for dependability evaluation in wireless sensor networks considering hardware, networking and visual coverage failures. While hardware and network failures had been already considered in other works, visual failures were addressed in this article as an important element of dependability, since they are related to the inability of the sensors to perform sufficient area coverage respecting the minimum required quality of monitoring. Moreover, in order to make this problem computationally tractable for large networks, an efficient algorithm for area coverage and QoM computation was proposed, bringing then an important contribution to this area.
As additional contributions, we also addressed an important issue, which is practical aspects of parameters setting. Moreover, it was considered the study case of a paper mill with a WirelessHART network. The methodology provided coherent results for an industrial context, pointing out important development directions in future works.
We believe that industrial WSN applications can significantly benefit from the proposed approach. In fact, we expect not only a more efficient planning of new monitoring applications in these scenarios, but also a continued understanding of how failures may impact the final quality and how and where improvements can be performed.
As future works, an interesting research area would be to analyze the systems’ dependability in runtime, during an application operation. Doing so, we could dynamically analyze a system’s dependability, tracking system alterations due to failures or repairs, as soon as they happen. This dynamic evaluation context also allows the inclusion of mobile obstacles in the mathematical model, making the methodology useful for more realistic applications. Also, the system dependability could be improved by an optimization process with some nodes parameters being altered (cameras’ orientation, nodes’ position, link quality, power consumption), aiming at dependability improvement in case of a bad deployment configuration or in response to changes in obstacles positions.

Author Contributions

Conceptualization, T.C.J., P.P., D.G.C. and F.V.; methodology, T.C.J., P.P., D.G.C. and F.V.; validation, T.C.J., P.P., D.G.C. and F.V.; formal analysis, T.C.J., P.P., D.G.C. and F.V.; investigation, T.C.J., P.P., D.G.C. and F.V.; data curation, T.C.J., P.P., D.G.C. and F.V.; writing—original draft preparation, T.C.J., P.P., D.G.C. and F.V.; writing—review and editing, T.C.J., P.P., D.G.C. and F.V.; visualization, T.C.J., P.P., D.G.C. and F.V. All authors have read and agreed to the published version of the manuscript.

