1. Introduction
With the development of various embedded computing platforms and low power sensing components, a diverse set of applications using wireless sensor networks (WSN) has been implemented in the past decade. These applications can be divided into two categories based on the type of sensor nodes that they use. These are static sensor networks and mobile sensor networks. Static sensor networks are composed of many stationary nodes, and these sensor nodes are located at various positions to sense local phenomena around them. These nodes have the characteristic that their positions rarely change. Such systems are used in applications, such as environmental monitoring [
1,
2], structural health monitoring [
3,
4,
5], industrial asset monitoring [
6], building automation [
7,
8], static asset management [
9] and traffic monitoring applications [
10]. On the other hand, mobile sensor networks are composed of many mobile nodes. In these networks, one or more mobile nodes are attached to a mobile object to monitor its movement and current location in real time. Such systems can be applied to healthcare systems [
11,
12,
13], mobile asset tracking [
14,
15,
16,
17] and human monitoring applications [
18].
Among various applications where WSN devices are applied, one important application that these systems can benefit is the application of mobile asset tracking. By attaching miniature sized wireless devices, the location and presence of various high-cost mobile assets can be tracked. As an example, in the hospital environment, while patients are encouraged to access different types of devices that are provided for their convenience, the problem of burglary is a major issue. In a recent report, hospitals face yearly losses of $150,000 dollars due to such unpredicted losses of assets [
19]. Currently, designated personnel monitor such assets manually, but the use of wireless systems can easily and effectively minimize such incidents.
To provide such a wireless system, a mobile asset tracking system was developed and installed at the emergency room of a medical center with the objective of reducing nurses’ workloads. This experience also served the purpose of validating the performance of the asset tracking system in a real application environment. In the system, mobile assets (e.g., wheelchairs and syringe pumps) move within the emergency room, freely move out of the tracking area and then can choose to come back to the region, as well. A mobile node is attached to a target asset, and the system tracks the current location of the node using the characteristics of the RF (radio frequency) signals. Specifically, this system is used for two different tasks: asset discovery and asset management. For asset discovery, the approximate location of each mobile medical asset is required; on the other hand, for asset management, the accurate quantity of assets both inside and outside of the target region needs to be known. This system displays the current location of various mobile assets and classifies them as either an inside asset or an outside asset based on the assets’ current location and the connection status of the wireless node attached to the mobile asset. Each medical asset with a mobile node is shown in
Figure 1.
The challenge in designing such a system is the fact that wireless nodes can fail, and it is difficult for the system to distinguish nodes that left the coverage area from the nodes that failed to provide effective service. The main reason behind this complication is the fact that these two types of activities show similar behavior: disconnection from the network. Empirically, during the initial studies with the mobile asset tracking system, several reports regarding this issue were generated. As the outcome of radio dis-connectivity from the network is the same for the two cases, the previous patterns of the wireless connection are carefully investigated to devise an efficient classification method. This method has to effectively distinguish between nodes that leave the monitoring area and faulty nodes that fail to provide service while (physically) within the monitoring area. Specifically, in this work, the classification method uses trends of the neighbor count sequences and link quality statistics for the suddenly disconnected (due to any reason) mobile nodes and also the same information from (previously connected) neighboring boundary nodes in the monitoring area. These collected trends are monitored to distinguish nodes that naturally leave the monitoring area from the nodes that fail to provide satisfactory service.
The evaluations using real traces collected from a real hospital environment show that the system successfully tracks and distinguishes the mobile assets with 100% accuracy, and the system reduces about 97% of the asset management time.
Specifically, the contributions of the paper can be summarized in four-fold.
This work develops a framework to classify failed nodes from mobile nodes, which can leave a monitoring region without failures using a sequence of neighbors of them. This method can be applied to many mobile asset-tracking services.
This work proposes a node state classifier using trends extracted from the neighbor counts and the ratios of the boundary nodes included in the neighbor counts. To the extent of our knowledge, the proposed method is the first state classification technique, for mobile nodes, that does not use heartbeat messages or routing protocols.
