1. Introduction
Mining plays a vital role in the economic and social development of many countries, and their sustainable development helps to enhance workers’ occupational safety and health (OSH), promotes the participation of diverse communities, and fosters sustainable mining practices [
1]. The economic impact of mining can be measured in terms of employment and income generation, considering that small-scale mining provides income to about 13 million workers and their families worldwide [
2]. Mining is one of the most critical sectors for Colombia’s economic development. The mining sector contributed 5.4% of the country’s Gross Domestic Product (GDP) for the first trimester of 2019. Colombia is one of the largest coal exporters in the world [
3], with proven reserves of 0.5% of the world’s total [
4], which will allow it to remain one of the leading world producers during the next 183 years [
5]. It is also the second-largest producer of emeralds in the world, after Zambia [
6], so mining has become one of the economic alternatives in the rural sector in Colombia, which results in support of a high percentage of families and constitutes one of the essential industrial lines in the country. However, underground mining is a dangerous job. Between 2005 and 2019, there were 1316 mining emergencies in Colombia, with a balance of 1476 fatalities [
7]. The causes range from falls (collapses) to other incidents, including the operation of heavy machinery and accidents involving explosions. These emergencies are associated with using explosives, coal dust, and/or the concentration of explosive gases. In this context, and recognizing the high number of fatalities in developing countries, the challenge invites us to create and adapt technological solutions to mitigate these OSH risks from prevention and alerts in the case of accidents. One of the most promising avenues to achieve this goal is the implementation of Industrial Internet of Things (IIoT) systems in underground mining environments. These systems, composed of wireless sensor networks, have the potential to continuously monitor environmental conditions, such as the concentration of explosive gases, and provide early warnings to prevent accidents. However, an open issue in this scenario is how to adopt these technologies for deployment and their cost, which can be an obstacle, particularly in small-scale mining operations.
Therefore, this study focuses on developing a methodology for the efficient deployment of Wireless Sensor Networks (WSNs) in underground mines aimed at early detection of hazardous gases and mitigation of explosion risks. At the same time, it focuses on cost efficiency, seeking to create an accessible and low-cost IIoT system that can be implemented in large mining operations and smaller mines with limited resources. Many technologies can be used to improve the miners’ safety, combining wireless and wired technologies. WSNs were designed to communicate with sensors by generating a cooperative network between nodes to measure and control various variables. They are characterized by using sensor nodes capable of processing data that work collaboratively. WSNs play a vital role in the IIoT, increasing the awareness of specific environments and linking physical and virtual objects, using WSNs to connect the sensor nodes. The IIoT applies Internet of Things (IoT) technology in industrial environments. In the IIoT context, sensors and devices collect real-time data regarding production processes, equipment, supply chain, and energy consumption. These data are analyzed to make decisions, predict maintenance, and optimize production.
According to the taxonomy proposed by Boyes et al. [
8], the industry sectors that use the IIoT are the energy sector, water, sewerage, transport, telecommunications, agriculture, mining, manufacturing, and retail. All are considered critical infrastructure for the development of the economy, except the retail sector. In the mining sector, IIoT is used to improve worker safety [
9,
10] and the production and exploitation processes [
11]. Furthermore, Zhou et al. [
12] shows the potential benefits of applying IIoT systems in underground coal mines to improve safety, productivity, and equipment automation.
On the other hand, analyzing the information technology used in the mining sector and identifying the challenges regarding IIoT adoption, [
13] proposes a unified architecture for the mining industry, considering IIoT frameworks and standards. We propose to design, develop, and implement an IIoT system that allows the monitoring of environmental variables in mining environments. The solution comprises static nodes in different mine locations and mobile nodes that the miners would carry. The nodes would communicate using a WSN and be sent to external monitoring centers over the Internet. The monitoring centers will be located in safety entities and with mine administrators.
The deployment of sensor nodes in IIoT systems refers to the site of sensors’ placement in the scenario. The node deployment methods fall into deterministic and random distribution [
14]. In deterministic deployment, the locations are known according to some pattern or vector. In contrast, in random deployment, the sensors are scattered in the region of interest (RoI), following a randomized distribution [
14]. Deterministic deployment schemes are ideal for network efficiency but impractical and impossible in large or inaccessible/harsh areas. For example, harsh environments like battlefields or disaster regions make deterministic deployment risky and infeasible. Random deployment becomes the only option, with sensors delivered from various sources such as planes, artillery shells, rockets, missiles, or ships [
15]. The environment is the main criterion when defining which deployment method is used. However, it is also possible to consider the deployment objectives, such as coverage, connectivity, energy consumption, and network lifetime.