Funding

This work was a result of the project Operation NORTE-08-5369-FSE-000003 supported by Norte Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement, through the European Social Fund (ESF). Additionally, this work was also partially funded by the Brazilian CNPq (Conselho Nacional de Desenvolvimento Científico e Tecnológico) Agency under Grant 204691/2018-4.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Qin, F.; Zhang, Q.; Zhang, W.; Yang, Y.; Ding, J.; Dai, X. Link Quality Estimation in Industrial Temporal Fading Channel With Augmented Kalman Filter. IEEE Trans. Ind. Inform. 2019, 15, 1936–1946. [Google Scholar] [CrossRef]
  2. Lucas-Estan, M.C.; Coll-Perales, B.; Gozalvez, J. Redundancy and Diversity in Wireless Networks to Support Mobile Industrial Applications in Industry 4.0. IEEE Trans. Ind. Inform. 2020, 17, 311–320. [Google Scholar] [CrossRef]
  3. Raposo, D.; Rodrigues, A.; Sinche, S.; Sá Silva, J.; Boavida, F. Industrial IoT Monitoring: Technologies and Architecture Proposal. Sensors 2018, 18, 3568. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Costa, D.G.; Silva, I.; Guedes, L.A.; Portugal, P.; Vasques, F. Selecting redundant nodes when addressing availability in wireless visual sensor networks. In Proceedings of the 2014 12th IEEE International Conference on Industrial Informatics (INDIN), Porto Alegre, Brazil, 27–30 July 2014; pp. 130–135. [Google Scholar] [CrossRef]
  5. Jesus, T.C.; Costa, D.G.; Portugal, P.; Vasques, F. FoV-Based Quality Assessment and Optimization for Area Coverage in Wireless Visual Sensor Networks. IEEE Access 2020, 8, 109568–109580. [Google Scholar] [CrossRef]
  6. Tao, J.; Zhai, T.; Wu, H.; Xu, Y.; Dong, Y. A quality-enhancing coverage scheme for camera sensor networks. In Proceedings of the 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 29 October–1 November 2017; pp. 8458–8463. [Google Scholar] [CrossRef]
  7. Shi, H.; Sun, G.; Wang, Y.; Hwang, K. Adaptive Image-Based Visual Servoing with Temporary Loss of the Visual Signal. IEEE Trans. Ind. Inform. 2019, 15, 1956–1965. [Google Scholar] [CrossRef]
  8. Ahlen, A.; Akerberg, J.; Eriksson, M.; Isaksson, A.J.; Iwaki, T.; Johansson, K.H.; Knorn, S.; Lindh, T.; Sandberg, H. Toward Wireless Control in Industrial Process Automation: A Case Study at a Paper Mill. IEEE Control Syst. Mag. 2019, 39, 36–57. [Google Scholar]
  9. Wang, Q.; Wang, P. A Finite-State Markov Model for Reliability Evaluation of Industrial Wireless Network. In Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 23–25 September 2010; pp. 1–4. [Google Scholar]
  10. Jesus, T.C.; Portugal, P.; Vasques, F.; Costa, D.G. Automated Methodology for Dependability Evaluation of Wireless Visual Sensor Networks. Sensors 2018, 18, 2629. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  11. Jesus, T.C.; Costa, D.G.; Portugal, P.; Vasques, F.; Aguiar, A. Modelling Coverage Failures Caused by Mobile Obstacles for the Selection of Faultless Visual Nodes in Wireless Sensor Networks. IEEE Access 2020, 8, 41537–41550. [Google Scholar] [CrossRef]
  12. He, S.; Shin, D.H.; Zhang, J.; Chen, J.; Sun, Y. Full-View Area Coverage in Camera Sensor Networks: Dimension Reduction and Near-Optimal Solutions. IEEE Trans. Veh. Technol. 2016, 65, 7448–7461. [Google Scholar] [CrossRef]
  13. Hsiao, Y.P.; Shih, K.P.; Chen, Y.D. On Full-View Area Coverage by Rotatable Cameras in Wireless Camera Sensor Networks. In Proceedings of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, 27–29 March 2017; pp. 260–265. [Google Scholar] [CrossRef]
  14. Konda, K.R.; Conci, N.; Natale, F.D. Global Coverage Maximization in PTZ-Camera Networks Based on Visual Quality Assessment. IEEE Sens. J. 2016, 16, 6317–6332. [Google Scholar] [CrossRef]
  15. Shriwastav, S.; Song, Z. Coordinated Coverage and Fault Tolerance Using Fixed-Wing Unmanned Aerial Vehicles. In Proceedings of the 2020 International Conference on Unmanned Aircraft Systems (ICUAS), Athens, Greece, 1–4 September 2020; pp. 1231–1240. [Google Scholar] [CrossRef]
