Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01.12.2010 | Research Article

Decentralized Detection in IEEE 802.15.4 Wireless Sensor Networks

verfasst von: Marco Martalò, Chiara Buratti, Gianluigi Ferrari, Roberto Verdone

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2010

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present a mathematical model to study decentralized detection in clustered wireless sensor networks (WSNs). Sensors and fusion centers (FCs) are distributed with the aim of detecting an event of interest. Sensors are organized in clusters, with FCs acting as cluster heads, and are supposed to observe the same common binary phenomenon. A query-based application is accounted for; FCs periodically send queries and wait for replies coming from sensors. After reception of data, FCs perform data fusion with a majority-like fusion rule and send their decisions to an access point (AP), where a final data fusion is carried out and an estimate of the phenomenon is obtained. We assume that sensors are IEEE 802.15.4-compliant devices and use the medium access control (MAC) protocol defined by the standard, based on carrier-sense multiple access with collision avoidance. Decentralized detection and MAC issues are jointly investigated through analytical modelling. The proposed framework allows the derivation of the probability of decision error at the AP, when accounting for packets' losses due to possible collisions. Our results show that MAC losses strongly affect system performance. The impact of different clustering configurations and of noisy communications is also investigated.
Wireless sensor networks (WSNs) have become an interesting research topic, both in military and civilian scenarios [1]. Remote environmental monitoring, such as surveillance of reserved areas, are important fields of application of WSNs. These applications often require very low-power consumption, low-cost hardware [2], and clustering has been proposed as a possible approach for saving energy. As an example, when contention-based medium access control (MAC) protocols are used, splitting nodes in small clusters not interfering among them allows to decrease the time needed for accessing the channel and, therefore, the energy consumed. In fact, the smaller is the number of nodes competing for the channel, the lower will be the probability to find the channel busy and to delay transmissions. The increasing interest for WSNs has spurred a significant activity on the design of efficient distributed detection techniques, allowing to efficiently detect a physical phenomenon of interest, while keeping the node complexity as low as possible [37].
We consider a network performing a specific decentralized detection task: sensor nodes (hereafter denoted as sensors) observe a binary phenomenon that is spatially constant, meaning that each sensor observes (neglecting observation noise) the same value of the phenomenon. Nodes are grouped into clusters and directly connected with local fusion centers (FCs), one per cluster, which send periodic queries to simultaneously poll all sensors in a cluster. The majority-like distributed detection strategy used in this paper leads to estimate the phenomenon status which is observed by the majority of the sensors. This is meaningful, for example, when it is of interest to detect if the phenomenon under observation (e.g., temperature, humidity, pressure, presence of a dangerous gas, etc.) overcomes a critical threshold.
In [8], a general framework on decentralized detection in clustered WSNs, accounting for communication noises and different clustered topologies, is presented. This analysis was carried out by considering an ideal MAC protocol, that is, in the absence of collisions. In this paper, we extend this approach to scenarios where collisions and MAC failures may occur due to the contention-based nature of the channel access mechanism. The impact of the MAC protocol on decentralized detection in clustered WSNs is analyzed. To the best of the authors' knowledge, there are no works, in the literature, dealing with distributed detection and contention-based MAC protocols jointly. As reference standard for the MAC, we consider the IEEE 802.15.4 [9]. However, the framework presented here can be extended to any MAC protocol.
IEEE 802.15.4 standard refers to a short-range wireless technology intended for Personal Area Networks (PANs). According to the standard, sensors use a carrier-sense multiple access with collision avoidance (CSMA/CA) protocol to access the channel. A recently proposed mathematical model for IEEE 802.15.4 networks is used in this paper to evaluate the Packet Success Probability (PSP), that is, the probability that a sensor can transmit correctly its packet (i.e., without collisions) to the PAN coordinator, when competing with the other sensors in the network [10, 11]. Even though in the literature there exist some models for the IEEE 802.15.4 MAC protocol [1215], none of these can be applied to query-based applications, where sensors have only one packet per query to be transmitted [10, 11]. All the above mentioned models, in fact, assume that packets transmitted from different sources collide with constant and independent probabilities, regardless of the backoff stage. However, this assumption is not accurate for query-based applications, where the number of sensors accessing the channel varies over time. Moreover, some of these models (e.g., [12, 14]) do not show a good agreement with simulation results. The model used in the current paper, instead, has been validated through simulations [10, 11] and experimental measurements [16].
We consider the reference scenario shown in Figure 1; FCs act as PAN coordinators gathering data from sensors belonging to their clusters and transmitting their decisions to the final destination, denoted as access point (AP). We assume that a different network (e.g., an infrastructure-based network where radio resources are scheduled) is used for the communication between the FCs and the AP and there are no MAC losses (i.e., a contention-free access is used). In this case, FCs will act as gateways between two different networks: the IEEE 802.15.4 network and the infrastructure-based network.
Both uniform and nonuniform clustering configurations are analyzed. Our results show a strong impact of the IEEE 802.15.4 MAC protocol on the system performance. While in the case of ideal MAC the best performance is obtained in the absence of clustering, on the opposite, when MAC collisions are considered, splitting sensors in noninterfering clusters allows reducing collisions within clusters and leads to better performance. Finally, the presence of noisy communication links between the sensors and the FCs is considered and its relative impact, with respect to MAC collisions, is analyzed.
The paper is structured as follows. In Section 2, the mathematical framework for decentralized detection is presented. Section 3 describes the IEEE 802.15.4 MAC protocol. In Section 4, a new mathematical model, accounting for decentralized detection and MAC issues jointly, is derived. Finally, Sections 5 and 6 report numerical results and concluding remarks, respectively.