Sensor deployment is a crucial design issue in IIoT based on WSNs and is considered critical because it determines the network’s performance. The proper placement of sensors can optimize performance metrics such as coverage, network connectivity, network lifetime, energy efficiency, reliability, deployment cost, and fault tolerance. A good deployment improves performance in information gathering and communication. The application requirements and the deployment scenario mainly determine the method for node deployment. Monitoring underground coal mines’ environment at work fronts and in transport tunnels is mandatory. Nodes must be deployed deterministically or randomly, but choosing only one deployment method causes performance issues such as coverage holes and weak network connectivity. It could also affect the deployment cost. Coverage indicates how well the sensors detect behaviors in the RoI [
16] and is a function of the sensing range (r
s). Connectivity refers to ensuring the node’s communication with other nodes and the sink node and is a communication range (r
c) function. To address these issues, a proper deployment methodology that combines deterministic and random deployment to support long-term planning is proposed in the present work.
This paper proposes a methodology for deploying WSN-based IIoT systems for gas monitoring of explosive atmosphere for long-term underground coal mine planning. Using a deterministic and random deployment, the algorithm locates the sensor nodes from a long-term planning blueprint. The sensors are located in tunnel crossings and at work fronts in the deterministic deployment step. Then, using random distributions, it locates new sensors to cover the whole scenario in case it does not meet the coverage and connectivity requirements. The strategy considers the communication and coverage sensing ranges obtained from previous experimental studies. The three main contributions of this paper are (1) a methodology based on a software tool to support operational planning of the deployment of IIoT systems to monitor explosive atmospheres in underground coal mines, to accomplish coverage and connectivity requirements, (2) an evaluation of the distributions for the random deployment of sensor nodes in underground mines, and (3) the use of real coordinates to replicate the actual structure of the mines and the sensor nodes’ location.
The remainder of this paper is organized as follows.
Section 2 presents IIoT, deployment background, and related work.
Section 3 offers the proposed deployment methodology.
Section 4 and
Section 5 show the experimental setup and discussion results of the tested distribution functions.
Section 6 concludes the paper.
3. Proposed Deployment Methodology
The IIoT is essential to making mining operations safer and controllable. The effectiveness of IIoT systems in supporting long-term planning in underground mines is highly dependent on how they are deployed. The coverage and connectivity parameters should be incorporated and evaluated from the initial deployment. The contribution of this paper is a two-step methodology using a proposed software tool to deploy an IIoT node system to assist long-term planning, attending to safety regulations related to the monitoring of gases in underground mining, as shown in
Figure 2. As mentioned, the methodology combines deterministic and random deployment because it can be the most effective and efficient deployment strategy for large-scale and mission-critical systems [
47]. It is observed that the deterministic deployment needs to insert the number of nodes necessary to meet the coverage and connectivity requirements demanded for this type of system. This is due to changes in the inclination, distance between nodes, and length of the tunnels. Therefore, nodes are included following a random distribution. With this second step, random deployment, the aim is to meet the requirements to connect the nodes to the outside of the mine and cover the most significant area. In this way, robustness and reliability in the WSN are guaranteed.
To simplify a mine’s structure, it is modeled like a set of tunnels, considering the distance and the tilt using the graphs theory. A graph is a collection of entities known as vertices (or nodes) and a choice of pairs of vertices, referred to as edges, that may or may not possess directionality. Traditionally, a graph is depicted by a sequence of points (the vertices) linked by strokes (the edges). In the proposed approach, the vertices symbolize the intersection of tunnels, and the edges represent the tunnels.
3.1. First Step: Deterministic Deployment
Initially, a deterministic deployment is made by locating sensor nodes in predetermined locations in the mine. The sensor nodes are deployed in the RoI, specifically at tunnel crossings, tilt changes, work faces, and portals. The software tool reads an Excel file that contains the coordinates (x and y axis), the ground elevation, and the convention per each change in the terrain, e.g., portal (PT), tunnel (TN), and level (LV), or creates the structure from a blueprint image. These data are obtained from total stations. With these data, the software tool constructs the initial blueprint in 2D, locating sensor nodes in the predetermined locations.