  16. Scott, K.; Dai, R.; Kumar, M. Occlusion-Aware Coverage for Efficient Visual Sensing in Unmanned Aerial Vehicle Networks. In Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  17. Costa, D.G.; Vasques, F.; Portugal, P. Enhancing the availability of wireless visual sensor networks: Selecting redundant nodes in networks with occlusion. Appl. Math. Model. 2017, 42, 223–243. [Google Scholar] [CrossRef]
  18. Andrade, E.; Nogueira, B. Dependability evaluation of a disaster recovery solution for IoT infrastructures. J. Supercomput. 2020, 76, 1828–1849. [Google Scholar] [CrossRef]
  19. Silva, I.; Guedes, L.A.; Portugal, P.; Vasques, F. Reliability and Availability Evaluation of Wireless Sensor Networks for Industrial Applications. Sensors 2012, 12, 806–838. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  20. Costa, D.G.; Silva, I.; Guedes, L.A.; Portugal, P.; Vasques, F. Availability assessment of wireless visual sensor networks for target coverage. In Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Barcelona, Spain, 16–19 September 2014; pp. 1–8. [Google Scholar] [CrossRef]
  21. Costa, D.G.; Rangel, E.; Peixoto, J.P.J.; Jesus, T.C. An Availability Metric and Optimization Algorithms for Simultaneous Coverage of Targets and Areas by Wireless Visual Sensor Networks. In Proceedings of the 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), Helsinki, Finland, 22–25 July 2019; pp. 617–622. [Google Scholar]
  22. Jesus, T.C.; Costa, D.G.; Portugal, P. On the Computing of Area Coverage by Visual Sensor Networks: Assessing Performance of Approximate and Precise Algorithms. In Proceedings of the 2018 IEEE 16th International Conference on Industrial Informatics (INDIN), Porto, Portugal, 18–20 July 2018; pp. 193–198. [Google Scholar] [CrossRef]
  23. Frühwirth, T.; Krammer, L.; Kastner, W. Dependability demands and state of the art in the internet of things. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–4. [Google Scholar] [CrossRef]
  24. Martins, M.; Portugal, P.; Vasques, F. A framework to support dependability evaluation of WSNs from AADL models. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–6. [Google Scholar] [CrossRef]
  25. Dar, K.S.; Taherkordi, A.; Eliassen, F. Enhancing Dependability of Cloud-Based IoT Services through Virtualization. In Proceedings of the 2016 IEEE 1st International Conference on Internet-of-Things Design and Implementation (IoTDI), Berlin, Germany, 4–8 April 2016; pp. 106–116. [Google Scholar] [CrossRef]
  26. Jesus, T.C.; Costa, D.G.; Portugal, P. Wireless Visual Sensor Networks Redeployment Based on Dependability Optimization. In Proceedings of the 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), Helsinki, Finland, 22–25 July 2019; pp. 1111–1116. [Google Scholar]
  27. Trivedi, K.S.; Sahner, R. SHARPE at the Age of Twenty Two. SIGMETRICS Perform. Eval. Rev. 2009, 36, 52–57. [Google Scholar] [CrossRef]
  28. Ye, Y.; Guangrui, F.; Shiqi, O. An Algorithm for Judging Points Inside or Outside a Polygon. In Proceedings of the 2013 7th International Conference on Image and Graphics, Qingdao, China, 26–28 July 2013; pp. 690–693. [Google Scholar] [CrossRef]
  29. Kularathne, D.; Jayarathne, L. Point in Polygon Determination Algorithm for 2-D Vector Graphics Applications. In Proceedings of the 2018 National Information Technology Conference (NITC), Colombo, Sri Lanka, 2–4 October 2018; pp. 1–5. [Google Scholar] [CrossRef]
  30. Wang, Q.; Jiang, J. Comparative Examination on Architecture and Protocol of Industrial Wireless Sensor Network Standards. IEEE Commun. Surv. Tutor. 2016, 18, 2197–2219. [Google Scholar] [CrossRef]
  31. Raptis, T.P.; Passarella, A.; Conti, M. Performance Analysis of Latency-Aware Data Management in Industrial IoT Networks. Sensors 2018, 18, 2611. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Endress+Hauser. WirelessHART Adapter SWA70; Technical Information: (TI00026S/04/EN/21.16 71339584); 2016; Available online: https://portal.endress.com/wa001/dla/5000557/8065/000/11/TI00026SEN_2116_PV2.40.xx.pdf (accessed on 10 June 2020).