This work classifies a mobile node disconnected from a wireless sensor network as either a faulty node within a monitoring region or a node that leaves (or already left) the region without failures based on the trends of connectivity metrics.
This work presents simulations and experiments using a network simulator, and real datasets with the proposed classifier are used. Their results indicate that this state classifier can detect most failed nodes that cannot be identified properly by conventional methods.
The rest of this paper is organized as follows. The related work and background of this study are presented in
Section 2. The architecture of the mobile asset tracking system and its components are presented in
Section 3. The failure detection method is explained in
Section 4. The experimental environment and the experiment results are presented in
Section 5. Finally, conclusions are given in
Section 6.
2. Related Work
Several works on node failure detection in WSNs are briefly reviewed in this section.
Meier
et al. [
20] and Rost and Balakrishnan [
21] proposed a distributed node monitoring tool (DiMo) and Memento, respectively. DiMo and Memento are network management tools for WSNs. These methods divide all nodes into two categories: observer nodes and remote nodes. Each remote node transmits heartbeat messages to its observer node periodically. If the observer node does not hear any heartbeat message for a certain threshold from the remote node, the observer considers the remote node as a faulty node. However, they do not consider a situation in which a mobile node can leave a WSN without failures.
Zia
et al. [
22] proposed a node failure detector that distinguishes between a node failure and a node movement. This method uses two types of nodes: observer nodes and target nodes. When a target node leaves the communication range of an observer node, the observer cannot distinguish between the target’s movement and the target’s failure. In order to handle this situation, the observer uses additional information obtained from one of the initiated nodes in the network. Initiated nodes are a few designated nodes that collect neighbor information from all nodes by propagating a message periodically. When an initiate node receives a message including “the target is alive” from one of the neighbors of the target, the initiator relays the response to the observer. The observer then recognizes that the target has moved. However, the method also does not consider a situation in which the target can leave the network.
Ramanathan
et al. [
23] proposed Sympathy, a tool to debug and detect failures occurring in WSNs. Sympathy runs at individual node, and failure detection occurs at a sink node. There are two types of packets in WSNs: monitored traffic and metric traffic. Each sensor node produces the former, and Sympathy produces the latter. Sympathy monitors the traffic to identify failure nodes and to decide the sources of failures. If a node produces monitored traffic less than a given threshold, Sympathy considers the node to be failed. However, Sympathy is not applicable to mobile nodes that leave the monitoring area without failures. As the sink node cannot hear any messages from all mobile nodes that normally leave the WSN, Sympathy incorrectly considers them to be failed.
Kim and Chung [
24] proposed a failure detection method based on the connection state of a mobile node and its battery lifetime. It is used to detect faulty mobile nodes in mobile asset tracking systems. This method runs on a central server. A mobile node is attached to a mobile object, which is mobile within a monitoring region, leaves it freely and then returns to the area repeatedly. Therefore, the status of a mobile node is either in or out. This failure detection method using the connection state is primarily intended for detecting failed nodes with the in status; on the other hand, the method using the battery lifetime considers the out status. Although a battery lifetime estimator can detect failed nodes that have the out status and the low battery power at the same time, it cannot detect failed nodes that have sufficient battery power. On the other hand, the proposed method in this paper detects failed nodes with the out status regardless of the battery level.
Duche and Sarwade [
25] proposed a node failure detection method using the the round-trip delay time occurring in both directions along a routing path in WSNs. This method detects failure nodes by measuring the latency in a round-trip path and comparing it to a certain threshold. The round-trip delay time of a failed node will be higher than the threshold value or infinite. However, this method cannot detect the failure of a mobile node that can leave the network without failure.
In summary, previous methods can efficiently detect node failures in certain ways. As they use a connection state determined by using heartbeat messages, those methods consider all mobile nodes with the left state to be a failed node. However, most of those methods do not consider a situation in which a mobile node can leave the monitoring region. Therefore, those methods erroneously consider a mobile node that has left the monitoring region without failures to be a failed node. To overcome this shortcoming, the classification method presented in this work distinguishes a faulty node from mobile nodes, which normally disconnects from the wireless sensor network.