Table 2 shows the template used to construct the deterministic deployment. The cX col contains the x coordinate, cY contains the y coordinate, and cZ is the ground elevation. All parameters are in meters. Per each change in the ground elevation, one sensor is located due to changes in slope, which weaken signal propagation.
However, according to normativity, the user can place other nodes if required. In Colombia, it is mandatory to implement a continuous system to monitor methane in coal underground mines with a high content of grisu gas (category III). Decree 1886/2015 defines three types of underground coal mine regarding the methane concentration [
48]:
Category I: underground workings for which the methane concentration at any site in the mine does not reach zero percent (0%).
Category II: underground workings for which the concentration of methane at any site in the mine is equal to or less than 0.3%.
Category III: underground workings for which the methane concentration at any site in the mine is more significant than 0.3%.
The monitoring system should be implemented in portals, work faces connected to the mine ventilation circuit, and roadways. In addition, it is mandatory to implement a carbon monoxide and oxygen monitoring system at work faces; underground sites with the presence of specialized electric systems, communication systems, and underground electrical substations; vehicles and personnel roadways; communications with old or abandoned works; and close to partitions that isolate burned areas [
49].
The distance and location are evaluated to insert nodes in the network, as shown in Algorithm 1. The location refers to the nodes being at the same level or tunnel. Thus, it is necessary to calculate the Euclidean distance between a source node and a destination node. Then, it is determined if there is communication between the sensors according to the communication range (35 m) and, therefore, network connections. The sensing range (12 m) is used, too, to establish coverage areas. Subsequently, the algorithm evaluates if sensors can communicate with their neighborhoods. This evaluation is according to the distance and the location.
Figure 3 shows the deterministic deployment in a medium-sized mine. The algorithm adds one sink node in the portal and, in this case, adds fifteen nodes distributed in crossings and slope changes.
On the other hand, the same evaluation is carried out with the coverage range. The results are stored in the distance matrix and the connection matrix. The distance matrix contains the distance between connected sensors, and the connection matrix shows if a connection between sensors exists.
Algorithm 1 Node Evaluation |
1: | for Si ← 0 to total_sensors |
2: | for Sj ← 0 to total_sensors |
3: | Calculate euclidean(sensor_source, sensor_destination) |
4: | if (Euclidean <= comm_range) and (same tunnel or level) |
5: | Communication = yes |
6: | else |
7: | Communication = no |
8: | end if |
9: | if (Euclidean <= sens_range) and (same tunnel or level) |
10: | Sensing = yes |
11: | else |
12: | Sensing = no |
13: | end if |
14: | If sensor_source == sensor_destination |
15: | Communication = no |
16: | Sensing = yes |
17: | end if |
18: | end for |
19: | end for |
3.2. Second Step: Random Deployment
This step is performed because it is possible that the first step does not reach coverage and connectivity requirements. The deployment process starts with the coordinate identifying the points between which additional nodes need to be deployed. These points indicate the section’s start and finish within the mine where the nodes will be located. The linear distance between nodes is calculated using the Euclidean distance (the same is applied in deterministic deployment). This measurement is essential to determine the necessary node quantity and simulate its distribution along the tunnel.
Next, the minimum and maximum sensing range parameters are defined. The parameters were obtained by analyzing previous research. The minimum sensing range for methane was established at 12 m after analyzing the simulations made in [
39,
40,
41], and the maximum sensing range at 24 m for an overlap level of 50%. These ranges ensure that the nodes cover the RoI without holes or excessive overlap. Several random node placement strategies have been proposed based on a probability density function (PDF). Senouci et al. categorized the strategies into simple and compound [
36]. Tree probability functions were chosen to model the nodes’ distribution in the tunnels. The normal probability distribution, the Gaussian distribution, was used considering the sensing range average μ = 18 m. The constant diffusion in [
50] suggests an equal location probability over the interval; this work uses the minimum and maximum sensing range values. On the other hand, the exponential may prefer concentrations of nodes in certain areas, depending on the rate of the function, in this case, based on the minimum sensing range. The result of this step is the distance between sensors, which will be used to calculate the vector equation of the line.