2. Decentralized Detection in Clustered Sensor Networks

2.1. Preliminaries on Decentralized Detection

In this section, we provide the reader with a few preliminaries on decentralized detection of a common binary phenomenon in the presence of an ideal (collision-less) MAC protocol [8].
We consider a network scenario where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq1_HTML.gif sensors observe a common binary phenomenon whose status is defined as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq2_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq3_HTML.gif being with the probability that the event https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq4_HTML.gif happens. The sensors are clustered into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq5_HTML.gif groups, and each sensor can communicate only with its local FC. The groups may have either the same or different dimensions, depending on the distribution of the sensors among the clusters. In the former case, clustering is referred to as uniform whereas in the latter the topology is referred to as nonuniform.
The FCs collect data from the sensors in their corresponding clusters and make local decisions on the status of the binary phenomenon. Each local FC then transmits to the AP, which makes the final decision. A logical representation of the overall considered architecture is shown in Figure 1(a), whereas Figure 1(b) shows a more detailed view of a scenario with a single cluster and the AP.
The observed signal at the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq6_HTML.gif th sensor can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ2_HTML.gif
(2)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ3_HTML.gif
(3)
and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq7_HTML.gif are additive noise samples. Note that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq8_HTML.gif is considered as a deterministic parameter. Assuming that the noise samples https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq9_HTML.gif are independent random variables with the same Gaussian distribution https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq10_HTML.gif , the common signal-to-noise ratio (SNR) at the sensors, denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq11_HTML.gif , can be defined as [17]
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ4_HTML.gif
(4)
Each sensor makes a decision comparing its observation https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq12_HTML.gif with a threshold value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq13_HTML.gif (the same at all sensors, for simplicity) and computes a local decision https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq14_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq15_HTML.gif is the unit step function. In particular, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq16_HTML.gif is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq17_HTML.gif .
In a scenario with noisy communication links, simply modeled as binary symmetric channels (BSCs), the decision https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq18_HTML.gif sent by the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq19_HTML.gif th sensor can be flipped with a probability corresponding to the cross-over probability of the BSC model and denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq20_HTML.gif [18]. This simplified model is accurate only in the presence of additive communication noise, without other impairments, such as intersymbol interference and path loss. For instance, when additive white Gaussian noise (AWGN) and binary phase shift keying are considered, it holds that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq21_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq22_HTML.gif is the channel SNR and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq23_HTML.gif . The received bit at the FC can be expressed as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq24_HTML.gif with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq25_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq26_HTML.gif with probability https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq27_HTML.gif .
The majority-like fusion rule used at the FCs and the AP is defined as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq28_HTML.gif are the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq29_HTML.gif binary data ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq30_HTML.gif ) to be fused together and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq31_HTML.gif is the decision threshold.
By denoting the number of sensors in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq32_HTML.gif th cluster as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq33_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq34_HTML.gif ), the following decision thresholds will be set: (i) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq35_HTML.gif is the decision threshold at the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq36_HTML.gif th FC with size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq37_HTML.gif ; (ii) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq38_HTML.gif is the decision threshold at the AP. In the presence of uniform clustering, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq39_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq40_HTML.gif .
Note that in the absence of clustering, the overall network architecture shown in Figure 1(a) collapses into a single cluster and the AP coincides with the corresponding cluster FC.