3. System Component
3.1. Description
This section formalizes the system architecture of a medical asset tracking system developed in this work and the features of each component composing the system. The system architecture is shown in
Figure 2. This system is composed of four-tuple
, where
T is the asset tracking application,
G is the gateway,
is the set of anchor nodes and
is the set of mobile nodes [
24].
A wireless sensor network is developed based on the ZigBee specifications and on IEEE 802.15.4 [
26]. The devices included in the network form a multiple-depth tree by themselves, exchanging messages with one another. They operate under the beacon-enabled mode to achieve a low duty cycle. A personal area network coordinator (PANC) included in the gateway starts the network formation process, and each node maintains a neighbor list table. This table typically contains neighbors’ addresses and received signal strength indication (RSSI) values for each connection. The anchor nodes and the mobile nodes are developed on the same hardware platform with the same software running on them. However, their functions are different with respect to their device type.
A mobile node is attached to a medical asset and always becomes a leaf node of the network. This node is a battery-powered device with a battery-saving sleep mode. If an anchor node and a mobile node can exchange radio signals, then the anchor node becomes a neighbor of the mobile node. However, a mobile node does not include other mobile nodes as a neighbor. Initially, each mobile node selects a parent node from neighbors that send signals that exceed a threshold. If the signal strength from the current parent is less than the threshold, the mobile node selects another parent node. Each mobile node wakes up periodically and exchanges polling messages with its parent to check whether the wireless connection between them is valid. After confirming the connection, this mobile node gathers RSSI values from its neighboring anchor nodes and sends them to its parent. After transmitting the data, the node enters a sleeping phase.
Anchor nodes are stationary nodes at a fixed location that form a tree network structure to transmit sensing data generated by each node to a gateway. They are installed in a monitoring region or on the boundaries of the target monitoring area and provide a high spatial resolution and a monitoring infrastructure for the mobile nodes. Every anchor node already knows its own position and acts as a router, which forwards messages for mobile nodes and other anchor nodes toward and from the gateway. Each anchor node uses heartbeat messages to detect disconnections of its neighbors.
The gateway is considered as an interface between the application and the wireless sensor network. The gateway receives RSSI values reported by a mobile node through the anchor nodes. The trilateration algorithm in the gateway determines the location of the mobile node using RSSI values received from the node. This location algorithm also uses filters to eliminate invalid RSSI values and to increase the location accuracy. This filter is a simple threshold-based algorithm. This location algorithm will not be discussed in detail in this paper as the details are outside the scope of this study.
The asset tracking application system gathers the location data of all individual nodes from the gateway. It takes the role of keeping track of the current locations of all mobile nodes, determining the enter/exit state of each mobile node, counting the number of assets within (and outside) the monitoring area and displaying all of the gathered data on its graphical user interface.
3.2. Testbed
The 40 m × 30 m emergency room where the prototype system was installed is enclosed with entrances and concrete walls. There are four treatment sections, all of which have no doors and are partitioned by concrete walls, a computed tomography (CT) room, two X-ray rooms, a control room for CT and X-ray scans, nurses’ and doctors’ offices, a waiting room, a staff station, a storage room and a hallway. Concrete walls and metal doors also partition the control room, CT room and X-ray rooms. The emergency room has about 100 medical assets, and four nurses spend about 30 min manually checking whether each asset is within the target area. Nurses selected 21 mobile medical objects, a subset of the ∼100 assets, to evaluate the developed system. The medical asset tracking system is composed of an application, a gateway, 38 anchor nodes deployed within the emergency room or on the boundary of the area and 21 mobile nodes attached to 21 mobile medical objects, one for each object. The medical assets here are two wheelchairs, four ventilators, five syringe pumps and 10 IV poles. Using the system, one nurse can finish the work within one minute.
Figure 3 shows a map of the emergency room enclosed with bold solid lines. They indicate the boundary of the monitoring area.
From an operational perspective, the system required maintenance approximately once every two weeks to exchange the batteries on the mobile assets. Each mobile asset was randomly mobile with a wakeup-and-report interval of 30 s. The RSSI-based location estimations showed an accuracy of ∼2.5 m, which was enough to satisfy the staff’s requirements in a non-line-of-sight (NLOS)-dominated environment. On the other hand, the anchor nodes were powered using wall plugs; thus, they were awake for the entire testing period.
4. Node Classification
In this section, a node classification method is introduced. The classification is between nodes that , therefore not being able to transmit RSSI-included messages, and nodes that the target detection region. These nodes are defined as and , respectively, and comprehensively termed . A straightforward solution is to use the last reported location of a disconnected node. If the final location of a disconnected node is within a monitoring area, then the node is considered to be a failed node. Otherwise, the node is considered to be a left node, which naturally left the target monitoring area. However, this method is not suitable for this system, since all anchor nodes are deployed within the monitoring area or on the boundary of the region. As a result, the developed system and many monitoring systems are incapable of “detecting” packets that are external to this area.
To overcome this shortcoming, the method proposed in this work uses two trends associated with the neighbor counts and the ratios of the boundary nodes included in the neighbors. Let
m be a mobile node,
B be the boundary of a monitoring area,
d be the Euclidean distance between
m and
B,
be the number of
m’s neighbors and
be the number of
neighbors on
B,
. Then, while
m moves far away from the monitoring area, as
d increases,
decreases and
increases. Finally, both
and
become zero when
m loses all communication links with its neighbors.
Figure 4 shows these concepts.
In
Figure 4, the thresholds,
and
, are used to determine whether a disconnected mobile node sends its last value from either inside or outside of the monitoring region. To calculate
and
, a mobile node disconnected from a WSN is mapped onto the nearest location on the boundary of the monitoring area from its last location. Then, the two values,
and
, are estimated. Based on the trends and the thresholds, the proposed method classifies a disconnected mobile node as either a left node or a failed node. The two trends are complementary to each other in various environments. For example, the trend of the neighbor counts reported by a mobile node within the monitoring area may decrease due to barriers, such as walls, other medical assets and people. In this case, an incorrect decision caused by the trend of the neighbor counts can be corrected by observing the ratios of boundary nodes. However, the proposed method does not incur an additional communication cost, because the neighbors’ data are essential to calculate the position of a mobile node in a radio-frequency-based positioning system.
From the above concepts, the proposed method can possess the following properties. Let and be the area within (i.e., inside) and outside the region of a monitoring area, in which the radio signals of the boundary nodes can propagate, respectively. If the ratio of the boundary nodes of a mobile node is greater than zero, the node is considered to be outside the monitoring area with probability /(), where . In addition, let m be a mobile node that has left a sensor network without failures and stayed outside a monitoring area, l be the line segment crossing v and w, which are m’s two nearest nodes on the boundary of the area, be the length of l and be the shortest distance between l and m. If , the communication range of a node, and m is located in the line segment, l, with the distance , then is greater than .
4.1. Data Sequence
When a mobile node is disconnected from a WSN, two sequences are extracted from the history of its neighbor counts. The neighbor counts of a mobile node are a set of observations , each of which is recorded at time t, because they are reported continually at every update period. Therefore, the history of neighbor counts is represented as the time series , where is the last value reported by a mobile node. Each has the property, , where A is the set of anchor nodes and . After the time z, the mobile node is disconnected from the network. As the history contains a large number of values, it is not feasible to extract the trends from the entire history P given the resource limitations on a sensor node platform. Therefore, a short sequence Q is extracted from P. To select Q, a data window expands from of the history P of a disconnected mobile node to the first value that is greater than . Q is represented as , where , where . Another sequence R is extracted from Q, and it is represented as , where and indicates the number of boundary nodes contained in .
4.2. Estimating Neighbor Counts
The number of neighbors of a mobile node at a location within a monitoring area or on the boundary of the area is estimated in this section. The estimated neighbor count is used to determine and and to calculate the missing neighbor rate, defined as , where , and and indicate the observed neighbor count and the estimated neighbor count, respectively.
4.2.1. Grid Model
If it is assumed that anchor nodes are uniformly distributed in a grid pattern, then the number of neighbors of a mobile node is estimated as follows. Let
be the number of neighbor nodes that a mobile node can have when they are measured with a fixed interval. As a sensor network contains
N anchor nodes, the probability that the radio coverage of a mobile node contains
k anchor nodes can be represented as
. Therefore, the probability that a mobile node has
k neighbors is:
where
N is the number of anchor nodes within the monitoring area and
p is the probability that an anchor node falls within the mobile node’s radio coverage.
It is assumed that anchor nodes are uniformly distributed within a rectangular monitoring area. The probability, p, is , where represents the overlapping area between the radio coverage of a mobile node and the monitoring area and represents the area of the monitoring region.
The expected number of neighbor nodes of a mobile node is:
If the radio coverage of a mobile node contains the monitoring area, is equal to N. If the monitoring area contains the radio coverage or the two areas are overlapping, is equal to , because is , where R indicates the radio range of a mobile node. If the two areas are overlapping, is equal to .
4.2.2. Real Deployment
The grid model is a simple and computationally inexpensive method. However, it cannot be applied to this medical asset tracking system because the anchor nodes cannot be deployed in a grid pattern within the emergency room, which is not a rectangle, as well as it has several walls. In addition, anchor nodes were not allowed to be installed on a marble wall. Under these restricted circumstances, the number of neighbors of a mobile node is estimated in two phases, the filter phase and the refinement phase, to shorten the processing time. In the filter phase, the candidate neighbors of the node are found using a minimum bounding rectangle (MBR) in which the communication coverage of the node is contained. This phase is not computationally expensive because at most four comparisons are required to determine whether an anchor node is within the MBR. The candidate neighbors construct the set C defined as , where , the set of anchor nodes. Each element in C has the properties, and , where is the location of , , and and are the coordinates of the MBR of a mobile node.
In the refinement phase, the candidate neighbors are checked for whether they are really the neighbors of the mobile node. The number of nodes processed in this phase is reduced due to the initial filter phase. To select the actual neighbors of the node from C, the distance between the node and in C is calculated. The actual neighbors of the node construct the set N defined as , where . Each element in N has the property , where is the distance function, m indicates the mobile node, indicates that of each element in N, and r is the communication range of mobile node m. Therefore, the number of neighbors of the mobile node equals .
4.2.3. Trend Detection
To extract the trend from
Q and
R, a linear regression model is used. This model finds the best-fitting straight line for all data in a data sequence and decides the trend of the sequence in accordance with the slope of the fitting line. The trend detection used here is the regression of neighbor counts over time and that of ratios of boundary nodes over time. Consider a regression model, where a dependent variable
is linked to an independent variable
through the following equation:
The equation above describes the relationship between
y and
x and represents a line with an intercept of
b on the
y-axis and a slope of
a. The two values,
a and
b, for which the sum of the squares of the estimated errors is the minimum, have to be estimated. The estimation equation is given as follows:
and:
Setting these expressions equal to zero and solving for
a and
b produce:
where
;
a represents the slope, and
b represents the
y-axis intercept. This slope represents the direction of the trend. A negative slope represents a decreasing trend; a positive slope represents an increasing trend; and zero represents that there is no change in the data sequence. Therefore, a left node from a monitoring area has a decreasing trend in
Q and an increasing trend in
R simultaneously.
4.3. Classification
The classification method proposed in this work uses a binary classifier that categorizes a mobile node disconnected from a WSN as either a failed node or a left node. This classifier uses four values. These are two trends extracted from
Q and
R and two thresholds
and
used to determine whether a disconnected mobile node sends its last value from either inside or outside of a monitoring region. Therefore, the classification rule to distinguish between a failed node and a left node consists of four conditions related to the trends and the thresholds. The classification rule is given as:
where
S indicates the slope and
and
indicate the last neighbor count and the last ratio of the boundary nodes, respectively, that a disconnected mobile node transmitted.