The next step involves the calculation of the vector equation of the line that joins the initial and final nodes’ positions in the same section. The exact path along which the nodes will be distributed is obtained with this equation. By ensuring that the nodes are placed in line with this straight line, the model guarantees that the sensors will be correctly aligned with the physical section of the tunnel and, therefore, will be more effective regarding coverage and connectivity. The defined probability functions and the line equation proceed to the random generation of locations for the nodes. Each generated location is validated against the vector equation to ensure alignment with the span.
Figure 4 shows the random deployment in which the algorithm adds nodes based on the distribution function chosen. Add 45 nodes to complete the coverage and communication requirements for a mine in a RoI of 345 m by 98 m.
The solution to this system of equations provides the three-dimensional coordinates of the locations of the nodes that comply with the PDF, as shown in Algorithm 2. This process is repeated until all nodes are satisfactorily located, following the previously defined sensing range parameters and staying within the tunnel path.
Algorithm 2 Random Deployment |
1: | calculate euclidean(sensor_source, sensor_destination) |
2: | while (nodes do not cover section) |
3: | distance = pdf.uniform(min_sensing_range, max_sensing_range) |
4: | distance = pdf.exponential(min_sensing_range) |
5: | distance = pdf.normal(average(min_sensing_range,max_sensing_range)) |
6: | if distance < euclidean |
7: | xyz_coordinate = (x0,yo,zo)+ k(x,y,z) |
8: | add_node |
9: | end if |
10: | end while |
4. Experimental Setup
The present work explored the effectiveness of different distribution functions for deploying sensor nodes in mining environments. To better understand the optimal distribution of these sensors, three types of probability functions—normal, uniform, and exponential—were implemented and tested using the software tool in two mines with different characteristics. The analysis and simulation of the deployments were carried out using a tool developed in Python. The choice of Python for this project was based on the set of specialized libraries that facilitate the implementation of complex algorithms and the handling of statistical calculations. Among these libraries, NumPy has been mainly used to efficiently manipulate matrices and mathematical operations: Pandas for data management and analysis, and Matplotlib to visualize the results.
The first mine, with a dimension of 265 m by 98 m, has two levels of exploitation. The second mine increased the measures by 345 m by 98 m and has four operating levels. These differences in size and complexity, shown in
Figure 5, allow us to evaluate how the specific characteristics of each mine can influence the effectiveness of each probability function for sensor deployment.
Five hundred deployment replicates were performed for each probability function in both mines to obtain reliable results. This methodology allows not only the number of sensors deployed in each scenario to be evaluated but also the identification of patterns and trends that may need to be evident in a more limited data set.
The results presented below allow us to understand the efficiency of deploying sensor nodes in mines and provide information on the applicability of different probability functions for long-term planning in underground mining environments. These findings can influence decisions about safety and efficiency in the mining industry.
5. Results and Discussion
5.1. Software Tool
An underground mine typically consists of portals, shafts, adits, slopes, levels, galleries, roadways, and face area. To generate an optimal deployment model, it is necessary to consider the structure of the mine, with all its components, as well as characteristics regarding inclination, length of the tunnels, and their dimensions. For this reason, the tool proposed in this work starts from the generation of the blueprint from the coordinates obtained from a total station or from a blueprint (AutoCAD 2022 or higher), to which conventions are included so that the tool can interpret it. With this, it is possible to obtain the real structure of the mine, including inclinations and dimensions, as well as have an overall view of the mine and the tunnels that comprise it. The objective is to generate the deployment for the entire mine in a single process. In their multilevel deployment work, Thirumal and Kumar [
43] assume parallel tunnels in an odd number to apply their strategy, as shown in
Figure 6. This approach is different from the reality of most underground mines. For his part, Muduli and Mishra [
45] and Zhou et al. [
46] propose a deployment strategy that must be implemented in tunnels independently, assuming that the inclination does not change.
It is highlighted that the tool makes a precise and detailed mapping of the mine, considering crucial aspects such as its inclinations and specific dimensions. This approach provides a realistic understanding of the mine structure, which is critical for long-term planning. A benefit of this approach is the ability to estimate implementation costs. By knowing the number of nodes needed, sensor type, and their locations, a more accurate cost forecast can be made, avoiding unnecessary expenditure on equipment and resources.
Applying separate deployment strategies means having multiple networks. Our proposal generates a single network. Implementing a unified network reduces the need for numerous equipment and infrastructure systems, reducing the initial investment and maintenance costs. This resource efficiency saves money and simplifies technical support and maintenance operations. In addition, as the mine expands or changes, the network can quickly adapt to these new conditions without configuring additional systems. This represents an advantage regarding adaptability and responsiveness to changing mine needs and short-term planning.