2.2. Probability of Decision Error at the AP

When an ideal (collision-less) MAC protocol is considered, the number of data packets received at an FC is equal to the number of sensors in the corresponding cluster, since no losses at MAC level occur. We denote by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq41_HTML.gif the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq42_HTML.gif -dimensional vector containing the number of decisions received at the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq43_HTML.gif FCs.
In the case with ideal MAC protocol, it holds that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq44_HTML.gif , assuming that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq45_HTML.gif . Furthermore, define also the following two probability vectors:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ6_HTML.gif
(6)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq46_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq47_HTML.gif , resp.) is the probability that the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq48_HTML.gif -th FC ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq49_HTML.gif ) decides for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq50_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq51_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq52_HTML.gif , resp.) has happened. The elements of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq53_HTML.gif (equivalently, the elements of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq54_HTML.gif ) are, in general, different from each other and depend on the particular distribution of the sensors among the clusters. We first consider ideal communication links between the sensors and the FCs. Note that in this case an error may still occur due to the quantization of the sensors' observations and the fusion operation performed by the FCs.
In [8], it is shown that the probability of decision error can be expressed as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq55_HTML.gif is the vector of FCs' decisions. The index https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq56_HTML.gif designates the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq57_HTML.gif th configuration, over the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq58_HTML.gif possible, with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq59_HTML.gif "1"s (and, obviously, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq60_HTML.gif "0"s). For example, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq61_HTML.gif is the second possible configuration with one "1" (and two "0s"); the "1" is the decision of the second FC. The rationale behind (7) is the following. The first summation at the right-hand side of (7) represents the probability that the AP decision on the phenomenon status is in favor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq62_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq63_HTML.gif is the true status. This happens when at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq64_HTML.gif (over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq65_HTML.gif decisions coming from the FCs) are in favor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq66_HTML.gif , due to the majority-like fusion rule. Similarly, the second summation at the right-hand side of (7) represents the probability that the AP decision on the phenomenon status is in favor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq67_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq68_HTML.gif is the true status. This happens when less than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq69_HTML.gif (over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq70_HTML.gif decisions coming from the FCs) are in favor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq71_HTML.gif .
Finally, in a scenario with noisy communication links, the probability of decision error can be derived from (7), by replacing the probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq72_HTML.gif with the probabilities https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq73_HTML.gif , which take into account the noise in the communication links between sensors and FCs and are defined as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ8_HTML.gif
(8)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ9_HTML.gif
(9)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq74_HTML.gif depends on the number of packets received at the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq75_HTML.gif -th FC. Since the same majority-like fusion rule of the AP is applied to each FC, the same considerations given above for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq76_HTML.gif still apply here for the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq77_HTML.gif .
In (8), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq78_HTML.gif is the probability that a sensor decision sent to an FC is in favor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq79_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq80_HTML.gif has happened and can be expressed, according to the BSC model for a noisy communication link, as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ10_HTML.gif
(10)
In fact, the first term at the right-hand side is obtained when there is an observation error but error-free communications whereas the second term is obtained when there is no observation but communication noise. Similarly, in (9), https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq81_HTML.gif represents the probability that a decision sent by a sensor to an FC is in favor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq82_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq83_HTML.gif has happened and can be given the following expression:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ11_HTML.gif
(11)
For large values of the sensor SNR, a floor on the probability of decision error can be computed from (8) and (9), by setting https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq84_HTML.gif and, therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq85_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq86_HTML.gif , it is easy to obtain that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ12_HTML.gif
(12)
Therefore, the probability of decision error in a scenario with noisy communication links, given a clustering configuration (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq87_HTML.gif ), becomes
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ13_HTML.gif
(13)
At the left-hand side of (13), we have explicitly indicated that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq88_HTML.gif depends on the observation quality (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq89_HTML.gif ) and the communication quality (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq90_HTML.gif ).