  33. Texas Instruments. CC2420 Reliability Report; SWRK007 Report (Rev. 1.2); 2005; Available online: http://www.ti.com/lit/rr/swrk007/swrk007.pdf (accessed on 10 June 2020).
  34. FLIR® Integrated Imaging Solutions Inc. FLIR BLACKFLY®S BFS-U3-13Y3 Reliability. 2017. Available online: http://softwareservices.flir.com/BFS-U3-13Y3/latest/Quality/MTBF.htm (accessed on 10 June 2020).
  35. Zonouz, A.E.; Xing, L.; Vokkarane, V.M.; Sun, Y.L. A time-dependent link failure model for wireless sensor networks. In Proceedings of the 2014 Reliability and Maintainability Symposium, Colorado Springs, CO, USA, 27–30 January 2014; pp. 1–7. [Google Scholar]
  36. Purba, J.H.; Lu, J.; Zhang, G.; Ruan, D. An Area Defuzzification Technique to Assess Nuclear Event Reliability Data from Failure Possibilities. Int. J. Comput. Intell. Appl. 2012, 11, 1250022. [Google Scholar] [CrossRef]
  37. Egeland, G.; Engelstad, P.E. The availability and reliability of wireless multi-hop networks with stochastic link failures. IEEE J. Sel. Areas Commun. 2009, 27, 1132–1146. [Google Scholar] [CrossRef]
  38. Gomez, C.; Cuevas, A.; Paradells, J. AHR: A Two-State Adaptive Mechanism for Link Connectivity Maintenance in AODV. In Proceedings of the 2nd International Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality, REALMAN ’06, Florence, Italy, 26 May 2006; pp. 98–100. [Google Scholar] [CrossRef]
  39. Miyazaki, M.; Fujiwara, R.; Mizugaki, K.; Kokubo, M. Adaptive channel diversity method based on ISA100.11a standard for wireless industrial monitoring. In Proceedings of the 2012 IEEE Radio and Wireless Symposium, Santa Clara, CA, USA, 15–18 January 2012; pp. 131–134. [Google Scholar]
  40. Muller, I.; Netto, J.C.; Pereira, C.E. WirelessHART field devices. IEEE Instrum. Meas. Mag. 2011, 14, 20–25. [Google Scholar] [CrossRef]
Figure 1. Field of View of a visual sensor.
Figure 1. Field of View of a visual sensor.
Sensors 20 06542 g001
Figure 2. Monitoring area being covered by visual sensor nodes v s i , i = 1 , , 7 [5].
Figure 2. Monitoring area being covered by visual sensor nodes v s i , i = 1 , , 7 [5].
Sensors 20 06542 g002
Figure 3. Quality model of visual sensor’s Field of View [5].
Figure 3. Quality model of visual sensor’s Field of View [5].
Sensors 20 06542 g003
Figure 4. Quality of the performed area coverage when viewing monitoring blocks.
Figure 4. Quality of the performed area coverage when viewing monitoring blocks.
Sensors 20 06542 g004
Figure 5. Flowchart of the proposed evaluation methodology.
Figure 5. Flowchart of the proposed evaluation methodology.
Sensors 20 06542 g005
Figure 6. Fault Tree models of (a) network, (b) combinations, (c) paths and (d) devices [10].
Figure 6. Fault Tree models of (a) network, (b) combinations, (c) paths and (d) devices [10].
Sensors 20 06542 g006
Figure 7. Markov Chain models of (a) hardware, (b) link and (c) battery [10].
Figure 7. Markov Chain models of (a) hardware, (b) link and (c) battery [10].
Sensors 20 06542 g007
Figure 8. A sensor’s field of view in different processing steps: (a) Original coverage, (b) Field of View (FoV) under occlusion, (c) Quality of Monitoring (QoM)-aware FoV and (d) Quality-Occluded FoV (QOFoV) for both occlusion and QoM-aware conditions.
Figure 8. A sensor’s field of view in different processing steps: (a) Original coverage, (b) Field of View (FoV) under occlusion, (c) Quality of Monitoring (QoM)-aware FoV and (d) Quality-Occluded FoV (QOFoV) for both occlusion and QoM-aware conditions.
Sensors 20 06542 g008
Figure 9. Shop floor layout.
Figure 9. Shop floor layout.
Sensors 20 06542 g009
Figure 10. Shop floor network.
Figure 10. Shop floor network.
Sensors 20 06542 g010
Figure 11. Network deployment considering QoM under visual failures.
Figure 11. Network deployment considering QoM under visual failures.
Sensors 20 06542 g011
Figure 12. Impact of (a) CAmin and (b) AQMmin on dependability evaluation.
Figure 12. Impact of (a) CAmin and (b) AQMmin on dependability evaluation.
Sensors 20 06542 g012
Figure 13. Availability at minimum and maximum acceptable visual failures.
Figure 13. Availability at minimum and maximum acceptable visual failures.