Finally, we want to highlight that the deployment proposed by the methodology can be used to support the worker safety system and that by regulation, it must be part of the initial planning of mining work.
5.2. Distributions Performance
Evidence of work has yet to determine the performance of the distribution functions used in random deployment for underground mining. The selection of probabilistic distributions for random implementations depends on the application and the system’s objectives to be deployed. Coverage, connectivity, energy consumption, and cost are some objectives that can be chosen to consider a probability function. It is also possible to use combinations of distributions or customize distributions according to the application’s needs.
The performance of three distribution functions in terms of number of nodes was evaluated. The proposed methodology was applied in two mines generated from coordinates obtained of the total station. The distribution functions considered were exponential, normal, and uniform.
Figure 7a,b show each event’s relative frequency of occurrence, with its corresponding fitting curve, providing a comprehensive visualization of the patterns observed in the data for exponential, normal, and uniform distributions.
As can be seen, the nodes added in the second step, random deployment, using the distribution functions, follow the expected pattern. According to the distribution function used in the random deployment, it is possible to calculate the number of nodes necessary to cover a RoI in underground mines. The number of nodes allows for determining the type of node sensor and the cost deployment, which is information suitable for planning the safety and health system and operational and financial planning.
Figure 8a,b show the number of nodes by exponential, normal, and uniform distributions, where the number of each bar represents the relative frequency of the number of sensors added. For example, in
Figure 8a, for the exponential distribution, 24 times 30 sensors were assigned.
Table 3 summarizes the ranges of sensors added and the variability associated with each probability function in small and medium-sized mines. An increase in the minimum and maximum number of deployed sensors is observed when moving from small to medium-sized mines, which is consistent with the expectation that larger mines would require more sensors to achieve adequate coverage.
In small mines, the exponential function showed the most significant variability in the number of sensors added, with a difference of 25 sensors between the minimum and maximum and a standard deviation of 4.47, which could reflect an adaptability in the density of the deployment in response to topological variations within the mine. The normal and uniform distribution presented less variability, indicating a more controlled and predictable deployment. When increasing the mine size to medium, all probability functions showed an increase in the number of sensors deployed, particularly notable in the exponential function, where the minimum number of sensors increased by 11 and the maximum by 16, with a slight rise in the standard deviation. This change may imply that the exponential function is more sensitive to mine size, adjusting the number of sensors more steeply to maintain deployment effectiveness. The uniform distribution function in medium-sized mines also presented an increase in variability (standard deviation of 1.43), suggesting that, although the deployment attempts to be homogeneous, there are factors within medium-sized mines that introduce a more excellent dispersion in the number of sensors.
For small mines, the minimum variation of the number of sensors is approximately −36.67%, and the maximum is −52.73%. For medium mines, the minimum variation is −39.02%, and the maximum is −53.52%. These variations show that the uniform function deploys fewer sensors than the exponential function. The average value of the percentage variation between the exponential and uniform functions is −44.70% for small mines and −46.27% for medium mines. This indicates that, on average, the uniform function deploys 44.70% fewer sensors in small mines and 46.27% fewer in medium mines than the exponential function. Consequently, the exponential distribution is the one that adds the most significant number of nodes, while the number of nodes located by the normal and uniform distributions are similar.
The exponential distribution typically requires more nodes because it is designed to model events that occur independently and at a constant average rate but with the possibility of clustering or spreading over the area. This leads to more nodes being deployed to cover less predictable regions adequately. On the other hand, a uniform distribution assumes that the events (in this case, the locations of the nodes) are uniformly distributed over an interval. This distribution is consistent and varies less, meaning that fewer nodes can achieve coverage since each node covers a predictable space. The above data also suggest that the deployment strategy based on exponential distribution tends to result in a higher sensor density.
5.3. Number of Nodes
The number of nodes deployed is a crucial factor in planning WSNs because it affects the cost of implementation. Coverage density in a WSN is a crucial metric that measures the number of sensors deployed per unit area. This metric, which represents the number of sensors per square meter, is handy for comparing the efficiency of different methodologies in terms of resources used, regardless of the total size of the deployment areas, and provides direct information on the efficiency of the network in terms of the resources used for coverage. Lower coverage density indicates that fewer sensors are needed to monitor a unit area, which indicates greater efficiency and potentially lower deployment and maintenance costs. Coverage density is calculated by dividing the total number of sensors deployed by the total area that the network must cover. This formula provides a normalized comparison independent of the network’s absolute size or deployment area, allowing networks of different scales to be compared.
It is impossible to directly compare the results of the strategy proposed in this work because the tool recreates the accurate and complete structure of the mine. However, comparing the number of nodes deployed in a specific tunnel is possible. Over a tunnel of 180 m without inclinations, Thirumal and Kumar [
43] deployed 28 nodes, Akyildiz et al. [
51] deployed 29 nodes, while our proposal deployed 29 nodes, in the worst case, using the exponential distribution function, in the main tunnel of 345 m in length with inclinations, guaranteeing the coverage and connectivity requirements.
Our results show that the proposed methodology achieves a coverage density of approximately 0.0274 sensors per square meter, while the methods of Thirumal and Kumar and Akyildiz et al. present densities of 0.0346 and 0.0358 sensors per square meter, respectively (see
Figure 9). This indicates that our methodology requires fewer sensors to cover the same area, guaranteeing coverage and connectivity, which suggests greater efficiency in network deployment.
A slightly larger number of sensors deployed over a greater distance of the tunnel indicates that, despite not prioritizing optimization, our methodology can maintain a comparable sensor density under more complex and realistic conditions. This suggests that our methodology could offer similar or even superior results regarding coverage and efficiency in natural mining environments. Notably, the smaller number of sensors required means a lower cost deployment and reduces the initial hardware investment and network complexity. This reduction can lead to easier maintenance and greater system longevity. This efficient approach is especially advantageous in challenging environments such as underground mines, where installing and maintaining nodes can be costly and logistically complicated. Additionally, by decreasing the number of sensors required to achieve complete coverage, our methodology can decrease the interference between sensors and improve battery life across the network as fewer devices compete for the same power and communication resources.
It is essential to emphasize that our methodology is based on real sensing and communication range values. This means that each sensor is configured and located, taking into account the actual limitations and needs of the mine, which can result in a more effective sensor network suitable for the specific conditions of each mine. In conclusion, the proposed methodology improves the network efficiency regarding coverage density and offers high operating costs and ease of maintenance advantages, making it a better option than existing methods.
5.4. Coverage and Connectivity
A concept associated with coverage is the k-coverage, which is related to the number of sensors sensing a specific area or point. The k-coverage depends on the application and, in some cases, can be dynamically configured [
38]. The maximum value of k is called the coverage degree [
52]. Fault tolerance in WSNs increases network costs while enhancing robustness. However, sensing coverage would only be worthwhile with communication paths between the sink and the source sensors. In other words, network connectivity is essential. Similar to the concept of k-coverage, there exists k-connectivity. A network is said to have k-connectivity if removing k − 1 nodes does not result in lost communication between them. k-coverage and k-connectivity are used to guarantee fault tolerance.
This work also determined the behavior of the exponential, uniform, and normal distributions concerning the requirements of k-coverage and k-connectivity. For analysis, the tool was executed 500 times for each of the prototype mines and each probability function.
Figure 10a–c show the maximum value for k-coverage and k-connectivity for exponential, normal, and uniform distributions in small-sized mines. In exponential distribution, it obtained k-coverage = 3 and k-connectivity = 2. This means that one point can be sensing up to three sensors and that for 54.2% of the time, it is possible to have k = 2, for 37.2% of the time, k = 1, and for 8.6% of the time, k = 3. In addition, normal and uniform distributions, for 76.2% and 74.8% of the time, a value of k = 1 was obtained.
Regarding connectivity, again, in
Figure 10, the exponential distribution has the maximum value with k = 2 (2-connectivity); in 72.8% of the cases, it is possible to have two routes through which the data can be routed. On the other hand, in normal and uniform distributions, k = 1 (1-connectivity) was obtained.
Now, the results obtained in the medium-sized mine will be analyzed.
Figure 11a–c show the maximum value for k-coverage and k-connectivity for exponential, normal, and uniform distributions in medium-sized mines. The three distributions function shows the same values for k-coverage k = 2, although for the highest percentage of times (53%) it is the exponent function, a value close to that obtained in the small mine for the exact value of k. In the case of the normal and uniform functions, it is observed that although we have the same values of k = 2, the percentage of times that it is repeated increases. Likewise, in regard to k-connectivity, the same behavior is shown. The exponential distribution has k = 2, while in the normal and uniform distribution functions, k = 1.
The analysis of the degrees of coverage and connectivity reveals that the exponential distribution achieves the highest values, facilitating a fault-tolerant network. This is because it deploys a more significant number of nodes compared to the other distributions. However, this increased number of nodes increases network implementation and maintenance costs. Therefore, it is vital to find a balance between the number of nodes and coverage and connectivity requirements versus the cost of deployment. The selection of the distribution must be aligned with the specific objective of the deployment, and it is necessary to perform a trade-off analysis between the goals, that is, choose a distribution that meets all the requirements in a balanced way.
Few studies address the problem of k-coverage in underground mines. Muduli, Jana, and Mishra [
45] proposed a deployment scheme that analyzes the event detection probabilities for different detection ranges, considering the relationship between the sensing range and the communication range and associating the event detection probability with specific parameters of the communications system. In contrast, our approach separates these two parameters. The overlap value is a user requirement, and the sensing range is not dependent on the parameters associated with the communication system.
Zhou et al. [
46] employed an annealing method to optimize the degree of coverage. It is not possible to make a comparison on equal terms because our results show the number of nodes after optimization. Considering that the simulation uses a 200 m long tunnel and that the small mine that we reconstructed has a 265 m main tunnel, we observe that for k = 3, approximately 65 nodes are deployed. In contrast, our proposal deploys 55 nodes with k = 1. It can be inferred that there is a 54.2% probability of reaching k = 2 and an 8.6% probability of reaching k = 3 without optimizing the degree of coverage.
6. Conclusions and Future Work
In Colombia, unfortunately, during the last three years, coal mining accidents have risen, on average, with 150 fatalities, exhibiting a poor safety policy and lack of attention to the mining workforce. For this reason, this study proposes and evaluates a methodology for deploying a WSN-based IIoT system for monitoring and alerting in underground mines. The method employs a two-step deployment approach supported by a software tool that facilitates the creation of the mine structure from geolocation or using flat images. The critical metric was defined as the coverage density in evaluating the efficiency of different methodologies in deploying sensor networks in underground mines. This metric, which represents the number of sensors per square meter, is handy for comparing the efficiency of different methodologies regarding the resources used, regardless of the total size of the deployment areas. We comprehensively analyze three PDFs for random deployment and their impact on the number of nodes added to choose the appropriate distribution according to the IIoT system requirements. Compared to other identified state-of-the-art methodologies, the results show that our proposal achieves a lower density of sensors deployed per m2. The number of sensors is reduced to around 20.81% and up to 23.46% for uniform and exponential PDFs with fewer sensors per square meter to cover the same area (180 m2). The tool’s methodology and software were tested with two mines, demonstrating that the uniform function deploys, on average, 44.70% fewer sensors in small mines and 46.27% fewer in medium-sized mines compared to the exponential function.
Additionally, coverage and connectivity were analyzed for the three distribution functions. The exponential PDF allowed us to identify a k-connectivity value of 2 for medium-sized mines, while in the normal and uniform distribution functions, k = 1. Although the number of nodes can be increased, it is not compared to the cost of a life. Suppose that connectivity inside the tunnels is not guaranteed. In that case, coverage and risk will be lost in communication to alert against possible variations in atmospheric conditions and explosion risks, which would be monitored from the front of the mine and in a supervision center.
The values of the normal function were similar to those of the uniform function; additionally, the exponential distribution reached the highest coverage and connectivity values for both mine sizes, and the distribution function for random deployment is selected based on user requirements: coverage, connectivity, and deployment cost. The proposed method can be used to plan IIoT systems based on realistic structures and parameters.
Regarding the future deployment of sensor nodes in mines, we propose to expand our research through additional measurement campaigns to specify the communication range of the nodes, exploring different frequencies and mining conditions. The methodology may also be adapted to other subsurface work with some adjustments. Simulations are also planned to estimate the detection range of the sensors more realistically. A key objective will be to optimize sensor deployment, balancing coverage, connectivity, and cost, which will not only improve accuracy and efficiency but also the economic viability of monitoring systems in underground environments. A preliminary measurement campaign is being conducted to complement the methodology with quality metrics such as Bit Error Rate (BER), Packet Error Rate (PER), and Received Signal Strength Indicator (RSSI).