3. The Packet Success Probability with IEEE 802.15.4 MAC Protocol: An Analytical Approach

We consider a network composed of IEEE 802.15.4-compliant sensors, working in beacon-enabled mode [9]. Each FC coincides with a PAN coordinator, receiving data from sensors belonging to its PAN (i.e., its cluster). We assume that the different clusters use the same frequency channel, but different resources in terms of time. In other words, a time division between clusters is applied, so that sensors of different clusters do not interfere among them. We evaluate performance by fixing the total time made available to all sensors in the network (i.e., all the clusters) for transmitting data to the FCs. This means that performance is evaluated under a total achievable throughput constraint. In this section, we consider an illustrative cluster composed of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq91_HTML.gif (IEEE 802.15.4) sensors transmitting data to the FC. We assume that no connectivity problems exist; each sensor can receive the query (i.e., the beacon packets) from the FC and reach it. Nodes transmit packets with size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq92_HTML.gif  bytes, being https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq93_HTML.gif an integer parameter.
According to the IEEE 802.15.4 MAC protocol in beacon-enabled mode, the access to the channel is managed through a superframe, starting with a packet, denoted as beacon, transmitted by the PAN coordinator [9]. The superframe may contain an inactive part, allowing sensors to enter in sleeping mode whereas in the active part sensors use a slotted CSMA/CA algorithm to transmit data. The duration of the active part, namely, the superframe duration, and of the entire superframe, namely, the beacon interval, depend on the value of two integer parameters ranging from 0 to 14, called superframe order ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq94_HTML.gif ) and beacon order ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq95_HTML.gif ), respectively. In particular, the superframe duration can be expressed as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq96_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq97_HTML.gif =16 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq98_HTML.gif s is the symbol time whereas the beacon interval is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq99_HTML.gif (see Figure 2).
Time division between clusters is performed as follows. The application sets the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq100_HTML.gif , that is the total time made available to the network for transmissions from sensors to FCs. If the AP does not know the clusters size, it allocates the same resource to all the clusters, that is the same value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq101_HTML.gif . In particular, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq102_HTML.gif is set accordingly to the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq103_HTML.gif and the number of clusters, such that all clusters have a portion of the beacon interval allocated. If, instead, the AP is aware of the network topology, it may allocate resources according to the number of sensors in each cluster. In this case, the AP assigns different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq104_HTML.gif according to the clusters' sizes; the smaller the cluster, the smaller the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq105_HTML.gif assigned to it. Both the above mentioned resource allocation strategies will be considered in Section 5. The AP communicates to the FCs the values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq106_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq107_HTML.gif and the instant in which the superframe of each FC must start. In this way, the active parts of the superframes defined by the different FCs will not overlap and during transmissions within a given cluster, sensors belonging to the other clusters will be in sleeping mode, being in the inactive part of the superframe of their FCs (see Figure 2). According to our application, each FC will send periodic queries, starting from the instant provided by the AP, and will wait for decisions coming from sensors. The application also requires that the data must be received by the FC by the end of the active part of the superframe defined by the FC. Therefore, each sensor has one packet to be transmitted per beacon received and has to transmit it by the end of the active part of the superframe defined by its FC.
In [10, 11], a mathematical model for the IEEE 802.15.4 MAC protocol in beacon-enabled mode is introduced. This model describes the behavior of a sensor accessing the channel by using the slotted CSMA/CA algorithm and allows the evaluation of the PSP, denoted, hereafter, as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq108_HTML.gif , and representing the probability that a sensor transmits successfully the packet to its FC by the end of the active part of the superframe of its FC. A packet could be lost due to the following reasons: (i) a collision, (ii) the channel is sensed busy more than five consecutive times [9], (iii) the available time ends before the channel is sensed idle. Note that retransmissions are not allowed in our scenario.
For the sake of conciseness, we do not report here the analysis made to derive https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq109_HTML.gif but we refer to [10, 11]. To show the behavior of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq110_HTML.gif when varying different parameters, in Figure 3,   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq111_HTML.gif is shown, as a function of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq112_HTML.gif (a single cluster is considered), for different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq113_HTML.gif (assumed to be equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq114_HTML.gif ) and when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq115_HTML.gif . Only the analytical model results are reported and we refer to [10, 11] for the validation of the model. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq116_HTML.gif decreases by increasing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq117_HTML.gif , since more sensors compete for the channel (i.e., the collision probability increases), and by decreasing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq118_HTML.gif , since less time is given to sensors to try to access the channel. Since sensors start the CSMA/CA algorithm at the same time, they can sense the channel for a limited number of times and no retransmissions are allowed, it will exist a maximum delay with which sensors can access the channel [11]. For this reason, performance achieved in the cases https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq119_HTML.gif and 2 is almost the same.

4. Impact of the Channel Access Probability on Decentralized Detection

In this section, we derive an analytical framework for the computation of the probability of decision error in the presence of the IEEE 802.15.4 MAC protocol. Each FC will receive a number of decisions smaller than the number of sensors in the cluster, owing to the contention-based nature of the protocol, that may cause collisions.
Equation (13) needs to be modified to take into account the presence of a nonideal MAC protocol, characterized, concisely, by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq123_HTML.gif .
Being https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq124_HTML.gif the PSP in a scenario with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq125_HTML.gif competing sensors in a cluster and assuming that all transmissions are independent, it follows that the number of successful transmissions in the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq126_HTML.gif -th cluster can be modeled as a binomial random variable, denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq127_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq128_HTML.gif ), with parameters https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq129_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq130_HTML.gif . Referring to the analysis in Section 2, the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq131_HTML.gif -dimensional vector, with the numbers of decisions received by the FCs, is a random vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq132_HTML.gif . ( The symbol https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq133_HTML.gif was used in Section 2.2 for a deterministic vector. With an abuse of notation, it now refers to a random vector. The context eliminates any ambiguity.) Note that even through the clusters are uniform, the number of decisions received at the FCs may vary from cluster to cluster, being such number a random variable. Therefore, the true clustering configuration is nonuniform.
At this point, the probability of decision error depends on a realization of the random vector https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq134_HTML.gif which, in turn, depends on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq135_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq136_HTML.gif . The average probability of decision error, with respect to the clustering configuration, can then be computed as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ14_HTML.gif
(14)
After a few manipulations, one obtains that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ15_HTML.gif
(15)
where the last probability at the right-hand side is given by (13) (with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq137_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq138_HTML.gif ) and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ16_HTML.gif
(16)
It would be interesting to preliminary evaluate a lower bound on the average probability of decision error, as the limiting average probability of decision error in an ideal scenario with no observation and communication noises, that is, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq139_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq140_HTML.gif . In this case, if at least one bit is delivered to the AP, then a correct decision will be made. At this point, there is a decision error if and only if no sensor decisions can be reliably sent to the AP. Therefore, an error happens only if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq141_HTML.gif , for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq142_HTML.gif . In this case, the AP decides randomly, thus obtaining that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ17_HTML.gif
(17)
In the presence of uniform clustering, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq143_HTML.gif , for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq144_HTML.gif , (17) reduces to
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ18_HTML.gif
(18)
where we have used the fact that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq145_HTML.gif , regardless of the (uniform) clustering configuration. It can be observed that expression (18) for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq146_HTML.gif is a decreasing function of the number of clusters. On the opposite, in a scenario with an ideal MAC protocol, this limiting probability does not depend on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq147_HTML.gif [8]. As an example, in the case https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq148_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq149_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq150_HTML.gif , when no clustering is applied, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq151_HTML.gif will be equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq152_HTML.gif (see Figure 5(b)). By increasing the number of clusters, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq153_HTML.gif gets larger and, therefore, the floor appears at very small (and not practical) values of the probability of decision error (e.g., in the case with eight uniform clusters we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq154_HTML.gif ). Finally, note that the limiting probability (17) equals to zero for any unbalanced configuration with at least one cluster with one sensor. In this case, in fact, the sensor directly connected to its FC always accesses the channel and, therefore, there is always at least one correct decision (sent by the corresponding FC to the AP) on the basis of which the AP can correctly estimate the phenomenon status.

5. Numerical Results

We now investigate the performance of the proposed decentralized detection schemes. In particular, in the presence of IEEE 802.15.4 MAC protocol the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq155_HTML.gif is determined offline, for a given clustering configuration, by using the analytical framework presented in Section 3. The obtained value is then used in (15) and in our simulator. In particular, our https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq156_HTML.gif simulator is designed "ad hoc" as follows. The transmissions from the sensors to the FCs are represented as Bernoulli trials, each with parameter https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq157_HTML.gif . On the basis of the received packets in their cluster, the FCs perform a data fusion (with decision threshold set according to the number of received packets) and transmit their decisions to the AP. Since each sensor must send only its decision (i.e., one bit) and since the model requires that sensors transmit packets of size multiple of 10 bytes [11], being the packet header equal to 19 bytes, we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq158_HTML.gif , that is, packets of 20 bytes are transmitted. In the following, we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq159_HTML.gif and the MAC parameters to the default values (see [11]). We first consider uniform resources allocation among clusters. Then, in Figure 7, we extend our approach to a scenario where resources are allocated accordingly to the cluster size. Note that in the first case, uniform clustering will be favored with respect to the nonuniform case, since resources will be better used. By the way, in scenarios where the AP is not aware of the network topology, only the uniform resource allocation can be implemented.
Unless otherwise stated, we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq160_HTML.gif and (apart from Figure 7) we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq161_HTML.gif (i.e., we give to the cluster all the available time) when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq162_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq163_HTML.gif (i.e., two nonoverlapping active parts within the beacon interval are present) when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq164_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq165_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq166_HTML.gif and 4; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq167_HTML.gif when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq168_HTML.gif and 8. Note that in the cases https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq169_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq170_HTML.gif part of the beacon interval is not used by any cluster and, therefore, some resources are wasted, due to the constraint that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq171_HTML.gif must be an integer.
In Figure 4, a comparison between analytical and simulation results in a scenario with IEEE 802.15.4 MAC protocol and ideal communication links (i.e., no noisy communication links) and two possible clustering configurations, uniform (16-16-16-16) and nonuniform (40-8-8-8), is proposed.
As expected, a good agreement between simulations and analytical results was found in both cases. In fact, the analysis carried out in Section 4 is exact and the simulator is implemented by exactly replicating the analysis conditions. In other words, this is a "sanity check," which allows us to use the simulator, especially to avoid numerical problems in the evaluation of the analytical formulas.
In Figure 5, the probability of decision error is shown, as a function of the sensor SNR, for different clustering configurations. No noisy communication links are accounted for and ideal MAC is considered in case (a) whereas the IEEE 802.15.4 MAC protocol is accounted for in case (b). The use of the IEEE 802.15.4 MAC protocol leads to a performance degradation with respect to the case of ideal MAC. The highest degradation is achieved with no clustering, since in this case a large number of sensors are competing for the radio resource. The best configuration, in the case with IEEE 802.15.4 MAC protocol is achieved for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq173_HTML.gif , where only eight sensors per cluster are competing for the channel, and even though https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq174_HTML.gif (i.e., sensors have only approx. 15 ms to access the channel), the success probability is the largest. By comparing curves in (a) and (b) we can observe that, while distributed detection is mainly affected by the uniformity or nonuniformity of clusters, rather than by the number of clusters itself, MAC losses strongly depend on the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq175_HTML.gif . In fact, while in the ideal case the performance of uniform clustering does not depend on the specific configuration, this is no longer true in the presence of contention-based MAC protocols. Moreover, note that the case (40-8-8-8) outperforms the case (32-8-8-8-8), since even though more sensors are competing for the channel (in the largest cluster), sensors have more time to access the channel (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq176_HTML.gif instead of 0). In fact, we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq177_HTML.gif in the cluster with 40 sensors and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq178_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq179_HTML.gif in the cluster with 32 sensors and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq180_HTML.gif . This means that the best performance is achieved when a good balance between the number of sensors competing for the channel and the time made available to sensors for transmissions is reached.
The comparison made in Figure 5 is done by assuming that all decisions coming from the FCs have the same reliability. This implies that the same weight is assigned to all FCs' decisions. However, in nonuniform scenarios the decisions obtained by fusing a larger number of sensors' decisions are more reliable than those obtained by fusing a smaller number of sensors' decisions. Therefore, one may resort to a weighing strategy, where the AP decides according to the following rule:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_Equ19_HTML.gif
(19)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq181_HTML.gif are the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq182_HTML.gif data ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq183_HTML.gif ) to be fused together and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq184_HTML.gif are the weights computed as the number of sensors in the cluster (which successfully access the channel) divided by the total number of sensors (which successfully access the channel). In Figure 6, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq185_HTML.gif is shown, as a function of the sensor SNR, for different clustering configurations, ideal communication links, and weighing strategy at the AP. Two scenarios for the MAC are considered: (a) ideal MAC protocol and (b) IEEE 802.15.4 MAC protocol. In the scenario with ideal MAC protocol, one can observe that the nonuniform configurations experience the expected performance improvement. Moreover, the higher is the nonuniformity degree, the larger is this improvement. On the other hand, when the IEEE 802.15.4 MAC protocol is considered, one can observe that the weighing strategy has no significant impact and the performance is the same predicted in Figure 5(b). This is probably due to the fact that, while in the case with no weighing strategy the performance is given by the average number of sensors accessing the channel, in the presence of weighing the performance is determined by the overall statistics of the number of sensors accessing the channel.
In Figure 7, we show the performance achieved when resources (in terms of time) are allocated to clusters depending on their size. In particular, we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq188_HTML.gif and we allocate https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq189_HTML.gif to clusters with 8 sensors, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq190_HTML.gif to clusters with 16 sensors, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq191_HTML.gif to clusters with 32 sensors, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq192_HTML.gif to the nonclustering case. In this way, the resource available to each cluster is proportional to the cluster size and also no resources are wasted for the considered set of network topologies. As expected, the performance of the nonuniform cases slightly improve with respect to those with uniform resource allocation (see, e.g., the case (32-8-8-8-8) present in both the figures). In particular, when the weighing strategy is applied, the results related to the nonuniform scenarios are approximatively the same. However, uniform configurations are still to be preferred.
Since increasing the number of FCs will increase also the cost of the network, being FCs sensors with special functionalities, and therefore high cost, it is of interest to investigate what is the best possible configuration for a fixed number of FCs. Only results in the presence of the IEEE 802.15.4 MAC protocol will be presented in the following figures. In Figure 8, the probability of decision error is shown, as a function of the sensor SNR, in a scenario with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq193_HTML.gif and 4 FCs. Two different values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq194_HTML.gif are considered: 0 (ideal communication links) and 0.1 (high communication noise). In the ideal case, the uniform configuration is still to be preferred, thus confirming the results in [8] with an ideal MAC protocol. Moreover, the larger the nonuniformity degree, the worse is the performance. In fact, when clusters are balanced, the decisions coming from the FCs to the AP have approximately the same reliability, since the number of collisions is approximately the same in all clusters. On the other hand, with unbalanced clusters the decisions do not have the same reliability and, therefore, the quality of the AP decision worsens. In the scenario with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq195_HTML.gif , the impact of the communication noise on the probability of decision error is significant and the performance rapidly degrades. As predicted in Section 2.2, for large values of SNR curves present a floor, due to the communication noise. Therefore, increasing more and more the observation quality does not lead to better performance, since this is also limited by the communication noise.
In Figure 9, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq200_HTML.gif is shown, as a function of the SNR, for different clustering configurations, considering ideal communication links and the IEEE 802.15.4 MAC protocol. For each value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq201_HTML.gif , the best and the worst configurations are shown. More precisely, the best possible configurations are uniform for all values of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq202_HTML.gif : 32-32 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq203_HTML.gif , 16-16-16-16 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq204_HTML.gif , and 8-8-8-8-8-8-8-8 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq205_HTML.gif . On the other hand, the worst possible configuration, for a given value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq206_HTML.gif , is that with one big cluster and the others with only one sensor, that is, 63-1 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq207_HTML.gif , 61-1-1-1 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq208_HTML.gif , and 57-1-1-1-1-1-1-1 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq209_HTML.gif . One should observe that the relative loss (in terms of sensor SNR) from the best to worst configuration is approximately constant, regardless of the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq210_HTML.gif . For instance, at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq211_HTML.gif this loss is around https://static-content.springer.com/image/art%3A10.1155%2F2010%2F174063/MediaObjects/13638_2010_Article_1816_IEq212_HTML.gif  dB. This implies that the gain brought by the use of uniform clustering is (more or less) the same, the only difference being the fact that the larger the number of FCs (with a corresponding larger cost), the better is the performance.

6. Concluding Remarks

In this paper, we have proposed a mathematical framework to study decentralized detection in IEEE 802.15.4 WSNs. In particular, on the basis of an analytical computation of the probability that a packet is correctly received at the destination when the IEEE 802.15.4 MAC protocol is used, we have evaluated the impact of the MAC protocol on a decentralized detection strategy. This analysis has been carried out considering different clustered topologies. Results show that the MAC protocol has a relevant impact on the performance. In particular, while the absence of clustering guarantees the best performance of a decentralized detection strategy, in the presence of an ideal MAC, this leads to the worst performance with the 802.15.4 MAC protocol. In the latter case, in fact, splitting sensors in clusters noninterfering among them, leads to decreasing the collision probability and, therefore, the error probability on the decision. Finally, the presence of communication noise increases the probability of decision error floor induced by the MAC protocol, and this degradation is more pronounced, the higher is the nonuniformity degree among the clusters.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E: A survey on sensor networks. IEEE Communications Magazine 2002, 40(8):102-114. 10.1109/MCOM.2002.1024422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E: A survey on sensor networks. IEEE Communications Magazine 2002, 40(8):102-114. 10.1109/MCOM.2002.1024422CrossRef
2.
Zurück zum Zitat Madou M: Fundamentals of Microfabrication. CRC Press, Boca Raton, Fla, USA; 1997. Madou M: Fundamentals of Microfabrication. CRC Press, Boca Raton, Fla, USA; 1997.
3.
Zurück zum Zitat Tsitsiklis JN: Advances in statistical signal processing. In Decentralized Detection. Volume 2. Edited by: Poor HV, Thomas JB. JAI Press, Greenwich, Conn, USA; 1993: 297-344. Tsitsiklis JN: Advances in statistical signal processing. In Decentralized Detection. Volume 2. Edited by: Poor HV, Thomas JB. JAI Press, Greenwich, Conn, USA; 1993: 297-344.
4.
Zurück zum Zitat Tenney RR, Sandell NR Jr.: Detection with distributed sensors. IEEE Transactions on Aerospace and Electronic Systems 1981, 17(4):501-510.MathSciNetCrossRef Tenney RR, Sandell NR Jr.: Detection with distributed sensors. IEEE Transactions on Aerospace and Electronic Systems 1981, 17(4):501-510.MathSciNetCrossRef
5.
Zurück zum Zitat Reibman AR, Nolte LW: Design and performance comparison of distributed detection networks. IEEE Transactions on Aerospace and Electronic Systems 1987, 23(6):789-797.MathSciNetCrossRef Reibman AR, Nolte LW: Design and performance comparison of distributed detection networks. IEEE Transactions on Aerospace and Electronic Systems 1987, 23(6):789-797.MathSciNetCrossRef
6.
Zurück zum Zitat Viswanathan R, Varshney PK: Distributed detection with multiple sensors: part I—fundamentals. Proceedings of the IEEE 1997, 85(1):54-63. 10.1109/5.554208CrossRef Viswanathan R, Varshney PK: Distributed detection with multiple sensors: part I—fundamentals. Proceedings of the IEEE 1997, 85(1):54-63. 10.1109/5.554208CrossRef
7.
Zurück zum Zitat Chamberland J-F, Veeravalli VV: Decentralized detection in sensor networks. IEEE Transactions on Signal Processing 2003, 51(2):407-416. 10.1109/TSP.2002.806982CrossRef Chamberland J-F, Veeravalli VV: Decentralized detection in sensor networks. IEEE Transactions on Signal Processing 2003, 51(2):407-416. 10.1109/TSP.2002.806982CrossRef
8.
Zurück zum Zitat Ferrari G, Martalò M, Pagliari R: Decentralized detection in clustered sensor networks. IEEE Transactions on Aerospace and Electronic Systems. In press Ferrari G, Martalò M, Pagliari R: Decentralized detection in clustered sensor networks. IEEE Transactions on Aerospace and Electronic Systems. In press
10.
Zurück zum Zitat Buratti C: A mathematical model for performance of IEEE 802.15.4 beacon-enabled mode. Proceedings of International Conference on Wireless Communications and Mobile Computing (IWCMC '09), June 2009, Leipzig, Germany 1184-1190. Buratti C: A mathematical model for performance of IEEE 802.15.4 beacon-enabled mode. Proceedings of International Conference on Wireless Communications and Mobile Computing (IWCMC '09), June 2009, Leipzig, Germany 1184-1190.
11.
Zurück zum Zitat Buratti C, Verdone R: Performance analysis of IEEE 802.15.4 non beacon-enabled mode. IEEE Transactions on Vehicular Technology 2009, 58(7):3480-3493.CrossRef Buratti C, Verdone R: Performance analysis of IEEE 802.15.4 non beacon-enabled mode. IEEE Transactions on Vehicular Technology 2009, 58(7):3480-3493.CrossRef
12.
Zurück zum Zitat Mišić J, Shafi S, Mišić VB: Maintaining reliability through activity management in an 802.15.4 sensor cluster. IEEE Transactions on Vehicular Technology 2006, 55(3):779-788. 10.1109/TVT.2006.873824CrossRef Mišić J, Shafi S, Mišić VB: Maintaining reliability through activity management in an 802.15.4 sensor cluster. IEEE Transactions on Vehicular Technology 2006, 55(3):779-788. 10.1109/TVT.2006.873824CrossRef
13.
Zurück zum Zitat Pollin S, Ergen M, Ergen S, et al.: Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer. IEEE Transactions on Wireless Communications 2008, 7(9):3359-3371.CrossRef Pollin S, Ergen M, Ergen S, et al.: Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer. IEEE Transactions on Wireless Communications 2008, 7(9):3359-3371.CrossRef
14.
Zurück zum Zitat Chen Z, Lin C, Wen H, Yin H: An analytical model for evaluating IEEE 802.15.4 CSMA/CA protocol in low rate wireless application. Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (AINAW '07), May 2007, Niagara Falls, Ontario, Canada 899-904.CrossRef Chen Z, Lin C, Wen H, Yin H: An analytical model for evaluating IEEE 802.15.4 CSMA/CA protocol in low rate wireless application. Proceedings of the International Conference on Advanced Information Networking and Applications Workshops (AINAW '07), May 2007, Niagara Falls, Ontario, Canada 899-904.CrossRef
15.
Zurück zum Zitat Martalò M, Busanelli S, Ferrari G: Markov Chain-based performance analysis of multihop IEEE 802.15.4 wireless networks. Performance Evaluation 2009, 66(12):722-741. 10.1016/j.peva.2009.08.011CrossRef Martalò M, Busanelli S, Ferrari G: Markov Chain-based performance analysis of multihop IEEE 802.15.4 wireless networks. Performance Evaluation 2009, 66(12):722-741. 10.1016/j.peva.2009.08.011CrossRef
16.
Zurück zum Zitat Gezer C, Buratti C, Verdone R: Capture effect in IEEE 802.15.4 networks: modelling and experimentation. Proceedings of the IEEE International Symposium on Wireless Pervasive Computing, May 2010, Modena, Italy 204-209. Gezer C, Buratti C, Verdone R: Capture effect in IEEE 802.15.4 networks: modelling and experimentation. Proceedings of the IEEE International Symposium on Wireless Pervasive Computing, May 2010, Modena, Italy 204-209.
17.
Zurück zum Zitat Shi W, Sun TW, Wesel RD: Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized Gaussian noise. IEEE Transactions on Information Theory 2001, 47(1):446-450. 10.1109/18.904560MathSciNetCrossRefMATH Shi W, Sun TW, Wesel RD: Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized Gaussian noise. IEEE Transactions on Information Theory 2001, 47(1):446-450. 10.1109/18.904560MathSciNetCrossRefMATH
18.
Zurück zum Zitat Ferrari G, Pagliari R: Decentralized binary detection with noisy communication links. IEEE Transactions on Aerospace and Electronic Systems 2006, 42(4):1554-1563.CrossRef Ferrari G, Pagliari R: Decentralized binary detection with noisy communication links. IEEE Transactions on Aerospace and Electronic Systems 2006, 42(4):1554-1563.CrossRef
Metadaten
Titel
Decentralized Detection in IEEE 802.15.4 Wireless Sensor Networks
verfasst von
Marco Martalò
Chiara Buratti
Gianluigi Ferrari
Roberto Verdone
Publikationsdatum
01.12.2010
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2010/174063

Weitere Artikel der Ausgabe 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Zur Ausgabe

Premium Partner