Sensors 20 06542 g013
Figure 14. Network deployment with considerable FoV occlusion.
Figure 14. Network deployment with considerable FoV occlusion.
Sensors 20 06542 g014
Table 1. Visual coverage research in dependability of wireless sensor networks.
Table 1. Visual coverage research in dependability of wireless sensor networks.
WorkQoMOcclusionWSN EvaluationVCFBrief Description
He et al. [12] and Hsiao et al. [13]XArea coverage analysis aiming at full-view coverage, considering QoM by the facing angle of points of interest.
Konda et al. [14]XAutomatic deployment of WVSN to maximize coverage and visual quality in indoor environments, considering perspective distortion of the acquired images.
Shriwastav and Song [15]XUAV network for area coverage. Network parameters are carefully handled during redeployment to keep the coverage quality constant.
Tao et al. [6]XXQoM-enhancing coverage scheme in a full area coverage scenario, considering the different area importance and the weighted quality of captured image.
Jesus et al. [5]XXProposal of metrics to QoM assement and optimization in WVSN for area coverage. The QoM model is realistic and flexible to guide (re)deployment.
Scott et al. [16]XXOcclusion-aware area coverage with aerial sensing quality, providing satisfactory spatial resolution subject to the energy constraints of UAVs.
Costa et al. [17]XXSelection of redundant visual nodes for enhanced resistance to visual failures, considering occlusion caused by obstacles modeled by lines.
Jesus et al. [11]XXSelection of faultless visual nodes based on the amount of monitored area, considering occlusion caused by mobile obstacles modeled by rectangles.
Andrade and Nogueira [18]XPetri net-based approach for modeling and analysis of dependability on IoT networks for disaster recovery.
Silva et al. [19]XIntegrative methodology for dependability evaluation of industrial WSN, based on fault tree analysis, considering hardware and communication failures.
Costa et al. [20]XXIntegrative methodology for dependability evaluation of WVSN, based on fault tree analysis, considering hardware, communication and visual failures.
Jesus et al. [10]XXAutomated integrative methodology for dependability evaluation of WVSN, based on fault tree analysis, considering hardware, communication and visual failures.
Proposed approachXXXXAutomated integrative methodology for dependability evaluation of WVSN, based on fault tree analysis, considering hardware, communication and visual failures, related to occlusion and QoM.
Table 2. Parameters of link reliability and fuzzy model approach.
Table 2. Parameters of link reliability and fuzzy model approach.
PRRFailure ProbabilityFuzzy Function Parameters ( a , b , c , d ) λ lk
0–50%Down link(0, 0, 0, 0)
50–60%Very High(0.94, 0.95, 1, 1) 4.3962 × 10 4
60–70%High(0.865, 0.875, 0.925, 0.935) 6.2411 × 10 4
70–80%Reasonably High(0.77, 0.80, 0.85, 0.86) 9.4357 × 10 4
80–90%Moderate(0.715, 0.725, 0.775, 0.785) 1.3609 × 10 3
90–95%Reasonably Low(0.64, 0.65, 0.70, 0.71) 1.5641 × 10 3
95–98%Low(0.565, 0.575, 0.625, 0.635) 2.5627 × 10 3
98–100%Very Low(0.5, 0.5, 0.55, 0.56) 3.6855 × 10 3
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jesus, T.C.; Portugal, P.; Costa, D.G.; Vasques, F. A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios. Sensors 2020, 20, 6542. https://doi.org/10.3390/s20226542

AMA Style

Jesus TC, Portugal P, Costa DG, Vasques F. A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios. Sensors. 2020; 20(22):6542. https://doi.org/10.3390/s20226542

Chicago/Turabian Style

Jesus, Thiago C., Paulo Portugal, Daniel G. Costa, and Francisco Vasques. 2020. "A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios" Sensors 20, no. 22: 6542. https://doi.org/10.3390/s20226542

APA Style

Jesus, T. C., Portugal, P., Costa, D. G., & Vasques, F. (2020). A Comprehensive Dependability Model for QoM-Aware Industrial WSN When Performing Visual Area Coverage in Occluded Scenarios. Sensors, 20(22), 6542. https://doi.org/10.3390/s20226542

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop